The Use of Governance to Identify Cyber Threats Through Social Media

Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins. By overlaying the new modes of governance (NMG) framework against sites and connections that may be subject to ongoing and persistent threats, sites can be divided into two areas. The first aligns closely with governance, whilst the second looks decidedly more threatening. This paper gives an outline for future developments in recognizing simple markers for differentiating hard core extremism from genuine community engagement. The notion that participatory governance need not imply democracy is an important element in future determinations between radically driven cyber threats and moderate media interactions.

[1]  Bob Jessop,et al.  Capitalism and its future: remarks on regulation, government and governance , 1997 .

[2]  R. Rhodes,et al.  The New Governance: Governing without Government , 1996 .

[3]  V. Lal Virtual Terrorism: How Modern Terrorists Use the Internet , 2008 .

[4]  E. Loo The Internet: Simulacrum of Democracy? , 2007 .

[5]  S. Sassen Globalization or denationalization? , 2003 .

[6]  Jarret Brachman Global Jihadism: Theory and Practice , 2008 .

[7]  D. M. Kaplan Readings in the Philosophy of Technology , 2003 .

[8]  Geoffry L. Taubman A Not-So World Wide Web: The Internet, China, and the Challenges to Nondemocratic Rule , 1998 .

[9]  D. Osborne,et al.  Reinventing government , 1993, Nature.

[10]  D. Denning Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .

[11]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[12]  R. Ramakrishna Radical pathways : understanding Muslim radicalization in Indonesia , 2009 .

[13]  S. Sassen,et al.  Digital formations: Constructing an object of study , 2005 .

[14]  Mark Bevir,et al.  Key Concepts in Governance , 2008 .

[15]  J. Kooiman,et al.  Modern Governance: New Government-Society Interactions , 1993 .

[16]  W. Walters Some Critical Notes on “Governance” , 2004 .

[17]  A. Schmid,et al.  Violence as Communication: Insurgent Terrorism and the Western News Media , 1982 .

[18]  Marc Sageman,et al.  Leaderless Jihad , 2011 .

[19]  The Internet and Governance in Asia: A Critical Reader , 2007 .