2173 Salk Avenue, Suite 250 Carlsbad, CA

support@assignmentprep.info

Extremist Indoctrination via Cyberspace

July 4, 2022
Christopher R. Teeple

 

Extremist Indoctrination via Cyberspace

Prior to beginning work on this assignment, read Chapter 10 in Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources (Links to an external site.) guide for assistance with finding appropriate resources.)

In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups’ causes. For this paper choose one domestic extremist group as the focus for your paper.

Your paper you must

  • Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.
  • Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.
  • Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.
  • Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.

The Extremist Indoctrination via Cyberspace paper

  • Must be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least three scholarly sources in addition to the course text.
  • Must document all sources in APA style as outlined in the Writing Center.

Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 9: Cyberbullying, On-Line Harassment, and Cyber stalking
  • Chapter 10: Online Extremism, Cyber terror, and Cyber Warfare

Article

Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization (Links to an external site.). Media, War & Conflict, 5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.

Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception (Links to an external site.). Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/

  • This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case (Links to an external site.). Retrieved from www.ecommercetimes.com/story/65424.html

  • This online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism (Links to an external site.). Studies in Conflict & Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345

  • The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.

Recommended Resources

Article

Giammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide (Links to an external site.). Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?lit

  • This website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy (Links to an external site.)

TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker (Links to an external site.). Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/

Websites

The Cybersmile Foundation (Links to an external site.). (www.cybersmile.org)

  • This website provides additional information on cyberstalking and may offer assistance developing this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist

MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

WHO@: Working to Halt Online Abuse (Links to an external site.). (www.haltabuse.org)

  • This website provides additional information on online abuse and may assist in the development of this week’s discussion post.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

Struggling With a Similar Paper? Get Reliable Help Now.

Delivered on time. Plagiarism-free. Good Grades.

What is this?

It’s a homework service designed by a team of 23 writers based in Carlsbad, CA with one specific goal – to help students just like you complete their assignments on time and get good grades!

Why do you do it?

Because getting a degree is hard these days! With many students being forced to juggle between demanding careers, family life and a rigorous academic schedule. Having a helping hand from time to time goes a long way in making sure you get to the finish line with your sanity intact!

How does it work?

You have an assignment you need help with. Instead of struggling on this alone, you give us your assignment instructions, we select a team of 2 writers to work on your paper, after it’s done we send it to you via email.

What kind of writer will work on my paper?

Our support team will assign your paper to a team of 2 writers with a background in your degree – For example, if you have a nursing paper we will select a team with a nursing background. The main writer will handle the research and writing part while the second writer will proof the paper for grammar, formatting & referencing mistakes if any.

Our team is comprised of native English speakers working exclusively from the United States. 

Will the paper be original?

Yes! It will be just as if you wrote the paper yourself! Completely original, written from your scratch following your specific instructions.

Is it free?

No, it’s a paid service. You pay for someone to work on your assignment for you.

Is it legit? Can I trust you?

Completely legit, backed by an iron-clad money back guarantee. We’ve been doing this since 2007 – helping students like you get through college.

Will you deliver it on time?

Absolutely! We understand you have a really tight deadline and you need this delivered a few hours before your deadline so you can look at it before turning it in.

Can you get me a good grade? It’s my final project and I need a good grade.

Yes! We only pick projects where we are sure we’ll deliver good grades.

What do you need to get started on my paper?

* The full assignment instructions as they appear on your school account.

* If a Grading Rubric is present, make sure to attach it.

* Include any special announcements or emails you might have gotten from your Professor pertaining to this assignment.

* Any templates or additional files required to complete the assignment.

How do I place an order?

You can do so through our custom order page here or you can talk to our live chat team and they’ll guide you on how to do this.

How will I receive my paper?

We will send it to your email. Please make sure to provide us with your best email – we’ll be using this to communicate to you throughout the whole process.

Getting Your Paper Today is as Simple as ABC

No more missed deadlines! No more late points deductions!

}

You give us your assignments instructions via email or through our order page.

Our support team selects a qualified writing team of 2 writers for you.

l

In under 5 minutes after you place your order, research & writing begins.

Complete paper is delivered to your email before your deadline is up.

Want A Good Grade?

Get a professional writer who has worked on a similar assignment to do this paper for you