Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Group-Based Social Network Characterisation Of Hidden Terrorist Networks, Belinda A. Chiera Aug 2010

Group-Based Social Network Characterisation Of Hidden Terrorist Networks, Belinda A. Chiera

International Cyber Resilience conference

Hidden networks arise in high-dimensional network structures when the hidden network members camouflage their existence by appearing randomly connected to the larger network structure, but in reality ensure they remain in persistent contact with one another over time. This paper takes a first step towards determining how to locate such hidden networks through the novel use of group-based social network metrics to characterise the features of hidden networks. Micro, meso and macro-level network analyses of the September 11 network and a selection of popular simulated terrorist network structures will show that the simulated networks are highly visible whereas the hidden …


Detecting Money Laundering And Terrorism Financing Activity In Second Life And World Of Warcraft, Angela S M Irwin, Jill Slay Aug 2010

Detecting Money Laundering And Terrorism Financing Activity In Second Life And World Of Warcraft, Angela S M Irwin, Jill Slay

International Cyber Resilience conference

In recent years there has been much debate about the risks posed by virtual environments. Concern is growing about the ease in which virtual worlds and virtual reality role-playing games such as Second Life and World of Warcraft can be used for economic crimes such as financially motivated cybercrime, money laundering and terrorism financing. Currently, virtual environments are not subject to the strict financial controls and reporting requirements of the real world, therefore, they offer an excellent opportunity for criminals and terrorism financers to carry out their illegal activities unhindered and with impunity. This paper demonstrates the need for suitable …


The Use Of Governance To Identify Cyber Threats Through Social Media, David M. Cook Aug 2010

The Use Of Governance To Identify Cyber Threats Through Social Media, David M. Cook

International Cyber Resilience conference

Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins. By overlaying the new modes of governance (NMG) framework against sites and connections that may be subject to ongoing …


"Don't Throw Anything Away!" Greenwashing In Public Relations, Christopher Devauld, Lelia Green Jan 2010

"Don't Throw Anything Away!" Greenwashing In Public Relations, Christopher Devauld, Lelia Green

Research outputs pre 2011

As environmentalism becomes increasingly popular, the importance of environmental language, images and ideas becomes more critical. This paper discusses the significance of environmental communication and its potential role as a “green” cloak for environmentally destructive practices and companies. Although there are many examples of the corporate use of “greenwash”, this paper illustrates the concept using one of Shell Oil’s controversial advertisements from 2007. Greenwash is a communications strategy which uses environmental images and language to make corporate activity appear eco-friendly, whether or not it is environmentally destructive. Through content analysis, visual decoding, and with reference to findings by regulators, the …


Reporting Hiv In Papua New Guinea: Trends And Omissions From 2000 To 2010, Trevor A. Cullen Jan 2010

Reporting Hiv In Papua New Guinea: Trends And Omissions From 2000 To 2010, Trevor A. Cullen

Research outputs pre 2011

This article presents the findings from a longitudinal content analysis on the reporting of HIV (Human Immunodeficiency Virus) in Papua New Guinea’s two national newspapers—The National and Post-Courier—in 2000, 2005 and 2010. The authors tried to answer two key questions: Did press coverage of the disease increase and did the topics change or remain the same? Data from the content analysis showed that coverage of the disease increased significantly during the ten-year study period, and that the framing of the disease moved beyond representing HIV as purely a health story to one that was linked to socio-economic conditions and cultural …


Using Nicknames, Pseudonyms And Avatars On Heartnet: A Snapshot Of An Online Health Support Community, Debbie Rodan, Lynsey Kay Uridge, Lelia Green Jan 2010

Using Nicknames, Pseudonyms And Avatars On Heartnet: A Snapshot Of An Online Health Support Community, Debbie Rodan, Lynsey Kay Uridge, Lelia Green

Research outputs pre 2011

Cardiovascular disease remains one of the leading causes of death and long-term disability for the ageing Australian population. During recovery from a heart event, many people seek an alternative to traditional support groups and look to the Internet and World Wide Web to establish a connection with others who have had a similar experience. HeartNET provides just such an alternative support structure for anyone affected by heart disease. One issue faced by members of any online support community is whether to remain anonymous by using pseudonyms, nicknames or avatars or whether to accept a certain level of risk, usually in …