University of Oklahoma Graduate College

Total Page:16

File Type:pdf, Size:1020Kb

University of Oklahoma Graduate College UNIVERSITY OF OKLAHOMA GRADUATE COLLEGE CYBERTERRORISM: A POSTMODERN VIEW OF NETWORKS OF TERROR AND HOW COMPUTER SECURITY EXPERTS AND LAW ENFORCEMENT OFFICIALS FIGHT THEM A Dissertation SUBMITTED TO THE GRADUATE FACULTY in partial fulfillment of the requirements for the degree of Doctor of Philosophy By JONATHAN A. MATUSITZ Norman, Oklahoma 2006 UMI Number: 3207541 Copyright 2006 by Matusitz, Jonathan A. All rights reserved. UMI Microform 3207541 Copyright 2006 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, MI 48106-1346 CYBERTERRORISM: A POSTMODERN VIEW OF NETWORKS OF TERROR AND HOW COMPUTER SECURITY EXPERTS AND LAW ENFORCEMENT OFFICIALS FIGHT THEM A Dissertation APPROVED FOR THE DEPARTMENT OF COMMUNICATION BY ________________________ Dr. Eric M. Kramer ________________________ Dr. H. Dan O’Hair ________________________ Dr. Todd L. Sandel ________________________ Dr. Patrick C. Meirick ________________________ Dr. Edward J. Perkins © Copyright by JONATHAN A. MATUSITZ 2006 All Rights Reserved. ACKNOWLEDGEMENTS First and foremost, I dedicate this product of months of academic work to my doctoral advisor, Dr. Eric Kramer. Without his wisdom, direction, and valuable pieces of advice, this dissertation would not have been what it is today. Dr. Kramer has greatly exceeded the role of advisor in my four years of doctoral experience. This is what an ambitious graduate student needs. Equally supportive is my mother, Anne Matusitz. Her emotional assistance has contributed to the success of my life. Her fortitude, serenity, and attentiveness have made me a much stronger individual. I would like to thank Dr. Jin Brown and Dr. Pamela McWherter, both of whom teach at the University of Alaska Fairbanks. Dr. Brown was my advisor and Dr. McWherter was one of my major professors. They truly made me the qualitative scholar that I have become today. I am very thankful to Dr. Dan O’Hair for his support, thoughtful recommendations, and humor. I also express gratitude to Dr. Sandel for giving me suggestions on how to improve the quality of the data analysis in this doctoral dissertation. In addition, Dr. Meirick and Dr. Perkins, I thank you for your patience and for reading this long dissertation. Finally, I am grateful to those fellow graduate students in the Department of Communication at the University of Oklahoma who have strongly supported me. I want to thank you, too, Gerald-Mark Breen, for your faith in me and your encouragement to “not let completed papers sleep on my computer, but to send them off to peer-reviewed journals.” And it works. Now, I keep the pipeline running. Thank you all. iv TABLE OF CONTENTS ACKNOWLEDGEMENTS……………………………………………………………... iv ABSTRACT…………………………………………………………………………........ x I. INTRODUCTION……………………………………………………………….. 1 Purpose of the Study………………………………………………………………5 Research Questions………………………………………………………………..6 Methodological Approach………………………………………………………...8 Social Network Theory and Game Theory………………………………………..9 Rationale for Conducting this Study……………………………………………..10 This Study Breaks New ground………………………………………….11 New Theoretical Approaches…………………………………………….11 Importance for the Subfield of Organizational Communication………...13 Importance for the Subfield of New Communication Technology……...14 Importance for the Discipline of Communication at Large……………...15 II. LITERATURE REVIEW………………………………………………………..17 Cyberterrorism…………………………………………………………………...18 Cyberterrorism: Origin of the Word……………………………………..18 Difficulty of Defining Cyberterrorism…………………………………...19 Cybercrime Different from Cyberterrorism……………………………...20 Hacktivism Different from Cyberterrorism……………………………...21 Computer-Assisted Terrorism Different from Cyberterrorism…………..22 What