The document analyzes the role of information and communication technologies (ICTs) in the Tunisian and Egyptian uprisings from an information warfare perspective using the Information Warfare Lifecycle Model. ICTs like social media and mobile phones were used by protesters to coordinate demonstrations and spread anti-government sentiment domestically and internationally. Governments attempted to restrict ICT access but were ultimately unsuccessful. The analysis characterizes the role of ICTs as psychological operations and command/control warfare, facilitating the dissemination of information to influence local and global audiences and provide some organization for initial protests.
Hate Speech and Nigeria’s Struggle for Democratic Consolidation: A Conceptual...Premier Publishers
Fake news and hate speech are not new to Nigerian democracy. However, since the internet revolution in recent decades, 2015 is seen as the year Nigeria finally woke up to the threat of fake news and hate speech fueled by internet technologies that are subtly used to undermine democracy. Since then, whenever national, state or local council elections approach, Nigeria experiences tense and difficult times – conflicts, media propaganda, hate comments and false information – circumstances that are inimical to the nation’s democracy. Despite fake news and hate have become global concepts, peculiarities of nations and cultures democracies imply that context-based tools will be more suitable to provide evidence-based data on their impact on democracies. To provide an understanding of the call-for-research epistemologies being developed in Nigerian academic circles, this paper presents a critical review of a book chapter titled Fake News, Hate Speech and Nigeria’s Struggle for Democratic Consolidation: A Conceptual Review written by two Nigerian scholars: Prof. Umaru A. Pate (Bayero University, Kano, Nigeria) and Adamkolo Mohammed Ibrahim (University of Maiduguri, Nigeria) published 2020 by IGI Global. The chapter provides a further understanding on the impacts and processes of fake news and hate speech in Nigeria, especially during political activities.
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
The rapid development of information and communication technology brings significant change to human life. In the past, people have been getting information through conventional media such as newspapers, radio, and television. Today, the public relies heavily on digital media consisting of social media and online media that are in the grip within the internet network which provides wide-ranging information in speedy manner. The phenomenon of hoaxes in social media is part of the information warfare in the cyberspace dimension. Hoaxes as tactic of choice in propaganda defined as misleading information attacks to various aspects, covering to include health, economy, disaster-events, and politics. People who are lacking in understanding propaganda tactics like how the news and information addressed in the digital media are often fooled by hoaxes that maybe appear as texts, pictures or videos. The spread of hoaxes may get uncontrollable due to the many parties who deliberately spread the hoaxes for a particular interest with anonymous accounts, fake accounts and so-called bots. The transmission of hoaxes as global phenomenon today, affecting many countries. Hoaxes that are spread in cyberspace are difficult to control without solid cooperation between government and society. This means of bad intension today by spreading news used as an asymmetric weapon extensively exercised during any political election period. This paper is about an analysis of hoax cases occurred in the time of Jakarta Gubernatorial Election 2017 as a case study.
163 317-1-sm Relation Sandro Suzart SUZART GOOGLE INC United States on Demons...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation Sandro Suzart SUZART GOOGLE INC United States on Demonstrations countries IMPEACHMENT GOOGLE INC
37 role of social media in political and regime change the college studyMary Smith
It is an educational blog and intended to serve as complete and self-contained work on essays, paragraph, speeches, articles, letters, stories, quotes.
https://www.thecollegestudy.net/
Hate Speech and Nigeria’s Struggle for Democratic Consolidation: A Conceptual...Premier Publishers
Fake news and hate speech are not new to Nigerian democracy. However, since the internet revolution in recent decades, 2015 is seen as the year Nigeria finally woke up to the threat of fake news and hate speech fueled by internet technologies that are subtly used to undermine democracy. Since then, whenever national, state or local council elections approach, Nigeria experiences tense and difficult times – conflicts, media propaganda, hate comments and false information – circumstances that are inimical to the nation’s democracy. Despite fake news and hate have become global concepts, peculiarities of nations and cultures democracies imply that context-based tools will be more suitable to provide evidence-based data on their impact on democracies. To provide an understanding of the call-for-research epistemologies being developed in Nigerian academic circles, this paper presents a critical review of a book chapter titled Fake News, Hate Speech and Nigeria’s Struggle for Democratic Consolidation: A Conceptual Review written by two Nigerian scholars: Prof. Umaru A. Pate (Bayero University, Kano, Nigeria) and Adamkolo Mohammed Ibrahim (University of Maiduguri, Nigeria) published 2020 by IGI Global. The chapter provides a further understanding on the impacts and processes of fake news and hate speech in Nigeria, especially during political activities.
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
The rapid development of information and communication technology brings significant change to human life. In the past, people have been getting information through conventional media such as newspapers, radio, and television. Today, the public relies heavily on digital media consisting of social media and online media that are in the grip within the internet network which provides wide-ranging information in speedy manner. The phenomenon of hoaxes in social media is part of the information warfare in the cyberspace dimension. Hoaxes as tactic of choice in propaganda defined as misleading information attacks to various aspects, covering to include health, economy, disaster-events, and politics. People who are lacking in understanding propaganda tactics like how the news and information addressed in the digital media are often fooled by hoaxes that maybe appear as texts, pictures or videos. The spread of hoaxes may get uncontrollable due to the many parties who deliberately spread the hoaxes for a particular interest with anonymous accounts, fake accounts and so-called bots. The transmission of hoaxes as global phenomenon today, affecting many countries. Hoaxes that are spread in cyberspace are difficult to control without solid cooperation between government and society. This means of bad intension today by spreading news used as an asymmetric weapon extensively exercised during any political election period. This paper is about an analysis of hoax cases occurred in the time of Jakarta Gubernatorial Election 2017 as a case study.
