resource log
TRANSCRIPT
-
8/9/2019 Resource Log
1/10
-
8/9/2019 Resource Log
2/10
-
8/9/2019 Resource Log
3/10
-
8/9/2019 Resource Log
4/10
-
8/9/2019 Resource Log
5/10
-
8/9/2019 Resource Log
6/10
-
8/9/2019 Resource Log
7/10
-
8/9/2019 Resource Log
8/10
-
8/9/2019 Resource Log
9/10
-
8/9/2019 Resource Log
10/10
Log and Evaluation of Resources
Extended Project 2014 | Maurice Yap 6946
10
report factually reliable. NATO’s CCDCoE. Terrorism.
Cybercrime.
Social infrastructure and SCADA.
Relationship between cyberwarfare and national security.
Online newsarticle
WINTOUR, P., 2011 Reliability of information wasn't considered as the source wasonly used for an image.
An image from this source was used in the presentation.
An unrolled cannabis joint used as a visual aid.
Encyclopaediaentry
WITHER, J., 2008 Encyclopaedia, probably intensely researched withlarge team of researchers and editors beforepublication to ensure accuracy so reliable.
Cyberwarfare definitions
Online newsarticle
ZETTER, K., 2007 Reliability of information wasn't considered as the source wasonly used for an image.
A video still of the Aurora test from this source was used inthe report and the presentation.
Personalexperience
My personal experiences, therefore reliable to me. The effect of Koobface on my Facebook “friends “at the timeof the incident – many were affected.
The failure of family internet filters – in particular, blockingof “sects”.
Seen a lot of propaganda used on Facebook and Twitter,particularly by QSIS and anti-government activists during the
Arab Spring.
Screenshots ofthree tweets byTwitter users
Reliable because it is primary evidence. The use of hashtags in Israel-Gaza conflict of 2014.
Empathy by internet users on all sides of the conflict.
Visible use of Twitter for public awareness raising andexpression of perceived truths by each user.