Post Type Description
Cyberterrorism Cyber Prevention Vs Cyber Recovery
September 18, 2023The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against ...
Hyper-connectivity: Intricacies Of National And International Cyber Securities
September 18, 2023This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be ...
The California Independent System Operator Security Vulnerabilities
September 18, 2023Our country is still in the early stages of the 21st century where technology is advancing on a daily basis allowing the threat of terrorism, both domestic and foreign, to pose a serious risk to both its citizens and its assets if not addressed soon. There are numerous potentially vulnerable sites throughout the country that ...
Identification And Ranking Of Critical Assets Within An Electrical Grid Under Threat Of Cyber Attack
September 18, 2023This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack. Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations ...
Cyber-Terrorism: Finding A Common Starting Point
September 18, 2023Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have ...
The Discourse Of Cyberterrorism: Exceptional Measures Call For The Framing Of Exceptional Times
September 18, 2023The configuration of the discourse of cyberterrorism in the Netherlands is a mix of public and private actors that have diverging views about whether cyberterrorism is a genuine security threat. How and why have several of these actors argued that it is a genuine security threat? What was their interest in doing so? Has cyberterrorism ...
Detection And Classification Of Social Media Based Extremist Affiliations Using Sentiment Analysis Techniques
September 18, 2023Identification and classification of extremist-related tweets is a hot issue. Extremist gangs have been involved in using social media sites like Facebook and Twitter for propagating their ideology and recruitment of individuals. This work aims at proposing a terrorism-related content analysis framework with the focus on classifying tweets into extremist and non-extremist classes. Based on ...
The Conflict In Jammu And Kashmir And The Convergence Of Technology And Terrorism
September 18, 2023This paper provides recommendations for what government and social media companies can do in the context of Jammu and Kashmir’s developing online theatre of both potential radicalisation and recruitment ...
Voices Of White Resistance: Democratic Theory And The Task Of Contending With White Nationalist Voice
September 18, 2023As white nationalists have come to increasing prominence in recent decades, their presence presents a significant challenge to democratic societies. Motivated by a sense of racial imperilment, and opposed, sometimes violently, to core democratic ideals, white nationalists cannot be meaningfully incorporated into the political life of societies which promote inclusiveness and pluralism without threatening those ...
Caught In The Net: The Impact Of “Extremist” Speech Regulations On Human Rights Content
September 18, 2023Social media companies have long struggled with what to do about extremist content on their platforms. While most companies include provisions about “extremist” content in their community standards, until recently, such content was often vaguely defined, providing policymakers and content moderators a wide berth in determining what to remove, and what to allow. Unfortunately, companies ...