Personal information

Verified email domains

Ireland

Biography

Maura Conway is Paddy Moriarty Professor of Government and International Studies in the School of Law and Government at Dublin City University, Ireland; Visiting Professor of Cyber Threats at CYTREC, Swansea University; and the Coordinator of the VOX-Pol academic network for research in violent online political extremism.

Activities

Employment (2)

Dublin City University: Dublin, IE

2006-09 to present | Lecturer/Senior Lecturer/ Professor (Law and Government )
Employment
Source: Self-asserted source
Maura Conway

University of St Andrews: St. Andrews, Scotland, GB

2003-08 to 2005-06 | Teaching Fellow (International Relations)
Employment
Source: Self-asserted source
Maura Conway

Education and qualifications (3)

Trinity College Dublin: Dublin, IE

1999-09 to 2006-07 | PhD (Political Science )
Education
Source: Self-asserted source
Maura Conway

University of Limerick: Limerick, IE

1997-09 to 1998-08 | MA International Studies (Politics and International Relations)
Education
Source: Self-asserted source
Maura Conway

National University of Ireland - Galway: Galway, Galway, IE

1994-09 to 1997-05 | BA (Sociology and Politics, Law)
Education
Source: Self-asserted source
Maura Conway

Works (31)

Introduction to Special Issue: The Practicalities and Complexities of (Regulating) Online Terrorist Content Moderation

Studies in Conflict & Terrorism
2023-06-19 | Journal article
Contributors: Maura Conway; Stuart Macdonald
Source: check_circle
Crossref

Online Extremism and Terrorism Research Ethics: Researcher Safety, Informed Consent, and the Need for Tailored Guidelines

Terrorism and Political Violence
2021-02-17 | Journal article
Contributors: Maura Conway
Source: check_circle
Crossref

Introduction to the Special Issue: Extremism and Terrorism Online—Widening the Research Base

Studies in Conflict & Terrorism
2021-01-21 | Journal article
Contributors: Maura Conway; Stuart Macdonald
Source: check_circle
Crossref

A Snapshot of the Syrian Jihadi Online Ecology: Differential Disruption, Community Strength, and Preferred Other Platforms

Studies in Conflict & Terrorism
2021-01-04 | Journal article
Contributors: Maura Conway; Moign Khawaja; Suraj Lakhani; Jeremy Reffin
Source: check_circle
Crossref

Introduction to the Special Issue: Islamic State’s Online Activity and Responses, 2014–2017

Studies in Conflict & Terrorism
2019-02-05 | Journal article
Contributors: Maura Conway; Stuart Macdonald
Source: check_circle
Crossref

Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research

Studies in Conflict and Terrorism
2017 | Journal article
EID:

2-s2.0-84963615161

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes

Criminology and Public Policy
2017 | Journal article
EID:

2-s2.0-85012870161

Contributors: Gill, P.; Corner, E.; Conway, M.; Thornton, A.; Bloom, M.; Horgan, J.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Countering terrorism via the internet

Routledge Handbook of Law and Terrorism
2015 | Book
EID:

2-s2.0-84941299628

Contributors: Conway, M.; Walker, C.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems

Social Science Computer Review
2015 | Journal article
EID:

2-s2.0-84936939596

Contributors: O’Callaghan, D.; Greene, D.; Conway, M.; Carthy, J.; Cunningham, P.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Online terrorism and online laws

Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide
2015 | Journal article
EID:

2-s2.0-84941614634

Contributors: Walker, C.; Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

From "cyberterrorism" to "online radicalism"

Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia
2014 | Book
EID:

2-s2.0-84945986531

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Online social media in the Syria conflict: Encompassing the extremes and the in-betweens

ASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
2014 | Conference paper
EID:

2-s2.0-84911122141

Contributors: O'Callaghan, D.; Prucha, N.; Greene, D.; Conway, M.; Carthy, J.; Cunningham, P.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Reality check: Assessing the (un)likelihood of cyberterrorism

Cyberterrorism: Understanding, Assessment, and Response
2014 | Book
EID:

2-s2.0-84929929965

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

What is cyberterrorism and how real is the threat?: A review of the academic literature, 1996-2009

Cyber Behavior: Concepts, Methodologies, Tools, and Applications
2014 | Book
EID:

2-s2.0-84960481530

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

An analysis of interactions within and between extreme right communities in social media

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84893817955

Contributors: O'Callaghan, D.; Greene, D.; Conway, M.; Carthy, J.; Cunningham, P.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Terrorist use of the internet and the challenges of governing cyberspace

Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
2013 | Book
EID:

2-s2.0-84937557157

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Uncovering the wider structure of extreme right communities spanning popular online networks

Proceedings of the 5th Annual ACM Web Science Conference, WebSci'13
2013 | Conference paper
EID:

2-s2.0-84883062542

Contributors: O'Callaghan, D.; Greene, D.; Conway, M.; Carthy, J.; Cunningham, P.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Exploring the form and function of dissident Irish Republican online discourses

Media, War and Conflict
2012 | Journal article
EID:

2-s2.0-84859467889

Contributors: Bowman-Grieve, L.; Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Introduction: Terrorism and contemporary mediascapes - reanimating research on media and terrorism

Critical Studies on Terrorism
2012 | Journal article
EID:

2-s2.0-84870863482

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Terrorism in 'old' and 'new' media

Media, War and Conflict
2012 | Journal article
EID:

2-s2.0-84859467514

Contributors: Conway, M.; McInerney, L.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

What is cyberterrorism and how real is the threat? a review of the academic literature, 1996 - 2009

Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
2012 | Book
EID:

2-s2.0-84898305260

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

What's love got to do with it? Framing 'JihadJane' in the US press

Media, War and Conflict
2012 | Journal article
EID:

2-s2.0-84859474971

Contributors: Conway, M.; McInerney, L.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Privacy and security: Against cyberterrorism

Communications of the ACM
2011 | Journal article
EID:

2-s2.0-79551717481

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Combining social network analysis and sentiment analysis to explore the potential for online radicalisation

Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009
2009 | Conference paper
EID:

2-s2.0-70349804705

Contributors: Bermingham, A.; Conway, M.; Mclnerney, L.; O'Hare, N.; Smeaton, A.F.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Jihadi video and auto-radicalisation: Evidence from an exploratory YouTube study

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-58849133782

Contributors: Conway, M.; McInerney, L.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Terrorist use of the internet and the challenges of governing cyberspace

Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
2008 | Book
EID:

2-s2.0-84900083062

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Terrorism and the Internet: New media - New threat?

Parliamentary Affairs
2006 | Journal article
EID:

2-s2.0-33745602731

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Cybercortical warfare: Hizbollah's Internet strategy

The Internet and Politics: Citizens, Voters and Activists
2005 | Book
EID:

2-s2.0-84905797459

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Terrorist web sites: Their contents, functioning, and effectiveness

Media and Conflict in the Twenty-First Century
2005 | Book
EID:

2-s2.0-84995711115

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Hackers as Terrorists? Why it Doesn't Compute

Computer Fraud and Security
2003 | Journal article
EID:

2-s2.0-0344308564

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier

Reality bytes: Cyberterrorism and terrorist 'use' of the internet

First Monday
2002 | Journal article
EID:

2-s2.0-0012422098

Contributors: Conway, M.
Source: Self-asserted source
Maura Conway via Scopus - Elsevier