Security

News Posts Publications

Nouvelle publication: “Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire”

M. Bérubé, and B. Dupont (2018), Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire, Studies in Conflict & Terrorism, DOI: 10.1080/1057610X.2018.1513689. Abstract: Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction […] Read more

Articles

Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire

Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction of the global jihadist movement’s discourse of mobilization as the result of the evolution of its network of actors, the context in which its communications […] Read more

News Posts Publications

Nouvelle publication: “Internet et propagande jihadiste : la régulation polycentrique du cyberespace”

V. Crosset et B. Dupont (2018), Internet et propagande jihadiste: la régulation polycentrique du cyberespace, Critique Internationale, (78), 107-125. Abstract: In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international […] Read more

Articles

Internet et propagande jihadiste : la régulation polycentrique du cyberespace

In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international dimension. Taken as a whole, however, such efforts remain scattered and fragmented. The present article seeks to […] Read more

News Posts Publications

New publication: "La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale"

B. Dupont, (2016), La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale, Cultures et Conflits, (102), 95-120. Abstract: One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the […] Read more

Articles

La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale

One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the international governance of cybercrime provides an alternative reading. This article uses a social network analysis (SNA) approach […] Read more

News Posts

Conférence au Coeur des sciences de l’UQAM (23 février 2017) – La cybersécurité est-elle possible?

This content is not available in the selected language. Avec plus de 230 000 attaques par jour contre des états, des entreprises ou des individus, serons-nous un jour capable d’assurer notre cybersécurité? Quelles sont les contraintes techniques, légales, diplomatiques, économiques et politiques à surmonter? À quels différents types d’attaques et d’attaquants faisons-nous face? Revient-il aux militaires, […] Read more

News Publications

New publication: “Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime”

This content is not available in the selected language. B. Dupont, (2016), Bots, cops and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime, Crime, Law and Social Change, doi:10.1007/s10611-016-9649-z. Abstract: Botnets currently pose the most serious threat to the digital ecosystem, providing an infrastructure that enables bank […] Read more

Articles

Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime

This content is not available in the selected language. Botnets currently pose the most serious threat to the digital ecosystem, providing an infrastructure that enables bank fraud, distributed denial of service attacks (DDoS), and click fraud. During the past few years, three main approaches have been used to fight botnets. First, police organizations have periodically […] Read more