This book offers fresh insights on digital activism and cyberconflicts through a comparison of sociopolitical and ethnoreligious movements in Nigeria. Occupy Nigeria, Boko Haram and The Movement for the Emancipation of the Niger Delta (MEND) highlight the digital and organizational aspects of conflict mobilization in contemporary Nigeria.
This book offers fresh insights on digital activism and cyberconflicts through a comparison of sociopolitical and ethnoreligious movements in Nigeria. Occupy Nigeria, Boko Haram and The Movement for the Emancipation of the Niger Delta (MEND) highlight the digital and organizational aspects of conflict mobilization in contemporary Nigeria.
Drawing on a historical and political economy analysis, this book provides insight on how, under neoliberal hegemony, the internet was transformed from an emancipatory project for humanity to the final frontier of unrestrained capitalism.
This book introduces four waves of upsurge in digital activism and cyberconflict. The rise of digital activism started in 1994, was transformed by the events of 9/11, culminated in 2011 with the Arab Spring uprisings, and entered a transformative phase of control and mainstreaming since 2013 with the Snowden affair.
This book explores the theories of transhumanism and posthumanism, two philosophies that deal with radically changing bodies, minds, and even the nature of humanity itself.
Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats. Highlighting a range of topics such as cyber threats, digital intelligence, and counterterrorism, this multi-volume book is ideally designed for law enforcement, government officials, lawmakers, security analysts, IT specialists, software developers, intelligence and security practitioners, students, educators, and researchers.
Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense experts P.W. Singer and Emerson T. Brooking.
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
Using the 2012 Delhi Nirbhaya rape case as a case study and keeping gender discourses at its core, this book explores the use of digital media for gender activism in India demonstrating how it has formed an alternate platform for dissent.