Book |
Cyber Racism and Community Resilience: Strategies for Combating Online Race Hate
View Abstract
This book highlights cyber racism as an ever growing contemporary phenomenon. Its scope and impact reveals how the internet has escaped national governments, while its expansion is fuelling the spread of non-state actors. In response, the authors address the central question of this topic: What is to be done? Cyber Racism and Community Resilience demonstrates how the social sciences can be marshalled to delineate, comprehend and address the issues raised by a global epidemic of hateful acts against race. Authored by an inter-disciplinary team of researchers based in Australia, this book presents original data that reflects upon the lived, complex and often painful reality of race relations on the internet. It engages with the various ways, from the regulatory to the role of social activist, which can be deployed to minimise the harm often felt. This book will be of particular interest to students and academics in the fields of cybercrime, media sociology and cyber racism.
|
2017 |
Jakubowicz, A., Dunn, K., Mason, G., Paradies, Y., Bliuc, A.M., Bahfen, N., Oboler, A., Atie, R. and Connelly, K. |
View
Publisher
|
Report |
Cyber Swarming, Memetic Warfare and Viral Insurgency: How Domestic Militants Organize on Memes to Incite Violent Insurrection and Terror Against Government and Law Enforcement
View Abstract
In this briefing, we document a recently formed apocalyptic militia ideology which, through the use of memes—coded inside jokes conveyed by image or text—advocates extreme violence against law enforcement and government officials. Termed the ‘boogaloo’, this ideology self-organizes across social media communities, boasts tens of thousands of users, exhibits a complex division of labor, evolves well-developed channels to innovate and distribute violent propaganda, deploys a complex communication network on extremist, mainstream and dark Web communities, and articulates a hybrid structure between lone-wolf and cell-like organization. Like a virus which awakens from dormancy, this meme has emerged with startling speed in merely the last 3–4 months.
|
2020 |
Goldenberg, A. and Finkelstein, J. |
View
Publisher
|
Journal Article |
Cyber Terrorism and Self-Radicalization-Emergent Phenomena of Onlife Age: An Essay Through the General System Theory
View Abstract
This article seeks to propose a valuable frame for understanding which processes, either cognitive or practical, take part in the making of a terrorist act within the frame of the onlife region. A term recently coined, onlife, refers to the interacting/indistinguishable domain of online and offline world: this is the environment where today’s global terrorism/extremism flourishes. This region of complexity and the phenomena that entails can valuably explored through the General System Theory (GST). In the first part of the paper how global terrorism is changing, moving into cyber terrorism, at the light of the GST, according to recent theoretical achievements in the field is described in detail. The second part will explore a case study of onlife terrorism perpetrated in New Zealand, in order to focus the passage from the ‘possible’ idea of making a massacre to its effective performance, from onlife radicalization to the onlife event (a livestreamed attack filmed by the author) – through a deliberate use of the internet. At this point, the author will be able to come back to the question posed before, sketching some insights that might be valuable for cyber terrorism as well as for GST, especially for what concerns systemic processes within the moral domain.
|
2019 |
Fisogni, P. |
View
Publisher
|
Journal |
Cyber-Extremism: Isis and the Power of Social Media
View Abstract
The current crises in Syria has led to a number of Britons travelling abroad to fight with groups such as Isis. Capitalising on this growth, Isis are now increasingly fighting an online cyber war, with the use of slick videos, online messages of hate and even an app that all aim to radicalise and create a new generation of cyber jihadists. These modern day tools are helping Isis spread their propaganda and ideology to thousands of online sympathisers across the world. Indeed, the group has actively been using social media sites such as Twitter, Facebook and YouTube to recruit new would be members. This is being done through images and the streaming of violent online viral videos filmed and professionally edited that are targeting young and impressionable people. Portraying a glamorised and ‘cool’ image, Isis fighters are beginning to act as the new rock stars of global cyber jihad. The Internet therefore is becoming the virtual playground for extremist views to be reinforced and act as an echo chamber. This study analysed 100 different Facebook pages and 50 Twitter user accounts which generated over 2050 results and helped the author create a typology of seven key behaviour characteristics and motivations. The findings in this study confirmed the author’s original hypothesis, i.e. online hate is being used by groups such as Isis for a variety of reasons such as recruitment and propaganda. Moreover, this material is coordinated and controlled by Isis as a means for publishing and sending out key messages.
|
2017 |
Awan, I. |
View
Publisher
|
Journal Article |
Cyber-routines, Political Attitudes, and Exposure to Violence-Advocating Online Extremism
View Abstract
The Internet’s relatively unfettered transmission of information risks exposing individuals to extremist content. Using online survey data (N = 768) of American youth and young adults, we examine factors that bring individuals into contact with online material advocating violence. Combining aspects of social structure-social learning theory with insights from routine activity theory, we find that exposure to violence-advocating materials is positively correlated with online behaviors, including the use of social media platforms and the virtual spaces individuals frequent. Target antagonism is also correlated with exposure to violence-advocating materials, but guardianship and online and offline associations are not. Finally, feelings of dissatisfaction with major social institutions and economic disengagement are associated with exposure to violent materials online.
|
2019 |
Hawdon, J., Bernatzky, C. and Costello, M. |
View
Publisher
|
PhD Thesis |
Cyber-security In The European Region: Anticipatory Governance And Practices
View Abstract
This thesis explores the nature of cyber security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber space is visible in all public private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber attacks on public and private entities are increasing. This requires a security framework that is flexible and establishes different types of security cooperation to manage the widespread cyber risks. This is essential to the development of security strategies, governance forms, practices, and guidelines for enhancing resilience and preparedness towards cyber risks. Therefore, I am examining cyber security through the lenses of nodal governance and governmentality, which enables me to understand European cyber security strategies and governance forms developed by the Council of Europe, the European Union, and the North Atlantic Treaty Organization. To analyse existing strategies and governance forms, I have used two critical security schools, the Copenhagen School and the Paris School, which cover different aspects of the security agenda. The thesis develops a substantive analytical framework through two case studies, namely cyber security and cyber terrorism. The findings in this thesis identifies problem areas, such as the complexity of the nodal system, the legislative lacuna, reliance on different governance forms, transparency and accountability, and types of anticipatory governance and regulatory practices.
|
2015 |
Munk, T. H. |
View
Publisher
|