The Discourse Of Cyberterrorism: Exceptional Measures Call For The Framing Of Exceptional Times
September 18, 2023
The configuration of the discourse of cyberterrorism in the Netherlands is a mix of public and private actors that have diverging views about whether cyberterrorism is a genuine security threat. How and why have several of these actors argued that it is a genuine security threat? What was their interest in doing so? Has cyberterrorism ...
An Analysis Of International Agreements Over Cybersecurity
September 18, 2023
Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and ...
Digital Discourse, Online Repression, And Cyberterrorism: Information Communication Technologies In Russia’s North Caucasus Republics
September 18, 2023
Is the cyber-utopian versus cyber-repression argument the most effective way to frame the political uses of new technologies? Contemporary discourse on social media fails to highlight political dynamics in authoritarian regimes with weak state control, where independent groups can capitalize on the use of coercive force. In this thesis, I will explore the various methods ...
Brand Caliphate And Recruitment Between The Genders
September 18, 2023
Since the declaration of the Islamic State (IS) in 2014, men and women have been recruited to join the Caliphate in numbers surpassing those recruited by al Qaida. This variance in recruitment volume is likely attributable to the online propaganda campaign, Brand Caliphate. This thesis looks at the recruitment of women and asks if Brand ...
“Support For Sisters Please”: Comparing The Online Roles Of Al-Qaeda Women And Their Islamic State Counterparts
September 18, 2023
This study evaluates female roles in pro-jihadist terrorism by examining online content. Data was collected from 36 Twitter accounts of women associated with al-Qaeda (AQ) affiliated groups for a period of six months. The purpose for collecting this data was to: 1) compare how traditional female roles, as constructed within a jihadi-Salafist ideology, are reproduced ...
Promises Of Paradise? – A Study On Official ISIS-Propaganda Targeting Women
September 18, 2023
Since the outbreak of the Syrian civil war in 2011 close to 30 000 foreign recruits from more than 100countries have migrated to the area of Iraq and Syria in support of the terrorist organization this thesis will refer to as ISIS. Among those traveling is a historically unprecedented number of women. Why women are ...
Application Of Recurrent Neural Networks In Toxic Comment Classification
September 18, 2023
Moderators of online discussion forums often struggle with controlling extremist comments on their platforms. To help provide an efficient and accurate tool to detect online toxicity, we apply word2vec’s Skip-Gram embedding vectors, Recurrent Neural Network models like Bidirectional Long Short-term Memory to tackle a toxic comment classification problem with a labeled dataset from Wikipedia Talk ...
Automatic Detection And Forecasting Of Violent Extremist Cyber-Recruitment
September 18, 2023
The growing use of the Internet as a major means of communication has led to the formation of cyber-communities, which have become increasingly appealing to violent extremists due to the unregulated nature of Internet communication. Online communities enable violent extremists to increase recruitment by allowing them to build personal relationships with a worldwide audience capable ...
Detection And Monitoring Of Improvised Explosive Device Education Networks Through The World Wide Web
September 18, 2023
As the information age comes to fruition, terrorist networks have moved mainstream by promoting their causes via the World Wide Web. In addition to their standard rhetoric, these organizations provide anyone with an Internet connection the ability to access dangerous information involving the creation and implementation of Improvised Explosive Devices (IEDs). Unfortunately for governments combating ...
Information Age Terrorism: Toward Cyberterror
September 18, 2023
The growing ubiquity of computers and their associated networks are propelling the world into the information age. Computers may revolutionize terrorism in the same manner that they have revolutionized everyday life. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and ...