Cybersecurity
Security Awareness for IS-Supporters on Telegram
May 30, 2025The so-called Islamic State (IS) has always had a strong online presence. The purpose of most IS propaganda is to shape perceptions and polarise the support of their audience, but there are also other forms of communication from the group and its supporters. In this paper, we present an analysis of the content from two ...
A feminist theorisation of cybersecurity to identify and tackle online extremism
April 29, 2025Online abuse and extremism disproportionately target marginalised populations, particularly people of colour, women and transgender and non‑binary people. The core argument of this report focuses on the intersecting failure of Preventing and Counter Violent Extremism (P/CVE) policies and cybersecurity policies to centre the experiences and needs of victims and survivors of online extremism and abuse. ...
The Internet of Things and Terrorism: A Cause for Concern
September 18, 2023Over recent years, there have been rapid advances in information and communication technology. The Internet of Things (IoT), an instance of such technologies, has brought numerous benefits to societies, revolutionising the lifestyles of many individuals living in these societies. Whilst advances in the IoT undoubtedly offer numerous benefits, they simultaneously present a wide range of ...
Public support for counterterrorism efforts using probabilistic computing technologies to decipher terrorist communication on the internet
September 18, 2023Advancements in big data analytics offer new avenues for the analysis and deciphering of suspicious activities on the internet. One promising new technology to increase the identification of terrorism threats is based on probabilistic computing. The technology promises to provide more efficient problem solutions in encryption and cybersecurity. Probabilistic computing technologies use large amounts of ...
A Discourse In Conflict: Resolving The Definitional Uncertainty Of Cyber War
September 18, 2023Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved. Using the methodology of discourse analysis, this thesis addresses this research need. Analysis has identified that the study of cyber war ...
Users’ Adoption Of Emergent Technologies: Towards an Acceptable Model for Safer Cyber-Assisted Olfactory Information Exchanges in Standard, Micro, and Nano Systems
September 18, 2023The potential of terrorists and other enemies to use the Internet and/or other digital information technologies as transport vehicles of weapons of mass destruction (WMD) is becoming more evident. This threat may involve cyber-assisted biochemical transactions, which can be performed through olfactory information exchanges, to attack civilian and military targets anytime. In response, this research ...
Cyberterrorism: Cyber Prevention Vs Cyber Recovery
September 18, 2023The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against ...
Hyper-connectivity: Intricacies Of National And International Cyber Securities
September 18, 2023This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be ...
An Analysis Of International Agreements Over Cybersecurity
September 18, 2023Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and ...