Is Cyberterrorism?............................................................................22 Are Hackers Cyberterrorists?.....................................................................24 Cyberterrorism: A Communicative and Semiotic Perspective…………..25 Cyberterrorism: A Legal Perspective…………………………………….28 Cyberterrorists Come from All over the World………………………….30 What Tools Do Cyberterrorists Like to Use?............................................32 What Are the Tools against Cyberterrorism?............................................35 Other Cases of Cyberterrorism…………………………………………..36 Social Networks of Cyberterrorists………………………………………37 Social Network Theory…………………………………………………………..38 Social Network Theory: A Definition……………………………………39 What Are Social Networks?.......................................................................40 Nodes: Essential to Social Networks…………………………………….43 Origins of Social Network Theory……………………………………………….45 Social Network Theory in the Social Sciences…………………………..45 Social Network Theory Rooted in Systems Theory……………………..47 Social Network Theory and the Internet…………………………………………50 Social Network Theory Applied to the Internet………………………….50 Social Network Theory Applied to the Threats to Internet v and Computer Security…………………………………………..51 Social Network Theory Applied to Cyberterrorist Networks……………54 A Comparative Analysis of Terrorist Networks in Antiquity and Cyberterrorist Networks Today………………………….……………...57 Terrorist Networks in Antiquity………………………………………………….58 What Was a Terrorist in Antiquity?...........................................................59 What Did Terrorist Networks in Antiquity Look Like?............................61 The Boukoloi…………………………………………………………….64 The Comparative Analysis……………………………………………………….65 Similar Terrorist Motivations……………………………………………65 Similar Illegal Money-Making…………………………………………..72 Similar End Result: Fear…………………………………………………75 Similar Patterns of Communication……………………………………...79 Similar Connections and Kinship Webs…………………………………82 Similar Obstacles………………………………………………………...89 A Comparative Analysis of the Jewish Revolt and the Cyberterrorism Incident over Kosovo, Based on Social Network Theory………...……..93 The Jewish Revolt of 66-73 CE…………………………………………94 Applying Social Network Theory to the Jewish Revolt…………………96 The Kosovo War as an Incident of Cyberterrorism………………..…...101 Applying Social Network Theory to this Cyberterrorism Incident….....103 Discussion………………………………………………………………………106 Postmodernism and Networks of Cyberterrorists………………………………112 Definition of Postmodernism…………………………………………...112 Postmodernism and Cyberspace: Hyperreal vs. Real…………………..114 Postmodernism and Cyberspace: Fragmentation, Fluidity, and Decentralization of Self………………………………………...118 Postmodernism and Cyberspace: Cyberterrorism………………………121 Postmodernism and Cyberspace: An Organizational Challenge……….124 Postmodernism and Cyberspace: Where No Leadership Is Needed……127 A Postmodern Theory of Terrorism in Cyberspace: Game Theory…………….129 Rationale for Using Game Theory……………………………………...130 Origins of Game Theory………………………………………………..131 Description of Game Theory…………………………………………...132 Nash Equilibrium……………………………………………………….134 Zero-Sum Game………………………………………………………...135 Positive-Sum Game…………………………………………………….136 Negative-Sum Game……………………………………………………136 Cooperative vs. Non-Cooperative Game……………………………….136 The Role of Communication in Game Theory…………………………137 Applications of Game Theory in the Study of Terrorism………………137 Game Theory as Applied to Cyberterrorism: An Overview……………139 Game Theory as Applied to Cyberterrorism: A Postmodern View…….140 Intersection of Game Theory and Social Network Theory in the Study of Cyberterrorism………………………………………..144 It Takes Networks to Fight Networks…………………………………………..147 vi Lack of Cyber Forensics Expertise in Law