From Traits to Threats – Identification of Personality Traits for Individuals at Risk of Radicalisation on Social Media
September 18, 2023
This Thesis contributes by proposing a method for identifying users believed to be at risk of radicalisation on social media, by utilising the social media networks of already radicalised individuals and a set of indicators derived from related work on radicalisation. In addition, this Thesis provides a new to the field, in-depth analysis of the ...
Hacktivism: An Analysis of the Motive to Disseminate Confidential Information
September 18, 2023
Anonymous, LulzSec, and the AntiSec movement are Internet-based organizations seeking to obtain and disseminate confidential data. Governments worldwide have made an attempt to crack down on these groups in response to the actions taken by them. Several countries, including the United States (Federal Bureau of Investigation, 2011a; 2011b; Department of Justice, 2011), the United Kingdom ...
The Geneva Conventions in Modern Warfare: A Contemporary Analysis of Conflict Classification, Combatant Status, and Detainee Treatment in the War on Terror
September 18, 2023
This study is focused on three topics regarding Geneva Convention III. First, is the process of classifying conflicts either as a Common Article 2 or Common Article 3 armed conflict at the onset of hostilities. Conflict classification is critical to the implementation of the Geneva Conventions in warfare and carries with it vast implications dependent ...
Cyberterrorism: Cyber Prevention Vs Cyber Recovery
September 18, 2023
The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against ...
Users’ Adoption Of Emergent Technologies: Towards an Acceptable Model for Safer Cyber-Assisted Olfactory Information Exchanges in Standard, Micro, and Nano Systems
September 18, 2023
The potential of terrorists and other enemies to use the Internet and/or other digital information technologies as transport vehicles of weapons of mass destruction (WMD) is becoming more evident. This threat may involve cyber-assisted biochemical transactions, which can be performed through olfactory information exchanges, to attack civilian and military targets anytime. In response, this research ...
Risk Of Cyberterrorism To Naval Ships Inport Naval Station Everett a model based project utilizing SIAM
September 18, 2023
Based on numerous high level concerns that the cyber threat is expected to increase, as well as the already documented uses of cyber warfare, it is necessary to ensure our naval ships are hardened against such attacks. In doing so, an influence net model was designed to discover the likelihood of a successful cyber attack. ...
Historical Events And Supply Chain Disruption: chemical, biological, radiological and cyber events
September 18, 2023
In the wake of the attacks of September 11, 2001, terrorism emerged as a legitimate threat not just to society, but to corporations as well. This new threat has challenged old business rules and prompted companies to rethink their supply chain operations. However, the events of September 11th were not the first or the only ...
A Discourse In Conflict: Resolving The Definitional Uncertainty Of Cyber War
September 18, 2023
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved. Using the methodology of discourse analysis, this thesis addresses this research need. Analysis has identified that the study of cyber war ...
Sony Pictures And The US Federal Government: A Case Study Analysis Of The Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
September 18, 2023
In this case study, I analyze the 2014 North Korean computer database hack of Sony Pictures Entertainment (SPE), a serious national security crisis of cyberterrorism. I utilize Normal Accidents theory as a lens, to help explain how the accident within one system (SPE) and later crisis lead to the interaction with a second system (U.S. ...
Cyberterrorists: Their Communicative Messages and the Effect on Targets
September 18, 2023
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to cause maximal damage while using terrorist propaganda. The very definition of cyberterrorism refers to Internet use, technology, and computer-based networks against critical infrastructures. The application of Stamper’s Semiotic Ladder– morphological, empirical, syntactical, semantic, pragmatic and social world –to the various methods of ...