Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Social and Behavioral Sciences

Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende Jan 2016

Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende

Australian Information Security Management Conference

Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social Media can also offer invaluable insights into the social networks of terrorist organisations through the use of Social Media Mining and Social Network Analysis. By …


Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok Jan 2015

Formation Of The Radical Self: Constructs Of Change In Western Youth To Acts Of Terrorism On Home-Soil, Robyn Torok

Australian Security and Intelligence Conference

The terrorist attack on a member of the Police service by a 15 year old boy in late 2015 sent shock waves not only through Australia but also throughout the world as the realisation of Islamic State targeting teenagers becomes a reality. This paper uses a blend of theoretical and empirical evidence to examine how the radicalised self is formed. Insights from various frameworks including: developmental psychology (teenage identity formation and role confusion), Foucault’s technologies of the self, governmentality and sociological issues including the perceived gap between Muslim values and those of the West. Coupled with these theoretical frameworks are …


Violent-Extremism: An Examination Of A Definitional Dilemma, Jason-Leigh Striegher Jan 2015

Violent-Extremism: An Examination Of A Definitional Dilemma, Jason-Leigh Striegher

Australian Security and Intelligence Conference

This article aims to demonstrate how radicalisation, violent-extremism and terrorism are terms often used interchangeably – terms that do not have the same meaning and are generally poorly defined. It will reveal, as with other terminologies pertaining to this area of interest, how violent-extremism has no universally accepted definition, and remains tainted with ambiguity. Arguably, the term is predominantly used as a social label in discussions on terrorism and other forms of extreme violence – particularly applied to those who have a distorted interpretation of religious ideology to justify the use of violence to achieve specific socio-political aimsTo provide a …


Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok Jan 2015

Symbiotic Radicalisation Strategies: Propaganda Tools And Neuro Linguistic Programming, Robyn Torok

Australian Security and Intelligence Conference

The rise of Islamic State has seen a rise in the threat and incidences of domestic terrorism. Sophisticated strategies are being used to target youth and draw them into the ideology of Islamic state and other terrorist groups. Two common strategies used by Islamic State are the use of propaganda tools as well as Neuro linguistic programming strategies. This paper looks at how these strategies were used through a longitudinal online ethnographic study on the social media site Facebook. Data collected revealed that these two strategies were used in a targeted manner and worked together in a symbiotic fashion to …


Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok Jan 2015

Institutionalised Moral Reframing: A Research Based Model On Islamic Radicalisation On Social Media, Robyn Torok

Australian Security and Intelligence Conference

Institutionalised Moral Reframing is a new research model on Islamic radicalisation based on a longitudinal ethnographic research on social media. Prior to introducing the model, an overview of other radicalisation models will be presented with a brief overview of each. Critical to the Institutionalised Moral Reframing model is the concept of socialisation via an online institution of social media where an individual is isolated from competing discourses. The model uses two axis, a moral authority axis and a moral discourses axis. These two axis are mutually reinforcing and enable an individual to progress along stages in a context that includes …


Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein Jan 2015

Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein

Australian Information Warfare and Security Conference

The influx of virtual media platforms has allowed extremists and terrorists to transmit their messages to wider audiences without passing through a gatekeeper or being a subject to editorial policies existed in traditional media outlets. Thus, extremists and terrorists exploit virtual media platforms to report their actions; propagate their ideologies and ultimately to boost their objectives, because these mediums enabled them to have control over time and space. As a result, some governments work to deprive extremists and terrorists from this 'oxygen' through monitoring the cyberspace to block the suspected virtual media platforms. The reactions of some governments to face …


Developing An Explanatory Model For The Process Of Online Radicalisation And Terrorism, Robyn Torok Jan 2013

Developing An Explanatory Model For The Process Of Online Radicalisation And Terrorism, Robyn Torok

Research outputs 2013

While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization. Preliminary hypotheses are developed, explored and refined in order to develop a comprehensive model which is then presented. This model utilizes and applies concepts from social theorist Michel Foucault, including the use of discourse and networked power …


The Australian Immigration Black Hole: A Radical Problem?, Alan Davies, Joe Ducie, Scott Eadie Jan 2011

The Australian Immigration Black Hole: A Radical Problem?, Alan Davies, Joe Ducie, Scott Eadie

