Post Type Description
Cybercrimes against the Electricity Infrastructure: Exploring Hacker and Industry Perceptions
September 18, 2023The US electricity infrastructure uses Industrial Control Systems (ICS) to oversee its operations. These systems are connected online for better efficiency, making them susceptible to cyberattacks. Current research has extensively addressed ICS vulnerabilities that can be exploited by cybercriminals. Vulnerabilities, however, are only one of the many factors influencing offender decision-making in cyberattacks. Furthermore, numerous ...
The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions
September 18, 2023This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat. First, it explores elements of virtual to virtual attacks. Second, it looks at threats against critical infrastructures that can be traced to online sources. Third, this thesis reports on ways ...
Confronting Cyberterrorism With Cyber Deception
September 18, 2023This thesis concerns the possibility of deceiving cyberterrorists using defensive deception methods. As cyberspace today is a battleground for myriad cyber attacks and intrusions, it may only be a matter of time before terrorists choose to advance their deadly cause in cyberspace. We explore some of the questions raised regarding the threat of cyberterrorism by ...
Understanding The Expression Of Grievances In The Arabic Twitter-sphere Using Machine Learning
September 18, 2023The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the grievances in Twitter in an Arabian context. To understand the characteristics of the Twitter users who expressed the identified grievances, data mining techniques and ...
Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (and As It Should Be)
September 18, 2023Nick Drnaso’s graphic novel Sabrina provides a powerful snapshot of online norms. The picture is not pretty. A young woman goes missing. Her grief-struck boyfriend cannot bear to stay in their home and escapes to a friend’s house. Her sister struggles with the pain of her loss. We learn that the woman’s neighbor, a misogynist ...
Briefing Note ‘El Rubio’ Lives: The Challenge Of Arabic Language Extremist Content On Social Media Platforms
September 18, 2023This briefing outlines research uncovering thousands of users viewing extremist content in Arabic language across mainstream social platforms including Facebook and YouTube. The findings emerged as world leaders, policymakers, and technology companies gathered in Jordan earlier this month to discuss counter-terrorism and extremism as part of the Aqaba Process and the convening of the Global ...
Social Media and Terrorist Financing: What are the Vulnerabilities and How Could Public and Private Sectors Collaborate Better?
September 18, 2023• Social media companies should recognise the political importance of counterterrorist financing (CTF) by explicitly reflecting the priorities of the UN Security Council and the Financial Action Task Force (FATF) in their policies, strategies and transparency reports. • Furthermore, social media companies identified as being at high risk of exploitation should update their terms of ...
The Hunt For The Paper Tiger: The Social Construction Of Cyberterrorism
September 18, 2023For two decades, there has been a high-profile debate on the issue of cyberterrorism. Politicians, law enforcement agents, the information security industry, other experts and the press have all made claims about the threats to and vulnerabilities in our society, who is responsible and what should be done. This is a UK study in the ...
The Effectiveness Of The Principle Of Distinction In The Context Of Cyber Warfare
September 18, 2023International humanitarian law provides foundational norms which are to be observed by states in order to protect civilians from the harsh realities of war. These norms have been applied to traditional kinetic methods of warfare but as technology advances at a rapid pace so too do methods of warfare. As weaponry becomes more sophisticated it ...
Knowledge And Perceptions Of Cyberterrorism
September 18, 2023While the threat of terrorists utilizing the Internet to execute a cyberterrorist attack is of prominent concern there exist great misconceptions and factual errors in the media as to the nature of this threat (Conway, 2002; Embar-Seddon, 2002; Weimann, 2005). This thesis examined media exposure, knowledge of cyberterrorism, fear of terrorism and perceived seriousness of ...