Enforcement………………148 Cyber Forensics: An Area for Fighting Networks of Cyberterrorists…………………………………………………..149 Who Is Part of the Network Fighting Networks?....................................150 Social Networks among Law Enforcement Agencies…………….........152 Social Networks between Law Enforcement Agencies and Cyber Forensics Labs………………………………………153 University Cyber Forensics Labs……………………………………….154 Informal Social Networks………………………………………………156 Ethical Dilemmas for Cybersecurity Experts…………………………………..157 III. METHODS……………………………………………………………………..161 Qualitative Interviewing………………………………………………………..161 Methodology………………………………………………………...….162 Analysis of the Accounts……………………………………………….164 Member Checking………………………………………………………165 Research Questions……………………………………………………………..166 Theoretical Approaches to the Interpretation of the Data………………………167 The Social Network Theory Approach…………………………………167 The Game Theory Approach…………………………………………...168 Intersection of Social Network Theory and Game Theory……………..170 Interview Procedure…………………………………………………………….170 Interview Process……………………………………………………….170 Interview Questions…………………………………………………….172 Probing………………………………………………………………….176 Participants……………………………………………………………………...177 Who Were the Participants Interviewed?................................................177 Why Were these Participants Selected in this Study?.............................178 Where Were the Participants Interviewed?..............................................178 How Were these Participants Recruited?.................................................179 How Were these Participants Protected?.................................................180 Why Are Qualitative Interviewing Methods Best Suited to Answering My Research Questions?..............................................................181
Recommended publications
  • Reactionary Postmodernism? Neoliberalism, Multiculturalism, the Internet, and the Ideology of the New Far Right in Germany
    University of Vermont ScholarWorks @ UVM UVM Honors College Senior Theses Undergraduate Theses 2018 Reactionary Postmodernism? Neoliberalism, Multiculturalism, the Internet, and the Ideology of the New Far Right in Germany William Peter Fitz University of Vermont Follow this and additional works at: https://scholarworks.uvm.edu/hcoltheses Recommended Citation Fitz, William Peter, "Reactionary Postmodernism? Neoliberalism, Multiculturalism, the Internet, and the Ideology of the New Far Right in Germany" (2018). UVM Honors College Senior Theses. 275. https://scholarworks.uvm.edu/hcoltheses/275 This Honors College Thesis is brought to you for free and open access by the Undergraduate Theses at ScholarWorks @ UVM. It has been accepted for inclusion in UVM Honors College Senior Theses by an authorized administrator of ScholarWorks @ UVM. For more information, please contact [email protected]. REACTIONARY POSTMODERNISM? NEOLIBERALISM, MULTICULTURALISM, THE INTERNET, AND THE IDEOLOGY OF THE NEW FAR RIGHT IN GERMANY A Thesis Presented by William Peter Fitz to The Faculty of the College of Arts and Sciences of The University of Vermont In Partial Fulfilment of the Requirements For the Degree of Bachelor of Arts In European Studies with Honors December 2018 Defense Date: December 4th, 2018 Thesis Committee: Alan E. Steinweis, Ph.D., Advisor Susanna Schrafstetter, Ph.D., Chairperson Adriana Borra, M.A. Table of Contents Introduction 1 Chapter One: Neoliberalism and Xenophobia 17 Chapter Two: Multiculturalism and Cultural Identity 52 Chapter Three: The Philosophy of the New Right 84 Chapter Four: The Internet and Meme Warfare 116 Conclusion 149 Bibliography 166 1 “Perhaps one will view the rise of the Alternative for Germany in the foreseeable future as inevitable, as a portent for major changes, one that is as necessary as it was predictable.
