{"id":125,"date":"2024-02-12T22:57:44","date_gmt":"2024-02-12T22:57:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=125"},"modified":"2024-10-27T22:47:14","modified_gmt":"2024-10-27T22:47:14","slug":"cyse-406","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/porter-doughty\/cyse-406\/","title":{"rendered":"Cyberterrorism"},"content":{"rendered":"<b>PDF Embedder requires a url attribute<\/b>\n\n<h1 style=\"text-align: center\">Cyberterrorism<\/h1>\n<p>In my Cyberterrorism course, we participated daily in critical discussions regarding world politics and the implications of technological advances within the extremist sphere. I personally had special interest in understanding the true role and influence the anonymity of the internet had of extremist violence within the States. I did independent research on several violent extremists, and from my research, I laid out the foundations of a pipeline to build upon that I have not encountered previously in any of my research. I drew connections between online activity, social setting, and influence individuals had before they committed violent acts. I believe this not only to be extremely critical work, but a strong foundation for others to build upon and investigate further.<\/p>\n<h1>Course Material<\/h1>\n<p>Below are two course assignments that I completed within the course.<\/p>\n<h3>Assignment 1<\/h3>\n<p style=\"text-align: left\"><em><span style=\"font-size: 1.8rem\">The first assignment shown here is a write up describing the relationship that human behavior has with a cybersecurity environment.<\/span><\/em><\/p>\n<p class=\"m_-7289575211786111875x_p2\">\n<h3>Assignment 2<\/h3>\n<p class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\"> My second assignment\u00a0is <strong><em>an infographic demonstrating the pipeline that leads to far-right radical extremism online.<\/em><\/strong> Multiple cases were studied when creating this presentation and it spans across multiple different online ecosystems.\u00a0<\/span><\/p>\n<p class=\"m_-7289575211786111875x_p2\">\n\n<a href=\"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-content\/uploads\/sites\/35865\/2024\/10\/Human-Factor-Write-up.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Human-Factor-Write-up<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-content\/uploads\/sites\/35865\/2024\/10\/Pipeline-Infographic.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Pipeline-Infographic<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberterrorism In my Cyberterrorism course, we participated daily in critical discussions regarding world politics and the implications of technological advances within the extremist sphere. I personally had special interest in understanding the true role and influence the anonymity of the internet had of extremist violence within the States. I did independent research on several violent&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/porter-doughty\/cyse-406\/\">Read More<\/a><\/div>\n","protected":false},"author":27427,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages\/125"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/users\/27427"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages\/125\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages\/125\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/media?parent=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}