Terrorism in Cyberspace

GPM510

terrorism in cyberspace GPM510

An 8 point post-graduate subject delivered by the Australian Graduate School of Policing and Security

Apply now

Workload

We offer this subject online, with an approximate workload of 8 – 10 hours per week.

We also offer an optional 3-day classroom-based intensive class in Canberra. The times and dates of these classes vary by session.

To find out more, please email terrorismstudies@csu.edu.au.

Upon completion of this subject students will have developed a comprehensive knowledge and understanding terrorism and cyberspace and the complex and diverse manifestations of this specific aspect of terrorism and counter terrorism. The subject will cover the various purposes for which terrorists utilise the online environment, and the costs and benefits they accrue in doing so. The subject will develop in students an holistic, critical, and wide-ranging knowledge and understanding of current and future issues related to terrorist uses of cyberspace, and the counter terrorism measures deployed against these efforts. Students will critically engage with both primary (through secure subscription services) and secondary resources related to terrorist use of cyberspace.

Objectives

Upon successful completion of this subject, students should:

  • Be capable of applying an advanced knowledge of terrorist use of cyberspace in a range of non-technical contexts
  • Possess knowledge of terrorist use of cyberspace and related counter terrorism contexts that includes an understanding of historical, contemporary, and ongoing developments in terrorist use of cyberspace
  • Demonstrate a knowledge of research principles and methods applicable to terrorism, cyberspace and
  • Understand the intersection of these issues at an operational, strategic, and policy context
  • Demonstrate mastery of conceptual and theoretical knowledge in relation to terrorist use of cyberspace

Indicative assessment

  • Output/organisational/impact assessment – 40%
  • Research paper – 60%

Textbooks

The set text for this course is:

Weimann, G. (2015). Terrorism in Cyberspace: The Next Generation, New York: Columbia University Press.

Note that all of these texts offer something different and come at the subject from a different perspective, but all are by well-regarded experts in their field. Various chapters from these texts will readings within the subject, and will subsequently be made available electronically.

reading list extract

  • Weimann, G. (2016) ‘Going Dark: Terrorism on the Dark Web,’ Studies in Conflict & Terrorism, 39(3), 195-206.
  • Klausen, J. (2015) ‘Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria
    and Iraq,’ Studies in Conflict & Terrorism, 38(1), 1-22.
  • Kenney, M. (2015). ‘Cyber-Terrorism in a Post-Stuxnet World,’ Orbis, 59(1), 111-128.
  • Gendron, A. (2016): ‘The Call to Jihad: Charismatic Preachers and the Internet,’ Studies in Conflict & Terrorism.
  • Seib, D. & Janbek, D. (2010). ‘Terrorists’ Online Strategies,’ in Global Terrorism and New Media: The Post-Al Qaeda Generation, Taylor & Francis, pp. 43-61.

subject availability

academic year 2018

INternal MODE (CBR)

  • SESSION 2

Distance MODE

  • SESSION 2
  • SESSION 3