1. African Union. (2014) African Union Convention on Cyber Security and Personal Data Protection. Available at https://au.int/sites/default/files/treaties/29560-treaty-0048_-_african_union_convention_on_cyber_security_and_personal_data_protection_e.pdf (Accessed: 28 May 2024)
2. Al Jazeera Staff (2016) ‘Q&A: Boko Haram’s Changing Tactics’, Al Jazeera, 11 February. Available at https://www.aljazeera.com/news/2016/02/qa-boko-haram-changing-tactics-160211045508486.html (Accessed: 28 May 2024)
3. Allen, K. (2022) ‘Weaponised Drones - the Latest Tech Threat to Reach Africa’, Institute for Security Studies, 11 October. Available at https://issafrica.org/iss-today/weaponised-drones-the-latest-tech-threat-to-reach-africa (Accessed: 28 May 2024)
4. Aly, A., Macdonald, S., Jarvis, L., and Chen, T. M. (2017) ‘Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization’, Studies in Conflict & Terrorism, 40(1), pp. 1–9. DOI: https://doi.org/10.1080/1057610X.2016.1157402, ISSN 1057-610X
5. Archetti, C. (2015) Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. Perspectives on Terrorism, 9(1), pp. 49–59. ISSN 2334-3745