Digital Discourse, Online Repression, And Cyberterrorism: Information Communication Technologies In Russia’s North Caucasus Republics
September 18, 2023
Is the cyber-utopian versus cyber-repression argument the most effective way to frame the political uses of new technologies? Contemporary discourse on social media fails to highlight political dynamics in authoritarian regimes with weak state control, where independent groups can capitalize on the use of coercive force. In this thesis, I will explore the various methods ...
Information Age Terrorism: Toward Cyberterror
September 18, 2023
The growing ubiquity of computers and their associated networks are propelling the world into the information age. Computers may revolutionize terrorism in the same manner that they have revolutionized everyday life. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and ...
Automatic Detection And Forecasting Of Violent Extremist Cyber-Recruitment
September 18, 2023
The growing use of the Internet as a major means of communication has led to the formation of cyber-communities, which have become increasingly appealing to violent extremists due to the unregulated nature of Internet communication. Online communities enable violent extremists to increase recruitment by allowing them to build personal relationships with a worldwide audience capable ...
Assemblages Of Radicalism: The Online Recruitment Practices Of Islamist Terrorists
September 18, 2023
This dissertation explores the various online radicalization and recruitment practices of groups like al-Qaeda and Hezbollah, as well as Salafi Jihadists in general. I will also outline the inadequacies of the federal government’s engagement with terrorist / Islamist ideologies and explore the ways in which early 20th century foundational Islamist theorists like Hasan al-Banna, Sayyid ...
Responding To The Threat Of Cyberterrorism Through Information Assurance
September 18, 2023
The number of people connecting to the Internet is growing at an astounding rate: estimates range from 100% to 400% annually over the next five years. This unprecedented level of interconnectedness has brought with it the specter of a new threat: cyberterrorism. This thesis examines the impact of this threat on the critical infrastructure of ...
Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
CLC – Cyberterrorism Life Cycle Model
September 18, 2023
The rise of technology has brought with it many benefits but also the potential for great dangers. In particular, Information Communication Technology (ICT) is involved in many facets of life-influencing systems, which range from power plants to airports. Terrorists are now realising the great possibilities of interfering with critical infrastructure. Remote access, reduced costs, automation, ...
Terrorists’ Use of the Internet
September 18, 2023
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a ...
Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism
September 18, 2023
It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization ...