منابع
اکبریتبار، علی. (1390). «مطالعه شبکههای اجتماعی مجازی؛ مطالعه موردی شبکههای اجتماعی دوره و یو ۲۴». تحلیل شبکههای اجتماعی. بازنشانی شده در: 3 اسفند 1390، به نشانی: http://www.onlinesna.com/?p=276
دهشیری، محمدرضا؛ جوزانی کهن، شاهین. (1394). «شبکهی سلولهای تروریستی داعش در آسیای مرکزی». فصلنامهی آسیای مرکزی و قفقاز. شمارهی 92.
فاضلی، نعمتاله؛ سلطانیفر، محمد؛ عباسی، حجتاله. (1396). «مزیتها و کارکردهای شبکههای اجتماعی برای گروههای تروریستی (مطالعهی موردی: استفادهی گروه داعش از توییتر و فیسبوک)». فصلنامهی مطالعات رسانههای نوین. دورهی 3. شمارهی 12. ص. 1-30.
فرهنگی، علیاکبر؛ عباسی، حجتاله. (1397). «طراحی مدل مقابله با چالشهای تروریسم رسانهای در شبکههای اجتماعی (مطالعهی موردی: مطالعهی گروه داعش در شبکههای توییتر و فیسبوک». دوفصلنامهی علمیپژوهشی دین و ارتباطات. شمارهی 53.
مرادیفر، سعیده؛ امیدی، علی. (1397). «تحلیل عملکرد داعش در بهکارگیری سه نسل وب». فصلنامهی پژوهشهای ارتباطی. شمارهی 96.
میرمحمدصادقی، میلاد. (1391). تحلیل شبکههای اجتماعی با NodeXL. تهران. نشر دانشگاهی کیان.
ولوین، دارلین؛ ولوین، اندرو؛ و برکو، ری. (1393). مدیریت ارتباطات: فردی و عمومی، ترجمه: داود ایزدی و سیدمحمد اعرابی. تهران: دفتر پژوهشهای فرهنگی.
Anne Aly, Stuart Macdonald, Lee Jarvis & Thomas M. Chen. (2016). “Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization”, Studies in Conflict & Terrorism, DOI: 10.1080/1057610X.2016.1157402.
Backstrom, Lars, Boldi, Paolo, Rosa, Marco, Johan, Ugander, Vigna, Sebastiano. (2012). “Four Degrees of Separation”. 4th Annual ACM Web Science Conference, New York, NY, USA.
Badawy, Adam, Ferrara, Emilio. (2018). “The rise of Jihadist propaganda on social networks”. Journal of Computational Social Science, Volume 1, Issue 2, pp 453–470.
Bargar, Alicia, Pitts, Stephanie, Butkevics, Janis, & McCulloh, Ian. (2019). “Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory”. 11th International Conference on Cyber Conflict: Silent Battle. Tallinn: NATO CCD COE Publications.
BBC. (2011, November 23). “Facebook users average 3.74 degrees of separation”. BBC News. Retrieved at: 30, November, 2011 from: http://www.bbc.co.uk/news/technology-15844230.
Berger, J.M. Morgan, Jonathon. (2015). The ISIS Twitter Census Defining and describing the population of ISIS supporters on Twitter. Brookings Institution.
Berger, J.M. and Perez, Heather. (2016).
“The Islamic State’s Diminishing Returns on Twitter: How Suspensions are Limiting the Social Networks of English-speaking ISIS Supporters”. Program on Extremism. Retrieved at: 28, May, 2018 from:
https://extremism.gwu.edu.
Bodine-Baron, Elizabeth, Helmus, Todd, Magnuson, Madeline, and Winkelman, Zev. (2016). Examining ISIS Support and Opposition Networks on Twitter. RAND Corporation. Santa Monica.
Bonacich, Phillip. (2007). “Some Unique Properties of Eigenvector Centrality”. Social Networks. Volume 29, pp. 555-564.
