Hyper-connectivity: Intricacies Of National And International Cyber Securities
September 18, 2023
This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be ...
The California Independent System Operator Security Vulnerabilities
September 18, 2023
Our country is still in the early stages of the 21st century where technology is advancing on a daily basis allowing the threat of terrorism, both domestic and foreign, to pose a serious risk to both its citizens and its assets if not addressed soon. There are numerous potentially vulnerable sites throughout the country that ...
Identification And Ranking Of Critical Assets Within An Electrical Grid Under Threat Of Cyber Attack
September 18, 2023
This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack. Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations ...
Cyber-Terrorism: Finding A Common Starting Point
September 18, 2023
Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have ...
The Discourse Of Cyberterrorism: Exceptional Measures Call For The Framing Of Exceptional Times
September 18, 2023
The configuration of the discourse of cyberterrorism in the Netherlands is a mix of public and private actors that have diverging views about whether cyberterrorism is a genuine security threat. How and why have several of these actors argued that it is a genuine security threat? What was their interest in doing so? Has cyberterrorism ...
Detection And Classification Of Social Media Based Extremist Affiliations Using Sentiment Analysis Techniques
September 18, 2023
Identification and classification of extremist-related tweets is a hot issue. Extremist gangs have been involved in using social media sites like Facebook and Twitter for propagating their ideology and recruitment of individuals. This work aims at proposing a terrorism-related content analysis framework with the focus on classifying tweets into extremist and non-extremist classes. Based on ...
The Conflict In Jammu And Kashmir And The Convergence Of Technology And Terrorism
September 18, 2023
This paper provides recommendations for what government and social media companies can do in the context of Jammu and Kashmir’s developing online theatre of both potential radicalisation and recruitment ...
Voices Of White Resistance: Democratic Theory And The Task Of Contending With White Nationalist Voice
September 18, 2023
As white nationalists have come to increasing prominence in recent decades, their presence presents a significant challenge to democratic societies. Motivated by a sense of racial imperilment, and opposed, sometimes violently, to core democratic ideals, white nationalists cannot be meaningfully incorporated into the political life of societies which promote inclusiveness and pluralism without threatening those ...
Caught In The Net: The Impact Of “Extremist” Speech Regulations On Human Rights Content
September 18, 2023
Social media companies have long struggled with what to do about extremist content on their platforms. While most companies include provisions about “extremist” content in their community standards, until recently, such content was often vaguely defined, providing policymakers and content moderators a wide berth in determining what to remove, and what to allow. Unfortunately, companies ...
Hate in the Machine: Anti-Black and Anti-Muslim Social Media Posts as Predictors of Offline Racially and Religiously Aggravated Crime
September 18, 2023
National governments now recognize online hate speech as a pernicious social problem. In the wake of political votes and terror attacks, hate incidents online and offline are known to peak in tandem. This article examines whether an association exists between both forms of hate, independent of ‘trigger’ events. Using Computational Criminology that draws on data ...