Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- [RSTDPub] (2)
- Anti-money laundering (1)
- Betweenness centrality (1)
- Content analysis culture framing health reporting HIV/AIDS social change communication (1)
- Counter terrorism (1)
-
- Counter-terrorism (1)
- Governance (1)
- Group-based social network metrics (1)
- Hidden networks (1)
- Massively multiplayer online game (MMOG) (1)
- Massively multiplayer online role-playing game (MMORPG) (1)
- Multi-scalar (1)
- Multi-user virtual environment (MUVE) (1)
- New modes of governance (NMG) (1)
- Participation (1)
- Radicalization (1)
- Second Life (1)
- Terrorism financing (1)
- Virtual environments (1)
- World of Warcraft (1)
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Group-Based Social Network Characterisation Of Hidden Terrorist Networks, Belinda A. Chiera
Group-Based Social Network Characterisation Of Hidden Terrorist Networks, Belinda A. Chiera
International Cyber Resilience conference
Hidden networks arise in high-dimensional network structures when the hidden network members camouflage their existence by appearing randomly connected to the larger network structure, but in reality ensure they remain in persistent contact with one another over time. This paper takes a first step towards determining how to locate such hidden networks through the novel use of group-based social network metrics to characterise the features of hidden networks. Micro, meso and macro-level network analyses of the September 11 network and a selection of popular simulated terrorist network structures will show that the simulated networks are highly visible whereas the hidden …
Detecting Money Laundering And Terrorism Financing Activity In Second Life And World Of Warcraft, Angela S M Irwin, Jill Slay
Detecting Money Laundering And Terrorism Financing Activity In Second Life And World Of Warcraft, Angela S M Irwin, Jill Slay
International Cyber Resilience conference
In recent years there has been much debate about the risks posed by virtual environments. Concern is growing about the ease in which virtual worlds and virtual reality role-playing games such as Second Life and World of Warcraft can be used for economic crimes such as financially motivated cybercrime, money laundering and terrorism financing. Currently, virtual environments are not subject to the strict financial controls and reporting requirements of the real world, therefore, they offer an excellent opportunity for criminals and terrorism financers to carry out their illegal activities unhindered and with impunity. This paper demonstrates the need for suitable …
The Use Of Governance To Identify Cyber Threats Through Social Media, David M. Cook
The Use Of Governance To Identify Cyber Threats Through Social Media, David M. Cook
International Cyber Resilience conference
Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins. By overlaying the new modes of governance (NMG) framework against sites and connections that may be subject to ongoing …
"Don't Throw Anything Away!" Greenwashing In Public Relations, Christopher Devauld, Lelia Green
"Don't Throw Anything Away!" Greenwashing In Public Relations, Christopher Devauld, Lelia Green
Research outputs pre 2011
As environmentalism becomes increasingly popular, the importance of environmental language, images and ideas becomes more critical. This paper discusses the significance of environmental communication and its potential role as a “green” cloak for environmentally destructive practices and companies. Although there are many examples of the corporate use of “greenwash”, this paper illustrates the concept using one of Shell Oil’s controversial advertisements from 2007. Greenwash is a communications strategy which uses environmental images and language to make corporate activity appear eco-friendly, whether or not it is environmentally destructive. Through content analysis, visual decoding, and with reference to findings by regulators, the …
Reporting Hiv In Papua New Guinea: Trends And Omissions From 2000 To 2010, Trevor A. Cullen
Reporting Hiv In Papua New Guinea: Trends And Omissions From 2000 To 2010, Trevor A. Cullen
Research outputs pre 2011
This article presents the findings from a longitudinal content analysis on the reporting of HIV (Human Immunodeficiency Virus) in Papua New Guinea’s two national newspapers—The National and Post-Courier—in 2000, 2005 and 2010. The authors tried to answer two key questions: Did press coverage of the disease increase and did the topics change or remain the same? Data from the content analysis showed that coverage of the disease increased significantly during the ten-year study period, and that the framing of the disease moved beyond representing HIV as purely a health story to one that was linked to socio-economic conditions and cultural …
Using Nicknames, Pseudonyms And Avatars On Heartnet: A Snapshot Of An Online Health Support Community, Debbie Rodan, Lynsey Kay Uridge, Lelia Green
Using Nicknames, Pseudonyms And Avatars On Heartnet: A Snapshot Of An Online Health Support Community, Debbie Rodan, Lynsey Kay Uridge, Lelia Green
Research outputs pre 2011
Cardiovascular disease remains one of the leading causes of death and long-term disability for the ageing Australian population. During recovery from a heart event, many people seek an alternative to traditional support groups and look to the Internet and World Wide Web to establish a connection with others who have had a similar experience. HeartNET provides just such an alternative support structure for anyone affected by heart disease. One issue faced by members of any online support community is whether to remain anonymous by using pseudonyms, nicknames or avatars or whether to accept a certain level of risk, usually in …