Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

PDF

Media

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Media, Government And Manipulation: The Cases Of The Two Gulf Wars, William Hutchinson Dec 2008

Media, Government And Manipulation: The Cases Of The Two Gulf Wars, William Hutchinson

Australian Information Warfare and Security Conference

This paper explores the bias and manipulation of the Western mass media during the Gulf wars of 1991 and 2003. The tactics of compliance and the ethics of the press and journalists are examined. The need for a pluralist press is extolled.


Terrorism As Opiniotainment: Perceptions Warriors And The Public Battlefield, Luke Howie Apr 2006

Terrorism As Opiniotainment: Perceptions Warriors And The Public Battlefield, Luke Howie

Australian Information Warfare and Security Conference

Terrorism continues to have a significant impact on the lives of Australians. Whilst Australian cities remain untargeted during this present wave of terrorism, many Australians perceive the threat to be significant. Terrorism is offered for consumption daily in the news media and many Australians have seen the images of terrorism. In addition to television images, media consumers have been inundated with terrorism reporting on talkback radio, in feature films, and in newspapers. What impact does the perceptions wars on terrorism have on Australian society? Are the public more or less knowledgeable because of public debate? These are questions that need …


Global Reach: Terrorists And The Internet, Simon O'Rourke Apr 2006

Global Reach: Terrorists And The Internet, Simon O'Rourke

Australian Information Warfare and Security Conference

The use of the Internet by terrorists appears to diverge into two distinct modes neither of which is mutually exclusive. The first aligns to the view that terrorists will use the Internet as a platform to launch cyber attacks against critical infrastructure nodes as well as key government and private sector networks. This paper discusses the alternate mode that being the primary use of the Internet by terrorists will be to recruit, train, communicate and gain information about potential targets by conducting virtual reconnaissance. It will examine the nexus between the virtual world and the physical threat that is manifested …