163 317-1-sm Relation Sandro Suzart SUZART GOOGLE INC United States on Demons...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation Sandro Suzart SUZART GOOGLE INC United States on Demonstrations countries IMPEACHMENT GOOGLE INC
37 role of social media in political and regime change the college studyMary Smith
It is an educational blog and intended to serve as complete and self-contained work on essays, paragraph, speeches, articles, letters, stories, quotes.
https://www.thecollegestudy.net/
SSR and human rights are intertwined each other. The focus of this study is to assess security sector reform in Ethiopia and its implication for human right protection in Debre Markos Town Administration. The central objective of the study was to explore the positive and negative implication and challenges of SSR in Ethiopia with a particular reference to protecting human rights in Debre Markos Town. The researchers employed qualitative research method with case study research design.
Semantic Social Mashup approach for Designing Citizen DiplomacyAmit Sheth
Amit Sheth, "Semantic Social Mashup approach for Designing Citizen Diplomacy," position paper/talk at NSF Workshop on Designing Citizen Diplomacy, Irvine, CA, January 27-28, 2011.
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...AkashSharma618775
Money laundering usually involves a series of multiple transactions used to mask the source of financial
assets, so that these assets can be used without compromising criminals seeking to their use. Money laundering can
happen through various intermediaries; bank transfers, both by wire and check, are the most common channels
for illicit money transfers. Money Laundering has several devastating effects; it damages financial sector
institutions that are critical for economic growth, promoting crime and corruption that slow economic growth,
reducing efficiency in the real sector of the economy. Money laundering is a problem not only in the world’s major
financial markets and sea centers but also in emerging markets. Cameroon has criminalized money-laundering in
line with the United Nations Convention against Corruption which was signed on 10th October, 2003, and ratified
by the President of the Republic on 6th February, 2006. Cameroon follows an all-crimes approach to moneylaundering whereby all offences under the laws and regulations of Cameroon constitute predicate offences. In
order to effectively combat money laundering, institutions have equally being put in place to combat it.
MANAGING INFORMATION FOR DEVELOPMENT IN NIGERIA BY DR. YIMA SEN AT THE PROGRESSIVE GOVERNORS FORUM CAPACITY DEVELOPMENT SESSION FOR MEDIA ADVISERS OF APC GOVERNORS AT HOTEL SEVENTEEN, KADUNA STATE ON JANUARY 23, 2017
This presentation was presented during international seminar "Youth for Arab Baltic Cooperation" that was held in Vilnius, Lithuania on 19th-25th of November.
163 317-1-sm Relation between Sandro Suzart, SUZART, GOOGLE INC, United...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Eltantawy wiest2011 Relation Sandro Suzart SUZART GOOGLE INC United St...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
Eltantawy wiest2011 Relation between Sandro Suzart, SUZART, GOOGLE INC, ...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma
The advancement in technology has brought a new era in terrorism where Online Social Networks (OSNs) have become a major platform of communication with wide range of usage from message channeling to propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks people use OSNs for information exchange, mobilizing and uniting and raising money for the victims. This paper critically analyses the specific usage of OSNs in the times of terrorisms attacks in developing countries. We crawled and used Twitter’s data during Westgate shopping mall terrorist attack in Nairobi, Kenya. We then analyzed the number of tweets, geo-location of tweets, demographics of the users and whether users in developing countries tend to tweet, retweet or reply during the event of a terrorist attack. We define new metrics (reach and impression of the tweet) and present the models for calculating them. The study findings show that, users from developing countries tend to tweet more at the first and critical times of the terrorist occurrence. Moreover, large number of tweets originated from the attacked country (Kenya) with 73% from men and 23% from women where original posts had a most number of tweets followed by replies and retweets.
SSR and human rights are intertwined each other. The focus of this study is to assess security sector reform in Ethiopia and its implication for human right protection in Debre Markos Town Administration. The central objective of the study was to explore the positive and negative implication and challenges of SSR in Ethiopia with a particular reference to protecting human rights in Debre Markos Town. The researchers employed qualitative research method with case study research design.
Semantic Social Mashup approach for Designing Citizen DiplomacyAmit Sheth
Amit Sheth, "Semantic Social Mashup approach for Designing Citizen Diplomacy," position paper/talk at NSF Workshop on Designing Citizen Diplomacy, Irvine, CA, January 27-28, 2011.