    [Show full text]
  • New Modernism(S)
    New Modernism(s) BEN DUVALL 5 Intro: Surfaces and Signs 13 The Typography of Utopia/Dystopia 27 The Hyperlinked Sign 41 The Aesthetics of Refusal 5 Intro: Surfaces and Signs What can be said about graphic design, about the man- ner in which its artifact exists? We know that graphic design is a manipulation of certain elements in order to communicate, specifically typography and image, but in order to be brought together, these elements must exist on the same plane–the surface. If, as semi- oticians have said, typography and images are signs in and of themselves, then the surface is the locus for the application of sign systems. Based on this, we arrive at a simple equation: surface + sign = a work of graphic design. As students and practitioners of this kind of “surface curation,” the way these elements are functioning currently should be of great interest to us. Can we say that they are operating in fundamentally different ways from the way they did under modern- ism? Even differently than under postmodernism? Per- haps the way the surface and sign are treated is what distinguishes these cultural epochs from one another. We are confronted with what Roland Barthes de- fined as a Text, a site of interacting and open signs, 6 NEW MODERNISM(S) and therefore, a site of reader interpretation and of SIGNIFIER + SIGNIFIED = SIGN semiotic play.1 This is of utmost importance, the treat- ment of the signs within a Text is how we interpret, Physical form of an Ideas represented Unit of meaning idea, e.g.
    [Show full text]
  • Connections Between Gilles Lipovetsky's Hypermodern Times and Post-Soviet Russian Cinema James M
    Communication and Theater Association of Minnesota Journal Volume 36 Article 2 January 2009 "Brother," Enjoy Your Hypermodernity! Connections between Gilles Lipovetsky's Hypermodern Times and Post-Soviet Russian Cinema James M. Brandon Hillsdale College, [email protected] Follow this and additional works at: https://cornerstone.lib.mnsu.edu/ctamj Part of the Film and Media Studies Commons, and the Soviet and Post-Soviet Studies Commons Recommended Citation Brandon, J. (2009). "Brother," Enjoy Your Hypermodernity! Connections between Gilles Lipovetsky's Hypermodern Times and Post- Soviet Russian Cinema. Communication and Theater Association of Minnesota Journal, 36, 7-22. This General Interest is brought to you for free and open access by Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. It has been accepted for inclusion in Communication and Theater Association of Minnesota Journal by an authorized editor of Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. Brandon: "Brother," Enjoy Your Hypermodernity! Connections between Gilles CTAMJ Summer 2009 7 “Brother,” Enjoy your Hypermodernity! Connections between Gilles Lipovetsky’s Hypermodern Times and Post-Soviet Russian Cinema James M. Brandon Associate Professor [email protected] Department of Theatre and Speech Hillsdale College Hillsdale, MI ABSTRACT In prominent French social philosopher Gilles Lipovetsky’s Hypermodern Times (2005), the author asserts that the world has entered the period of hypermodernity, a time where the primary concepts of modernity are taken to their extreme conclusions. The conditions Lipovetsky described were already manifesting in a number of post-Soviet Russian films. In the tradition of Slavoj Zizek’s Enjoy Your Symptom (1992), this essay utilizes a number of post-Soviet Russian films to explicate Lipovetsky’s philosophy, while also using Lipovetsky’s ideas to explicate the films.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Zombies—A Pop Culture Resource for Public Health Awareness Melissa Nasiruddin, Monique Halabi, Alexander Dao, Kyle Chen, and Brandon Brown
    Zombies—A Pop Culture Resource for Public Health Awareness Melissa Nasiruddin, Monique Halabi, Alexander Dao, Kyle Chen, and Brandon Brown itting at his laboratory bench, a scientist adds muta- secreted by puffer fish that can trigger paralysis or death- Stion after mutation to a strand of rabies virus RNA, like symptoms, could be primary ingredients. Which toxins unaware that in a few short days, an outbreak of this very are used in the zombie powders specifically, however, is mutation would destroy society as we know it. It could be still a matter of contention among academics (4). Once the called “Zombie Rabies,” a moniker befitting of the next sorcerer has split the body and soul, he stores the ti-bon anj, Hollywood blockbuster—or, in this case, a representation the manifestation of awareness and memory, in a special of the debate over whether a zombie apocalypse, manu- bottle. Inside the container, that part of the soul is known as factured by genetically modifying one or more diseases the zombi astral. With the zombi astral in his possession, like rabies, could be more than just fiction. Fear of the the sorcerer retains complete control of the victim’s spiri- unknown has long been a psychological driving force for tually dead body, now known as the zombi cadavre. The curiosity, and the concept of a zombie apocalypse has be- zombi cadavre remains a slave to the will of the sorcerer come popular in modern society. This article explores the through continued poisoning or spell work (1). In fact, the utility of zombies to capitalize on the benefits of spreading only way a zombi can be freed from its slavery is if the spell public health awareness through the use of relatable popu- jar containing its ti-bon anj is broken, or if it ingests salt lar culture tools and scientific explanations for fictional or meat.
