Skip to main content
Erschienen in: Information Systems Frontiers 1/2011

01.03.2011

Information control and terrorism: Tracking the Mumbai terrorist attack through twitter

verfasst von: Onook Oh, Manish Agrawal, H. Raghav Rao

Erschienen in: Information Systems Frontiers | Ausgabe 1/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper analyzes the role of situational information as an antecedent of terrorists’ opportunistic decision making in the volatile and extreme environment of the Mumbai terrorist attack. We especially focus on how Mumbai terrorists monitored and utilized situational information to mount attacks against civilians. Situational information which was broadcast through live media and Twitter contributed to the terrorists’ decision making process and, as a result, increased the effectiveness of hand-held weapons to accomplish their terrorist goal. By utilizing a framework drawn from Situation Awareness (SA) theory, this paper aims to (1) analyze the content of Twitter postings of the Mumbai terror incident, (2) expose the vulnerabilities of Twitter as a participatory emergency reporting system in the terrorism context, and (3), based on the content analysis of Twitter postings, we suggest a conceptual framework for analyzing information control in the context of terrorism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A documentary of Mumbai terror shows how remote handlers in Pakistan controlled field attackers in Mumbai through satellite phone by monitoring live TV. The video is available at: http://​www.​liveleak.​com/​view?​i=​1e4_​1246490858 (Last accessed November 12th, 2009).
 