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...AkashSharma618775
Money laundering usually involves a series of multiple transactions used to mask the source of financial
assets, so that these assets can be used without compromising criminals seeking to their use. Money laundering can
happen through various intermediaries; bank transfers, both by wire and check, are the most common channels
for illicit money transfers. Money Laundering has several devastating effects; it damages financial sector
institutions that are critical for economic growth, promoting crime and corruption that slow economic growth,
reducing efficiency in the real sector of the economy. Money laundering is a problem not only in the world’s major
financial markets and sea centers but also in emerging markets. Cameroon has criminalized money-laundering in
line with the United Nations Convention against Corruption which was signed on 10th October, 2003, and ratified
by the President of the Republic on 6th February, 2006. Cameroon follows an all-crimes approach to moneylaundering whereby all offences under the laws and regulations of Cameroon constitute predicate offences. In
order to effectively combat money laundering, institutions have equally being put in place to combat it.
MANAGING INFORMATION FOR DEVELOPMENT IN NIGERIA BY DR. YIMA SEN AT THE PROGRESSIVE GOVERNORS FORUM CAPACITY DEVELOPMENT SESSION FOR MEDIA ADVISERS OF APC GOVERNORS AT HOTEL SEVENTEEN, KADUNA STATE ON JANUARY 23, 2017
This presentation was presented during international seminar "Youth for Arab Baltic Cooperation" that was held in Vilnius, Lithuania on 19th-25th of November.
Similar to Analysing the role_of (2) Relation between Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations, countries IMPEACHMENT, GOOGLE INC
163 317-1-sm Relation between Sandro Suzart, SUZART, GOOGLE INC, United...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Eltantawy wiest2011 Relation Sandro Suzart SUZART GOOGLE INC United St...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
Eltantawy wiest2011 Relation between Sandro Suzart, SUZART, GOOGLE INC, ...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma
The advancement in technology has brought a new era in terrorism where Online Social Networks (OSNs) have become a major platform of communication with wide range of usage from message channeling to propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks people use OSNs for information exchange, mobilizing and uniting and raising money for the victims. This paper critically analyses the specific usage of OSNs in the times of terrorisms attacks in developing countries. We crawled and used Twitter’s data during Westgate shopping mall terrorist attack in Nairobi, Kenya. We then analyzed the number of tweets, geo-location of tweets, demographics of the users and whether users in developing countries tend to tweet, retweet or reply during the event of a terrorist attack. We define new metrics (reach and impression of the tweet) and present the models for calculating them. The study findings show that, users from developing countries tend to tweet more at the first and critical times of the terrorist occurrence. Moreover, large number of tweets originated from the attacked country (Kenya) with 73% from men and 23% from women where original posts had a most number of tweets followed by replies and retweets.
lab8/1.jpg
lab8/2.jpg
lab8/3.jpg
lab8/4.jpg
lab8/5.jpg
lab8/6.jpg
lab8/7.jpg
Kavanaugh et al. Between a Rock and a Cell Phone
Proceedings of the 9th International ISCRAM Conference – Vancouver, Canada, April 2012
L. Rothkrantz, J. Ristvej and Z. Franco, eds.
1
Between a Rock and a Cell Phone:
Communication and Information Technology Use
during the 2011 Egyptian Uprising
Andrea Kavanaugh1 Steven D. Sheetz1
Riham Hassan2 Seungwon Yang1
Hicham G. Elmongui3 Edward A. Fox1
Mohamed Magdy1 Donald J. Shoemaker1
1 Virginia Tech, Blacksburg, VA 24061, +1 (540) 231-1806
2 Arab Academy for Science and Technology, Cairo, Egypt
3 Alexandria University, Alexandria, Egypt
kavan, sheetz, seungwon, fox, mmagdy, [email protected][email protected][email protected]
ABSTRACT
Many observers heralded the use of social media during recent political uprisings in the Middle East even
dubbing Iran’s post election protests a “Twitter Revolution”. We seek to put into perspective the use of social
media in Egypt during the mass political demonstrations in 2011. We draw on innovation diffusion theory to
argue that these media could have had an impact beyond their low adoption rates due to other factors related to
demographics and social networks. We supplement our social media data analysis with survey data we collected
in June 2011 from an opportunity sample of Egyptian youth. We conclude that in addition to the contextual
factors noted above, the individuals within Egypt who used Twitter during the uprising have the characteristics
of opinion leaders. These findings contribute to knowledge regarding the role of opinion leaders and social
media, especially Twitter, during violent political demonstrations.
Keywords
social media, mobile phones, Middle East, social networks, innovation diffusion.
THE ROLE OF SOCIAL MEDIA IN POLITICAL CRISES
Protesters took to the streets with "a rock in one hand, a cell phone in the other," according to Rochdi Horchani
– a relative of Mohamed Bouazizi, the 26-year-old Tunisian street vendor who set himself on fire in December
2010 to protest police harassment and corruption (Ryan, 2011). Bouazizi’s death in early January 2011 as a
result of his burns triggered riots leading to the downfall in mid-January of the 23-year reign of Tunisia’s
President Ben Ali. A wave of protests against Middle East authoritarian governments followed in Egypt, Libya,
Bahrain, Algeria, and Syria, and came to be dubbed the ‘Arab Spring’. Starting in July 2010, prior to the
uprising, WikiLeaks began to release confidential State Department cables indicating that the US did not much
admire the authoritarian leaders in many of these countries – a development played out via a set of online
documents that certainly may have contributed to Arabs’ confidence in protesting. In addition, much credit has
been given to the role played by social media used by citizens to share with each other and with intern ...
Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...UN Global Pulse
A feasibility study conducted by Global Pulse with UNDP explored how data mining of large-scale online news data could complement existing tools and information for conflict analysis and early warning. Taking Tunisia as a test case, analysing news media archives from the period immediately prior to and following the January 2011 government transition, the study showed how tracking changes in tone and sentiment of news articles over time could offer insights about emerging conflicts. This study evidenced the considerable possibilities for further explorations into how mining of online digital content can be leveraged for conflict prevention.
Cite as: UN Global Pulse, 'Feasibility Study: Analysing Large-Scale News Media Content for Early Warning of Conflict', Global Pulse Project Series, no.3, 2014.
P2594 Relation Sandro Suzart SUZART GOOGLE INC United States on Demons...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
P2594 2 Relation between Sandro Suzart, SUZART, GOOGLE INC, United Stat...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
64
The Empire Strikes Back:
Social Media Uprisings and
the Future of Cyber Activism
by Ramtin Amin
ramtin amin is a Master in Public Policy
student at the John f. Kennedy school of
Government at Harvard University where he
concentrates in international and global
affairs. He has conducted extensive
research at the nexus of technology and
democracy and plans to pursue doctoral
work in this field upon graduating.
Neda Agha-Soltan and a few close friends
headed toward the center of Tehran, Iran,
in June 2009 to join thousands of others
in an anti-government protest following
the disputed presidential election. After
becoming stuck in traffic, Agha-Soltan
and her friends eventually decided to exit
the car to cool off. As she stepped out and
gazed at the crowd, the sound of a
gunshot rang through the air. A single
bullet was fired, and she fell to
the ground.
Bystanders captured her last moments
on a cell phone, and within hours the
grainy, low-resolution footage was
uploaded to the Internet and soon spread
virally across the globe. With links to
the video posted on YouTube, Facebook,
and Twitter, the amateur clip eventually
harnessed the attention of the mainstream
media, grabbing headlines on CNN and
in the New York Times.
Agha-Soltan’s death became a symbol for
the Iranian anti-government movement,
and online social media amplified that
symbol for the rest of the world to see.
TRADITIONAL POWER CIRCUMVENTED
The image of Agha-Soltan’s death was not
one that Iran’s government wanted the
world to see. In a country notorious for
its media censorship, the emergence of
online social networking sites and cell
phone cameras now allows citizens to
bypass state-censored media instantly and
transmit a message or video clip to
countless others at little or no cost. Digital
media has enabled average citizens,
including the two bystanders at the scene
of Agha-Soltan’s death, to provoke
outrage and motivate millions of people
to their feet at the touch of a button. Such
a level of power was previously limited to
just a small number of people within a
governing regime or those leading an
opposition group.
But this phenomenon is not unique
to Iran. Around the world, social
networking sites like YouTube and
Facebook are becoming unlikely leaders
of political power, as citizens circumvent
single political or religious leaders to
become champions of their
own campaigns.
DIGITAL ACTIVISM IN ACTION
Digital activism, also known as cyber
activism or e-activism, describes how
citizens can use digital tools to effect
social and political change. These digital
tools range from mobile phones and
digital cameras to Web 2.0 social
networking sites like YouTube, Facebook,
and Twitter.
65harvard kennedy school review | volume 10 | 2009–2010
unlikely leaders
activism became recognized as a source of
political power.
NOT WITHOUT LIMITATIONS
The Burmese and Moldovan cases also
demonstrate tha.
The slides tell how technology and politics complement and contradict each other, as well as how technology is used as a tool to serve particular political interest. The slides also show how technology can be perceived in a different context of a country's culture and priority.
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
Similar to Analysing the role_of (2) Relation between Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations, countries IMPEACHMENT, GOOGLE INC (20)
Material history of sandro suzart and the history of material meansSandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Political devices system Sandro Suzart, Suzart, Relationship Google INC Impea...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Conditioning of the absorption Sandro Suzart, Suzart, Relationship Google INC...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
The material history of sandro suzart a captive individualSandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Behavioural process of sandro suzart year 2027Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Resultado do cefet lista de aprovados no cefet ba sandro suzartSandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Conditioning of the absorption1 Sandro Suzart, Suzart, Relationship Google IN...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
List of organizations s Sandro Suzart, Suzart, Relationship Google INC Impeac...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
List of organizationsa Sandro Suzart, Suzart, Relationship Google INC Impeach...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
List of organizationsc Sandro Suzart, Suzart, Relationship Google INC Impeach...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubara...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubara...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubara...Sandro Santana
Sandro Suzart, Suzart, Relationship Google INC Impeachment of Ben Ali, Mubarak, Gaddafi
Sandro Suzart relationship on 2013 events of Demonstrations, a Media hierarchy of reporters covering the close event in Street DR Teodoro Baima, 51,52, República, São Paulo. Demonstrations event system in 2013, Mubarak and Gaddafi impeachment.