Borgatti, Stephen, & Halgin, Daniel. (2011). “On network theory”. Organization Science. Volume 22, pp. 1168-1181.
Borgatti, Stephen, Lopez-Kidwell, Virginie. (2011). “Network Theory”. In The Sage Handbook of Social Network Analysis.
Catanese, Salvatore, De Meo, Pasquale, Ferrara, Emilio, and Fiumara, Giacomo. (2010). “Analyzing the Facebook Friendship Graph”. 1st International Workshop on Mining the Future Internet (MIFI '10).
Conway, Maura, Khawaja, Moign, Lakhani Suraj, Reffin, Jeremy, and Robertson, Andrew. (2017). “Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts”. Studies in Conflict & Terrorism. Volume 42, 2019 - Issue 1-2: Islamic States Online Activity and Responses, pp.141-160.
Freeman, Linton. (1977). “A Set of Measures of Centrality Based on Betweenness”. Sociometry, Volume 40, pp. 35-41.
Freeman, Linton. (2004). The Development of Social Network Analysis: a Study in The Sociology of Science. North Charleston, South Carolina: BookSurge, LLC.
Hansen, Derek, Shneiderman, Ben, & Smith, Mark. (2011). Analyzing Social Media Networks with NodeXL: Insights From a Connected World. Elsevier Inc.
Jacobs, Ryan Timothy. (2015). “Daesh and Social Media Platforms”. Research Gate. Retrieved at: 29 May 2018 from: "https://www.researchgate.net/publication/281493804_Daesh_and_Social_Media_Platforms"
Koschade, Stuart. (2006). “A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence”. Studies in Conflict & Terrorism. Volume 29, pp. 559–575.
Lewis, Kewin, Kaufman, Jason, Gonzalez, Marco, Wimmer, Andreas, & Christakis, Nicholas. (2008). “Tastes, ties, and time: A new social network dataset using Facebook.com”. Social Networks. Volume 30, pp. 330-342.
McAllister, Brad. (2004). “Al Qaeda and the Innovative Firm: Demythologizing the Network”. Studies in Conflict and Terrorism. Volume 27, pp. 297-319.
McPherson, Miller, Smith-Lovin, Lynn, & Cook, James. M. (2001). “Birds of a Feather: Homophily in Social Networks”. Annual review of sociology, Volume 27, pp. 415–444.
Maiya, Arun, Berger-Wolf, Tanya. (2010). “Online Sampling of High Centrality Individuals in Social Networks”. PAKDD 10, pp. 91-98.
Newman, Mark. (2018). Networks. Oxford University Press. Oxford.
Nissen, Thomas Elkjer. (2014). “Terror.com - IS’s Social Media Warfare in Syria and Iraq”. Military Studies Magazine. Issue 02, Volume 02.
Parekh, Deven, Amarasingam, Amarnath, Dawson, Lorne, and Ruths, Derek. (2018). “Studying Jihadists on Social Media: A Critique of Data Collection Methodologies”. Perspectives On Terrorism. Issue 03, Volume 12, pp. 3-21.
Ressler, Steve. (2006). “Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research”. Homeland Security Affairs, 2(II).
Rodriquez, Josep. (2005). “The March 11th Terrorist Network: In its weakness lies its strength”. International Sunbelt Conference. Los Angeles.
Sageman, Mark. (2007). “Radicalization of global Islamist terrorists”. Address to United States senate committee on homeland security and governmental affairs.
Sageman, Mark. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia, PA: University of Pennsylvania Press.
Sabidussi, Gert. (1966). “The Centrality Index of a Graph”. Psychometrika, 581-601.
Shaheen, joseph. (2015). “Network of terror: how DAESH uses adaptive social networks to spread it's message”. Riga.
Tsvetovat, Maksim, Kouznetsov, Alexander. (2011). Social Network Analysis for Startups. O’Reilly Media.
Wasserman, Stanley, & Faust, Katherina. (1994). Social network analysis: methods and applications. New York: Cambridge University Press.