A Model of Cyber Extremists' Rhetorical Structure Towards Protecting Critical Infrastructure

Osman Khairunnisa, J. Zanariah, Ahmad Rabiah
{"title":"A Model of Cyber Extremists' Rhetorical Structure Towards Protecting Critical Infrastructure","authors":"Osman Khairunnisa, J. Zanariah, Ahmad Rabiah","doi":"10.3844/jcssp.2024.610.627","DOIUrl":null,"url":null,"abstract":": Much research at present focuses on the ways in which organizations secure their networks and information in the supply chain, ignoring the ways in which organizations construct and understand the core of the cybersecurity risks. Cybersecurity focuses more on defense mechanisms such as anti-virus software, malware protection, firewall and more on securing network and application. More research to understand extremist activity should be conducted by exploring the extremist corpus. It is a good strategy since the web is overloaded with multiple conversations or information since the dependency to the technology has been skyrocketing by people including by the extremist itself. The objectives of this study were to identify the types of rhetoric in cyber extremist’s communication, analyze how the cyber extremists utilized the rhetoric in appealing to the audience, identify the stylistic devices used by the extremists and produce a model of cyber extremists’ rhetorical structure. Therefore, new approaches to study the rhetoric of cyber extremists have been designed. It is the combination of Norreklit’s methodology, Neo-Aristotelian criticism ideologist criticism which were deemed able to pry out the hidden literacy of the extremists. In this study the type of rhetoric that dominated the cyber extremists’ communication was pathos. The category of pathos in the extremists’ postings was more on negative feelings such as sad, anger and hatred. Using the Neo-Aristotle criticism, the stylistic devices used by the extremists were identified such as the metonymy, simile metaphor. The metonymy used was like ‘Jihad’, ‘Mujahidin’, ‘Ansar’ and ‘Muhajirin’. The metonymy ‘Penyembah’ which referred to the opponents’ obsessive materialistic behavior was seen multiplicatively in the extremists’ postings. The simile stylistic devices such as the word ‘Thagut’ and ‘terrorist’ were used by the extremists as direct comparison. As a direct comparison, Meanwhile, the metaphor of death was used consistently by the extremist which can be seen as a scary technique for the opponents. Meanwhile, by using the ideologist criticism, the appearance that was used by most of the extremists was the desire to be seen as a peace ideologist and kind rhetor through the use of cold color such as blue and green with the nature design as the background of the blog. All the phrases were gathered, analyzed and integrated to ascertain the pattern based on the research methodologies to develop a model. A model of cyber extremists' rhetorical structure was developed and established towards protecting the critical infrastructure to ease any parties including the authority, expert and public to identify the possible extremists’ styles as red flags during cyber communication such as social media communication","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3844/jcssp.2024.610.627","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