P1436 Relation between Sandro Suzart, SUZART, GOOGLE INC, United States...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Noha bakr Relation between Sandro Suzart, SUZART, GOOGLE INC, United St...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Nchr egypt upRelation between Sandro Suzart, SUZART, GOOGLE INC, United...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Mde123910Relation between Sandro Suzart, SUZART, GOOGLE INC, United Sta...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Kerry mcbroome Relation between Sandro Suzart, SUZART, GOOGLE INC, Unit...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOChristina Parmionova
The 2024 World Health Statistics edition reviews more than 50 health-related indicators from the Sustainable Development Goals and WHO’s Thirteenth General Programme of Work. It also highlights the findings from the Global health estimates 2021, notably the impact of the COVID-19 pandemic on life expectancy and healthy life expectancy.
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...OECDregions
Preliminary findings from OECD field visits for the project: Enhancing EU Mining Regional Ecosystems to Support the Green Transition and Secure Mineral Raw Materials Supply.
About Potato, The scientific name of the plant is Solanum tuberosum (L).Christina Parmionova
The potato is a starchy root vegetable native to the Americas that is consumed as a staple food in many parts of the world. Potatoes are tubers of the plant Solanum tuberosum, a perennial in the nightshade family Solanaceae. Wild potato species can be found from the southern United States to southern Chile
Synopsis (short abstract) In December 2023, the UN General Assembly proclaimed 30 May as the International Day of Potato.
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Working with data is a challenge for many organizations. Nonprofits in particular may need to collect and analyze sensitive, incomplete, and/or biased historical data about people. In this talk, Dr. Cori Faklaris of UNC Charlotte provides an overview of current AI capabilities and weaknesses to consider when integrating current AI technologies into the data workflow. The talk is organized around three takeaways: (1) For better or sometimes worse, AI provides you with “infinite interns.” (2) Give people permission & guardrails to learn what works with these “interns” and what doesn’t. (3) Create a roadmap for adding in more AI to assist nonprofit work, along with strategies for bias mitigation.
RFP for Reno's Community Assistance CenterThis Is Reno
Property appraisals completed in May for downtown Reno’s Community Assistance and Triage Centers (CAC) reveal that repairing the buildings to bring them back into service would cost an estimated $10.1 million—nearly four times the amount previously reported by city staff.
2. International Journal of Communication 5 (2011) Analyzing the Role of ICTs 1407
supporting systems have value and therefore can be considered as an asset to be attacked or defended;
in fact, the information and information systems themselves may also be used to conduct the attack
(Denning, 1999). The IW Lifecycle Model aims to describe an IW incident from the initial context to the
resolution and consequences of the incident. The analysis using the model extracts the functions that the
relevant ICTs performed in the uprisings and the attempts by the governments to subdue the protestors.
A more detailed background to information warfare and the model is provided in the following
section, followed by a background to the unrest in Tunisia and Egypt. The turmoil in the region is analyzed
using the model, and ICT roles are summarized.
Information Warfare and the IW Lifecycle Model
The philosophy of information warfare is that information and related technologies are an
offensive weapon as well as a target. Offensive operations seek to utilize technology or information to
corrupt, exploit, or deny access to the adversary’s similar assets (van Niekerk & Maharaj, 2010). Brazzoli
(2007) and Waltz (1998) have noted that information warfare may be conducted in three domains: the
physical (hardware); the information (software, logical network connections, policies); and the cognitive
(understanding, perceptions, and will). Information warfare consists of a number of “functional areas,”
and different nations have their own construct for the information warfare functional areas. For the
purposes of this article, the following functional areas will be considered: psychological operations,
network-centric warfare, and command and control warfare.
Psychological operations are actions taken to affect the will and perceptions of a target population
to ultimately influence their behavior to be favorable to the objectives of the protagonists (Brazzoli, 2007).
Additionally, Chatterji (2008) suggests that psychological operations may be used to achieve military or
political goals. Network-centric warfare is the integration of individual elements or platforms to create a
single cohesive fighting force through networking that can maximize the effective combat power (2008).
Command and control warfare is the protection of the ability to manage forces while disrupting the
adversary’s similar capabilities (Brazzoli, 2007).
Cronin and Crawford (1999) discuss the concept of social information warfare, where political and
social activists use the Internet and related technologies to further their objectives. They claim that the
Internet provides an “immediacy of audience access” (p. 261), which cultivates a situation where social
information warfare can thrive. The earliest example of a major social IW campaign was the Zapatista
movement in Mexico from 1994 to 1996, where the Internet was successfully used to pressure the
government into making reforms (Ronfeldt & Arquilla, 1998). Subsequently, mobile phones and online
social networks have been used to orchestrate anti-government protests in the Philippines, Iran, Moldova,
and Urumqi in China (Pillay, van Niekerk & Maharaj, 2010). The first use of ICTs in a protest context in
Africa was in Mozambique during the 2010 riots over the increase in food prices (Jacobs & Duarte, 2010).
The unrest in North Africa and the Middle East is the latest in this emerging trend of using ICTs to
facilitate mass protest actions. These tools are also used for advocacy by nongovernment organizations,
as well as for communication with their followers
3. 1408 Brett van Niekerk, Kiru Pillay, & Manoj Maharaj International Journal of Communication 5(2011)
and members (Pillay, van Niekerk & Maharaj, 2010). The online social media and the almost immediate
delivery of messages to a global target audience make these tools ideal for psychological operations and
perception management on a large scale (ibid.).
