Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Group-Based Social Network Characterisation Of Hidden Terrorist Networks, Belinda A. Chiera Aug 2010

Group-Based Social Network Characterisation Of Hidden Terrorist Networks, Belinda A. Chiera

International Cyber Resilience conference

Hidden networks arise in high-dimensional network structures when the hidden network members camouflage their existence by appearing randomly connected to the larger network structure, but in reality ensure they remain in persistent contact with one another over time. This paper takes a first step towards determining how to locate such hidden networks through the novel use of group-based social network metrics to characterise the features of hidden networks. Micro, meso and macro-level network analyses of the September 11 network and a selection of popular simulated terrorist network structures will show that the simulated networks are highly visible whereas the hidden …


Detecting Money Laundering And Terrorism Financing Activity In Second Life And World Of Warcraft, Angela S M Irwin, Jill Slay Aug 2010

Detecting Money Laundering And Terrorism Financing Activity In Second Life And World Of Warcraft, Angela S M Irwin, Jill Slay

International Cyber Resilience conference

In recent years there has been much debate about the risks posed by virtual environments. Concern is growing about the ease in which virtual worlds and virtual reality role-playing games such as Second Life and World of Warcraft can be used for economic crimes such as financially motivated cybercrime, money laundering and terrorism financing. Currently, virtual environments are not subject to the strict financial controls and reporting requirements of the real world, therefore, they offer an excellent opportunity for criminals and terrorism financers to carry out their illegal activities unhindered and with impunity. This paper demonstrates the need for suitable …


The Use Of Governance To Identify Cyber Threats Through Social Media, David M. Cook Aug 2010

The Use Of Governance To Identify Cyber Threats Through Social Media, David M. Cook

International Cyber Resilience conference

Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins. By overlaying the new modes of governance (NMG) framework against sites and connections that may be subject to ongoing …