    [Show full text]
  • New York State Thoroughbred Breeding and Development Fund Corporation
    NEW YORK STATE THOROUGHBRED BREEDING AND DEVELOPMENT FUND CORPORATION Report for the Year 2008 NEW YORK STATE THOROUGHBRED BREEDING AND DEVELOPMENT FUND CORPORATION SARATOGA SPA STATE PARK 19 ROOSEVELT DRIVE-SUITE 250 SARATOGA SPRINGS, NY 12866 Since 1973 PHONE (518) 580-0100 FAX (518) 580-0500 WEB SITE http://www.nybreds.com DIRECTORS EXECUTIVE DIRECTOR John D. Sabini, Chairman Martin G. Kinsella and Chairman of the NYS Racing & Wagering Board Patrick Hooker, Commissioner NYS Dept. Of Agriculture and Markets COMPTROLLER John A. Tesiero, Jr., Chairman William D. McCabe, Jr. NYS Racing Commission Harry D. Snyder, Commissioner REGISTRAR NYS Racing Commission Joseph G. McMahon, Member Barbara C. Devine Phillip Trowbridge, Member William B. Wilmot, DVM, Member Howard C. Nolan, Jr., Member WEBSITE & ADVERTISING Edward F. Kelly, Member COORDINATOR James Zito June 2009 To: The Honorable David A. Paterson and Members of the New York State Legislature As I present this annual report for 2008 on behalf of the New York State Thoroughbred Breeding and Development Fund Board of Directors, having just been installed as Chairman in the past month, I wish to reflect on the profound loss the New York racing community experienced in October 2008 with the passing of Lorraine Power Tharp, who so ably served the Fund as its Chairwoman. Her dedication to the Fund was consistent with her lifetime of tireless commitment to a variety of civic and professional organizations here in New York. She will long be remembered not only as a role model for women involved in the practice of law but also as a forceful advocate for the humane treatment of all animals.
    [Show full text]
  • America's Defense Meltdown
    AMERICA’S DEFENSE MELTDOWN ★ ★ ★ Pentagon Reform for President Obama and the New Congress 13 non-partisan Pentagon insiders, retired military officers & defense specialists speak out The World Security Institute’s Center for Defense Information (CDI) provides expert analysis on various components of U.S. national security, international security and defense policy. CDI promotes wide-ranging discussion and debate on security issues such as nuclear weapons, space security, missile defense, small arms and military transformation. CDI is an independent monitor of the Pentagon and Armed Forces, conducting re- search and analyzing military spending, policies and weapon systems. It is comprised of retired senior government officials and former military officers, as well as experi- enced defense analysts. Funded exclusively by public donations and foundation grants, CDI does not seek or accept Pentagon money or military industry funding. CDI makes its military analyses available to Congress, the media and the public through a variety of services and publications, and also provides assistance to the federal government and armed services upon request. The views expressed in CDI publications are those of the authors. World Security Institute’s Center for Defense Information 1779 Massachusetts Avenue, NW Washington, D.C. 20036-2109 © 2008 Center for Defense Information ISBN-10: 1-932019-33-2 ISBN-13: 978-1-932019-33-9 America’s Defense Meltdown PENTAGON REFORM FOR PRESIDENT OBAMA AND THE NEW CONGRESS 13 non-partisan Pentagon insiders, retired military officers & defense specialists speak out Edited by Winslow T. Wheeler Washington, D.C. November 2008 ABOUT THE AUTHORS Thomas Christie began his career in the Department of Defense and related positions in 1955.