The IW Lifecycle Model was proposed by van Niekerk and Maharaj in a companion article
submitted to the South African Journal of Information Management. The model is designed to be scalable
and analyze events that employ the use of IW tactics. The model consists of a dual-layered process
describing the high-level and more in-depth technical details of an event such as the tools employed to
conduct the offensive and the defensive actions employed by the target. An IW incident evolves from
some context whereby an aggressor attacks a target, employing certain tactics and tools to meet its
objectives. This will have an impact on society as a whole, which, in turn, affects the individual. The target
reacts to the attack to recover from it and to protect itself against the aggressors, as well as to possibly
retaliate. The incident alters the original context, and the reaction results in the aggressor re-evaluating
the original IW operation. The Information Warfare Lifecyle model is shown in Figure 1.
4. International Journal of Communication 5 (2011) Analyzing the Role of ICTs 1409
Figure 1. The Information Warfare Lifecycle Model.
5. 1410 Brett van Niekerk, Kiru Pillay, & Manoj Maharaj International Journal of Communication 5(2011)
Background to the Uprisings in North Africa
The United Nations Development Program (UNDP) Arab Human Development Report (2009)
argues that few postindependence Arab states have transitioned to inclusive states, with the majority
failing to introduce representative democratic governments and institutions. The report notes further that
Arab states have instituted “varying degrees of repression and restrictions on the establishment and
functioning of political parties.” Furthermore, civil society has been subjected to restrictions and
regulations that hinder their existence and ability to operate.
Young people are the fastest growing segment of Arab countries’ populations. This “youth bulge”
makes the Middle East one of the most youthful regions in the world, with a median age of 22 compared
to a global average age of 28 (UNDP, 2009). However, many youth are unemployed, with 33% of Egypt's
youth staying at home (Hokayem, 2011). This lack of employment among many youth, combined with
nepotism, corruption and state repression, has seen the Arab social contract fracturing (Hokayem, 2011),
making many countries ripe for a people’s revolution. Radsch (2008) cites Meyer’s (2002) argument that
“dissidents and activists are created through common cause and the construction of identity around that
cause, which is often in response to government policies and configurations of the political environment.”
The Arab world has always been an early adopter of “mass media” technology. Egypt, in
particular, is perceived as a leader in the adoption of technology and also as the country with the largest
number of Internet users in the Arab world (Abdulla, 2007). Etling et al. (2010) state that “while offline
political speech is highly regulated in Egypt, political discourse is very evident in the blogosphere.” Lynch
(2007) argues that Egypt has some of the most active political bloggers in the Arab public sphere, with
Arab political blogging becoming more politically relevant. This is supported by Etling et al., who contend
that Egypt bloggers comprise the largest structural cluster in the Arab world. Blogs intersect and
compliment existing transnational media, allowing for dissident groups and their sympathizers to tap into
the mainstream (Ajemian, 2008).
Tunisia has one of the most developed telecommunications infrastructures in North Africa, with a
high mobile penetration rate and one of the lowest broadband prices in Africa. Of a population of 10.2
million inhabitants, 9 out of 10 Tunisians own a mobile telephone. Of these users, 84% access the
Internet at home, 75.8% use the Internet at work, and 24% use public Internet cafés (OpenNet Initiative,
2009). Tunisia has approximately 3.6 million Internet users and just over 1.6 million Facebook users
(Internet World Stats, 2011).
Through discontent and online political discourse, the North Africa region was on the verge of a
popular uprising in late 2010. The Jasmine Revolution began in December and first gained global
prominence in January 2011 when Tunisian President Ben Ali resigned and fled the country. The national
uprising was fueled by two decades of government misrule (Bay, 2011) and instigated by unemployed
university graduates. Additionally, leaked diplomatic cables released by WikiLeaks and outlining the
extravagant lifestyle of the presidential family may have played a part in sparking the revolt (Kirkpatrick,
2011). The demonstrators used the Internet and, in particular, social media websites to promote their
6. International Journal of Communication 5 (2011) Analyzing the Role of ICTs 1411
cause and distribute videos documenting the protests. These tools and cell phones also aided in
coordinating the protests (Bay, 2011; Kirkpatrick, 2011). The traditional mass media also played its part,
as Al Jazeera covered the entire period of demonstrations, even prior to the Western media taking notice
(Kirkpatrick, 2011).
Less than two weeks after the fall of the Tunisian government, massive antigovernment protests
erupted in Egypt; many protestors claimed that they were inspired by the success in Tunisia. Again, online
social media and cell phones appeared to be key to organizing the protests (Hendawi, 2011). The protests
stemmed from high unemployment, poverty, and increasing prices. As was the case in Tunisia, Egyptian
President Mubarak’s regime had been in power for an extended period, in this case three decades
(Hendawi, 2011).
The antigovernment protests in both Tunisia and then Egypt appeared to utilize social media to
advertise and coordinate the protests (Kessler, 2011). Tunisian authorities were reported to have tried to
hack into social media accounts in an attempt to delete users who were participating in encouraging
antigovernment protests (Madrigal, 2011). The response of the Egyptian authorities was to shut down
Internet and mobile services (Kessler, 2011; Kravets, 2011). These actions were ultimately unsuccessful,
as the social media served to initially spread the idea of the protest. It appears that once the uprisings
had gained momentum, the involvement of social media was not as important as it had been in the early
stages.