Australian Counter Terrorism Conference

Australia has done what it can to secure its borders and to prevent terrorist attacks at home. The path to radicalisation is paved with the disenfranchised and the alienated. This paper assesses the conditions of radicalisation, and whether Australia’s strict immigration and detention policy for asylum seekers arriving by boat is a breeding ground for radical behaviour. The processes of radicalisation are explored and compared to previous attacks seen in Britain. The narrative of recruitment offered by organisations such as Al Qaeda is appealing to those bereft of cultural identity, incarcerated in prisons and inside detention centres (Gunaratna, 2011; Hamm, …


A Poisoned Apple? The Use Of Secret Evidence And Secret Hearings To Combat Terrorism In Australia, Michael Crowley Jan 2011

A Poisoned Apple? The Use Of Secret Evidence And Secret Hearings To Combat Terrorism In Australia, Michael Crowley

Australian Counter Terrorism Conference

The use of secrecy in the form of secret evidence and secret hearings had a limited role in modern democracies where the focus is on open justice. This changed after the events of 11 September 2001. Secrecy may be a necessary adjunct to maintaining military options, for combating organised crime and countering terrorism but like a double-edged sword it can also cut into the fabric of the democratic state via abuses of power, and the maintenance and expansion of organisations beyond their usefulness. This paper considers the use of secrecy in Australia with particular reference to its impact on the …


The Piracy And Terrorism Nexus: Real Or Imagined?, Karine Hamilton Nov 2010

The Piracy And Terrorism Nexus: Real Or Imagined?, Karine Hamilton

Australian Counter Terrorism Conference

The waters off the coast of Somalia and in the Gulf of Aden have been the location of a dramatic proliferation of pirate activities in recent years. Security officials around the world are concerned about the risks posed by Somali piracy to maritime shipping and to national security. These risks relate to the susceptibility of world trade shipments to terrorist attack and to the emergence of an increasingly powerful Islamist movement in Somalia with connections to global terrorist networks. Whilst Somali piracy has been the topic of growing media speculation, reliable information about the phenomenon is scant. This paper reports …


The Emergent Challenges For Policing Terrorism: Lessons From Mumbai, Simon O'Rourke Nov 2010

The Emergent Challenges For Policing Terrorism: Lessons From Mumbai, Simon O'Rourke

Australian Counter Terrorism Conference

On November 26, 2008 ten armed terrorists from Lashka-e-Toiba utilised military assault style tactics to attack a number of establishments including restaurants and hotels in the city of Mumbai, India. This new attack paradigm indicated a significant shift in tactics from the placement of improvised explosive devices or deployment of suicide bombers, and contains valuable lessons for contemporary law enforcement particularly with regard to intelligence, response, and media management. There are few agencies currently geared to deal with the sheer scope of an event involving trained terrorists well versed with small team tactics, heavily armed and equipped conducting operations in …


Moral Disengagement: Exploring Support Mechanisms For Violent Extremism Among Young Egyptian Males, Paul S. Lieber, Yael Efreom-Lieber, Christopher Rate Jan 2010

Moral Disengagement: Exploring Support Mechanisms For Violent Extremism Among Young Egyptian Males, Paul S. Lieber, Yael Efreom-Lieber, Christopher Rate

Australian Counter Terrorism Conference

This study applied Bandura’s (1986) eight mechanisms of moral disengagement to a sample of young, Egyptian Muslim males (N=660). Findings uncovered two distinct scoring groups, likewise a statistically significant (p<.01) relationship between higher reported levels of moral disengagement and age. For this sample, younger individuals were likewise more apt to possess higher levels of moral disengagement. Findings argue for additional analyses exploring these relationships, likewise employing counter-violence, communication interventions derived specifically from Bandura’s identified mechanisms.


"We Are Next!": Listening To Jewish Voices In A Multicultural Country, Lelia Rosalind Green, Gerry Bloustien, Mark Balnaves Jan 2008

"We Are Next!": Listening To Jewish Voices In A Multicultural Country, Lelia Rosalind Green, Gerry Bloustien, Mark Balnaves

Research outputs pre 2011

If the notion of being at home in one’s country is safe and reassuring, the homeland and the heartland of what we judge important, then the thought that a countryneeds its own homeland security is destined to create a sense of unease. Australia’s homeland security unit was set up in May 2003 (Riley), just weeks after theallies’ Coalition of the Willing had celebrated George W Bush’s declaration aboard the USS Abraham Lincoln, of ‘Victory in Iraq’ (BBC). It might have been expected, inthis victorious glow, that the country would feel confidently able to return to a state of security. Apparently …