    [Show full text]
  • The Emergence and Development of the Sentient Zombie: Zombie
    The Emergence and Development of the Sentient Zombie: Zombie Monstrosity in Postmodern and Posthuman Gothic Kelly Gardner Submitted in partial fulfilment of the requirements for the award of Doctor of Philosophy Division of Literature and Languages University of Stirling 31st October 2015 1 Abstract “If you’ve never woken up from a car accident to discover that your wife is dead and you’re an animated rotting corpse, then you probably won’t understand.” (S. G. Browne, Breathers: A Zombie’s Lament) The zombie narrative has seen an increasing trend towards the emergence of a zombie sentience. The intention of this thesis is to examine the cultural framework that has informed the contemporary figure of the zombie, with specific attention directed towards the role of the thinking, conscious or sentient zombie. This examination will include an exploration of the zombie’s folkloric origin, prior to the naming of the figure in 1819, as well as the Haitian appropriation and reproduction of the figure as a representation of Haitian identity. The destructive nature of the zombie, this thesis argues, sees itself intrinsically linked to the notion of apocalypse; however, through a consideration of Frank Kermode’s A Sense of an Ending, the second chapter of this thesis will propose that the zombie need not represent an apocalypse that brings devastation upon humanity, but rather one that functions to alter perceptions of ‘humanity’ itself. The third chapter of this thesis explores the use of the term “braaaaiiinnss” as the epitomised zombie voice in the figure’s development as an effective threat within zombie-themed videogames.
    [Show full text]
  • A Portrayal of Gender and a Description of Gender Roles in Selected American Modern and Postmodern Plays
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 5-2002 A Portrayal of Gender and a Description of Gender Roles in Selected American Modern and Postmodern Plays. Bonny Ball Copenhaver East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the English Language and Literature Commons, and the Feminist, Gender, and Sexuality Studies Commons Recommended Citation Copenhaver, Bonny Ball, "A Portrayal of Gender and a Description of Gender Roles in Selected American Modern and Postmodern Plays." (2002). Electronic Theses and Dissertations. Paper 632. https://dc.etsu.edu/etd/632 This Dissertation - Open Access is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. The Portrayal of Gender and a Description of Gender Roles in Selected American Modern and Postmodern Plays A dissertation presented to the Faculty of the Department of Educational Leadership and Policy Analysis East Tennessee State University In partial fulfillment of the requirements for the degree Doctor of Education in Educational Leadership and Policy Analysis by Bonny Ball Copenhaver May 2002 Dr. W. Hal Knight, Chair Dr. Jack Branscomb Dr. Nancy Dishner Dr. Russell West Keywords: Gender Roles, Feminism, Modernism, Postmodernism, American Theatre, Robbins, Glaspell, O'Neill, Miller, Williams, Hansbury, Kennedy, Wasserstein, Shange, Wilson, Mamet, Vogel ABSTRACT The Portrayal of Gender and a Description of Gender Roles in Selected American Modern and Postmodern Plays by Bonny Ball Copenhaver The purpose of this study was to describe how gender was portrayed and to determine how gender roles were depicted and defined in a selection of Modern and Postmodern American plays.
    [Show full text]
  • Zombie Apocalypse: Engaging Students in Environmental Health
    Journal of University Teaching & Learning Practice Volume 15 | Issue 2 Article 4 2018 Zombie Apocalypse: Engaging Students In Environmental Health And Increasing Scientific Literacy Through The seU Of Cultural Hooks And Authentic Challenge Based Learning Strategies Harriet Whiley Flinders University, [email protected] Donald Houston Flinders University, [email protected] Anna Smith Flinders University, [email protected] Kirstin Ross Flinders University, [email protected] Follow this and additional works at: http://ro.uow.edu.au/jutlp Recommended Citation Whiley, Harriet; Houston, Donald; Smith, Anna; and Ross, Kirstin, Zombie Apocalypse: Engaging Students In Environmental Health And Increasing Scientific Literacy Through The sU e Of Cultural Hooks And Authentic Challenge Based Learning Strategies, Journal of University Teaching & Learning Practice, 15(2), 2018. Available at:http://ro.uow.edu.au/jutlp/vol15/iss2/4 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] Zombie Apocalypse: Engaging Students In Environmental Health And Increasing Scientific Literacy Through The seU Of Cultural Hooks And Authentic Challenge Based Learning Strategies Abstract Environmental Health (EH) is an essential profession for protecting human health and yet as a discipline it is under-recognised, overlooked and misunderstood. Too few students undertake EH studies, culminating in a dearth of qualified Environmental Health Officers (EHOs) in Australia. A major deterrent to students enrolling in EH courses is a lack of appreciation of the relevance to their own lives. This is symptomatic of a wider problem of scientific literacy: the relevance gap and how to bridge it.
