Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Media, Government And Manipulation: The Cases Of The Two Gulf Wars, William Hutchinson
Media, Government And Manipulation: The Cases Of The Two Gulf Wars, William Hutchinson
Australian Information Warfare and Security Conference
This paper explores the bias and manipulation of the Western mass media during the Gulf wars of 1991 and 2003. The tactics of compliance and the ethics of the press and journalists are examined. The need for a pluralist press is extolled.
Terrorism As Opiniotainment: Perceptions Warriors And The Public Battlefield, Luke Howie
Terrorism As Opiniotainment: Perceptions Warriors And The Public Battlefield, Luke Howie
Australian Information Warfare and Security Conference
Terrorism continues to have a significant impact on the lives of Australians. Whilst Australian cities remain untargeted during this present wave of terrorism, many Australians perceive the threat to be significant. Terrorism is offered for consumption daily in the news media and many Australians have seen the images of terrorism. In addition to television images, media consumers have been inundated with terrorism reporting on talkback radio, in feature films, and in newspapers. What impact does the perceptions wars on terrorism have on Australian society? Are the public more or less knowledgeable because of public debate? These are questions that need …
Global Reach: Terrorists And The Internet, Simon O'Rourke
Global Reach: Terrorists And The Internet, Simon O'Rourke
Australian Information Warfare and Security Conference
The use of the Internet by terrorists appears to diverge into two distinct modes neither of which is mutually exclusive. The first aligns to the view that terrorists will use the Internet as a platform to launch cyber attacks against critical infrastructure nodes as well as key government and private sector networks. This paper discusses the alternate mode that being the primary use of the Internet by terrorists will be to recruit, train, communicate and gain information about potential targets by conducting virtual reconnaissance. It will examine the nexus between the virtual world and the physical threat that is manifested …