MA Thesis |
Sony Pictures And The US Federal Government: A Case Study Analysis Of The Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
View Abstract
In this case study, I analyze the 2014 North Korean computer database hack of Sony Pictures Entertainment (SPE), a serious national security crisis of cyberterrorism. I utilize Normal Accidents theory as a lens, to help explain how the accident within one system (SPE) and later crisis lead to the interaction with a second system (U.S. Federal Government), the development of a new crisis, and the need for a crisis response from system two. The evolution of a single organization’s accident into a national security crisis does not occur without specific complex interactions that take place to connect the two systems together. To explain this interconnectedness between systems, I introduce two new constructs: 1) common denominator and 2) common goal, which expand Normal Accidents theory allowing it to account for the coupling between the two independent systems (SPE & United States Government) through non-linear interactions. Overall, this case study provides important insight for future crisis communication planning, response, and development regarding between-organization interaction during a crisis.
|
2017 |
Ismail, M. |
View
Publisher
|
Journal Article |
Spectacles Of Sovereignty In Digital Time: ISIS Executions, Visual Rhetoric And Sovereign Power
View Abstract
The ISIS videos staging the executions of James Foley and Steven Sotloff are usually understood as devices to deter, recruit, and “sow terror.” Left unanswered are questions about how these videos work; to whom they are addressed; and what about them can so continuously bring new audiences into existence. The evident durability of ISIS despite the imminent defeat of its state, coupled with the political impact of these particular videos, make these questions unusually urgent. Complete answers require analysis of the most understudied aspect of the videos that also happens to be vastly understudied in US political science: the visual mode of the violence. Approaching these videos as visual texts in need of close reading shows that they are, among other things, enactments of “retaliatory humiliation” (defined by Islamists) that perform and produce an inversion of power in two registers. It symbolically converts the public abjection of Foley and Sotloff by the Islamist executioner into an enactment of ISIS’ invincibility and a demonstration of American impotence. It also aims to transpose the roles between the US, symbolically refigured as mass terrorist, failed sovereign, and rogue state, and ISIS, now repositioned as legitimate, invincible sovereign. Such rhetorical practices seek to actually constitute their audiences through the very visual and visceral power of their address. The affective power of this address is then extended and intensified by the temporality that conditions it—what I call digital time. Digital time has rendered increasingly rare ordinary moments of pause between rapid and repetitive cycles of reception and reaction—moments necessary for even a small measure of distance. The result is a sensibility, long in gestation but especially of this time, habituated to thinking less and feeling more, to quick response over deliberative action.
|
2017 |
Euben, R. L. |
View
Publisher
|
Report |
Spiders of the Caliphate: Mapping the Islamic State’s Global Support Network on Facebook
View Abstract
This report analyzes the strength of the Islamic State’s (IS) network on Facebook using online network measurement tools and uncovers the myriad of ways in which IS operates on Facebook. To do so, we mapped the accounts and connections between 1,000 IS-supporting Facebook profiles with links to 96 countries on every continent except Antarctica using the open-source network analysis and visualization software, Gephi. It should be noted, however, that hundreds of additional pro-IS profiles were excluded from the dataset. This is because while we were able to identify the IS supporting Facebook accounts, there was no information on those users’ locations. Therefore, this data represents only a portion of IS’s support network on the platform. Our analysis of online IS communities globally, regionally, and nationally suggests that IS’s online networks, in particular on Facebook, are growing and can be utilized to plan and direct terror attacks as well as mobilize foreign fighters for multiple areas of insurgency. Secondly, IS’s presence on Facebook is pervasive and professionalized, contrary to the tech company’s rhetoric and efforts to convince the public, policymakers, and corporate advertisers from believing otherwise. Our findings illustrate that IS has developed a structured and deliberate strategy of
using Facebook to radicalize, recruit, support, and terrorize individuals around the world. According to our observations, it appears that IS utilizes a limited number of central players who work to magnify the group’s presence on the platform, and also works to strengthen its networks so that no one individual IS Facebook account (node) serves as an irreplaceable connection (edge) to other pro-IS accounts located elsewhere.
|
2018 |
Waters, G. and Postings, R. |
View
Publisher
|
VOX-Pol Blog |
Spoofing, Truthing, and Social Proofing: Digital Influencing after Terrorist Attacks
View Abstract
|
2019 |
Innes, M., Innes, H., and Dobreva, D. |
View
Publisher
|
VOX-Pol Blog |
Spreading Hate and Violence: The Link between Online Vitriol and Terrorism
View Abstract
|
2023 |
Champion, A. R., Hattie, D. M., Khera, D., Frank, R., and Pedersen, C. L. |
View
Publisher
|
Chapter |
Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
View Abstract
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility and provide information about the group along with its goals without posing an increased risk to the members. It also allows them to easily ask for, and accept, donations through anonymous financial services such as Dark Coins. These benefits allow these groups to promote awareness of their cause, to convey their message to, and perhaps foster sympathy from a much larger pool of potential supporters and converts (Weimann 2010). Finally, the Internet also provides asynchronous services with global access, with the sender and recipient located at any place, at any time, without the need to link up at a specific time (Wagner 2005). In short, unlike the real world, cyberspace is borderless without limitation, and this makes identification, verification, and attribution a challenge.
|
2015 |
Davies, G., Frank,R., Bouchard,M. and Mei, J. |
View
Publisher
|