    [Show full text]
  • Using Postmodernism in Drama and Theatre Making David Porter AS/A2
    Using postmodernism in drama and theatre making AS/A2 David Porter AS/A2 Introduction David Porter is former Head of Performing Arts at Kirkley High School, We live in an increasingly ‘cross-genre’ environment where things are mixed, Lowestoft, teacher and one-time sampled and mashed up. History, time, roles, arts, technology and our cultural children’s theatre performer. Freelance and social contexts are in flux. Postmodernism expresses many of the ways in writer, blogger and editor, he is a senior which this is happening. assessor for A level performance studies, IGSCE drama moderator and GCSE drama As the reformed A levels come on stream, postmodernism may appear to examiner. have little place except in BTECs. However, performing arts in general and drama in particular require knowledge and understanding of wider contexts, reinterpretations, devising and study of texts from different periods. Exploring postmodernism is an excellent way to open up a world of artistic interest, exploration, experiment and mash-ups for students who are 16 and over. Although different in details, the Drama and Theatre A level specifications offered for teaching from 2016 (first exam in 2018) are similar in intention and breadth of study. All require exploration of some predetermined and some centre-chosen texts, a variety of leading practitioners, and devising and re- interpretations. Using postmodernism broadens students’ viewpoints, ideas and practical experiences of using art forms to express material. Exam preparation aside, this scheme serves as an
    [Show full text]
  • Zombie Apocalypse: an Epidemic Model
    Zombie Apocalypse: An Epidemic Model REDay 2013 Cait Witkowski Brian Blais Overview • Our interest • Zombie basics • Epidemic (SIR) model • Munz et al., 2009 • Modifications What is a zombie? • “Undead” • Eat human flesh • Infect healthy • Difficult to kill (destroy brain) Photo credit: thewalkingdeadstrream.net What is a zombie? Main dynamics: 1. How you become a zombie Sick, Bitten, Die 2. How you get rid of zombies Cure, Death Epidemic Model • Outbreak • Spread • Control • Vaccination Epidemic Model Susceptible Infected Recovered S I R Total Pop Photo credit: http://whatthehealthmag.wordpress.com S I S I (change in quantity S)= -(constant) S I (change in quantity S)= -(constant) S’= -θ S I (change in quantity S)= -(constant) S’= -θ I’= +θ Epidemic Model ζI I R I’ = - ζI R’= +ζI Epidemic Model βSI S I S’ = -βSI I’ = +βSI Epidemic Model βSI ζI S I R S’ = -βSI I’ = +βSI—ζI R’= +ζI Epidemic Model Example of SIR dynamics for influenza Sebastian Bonhoeffer, SIR models of epidemics Epidemic Model Modifications •Death rates •Latent periods (SEIS) •Ability to recover (SEIR) •Ability to become susceptible again (SIRS) “When Zombies Attack!: Mathematical Modelling of an Outbreak Zombie Infection” Munz, Hudea, Imad, Smith (2009) Goals: •Model a zombie attack, using biological assumptions based on popular zombie movies •Determine equilibria and their stability •Illustrate the outcome with numerical solutions •Introduce epidemic modeling with fun example “When Zombies Attack!: Mathematical Modelling of an Outbreak Zombie Infection” Munz, Hudea, Imad,
    [Show full text]