Lella Nouri

Lella Nouri
  • Doctor of Philosophy
  • Lecturer at Swansea University

About

10
Publications
4,271
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
124
Citations
Introduction
Lella Nouri is a Senior Lecturer of Criminology and Programme Director of the MA in Cyber Crime and Terrorism at Swansea University. She specialises in the radical right and extremist use of the internet. Lella heads up the Online Radical Right Research International Network (ORIN) which is part of Swansea University’s Cyber Threats Intelligence Centre.
Current institution
Swansea University
Current position
  • Lecturer

Publications

Publications (10)
Research
Full-text available
Seeking to explore the nature of European far-right online ecosystems, this research report examines the outlinking activity of identified pro-far-right users among the followers of the official Twitter accounts of two prominent far-right European political parties, Germany’s Alternative für Deutschland (AfD) and France’s Rassemblement National (RN...
Article
This article examines the visual strategy of the U.K. radical right group Britain First as they were removed from Facebook and migrated to a less regulated platform – Gab. Data was collected over two four month periods in 2017 and 2018. Using methods from discourse analysis, the study identifies visual changes in terms of content, including a shift...
Article
The use of social media by extreme right groups and the self-proclaimed formation of the ‘alt-right’ in recent years have been linked to the rise in US white nationalism. Against a backdrop of widespread concern regarding the growing nature of the ‘alt-right’ phenomenon, this article responds to the pressing need to understand its appeal. Specifica...
Research
Full-text available
In 2012 members of the Cyberterrorism Project conducted a survey of researchers on cyberterrorism. A total of 118 responses were received, from researchers working in 24 countries across six continents. The findings were published in a report and series of four journal articles, listed below, examining understandings of cyberterrorism, assessments...
Book
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of p...
Article
Full-text available
This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discuss...
Research
Full-text available
This report contains findings from the Cyberterrorism Project’s symposium on terrorists’ use of the Internet. The event was hosted by Swansea University, UK, on 5-6 June 2014. 43 delegates attended the symposium, including researchers from a number of UK universities, as well as institutions in the Republic of Ireland, France, the Netherlands, Norw...
Article
Chapter Overview: This chapter engages with the concept of cyberterrorism by investigating three connected questions. First, to what - if anything does cyberterrorism refer, and from where does its meaning derive? Second, how useful is this term for academics, policymakers, legislators and other potential users? Third, what problems or limitations...
Article
Full-text available
This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those...

Network

Cited By