The Use of Governance to Identify Cyber Threats Through Social Media

Download Now Date Added: Dec 2010
Format: PDF

Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins.