CYSE201S Article 2

Michael J Bradley
Professor Armistead
CYSE 201S
Article 2 Review
“Cyber Terrorism Through Social Media: A
Categorical Based Preventive Approach”
Parlakkilic, Alaattin. “Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE, vol. 7, no. 4, 2018, pp. 172-178. Academic Search Complete. Accessed 05 Nov. 2022
In the scholarly journal article “Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach.” Parlakkilic, Alaattin of the Department of Management Information Systems, Ufuk University, Turkey, examine the categorical cyber terrorism threats posed by social media. The article was published in the International Journal of Information Security Science and was targeted towards scholars concerned with the spread of extremist’s ideologies through social media. This study was designed to outline preventative approaches developed by the United Nations and standard industry policy.
The article first addresses the impacts of cyber terrorism and the massive scope of available victims to their nefarious intentions. The initial focus is based on defining the term cyber terrorist and identifying why social media has become their chosen hunting ground. The speaker then builds on the defined term by breaking down the varied methods employed to carry out illicit actions such as spreading propaganda and money laundering. By establishing the standard illicit actions carried out by cyber terrorists the speaker can outline the corrective course of action that can be taken to alleviate the negative impact of these actions. Further suggestions are made to reinforce the social media platforms standard procedures of risk mitigation. The speaker concludes with his suggestions for the categorization of cyber terrorism threats.
The article illustrated many of the aspects of victim precipitation as the speaker examined how victims could be exposed to cyber terrorism threats. This was done in a matter of fact and professional manner that did not “victim Blame.” Instead, the speaker simply identified how victims were targeted and how their online social media behavior was being manipulated by cyber terrorists. The cyber offenders are identified by their extremist’s philosophy by which they act and justify the victimization of others. The speaker reinforces the need for recognition of the human factor and how it relates to risk mitigation practices.
Though the speaker addresses the issues in a macro format; many elements of the social forces that impact social media become evident. The Cyber terrorists use Appeal to higher loyalty to justify their actions. They manipulate the geographical concerns of downtrodden and marginalized people. This was used to great effect in Somalia when convincing children that the western nations were starving them; it was in fact the terrorists attempting to brain wash them. The use of social group, religious groups or any other group to assign the label of good or bad serves the purpose of these bad actors. All these negative phycological traits are easily transferred and even amplified on social media. These manipulations become even more sinister when considering they are masquerading as Gods chosen to obfuscate their true nature
Overall, the speaker communicates clearly and concisely to convey his point. Much of the article is focused on defining terms and identifying risk mitigation tactics that are commonly used. This; however, simply builds upon his Ethos and lend credence to the Pathos used to elicit a buy in from his intended audience. This work is significant because it addresses cyber terrorism threats as it relates to social media.

Leave a Reply

Your email address will not be published. Required fields are marked *