: Much research at present focuses on the ways in which organizations secure their networks and information in the supply chain, ignoring the ways in which organizations construct and understand the core of the cybersecurity risks. Cybersecurity focuses more on defense mechanisms such as anti-virus software, malware protection, firewall and more on securing network and application. More research to understand extremist activity should be conducted by exploring the extremist corpus. It is a good strategy since the web is overloaded with multiple conversations or information since the dependency to the technology has been skyrocketing by people including by the extremist itself. The objectives of this study were to identify the types of rhetoric in cyber extremist’s communication, analyze how the cyber extremists utilized the rhetoric in appealing to the audience, identify the stylistic devices used by the extremists and produce a model of cyber extremists’ rhetorical structure. Therefore, new approaches to study the rhetoric of cyber extremists have been designed. It is the combination of Norreklit’s methodology, Neo-Aristotelian criticism ideologist criticism which were deemed able to pry out the hidden literacy of the extremists. In this study the type of rhetoric that dominated the cyber extremists’ communication was pathos. The category of pathos in the extremists’ postings was more on negative feelings such as sad, anger and hatred. Using the Neo-Aristotle criticism, the stylistic devices used by the extremists were identified such as the metonymy, simile metaphor. The metonymy used was like ‘Jihad’, ‘Mujahidin’, ‘Ansar’ and ‘Muhajirin’. The metonymy ‘Penyembah’ which referred to the opponents’ obsessive materialistic behavior was seen multiplicatively in the extremists’ postings. The simile stylistic devices such as the word ‘Thagut’ and ‘terrorist’ were used by the extremists as direct comparison. As a direct comparison, Meanwhile, the metaphor of death was used consistently by the extremist which can be seen as a scary technique for the opponents. Meanwhile, by using the ideologist criticism, the appearance that was used by most of the extremists was the desire to be seen as a peace ideologist and kind rhetor through the use of cold color such as blue and green with the nature design as the background of the blog. All the phrases were gathered, analyzed and integrated to ascertain the pattern based on the research methodologies to develop a model. A model of cyber extremists' rhetorical structure was developed and established towards protecting the critical infrastructure to ease any parties including the authority, expert and public to identify the possible extremists’ styles as red flags during cyber communication such as social media communication
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络极端分子保护关键基础设施的修辞结构模型
:目前的许多研究侧重于组织如何确保其网络和供应链中信息的安全,而忽视了组织如何构建和理解网络安全风险的核心。网络安全更多地关注防病毒软件、恶意软件保护、防火墙等防御机制,而更多地关注网络和应用程序的安全。应通过探索极端分子语料库来开展更多研究,以了解极端分子的活动。这是一个很好的策略,因为网络上充斥着大量的对话或信息,人们包括极端分子本身对技术的依赖性急剧上升。本研究的目标是识别网络极端分子传播中的修辞类型,分析网络极端分子如何利用修辞吸引受众,识别极端分子使用的文体手段,并建立网络极端分子的修辞结构模型。因此,人们设计了研究网络极端分子修辞的新方法。诺雷克利特方法论、新亚里士多德批判思想家批判相结合,被认为能够窥探出极端分子隐藏的素养。在本研究中,主导网络极端分子传播的修辞类型是悲怆。在极端分子的帖子中,"悲怆 "更多的是负面情绪,如悲伤、愤怒和仇恨。利用新亚里士多德批评法,研究人员确定了极端分子使用的文体手段,如转喻、比喻和隐喻。使用的隐喻有 "圣战"、"圣战者"、"安萨尔 "和 "穆哈吉林"。隐喻 "Penyembah "指的是极端分子的反对者痴迷于物质的行为,在极端分子的帖子中成倍出现。极端分子使用 "Thagut "和 "terrorist "等比喻文体进行直接对比。同时,作为直接对比,极端分子不断使用死亡的隐喻,这可以被视为一种让反对者感到恐惧的手法。同时,通过使用意识形态批评,大多数极端分子使用的外观是通过使用蓝色和绿色等冷色调以及自然设计作为博客背景,希望被视为和平意识形态主义者和善良的修辞者。我们收集、分析和整合了所有短语,并根据研究方法确定了模式,从而建立了一个模型。网络极端分子修辞结构模型的开发和建立旨在保护关键基础设施,以方便包括权威机构、专家和公众在内的各方在网络通信(如社交媒体通信)过程中识别可能的极端分子风格,并将其作为红旗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Computer Science
Journal of Computer Science Computer Science-Computer Networks and Communications
CiteScore
1.70
自引率
0.00%
发文量
92
期刊介绍: Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.
期刊最新文献
Features of the Security System Development of a Computer Telecommunication Network Performance Assessment of CPU Scheduling Algorithms: A Scenario-Based Approach with FCFS, RR, and SJF Website-Based Educational Application to Help MSMEs in Indonesia Develop A Multi-Split Cross-Strategy for Enhancing Machine Learning Algorithms Prediction Results with Data Generated by Conditional Generative Adversarial Network Improving the Detection of Mask-Wearing Mistakes by Deep Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1