Security

The Use of Governance to Identify Cyber Threats Through Social Media

Free registration required

Executive Summary

Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins.

  • Format: PDF
  • Size: 126.76 KB