Osman, Khairunnisa (2024) A model of cyberterrorists’ rhetorical structure towards protecting critical national information infrastructure. Doctoral thesis, Universiti Teknikal Malaysia Melaka.
![]() |
Text (24 Pages)
A model of cyberterrorists’ rhetorical structure towards protecting critical national information infrastructure.pdf - Submitted Version Download (374kB) |
![]() |
Text (Full Text)
A model of cyberterrorists’ rhetorical structure towards protecting critical national information infrastructure.pdf - Submitted Version Restricted to Registered users only Download (5MB) |
Abstract
Presently, many efforts to eliminate the terrorists are focusing on the physical controls such as body scanner, CCTV, weapons, alarms, and other tangible procedures. Same as the way organizations secure their networks and information from the terrorists’ exploitation by focusing more on the defence mechanism such as anti-virus software, malware protection, firewall, and others. However, we should not ignore that the fact that the dependency to the technology has been increasing rapidly due to inexpensive, borderless, fast, and safe by people including the terrorist itself which causes the increase of successful passing of any defence mechanism that being placed. Instead of concentrating of the protection attempts, another strategy as utilizing the situation that the web is overloaded with information put by the people including by the terrorists must be used as other efforts to understand the core causes of terrorists and eventually use it to prevent it from evolves. Therefore, this research is focusing and exploring the terrorists’ corpus area by identifying the types of rhetoric in cyber terrorist’s communication, analysing how the cyber terrorists utilize the rhetoric in appealing the audience, the preferred stylistics devices and argumentation in their communication. We believe the corpus research able to identify the terrorists’ rhetorical strategic and past background. Understanding from the rhetoric side might help eliminating the terrorists as the current efforts are focusing more on defence mechanism which can be defeated eventually. The samples of actual terrorists’ postings in the social media are used in the rhetorical analysis. Most of the samples’ postings are given by CyberSecurity Malaysia as a credible cybersecurity expert in Malaysia whereby the samples given for the purpose of research and education only. A new research methodology has been designed in this research using the combination of the Norreklit’s Methodology, Neo-Aristotelian Criticism, and IdeologistCriticism. The combination ofthese criticisms can pry out the types of rhetoric used by the terrorist to convey their messages to their target audience. Based on this design, the types of rhetoric are assessed in the attributes of pathos (emotion), ethos (trust), logos (logical), the common stylistic devices used, and the appearance preferred in the social media in term of web’s colour and design. These attributes are combined to develop the model of cyberterrorists’ rhetorical structure which the effort from this literature perspective able to understand the strategy used by the terrorists in the cyber realm during appealing their audience. The models developed has obtained the accuracy verification by the expert that has vast experience in terrorism and extremism. The model aligns with expert’s view based on responses and expert’s key writings and books. Recognizing the red flag during social media communication is helping in reducing and disrupting the terrorism activities from continually evolving. The model can be used for the reference of authority, policy maker, system developer, and public by enlarging the benefits in each own field for the protection and security of Critical National Information Infrastructure (CNII) in Malaysia.
Item Type: | Thesis (Doctoral) |
---|---|
Uncontrolled Keywords: | Cyber terrorism, Cybersecurity, Critical National Information Infrastructure (CNII) |
Divisions: | Library > Tesis > IPTK |
Depositing User: | Muhamad Hafeez Zainudin |
Date Deposited: | 28 Feb 2025 11:47 |
Last Modified: | 28 Feb 2025 11:47 |
URI: | http://eprints.utem.edu.my/id/eprint/28550 |
Statistic Details: | View Download Statistic |
Actions (login required)
![]() |
View Item |