Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Utilizing Cyber Espionage To Combat Terrorism, Gary Adkins
Utilizing Cyber Espionage To Combat Terrorism, Gary Adkins
Open Access Theses & Dissertations
The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has been a great asset to both businesses and private citizens. However, there is a dark side to the age we live in, where terrorist groups are able to communicate, plan, fund, recruit, and spread their message to the world. The relative anonymity the internet provides hinders law enforcement and security agencies in not only locating would-be terrorists but also in disrupting their operations. The internet is a loosely knit group of computers and routers and is …
Analyzing The Effectiveness Of Al Qaeda's Online Influence Operations By Means Of Propaganda Theory, David K. Lyons
Analyzing The Effectiveness Of Al Qaeda's Online Influence Operations By Means Of Propaganda Theory, David K. Lyons
Open Access Theses & Dissertations
This thesis sought to explore the use of propaganda by al Qaeda through the lenses of established propaganda theorists and theories. Through analyzing former al Qaeda releases and case studies in the context of propaganda theory this thesis established a clearer understanding of the effectiveness of al Qaeda's propaganda. After analyzing the propaganda and case studies it was discovered that the rate of those engaging in attacks based on al Qaeda's online influence operations is insignificant. The concerns that al Qaeda is recruiting numerous individuals to engage in attacks based on its online propaganda operations might be overstated and while …