Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Utilizing Cyber Espionage To Combat Terrorism, Gary Adkins Jan 2013

Utilizing Cyber Espionage To Combat Terrorism, Gary Adkins

Open Access Theses & Dissertations

The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has been a great asset to both businesses and private citizens. However, there is a dark side to the age we live in, where terrorist groups are able to communicate, plan, fund, recruit, and spread their message to the world. The relative anonymity the internet provides hinders law enforcement and security agencies in not only locating would-be terrorists but also in disrupting their operations. The internet is a loosely knit group of computers and routers and is …


Analyzing The Effectiveness Of Al Qaeda's Online Influence Operations By Means Of Propaganda Theory, David K. Lyons Jan 2013

Analyzing The Effectiveness Of Al Qaeda's Online Influence Operations By Means Of Propaganda Theory, David K. Lyons

Open Access Theses & Dissertations

This thesis sought to explore the use of propaganda by al Qaeda through the lenses of established propaganda theorists and theories. Through analyzing former al Qaeda releases and case studies in the context of propaganda theory this thesis established a clearer understanding of the effectiveness of al Qaeda's propaganda. After analyzing the propaganda and case studies it was discovered that the rate of those engaging in attacks based on al Qaeda's online influence operations is insignificant. The concerns that al Qaeda is recruiting numerous individuals to engage in attacks based on its online propaganda operations might be overstated and while …