Terrorism in Cyberspace

GPM510

terrorism in cyberspace GPM510

An 8 point post-graduate subject delivered by the Australian Graduate School of Policing and Security

Apply now

Workload

This subject will be delivered in intensive mode over a 1 week period. Specific dates will be provided once confirmed.

Upon completion of this subject students will have developed a comprehensive knowledge and understanding terrorism and cyberspace and the complex and diverse manifestations of this specific aspect of terrorism and counter terrorism. The subject will cover the various purposes for which terrorists utilise the online environment, and the costs and benefits they accrue in doing so. The subject will develop in students an holistic, critical, and wide-ranging knowledge and understanding of current and future issues related to terrorist uses of cyberspace, and the counter terrorism measures deployed against these efforts. Students will critically engage with both primary (through secure subscription services) and secondary resources related to terrorist use of cyberspace.

Objectives

Upon successful completion of this subject, students should:

  • Be capable of applying an advanced knowledge of terrorist use of cyberspace in a range of non-technical contexts
  • Possess knowledge of terrorist use of cyberspace and related counter terrorism contexts that includes an understanding of historical, contemporary, and ongoing developments in terrorist use of cyberspace
  • Demonstrate a knowledge of research principles and methods applicable to terrorism, cyberspace and
  • Understand the intersection of these issues at an operational, strategic, and policy context
  • Demonstrate mastery of conceptual and theoretical knowledge in relation to terrorist use of cyberspace

Indicative assessment

  • Output/organisational/impact assessment – 40%
  • Research paper – 60%

Textbooks

The set text for this course is:

Weimann, G. (2015). Terrorism in Cyberspace: The Next Generation, New York: Columbia University Press.

Note that all of these texts offer something different and come at the subject from a different perspective, but all are by well-regarded experts in their field. Various chapters from these texts will readings within the subject, and will subsequently be made available electronically.

reading list extract

  • Weimann, G. (2016) ‘Going Dark: Terrorism on the Dark Web,’ Studies in Conflict & Terrorism, 39(3), 195-206.
  • Klausen, J. (2015) ‘Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria
    and Iraq,’ Studies in Conflict & Terrorism, 38(1), 1-22.
  • Kenney, M. (2015). ‘Cyber-Terrorism in a Post-Stuxnet World,’ Orbis, 59(1), 111-128.
  • Gendron, A. (2016): ‘The Call to Jihad: Charismatic Preachers and the Internet,’ Studies in Conflict & Terrorism.
  • Seib, D. & Janbek, D. (2010). ‘Terrorists’ Online Strategies,’ in Global Terrorism and New Media: The Post-Al Qaeda Generation, Taylor & Francis, pp. 43-61.

subject availability

academic year 2017

INternal MODE (CBR)

  • SESSION 2

Distance MODE

  • SESSION 2
  • SESSION 3