Analysis of the Uprisings
This section provides an analysis of the uprisings in Tunisia and Egypt using the IW Lifecycle
Model.
Context
The aggressor is the general population of the two nations, targeting the senior government, and
to a certain degree, the international community to get its support. The motivation of the aggressors is to
remove the governments that are perceived to be oppressive and corrupt; they are essentially fighting for
an improved way of life. The objective of each uprising is to call attention to a population that is unhappy
and to a corrupt regime that needs to be replaced by a democratic government.
Attack
The IW functional areas employed are psychological operations and a form of network-centric
warfare (or command and control of the protestors). The international community was targeted by
psychological operations to “corrupt” or alter their perceptions about supporting the objectives of the
protestors. The protests themselves were designed to break the will of the governments. The target set
can therefore be defined as the political and social constructs of the nations, along with the minds of both
the local and international communities. Technology was exploited to provide a delivery mechanism for
the anti-government sentiments and as a form of command and control.
7. 1412 Brett van Niekerk, Kiru Pillay, & Manoj Maharaj International Journal of Communication 5(2011)
The offensive “weapons” can be considered to be the online social media and the Internet, the
international mass media, and the mass human protests themselves. As many of the protest signs were in
English, it may be assumed that the message was not only being directed at the national government but
also at the international community to try to gain support and sympathy.
Consequences and Phenomena
As the thoughts and perceptions of the populations in Tunisia and in Egypt were affected, the
protests grew and local society was impacted. Additionally, the mass media and online social networks
affected the perceptions of the international community. The protests were also aimed to sap the will of
the targeted government leaders. The success of the protests in Tunisia seems to have sparked similar
unrest in Egypt. Then, as the idea of rebellion against unpopular government regimes spread, and as the
impacted populations were encourage by success, protests spread to other nations in the region, notably
Jordan, Syria, Bahrain, Libya, Iran, and Yemen (Black & Chulov, 2011; Sky News, 2011). Other national
leaders also put pressure on Mubarak to step down (Lee, 2011; Lekic, 2011; Robinson, 2011), indicating a
level of success in that the behavior of these leaders was influenced to support the protestors’ objectives.
Mobile phones were used by mass broadcast media to communicate with protestors on the ground via
voice services, which, in turn, provided the individual protestors with a stage on which to voice their
opinion.
Defense
The governments initially used the police force and the military to crack down on protestors.
There were also reports of the Tunisian government attempting to hack into and delete social media
profiles of major participants to try to mitigate the spread of the uprising. The Egyptian government shut
off the Internet and mobile phone services to try to hinder the organization of demonstrations. This
indicates a form of command and control warfare, as it was an attempt to prevent communication and co-
ordination amongst the protestors and main opposition leaders.
Summary of the Role of ICTs in the Uprisings
From the analysis using the IW Lifecycle Model, it is apparent that ICTs were employed as a
communication tool to disseminate information to alter the perceptions and will of both local and
international target audiences in both uprisings. ICT usage also provided a degree of co-ordination for the
initial protests. Attempts by authorities to control the protests in Tunisia and Egypt by denying the social
media platform were ultimately unsuccessful. The social media served to initially disseminate news of and
the reasoning behind the protests. Once the uprisings had gained momentum, the need for social media
involvement was reduced. This indicates that the reacting actor is at a disadvantage while the initiating
actor has the opportunity to shape the perspectives of the target audience. Therefore, the reaction needs
to counter those effects in addition to providing an opposing message.
The role of ICTs in the uprisings from an IW perspective then could be construed as psychological
operations and command and control warfare.
8. International Journal of Communication 5 (2011) Analyzing the Role of ICTs 1413
Conclusion
The role of ICTs in the Tunisian and Egyptian uprisings was primarily that of a transmission
medium through which to spread anti-government perception and provide some organization and cohesion
to the protests. Social media, in particular, facilitated communications and provided a degree of command
and control for the protestors, therefore forming the basis for network-centric warfare. This technology,
and the devices that support it, namely mobile phones, became the initial target of the government
response as it attempted to restrict the spread of antigovernment perceptions. The mass media provided a
platform for the protestors to present their message to the global community, again in an attempt to
promulgate antigovernment perceptions and to apply further pressure on the respective government
leaders to step down. In both cases, the objectives were met. While the use of ICTs alone did not achieve
these successes, they certainly made a strong contribution.
◊◊◊
Two of the three authors of this article (Brett van Niekerk and Kiru Pillay) received grants from the South
African Department of Defence and Armscor Ledger Program, through the Cyber Defence Research Group
at the Council for Scientific and Industrial Research, Defence, Peace, Safety, and Security (CSIR-DPSS) as
well as from the University of KwaZulu-Natal for their PhD research, of which this paper forms a part.
9. 1414 Brett van Niekerk, Kiru Pillay, & Manoj Maharaj International Journal of Communication 5(2011)
References
Abdulla, R.A. (2007). The Internet in the Arab world. New York: Peter Lang Publishing.
