Article
Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization. Media, War & Conflict, 5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917
The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception. Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/
This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy
Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case. Retrieved from www.ecommercetimes.com/story/65424.html
This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy
Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism. Studies in Conflict & Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345
The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.
Recommended Resources
Article
Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide. Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?lit
This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy
TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker. Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/
This website details the cyberstalking of Vickie Newton. It may assist you in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy
Websites
The Cybersmile Foundation. (www.cybersmile.org)
This website provides additional information on cyberstalking and may offer assistance developing this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy does not exist
MSCJ Professional Sources. (http://ashford-mscj.weebly.com)
This resource site will provide assistance in researching additional sources for the assessments within this course.
Accessibility Statement does not exist.
Privacy Policy does not exist.
WHO@: Working to Halt Online Abuse. (www.haltabuse.org)
This website provides additional information on online abuse and may assist in the development of this week’s discussion post.
Accessibility Statement does not exist.
Privacy Policy does not exist.
Go to top of page
Extremist Indoctrination via Cyberspace
Prior to beginning work on this assignment, read Chapter 10 in Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources guide for assistance with finding appropriate resources.)
In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups’ causes. For this paper choose one domestic extremist group as the focus for your paper.
Your paper you must
Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.
Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.
Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.
Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.