scholarly journals Cyber conflict and Islam Ethics on the Ustadz Harassment cases in the YouTube Community

2021 ◽  
Vol 3 (2) ◽  
pp. 45-56
Author(s):  
Mariko Rizkiansyah ◽  
Muslikhin
Keyword(s):  

The number of Indonesia user YouTube Access increases significantly. The content of YouTube also diverse including Islam da'wah in many channels in YouTube both national and international. The comment fixture in YouTube not only simplify users to comment but also create a conflict between users including the Ustadz Abdul Somad Rejection broadcasting. This aim of the research is to figure out how the meaning of YouTube comment and how the application of comment Islam ethics according to Quran and Hadis in the Ustadz Abdul Somad cases on YouTube. This research also using cyber conflict and Quran verse and Hadis related to communication Islam ethics. The method of this research using Netnography where researcher focus to comment columns who indicated have a conflict between users. The data of this research is the comment columns on three video who indicated have an Ustadz Abdul Somad Rejection topic. The result of this research that Pro UAS trying to mobilize opinion to drive out Banser while anti-UAS framing UAS as a radicalism orator and involve in prohibit organization. Both pro-UAS and anti-UAS always mocking each other when creating a conflict. They also think this is the best way to win the debate.

2020 ◽  
Vol 102 (913) ◽  
pp. 261-285
Author(s):  
Amandeep S. Gill

AbstractThis article examines a subset of multilateral forums dealing with security problems posed by digital technologies, such as cyber warfare, cyber crime and lethal autonomous weapons systems (LAWS).1 It identifies structural issues that make it difficult for multilateral forums to discuss fast-moving digital issues and respond in time with the required norms and policy measures. Based on this problem analysis, and the recent experience of regulating cyber conflict and LAWS through Groups of Governmental Experts, the article proposes a schema for multilateral governance of digital technologies in armed conflict. The schema includes a heuristic for understanding human–machine interaction in order to operationalize accountability with international humanitarian law principles and international law applicable to armed conflict in the digital age. The article concludes with specific suggestions for advancing work in multilateral forums dealing with cyber weapons and lethal autonomy.


2017 ◽  
Vol 139 (03) ◽  
pp. S9-S12
Author(s):  
Brian Connett ◽  
Bryan O’Halloran

This article presents a combination of known models and system design techniques that result in an architectural framework that is predictive. The article also provides a methodical recommendation that develops the way defense of a cyber critical infrastructure can be most effective. Firstly, historical background has been provided to motivate the current political theme, followed by modeling theory that has been published. Classical systems engineering foundations are reviewed to adapt modeling environment to the current cyber conflict problem in a way that allows a systems owner to posture most effectively against anomalies across the network of communication nodes. The implication of the model presented in the article is that a protection posture can be estimated, and can quickly turn into a balanced engagement between the attacker and defender. When optimized within decision algorithms, data will exist to illuminate what process can be implemented in defense. Using classical systems engineering fundamentals, modeling simulation, and proven mathematical approaches, this research seeks to support such implementation.


2021 ◽  
pp. 272-294
Author(s):  
Paul Cornish

For all its apparent complexity, deterrence is built upon a relatively straightforward premise: that fear of adverse consequences can serve to prevent unacceptable behaviour. In traditional deterrence theory, particularly that which matured during the Cold War, prevention could be achieved both by fear of punishment and by fear of failure: by punitive measures that would be undertaken in response to a transgression and intended to inflict some pain, damage, or loss upon the transgressor; or by a denial posture intended to impress upon an adversary that the complexities of the defences will be technologically insurmountable and/or the costs of doing so unbearably high. Fresh thinking is required to make deterrence relevant to the cyber era. The challenges of cyber warfare are described here as the ‘four zeros’: ‘zero day’ vulnerability to novel malware; ‘zero source’ or non-attribution of an attack; ‘zero effect’ or covert, non-detectable attack; and ‘zero intent’ or lack of clarity as to an adversary’s intentions. These challenges can be met by allowing deterrence to function in different ways as circumstances allow or require: punitive, constructive, and protective deterrence.


2019 ◽  
pp. 304-330
Author(s):  
Metodi Hadji-Janev

Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is complex and poses serious challenges to national and international security. One way to protect the civilian populace is by deterring potential malicious actors (state and non-state) from exploiting cyberspace in a negative way. Given the changed reality and complexity that gravitates over the cyber conflict classical deterrence that have worked during the Cold War is not promising. The article argues that if the states are about to protect their civilians from the future cyber conflict by deterring potential attacker they need to change the approach to deterrence.


2012 ◽  
pp. 1088-1095
Author(s):  
Kumi Ishii ◽  
Brittany R. Black

With the diffusion of networked technology in our society, online communication has become an integral part of daily life, and conflict no longer occurs only in face-to-face (FtF) contexts. Many people experience cyber conflict (i.e., a perceived incompatibility of goals among two or more cyber parties over computer-mediated communication (CMC) or online communication) and manages it online. While research in this significant and emerged topic is scattered across contexts and disciplines, this chapter provides preliminary knowledge by discussing the antecedents and outcomes of cyber conflict as well as factors that affect cyber conflict management. The chapter also offers future research directions.


Author(s):  
Dorothy E. Denning

This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa’ida and the global jihadist movement associated with it; and operations by patriotic hackers from China, Russia, and elsewhere.


Sign in / Sign up

Export Citation Format

Share Document