2
The URL is a link to Google map which indicates Nariman House under terrorist attack.
 
3
ATS stands for Anti-Terror Squad
 
Literatur
Zurück zum Zitat Anderson, A. (2003). Risk, terrorism, and the internet. Knowledge, Technology, & Policy, 16(2), 24–33.CrossRef Anderson, A. (2003). Risk, terrorism, and the internet. Knowledge, Technology, & Policy, 16(2), 24–33.CrossRef
Zurück zum Zitat Ariely, G. (2008). Chapter II: Knowledge mangement, terrorism, and cyber terrorism. In L. J. Janczewsk & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 7–25). New York: Yurchak Printing Inc. Ariely, G. (2008). Chapter II: Knowledge mangement, terrorism, and cyber terrorism. In L. J. Janczewsk & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 7–25). New York: Yurchak Printing Inc.
Zurück zum Zitat Denning, D. E. (2009). Chapter 10: Terror’s Web: How the Internet is Transforming Terrorism. In Y. Jewkes & M. Year (Eds.), Handbook on Internet Crime.Willan Publishing. Denning, D. E. (2009). Chapter 10: Terror’s Web: How the Internet is Transforming Terrorism. In Y. Jewkes & M. Year (Eds.), Handbook on Internet Crime.Willan Publishing.
Zurück zum Zitat Endsley, M. R. (1995a). Toward a theory of situation awareness in dynamic systems. Human Factors, 37(1), 32–64.CrossRef Endsley, M. R. (1995a). Toward a theory of situation awareness in dynamic systems. Human Factors, 37(1), 32–64.CrossRef
Zurück zum Zitat Endsley, M. R. (1995b). Measurement of situation awareness in dynamic systems. Human Factors, 37(1), 65–84.CrossRef Endsley, M. R. (1995b). Measurement of situation awareness in dynamic systems. Human Factors, 37(1), 65–84.CrossRef
Zurück zum Zitat Haeni, R. E. (1997). Information Warfare—an Introduction. The George Washington University Cyberspace Policy Institute, January, pp. 1–16. Haeni, R. E. (1997). Information Warfare—an Introduction. The George Washington University Cyberspace Policy Institute, January, pp. 1–16.
Zurück zum Zitat Hallin, D. (1993). The uncensored war. Peace Review, 51(1), 51–57. Hallin, D. (1993). The uncensored war. Peace Review, 51(1), 51–57.
Zurück zum Zitat Hutchinson, W. (2006). Information warfare and deception. Informing Science, 9, 213–223. Hutchinson, W. (2006). Information warfare and deception. Informing Science, 9, 213–223.
Zurück zum Zitat Khetan, A. (2009). 60 dark hours at Hotel Taj. In H. Baweja (Ed.), 26/11 Mumbai attacked (pp. 46–83). New Delhi: Roli Books. Khetan, A. (2009). 60 dark hours at Hotel Taj. In H. Baweja (Ed.), 26/11 Mumbai attacked (pp. 46–83). New Delhi: Roli Books.
Zurück zum Zitat Kishore, R., Agrawal, M., & Rao, H. R. (2004–2005). Determinants of sourcing during technology growth and maturity: an empirical study of e-commerce sourcing. Journal of Management Information Systems, 21(3), 47–82. Kishore, R., Agrawal, M., & Rao, H. R. (2004–2005). Determinants of sourcing during technology growth and maturity: an empirical study of e-commerce sourcing. Journal of Management Information Systems, 21(3), 47–82.
Zurück zum Zitat Krippendorff, K. (1980). Content analysis: An introduction to its methodology. CA: Sage. Krippendorff, K. (1980). Content analysis: An introduction to its methodology. CA: Sage.
Zurück zum Zitat Lee, W. E. (2002). Security ‘review’ and the first amendment. Harvard Journal of Law & Public Policy, 25(2), 743–763. Lee, W. E. (2002). Security ‘review’ and the first amendment. Harvard Journal of Law & Public Policy, 25(2), 743–763.
Zurück zum Zitat Lenhart, A., & Fox, S. (2009). Pew internet project data memo regarding Twitter and status updating. Pew/Internet. Lenhart, A., & Fox, S. (2009). Pew internet project data memo regarding Twitter and status updating. Pew/Internet.
Zurück zum Zitat McAfee, A. P. (2006). Enterprise 2.0: The dawn of emergent collaboration. MIT Sloan Management, Spring, pp. 20–28. McAfee, A. P. (2006). Enterprise 2.0: The dawn of emergent collaboration. MIT Sloan Management, Spring, pp. 20–28.
Zurück zum Zitat Meindl, J. R., Ehrlich, S. B., & Dukerich, J. M. (1985). The romance of leadership. Administrative Science Quarterly, 30(1), 78–102.CrossRef Meindl, J. R., Ehrlich, S. B., & Dukerich, J. M. (1985). The romance of leadership. Administrative Science Quarterly, 30(1), 78–102.CrossRef
Zurück zum Zitat Mills, A., Chen, R., Lee, J., & Rao, H. R. (2009). Web 2.0 emergency applications: how useful can Twitter be. Journal of Information Privacy and Security, 5(3), 3–26. Mills, A., Chen, R., Lee, J., & Rao, H. R. (2009). Web 2.0 emergency applications: how useful can Twitter be. Journal of Information Privacy and Security, 5(3), 3–26.
Zurück zum Zitat Moore, D. W. (2009). Twenty-First Century Embedded Journalists: Lawful Target?. In A. M. Tulud, A. B. Ching & C. J. Strong (Eds.), The Armay Lawyer (pp. 1–32) Department of Army. Moore, D. W. (2009). Twenty-First Century Embedded Journalists: Lawful Target?. In A. M. Tulud, A. B. Ching & C. J. Strong (Eds.), The Armay Lawyer (pp. 1–32) Department of Army.
Zurück zum Zitat Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. International Journal of Human Computer Studies, 65, 71–84.CrossRef Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. International Journal of Human Computer Studies, 65, 71–84.CrossRef
Zurück zum Zitat Strater, L. D., Endsley, M. R., Pleban, R. J., & Matthews, M. D. (2001). “Measures of platoon leader situation awareness in virtual decision-making exercise,” US Army Research Institute for the Behavioral and Social Sciences. Strater, L. D., Endsley, M. R., Pleban, R. J., & Matthews, M. D. (2001). “Measures of platoon leader situation awareness in virtual decision-making exercise,” US Army Research Institute for the Behavioral and Social Sciences.
Zurück zum Zitat Taipale, K. A. (2005). “Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism,” Yale ISP 2005 Global Flow of Information, Draft. Taipale, K. A. (2005). “Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism,” Yale ISP 2005 Global Flow of Information, Draft.
Zurück zum Zitat Weimann, G. (2004). “www.terror.net: How Modern Terrorism Uses the Internet,” Special Report, United States Institute of Peace (116), pp.1–12. Weimann, G. (2004). “www.​terror.​net: How Modern Terrorism Uses the Internet,” Special Report, United States Institute of Peace (116), pp.1–12.
Metadaten
Titel
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter
verfasst von
Onook Oh
Manish Agrawal
H. Raghav Rao
Publikationsdatum
01.03.2011
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 1/2011
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-010-9275-8

Weitere Artikel der Ausgabe 1/2011

Information Systems Frontiers 1/2011 Zur Ausgabe

Premium Partner