MA Thesis |
Sony Pictures And The US Federal Government: A Case Study Analysis Of The Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
View Abstract
In this case study, I analyze the 2014 North Korean computer database hack of Sony Pictures Entertainment (SPE), a serious national security crisis of cyberterrorism. I utilize Normal Accidents theory as a lens, to help explain how the accident within one system (SPE) and later crisis lead to the interaction with a second system (U.S. Federal Government), the development of a new crisis, and the need for a crisis response from system two. The evolution of a single organization’s accident into a national security crisis does not occur without specific complex interactions that take place to connect the two systems together. To explain this interconnectedness between systems, I introduce two new constructs: 1) common denominator and 2) common goal, which expand Normal Accidents theory allowing it to account for the coupling between the two independent systems (SPE & United States Government) through non-linear interactions. Overall, this case study provides important insight for future crisis communication planning, response, and development regarding between-organization interaction during a crisis.
|
2017 |
Ismail, M. |
View
Publisher
|
MA Thesis |
A Discourse In Conflict: Resolving The Definitional Uncertainty Of Cyber War
View Abstract
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved. Using the methodology of discourse analysis, this thesis addresses this research need. Analysis has identified that the study of cyber war and cyber warfare is inherently interdisciplinary. The most prominent academic disciplines contributing definitions are Strategic Studies, Security Studies, Information and Communications Technology, Law, and Military Studies. Despite the apparent definitional uncertainty, most researchers do not offer formal definitions of cyber war or cyber warfare. Moreover, there is little evidentiary basis in literature to distinguish between cyber war and cyber warfare. Proximate analysis of definitions of cyber war and cyber warfare suggests a high level of inconsistency between dozens of definitions. However, through deeper analysis of both the relationships between definitions and their underlying structure, this thesis demonstrates that (a) the relationships between definitions can be represented hierarchically, through a discourse hierarchy of definitions; and (b) all definitions share a common underlying structure, accessible through the application of a structural definition model. Crucially, analysis of definitions via these constructs allows a foundational definition of cyber war and cyber warfare to be identified. Concomitantly, use of the model identifies the areas of greatest interdefinitional inconsistency and the implications thereof and contributes to the construction of a taxonomy of definitions of cyber war and cyber warfare. Considered holistically, these research outputs allow for significant resolution of the inconsistency between definitions. Moreover, these outputs provide a basis for the emergence of dominant functional definitions that may aid in the development of policy, strategy, and doctrine.
|
2017 |
Hughes, D. |
View
Publisher
|
Book |
Cyber Racism and Community Resilience: Strategies for Combating Online Race Hate
View Abstract
This book highlights cyber racism as an ever growing contemporary phenomenon. Its scope and impact reveals how the internet has escaped national governments, while its expansion is fuelling the spread of non-state actors. In response, the authors address the central question of this topic: What is to be done? Cyber Racism and Community Resilience demonstrates how the social sciences can be marshalled to delineate, comprehend and address the issues raised by a global epidemic of hateful acts against race. Authored by an inter-disciplinary team of researchers based in Australia, this book presents original data that reflects upon the lived, complex and often painful reality of race relations on the internet. It engages with the various ways, from the regulatory to the role of social activist, which can be deployed to minimise the harm often felt. This book will be of particular interest to students and academics in the fields of cybercrime, media sociology and cyber racism.
|
2017 |
Jakubowicz, A., Dunn, K., Mason, G., Paradies, Y., Bliuc, A.M., Bahfen, N., Oboler, A., Atie, R. and Connelly, K. |
View
Publisher
|
Journal Article |
‘Stop fake hate profiles on Facebook’: Challenges for crowdsourced activism on social media
View Abstract
This research examines how activists mobilise against fake hate profiles on Facebook. Based on six months of participant observation, this paper demonstrates how Danish Facebook users organised to combat fictitious Muslim profiles that spurred hatred against ethnic minorities. Crowdsourced action by Facebook users is insufficient as a form of sustainable resistance against fake hate profiles. A viable solution would require social media companies, such as Facebook, to take responsibility in the struggle against fake content used for political manipulation.
|
2017 |
Farkas, J. and Neumayer, C. |
View
Publisher
|
Journal Article |
Extreme Speech Online: An Anthropological Critique of Hate Speech Debates
View Abstract
Exploring the cases of India and Ethiopia, this article develops the concept of “extreme speech” to critically analyze the cultures of vitriolic exchange on Internet-enabled media. While online abuse is largely understood as “hate speech,” we make two interventions to problematize the presuppositions of this widely invoked concept. First, extreme speech emphasizes the need to contextualize online debate with an attention to user practices and particular histories of speech cultures. Second, related to context, is the ambiguity of online vitriol, which defies a simple antonymous conception of hate speech versus acceptable speech. The article advances this analysis using the approach of “comparative practice,” which, we suggest, complicates the discourse of Internet “risk” increasingly invoked to legitimate online speech restrictions.
|
2017 |
Pohjonen, M. and Udupa, S. |
View
Publisher
|
Report |
Toxic Narratives: Monitoring Alternative-right Actors
View Abstract
Why do we use the term “toxic narrative”? The concept of “toxic communication” has been established in the English-speaking world since the 1960s. The term has also been borrowed in Germany to refer to linguistic behavior that has a negative influence on its environment. When we speak of toxic narratives, we are referring to accounts of the world that supply the pertinent “events” and interpretations for such communication.
It is necessary to process such narratives – decoding them, examining their core content and classifying them – in order to respond to them cogently and successfully. The present report is intended to make a contribution to this effort.
|
2017 |
Baldauf, J., Dittrich, M., Hermann, M., Kollberg, B., Lüdecke, R. and Rathje, J. |
View
Publisher
|