Ajemian, P. (2008, January). The Islamist opposition online in Egypt and Jordan. Arab Media & Society,
Issue 4. Retrieved from http://www.arabmediasociety.com/?article=577
Bay, A. (2011, January 18). Tunisia's remarkable revolt. Retrieved from
http://www.strategypage.com/on_point/20110118224752.aspx
Black, I., & Chulov, M. (2011, February 18). Bahrain, Libya and Yemen try to crush protests with violence.
Retrieved from http://www.guardian.co.uk/world/2011/feb/18/bahrain-libya-yemen-protests-
violence
Brazzoli, M. S. (2007). Future prospects of information warfare and particularly psychological operations.
In L. Le Roux (Ed.), South African Army Vision 2020 (pp. 217–232). Pretoria, South Africa:
Institute for Security Studies.
Chatterji, S. K. (2008). An overview of information operations in the Indian army. IOSphere, Special
Edition, 10–14.
Cronin, B., & Crawford, H. (1999). Information warfare: Its application in military and civilian contexts.
The Information Society, 15( 4), 257–263.
Denning, D. E. (1999). Information warfare and security. Boston: Addison-Wesely.
Etling, B., Kelly, J., Faris, R., & Palfrey, J. (2010). Mapping the Arabic blogosphere: Politics and dissent
online. New Media and Society, 12(8), 1225–1243.
Hendawi, H. (2011, January 27). Egypt protests pose threat for regime. Retrieved from
http://news.yahoo.com/s/ap/20110127/ap_on_re_mi_ea/ml_egypt_protest_66
Hokayem, E. (2011). A universalism to the pleas from Cairo's streets. Retrieved from
http://www.thenational.ae/thenationalconversation/comment/a-universalism-to-the-pleas-from-
cairos-streets
Internet World Stats. (2011). Usage and population statistics. Retrieved from
http://www.internetworldstats.com/africa.htm#eg
Jacobs, S., & Duarte, D. (2010, September 16). Protest in Mozambique: The power of SMS. Retrieved
from http://www.afronline.org/?p=8680
Kessler, S. (2011, January 25). Twitter blocked in Egypt as protests turn violent. Retrieved from
http://news.yahoo.com/s/mashable/20110125/tc_mashable/twitter_blocked_in_egypt_as_protes
ts_turn_violent
10. International Journal of Communication 5 (2011) Analyzing the Role of ICTs 1415
Kirkpatrick, D. D. (2011, January 14). Tunisia leader flees and prime minister claims power. Retrieved
from
http://www.nytimes.com/2011/01/15/world/africa/15tunis.html?pagewanted=1&_r=2&nl=today
sheadlines&emc=tha2
Kravets, D. (2011, January 27). Internet down, tens of thousands protest in Friday of wrath. Retrieved
from http://www.wired.com/threatlevel/2011/01/egypt-internet-down/#
Lee, M. (2011, February 1). Obama urges Mubarak to step down. Retrieved from
http://www.columbiamissourian.com/stories/2011/02/01/obama-urges-mubarak-step-down-now
Lekic, S. (2011, February 11). Denmark prime minister Lars Loekke Rasmussen calls on Egypt's Mubarak
to resign. Retrieved from http://www.huffingtonpost.com/2011/02/11/denmark-lars-loekke-
rasmussen-mubarak-egypt_n_821804.html
Lynch, M. (2007, February). Blogging the new Arab public. Arab Media & Society, Issue 1. Retrieved from
http://www.arabmediasociety.com/?article=10
Madrigal, A. (2011, January 24). The inside story of how Facebook responded to Tunisian hacks. Retrieved
from http://www.theatlantic.com/technology/archive/2011/01/the-inside-story-of-how-facebook-
responded-to-tunisian-hacks/70044/#
OpenNet Initiative. (2009). Tunisia. Retrieved from http://opennet.net/research/profiles/tunisia
Pillay, K., van Niekerk, B., & Maharaj, M. (2010). Web 2.0 and its implications for the military. Workshop
on the Uses of ICT in Warfare and the Safeguarding of Peace (pp. 50–57). Bela-Bela, October 11.
Radsch, C. (2008, Fall). Core to commonplace: The evolution of Egypt’s blogosphere. Arab Media &
Society, Issue 6. Retrieved from http://www.arabmediasociety.com/?article=692
Robinson, J. J. (2011, February 2). Maldavian president joins calls for Mubarak to step down. Retrieved
from http://minivannews.com/politics/maldivian-president-joins-calls-for-mubarak-to-step-down-
15715
Ronfeldt, D., & Arquilla, J. (1998). The Zapatista social netwar in Mexico. Santa Monica: RAND
Corporation.
Sky News. (2011). Middle East: See facts about all the countries in the region. Retrieved from
http://news.sky.com/skynews/Interactive-Graphics/middleeast
United Nations Development Programme—Regional Bureau for Arab States. (2009). Arab human
development report: Challenges to human security in Arab countries. Retrieved from
http://www.arab-hdr.org
11. 1416 Brett van Niekerk, Kiru Pillay, & Manoj Maharaj International Journal of Communication 5(2011)
van Niekerk, B., & Maharaj, M. (2010). Mobile security from an information warfare perspective. 9th
Information Security South Africa Conference. Sandton, August 2–4.
Waltz, E. (1998). Information warfare: Principles and operations. Boston & London: Artech House.