707
edits
No edit summary |
No edit summary |
||
Line 66: | Line 66: | ||
that are using Internet and their extremely popular applications based on Social Media to radicalise and | that are using Internet and their extremely popular applications based on Social Media to radicalise and | ||
recruit European citizens that later could be part of terrorist cells. On the other hand, any risks assessment | recruit European citizens that later could be part of terrorist cells. On the other hand, any risks assessment | ||
methodology will need from a specific software tool, which using the latest and mature technologies from | methodology will need from a specific software tool, which using the latest and mature technologies from ICT, could be used to provide an adequate framework for terrorism and human behaviour experts to analyse the huge amount of information available in the mentioned sources. | ||
ICT, could be used to provide an adequate framework for terrorism and human behaviour experts to analyse the huge amount of information available in the mentioned sources. | |||
}} | }} | ||
edits