Introduction to Cyberterrorism
Cyberterrorism refers to unlawful activities and threats that bring attacks and threats against computerized systems and network systems. By using internet technology, the attackers can create different violent acts that raise security concerns to the respective machine or network system. This violence introduces harmful effects on the social objectives of any organization, and in severe cases, it leads to major economic loss and loss of properties of individuals. Information and Communication Technology (ICT) facilitates anti-social offenses by injecting several critical programming codes. The anti-social people apply information technology to promote and engage in illegal activities. As the attacker uses the internet resources to damage the significant data, this approach is known as cyberterrorism.
Cyberterrorism brings adverse effects on the infrastructure of the business. The aim of these cyber-criminal activities is to disrupt the essential services and hamper the target systems. Serious attacks on the critical infrastructure are responsible for bringing negative impacts in the ongoing services. Most of the time, cyberterrorism is used as hacktivism that occurs online and manipulates the data with illegal data access methodologies. The hackers often use this approach to exploit vulnerabilities to the target systems that bring negative impacts on the computer operating system and in application software. Virtual blockage and data hijacking are the primary weapons to invite the attacks.
Cyber radicalization is the way to involve the anti-social media associated components and perform online radicalization. The project has been taken into account to build the language tools to identify cyberterrorism and detect cyber radicalization. The collection of datasets from different demographics. The extremists mainly attempt the influence vulnerable people, and internet technology plays a key role in enabling the cyberterrorism mechanism. The language tools allow the users to detect unknown cybercrime issues and radicalize people to join the anti-social media groups.
The application mainly focused on the development of language detecting tools to identify cyber-terrorism radicalization. Moreover, different machine learning tools allow the users to complete the entire process with 100% accuracy of the result (Hettiarachchi et al., 2019). This application will be helpful to run the android studio application and brings flexibility to the user interface. In this project, all tweets will be passed through language tools and techniques, then the crucial keywords of the tweets allow the users to collect the dataset from the social media platforms. Besides this, the relational database has been used here to create a connection between more than one attribute. Finally, the database has been identified by using the primary keys, and then the entire set has been stored in a modular format. After that, prototype design has been proposed before launching the application tool, and it will minimize the project complexity as well as is helpful to identify the errors easily. Finally, the pseudocode has been introduced to develop the code easily. Thus, the entire system can be designed easily without any effort. So, the users can easily run the project and develop the project within a certain time. It eliminates project errors with maximum accuracy.
Adverse Effects of Cyberterrorism on Business
Functional requirements deal with separate modules of the project. This approach is useful to run several tasks related to the main project objectives. Functional requirements allow the product features and the modules that are available to accomplish the tasks easily. Besides this, both the development team and stakeholders describe the system behavior under specific conditions to complete the entire task (Neo, 2021). This cyber radicalization consists of separate functionalities according to the project deliverables.
view_posts ():
The system allows the system analysts to view Twitter posts and social media posts. Moreover, this function is useful to retweet among various cyber-protection groups. Besides this, this function allows the users to verify the relevancy of the posts. This function allows the users to maintain the posts with valuable data. This data view records can be helpful to view a whole set of data with appropriate data. However, this function allows the users to extract the data as per the given criteria. This technique minimizes the searching time and provides the exact results according to the project criteria.
provide_report ():
The system allows the providers to prepare a detailed report of the tweets, and it is through the language tool. This report will contain the data related to the tweet comments and tweet likes. The opinions against cyberterrorism have been categorized as per the comments given by the users, and this can be done in the tweet account. The report will contain a summary of the details that are given by the tweet users and the data about the number of tweet users and their feedback given by the users. Therefore, the users are categorized according to their feedback status. Besides this, the percentage of the tweet users is also available in this report.
collect_dataset ():
The system might collect the dataset from the social media platforms such as tweeters the Facebook accounts. Moreover, the data collection methods focus on cybercrime radicalization. First, a bulk of responses are collected from various resources of the social media accounts and then prioritized as per the relevant comments.
provide_demographic_data ():
The system is used to store the details of the demographic data of tweet users. This function allows the users to collect demographic data about the tweet users and analyze the data. This data will store the people from different regions, and it is quite useful to predict the suggestions. According to the functional requirements, this function will hold location-based data about the users along with their suggestions to deal with the cybersecurity issues. This function allows the IT analyst to generate reports from the collected dataset. Once the data analysis is completed, then the data will visualize based on the dataset.
decode_data ():
The system allows the users to analyze the collected information from different social media accounts and audit them according to the types of media used to collect the data from different demographic regions. This function decodes the data into appropriate information that is useful to run this project successfully.
view_employee_details():
This function allows the managers and the system admin to view details of the employees. This function is useful to make the users find out the user details with ease. Moreover, this function helps to track individual employee data by using the extraction system. Thus, the admin users and respective managers can easily verify user data in real-time. It allows the users to modify the records of the database as per their requirements.
Cyber Radicalization and Language Detecting Tools
generate_performance_report():
This function is used to generate the performance report of the employee on a regular basis. Once the organizational staff takes part in report generation, then all the data about them are stored in the management database. According to the proposed technical tools, system administration can track individual performance to meet the project goal. Even it is useful to minimize the time complexity of this project to identify the cyber radicalization issues.
update_software ():
This application software must be updated on a frequent basis to make the records more relevant and enhance data accuracy. This function allows the users to make the application user-friendly, and it will be useful to run in the latest operating system (Thomas-Evans, 2022). Thus, the users can easily complete the tasks within a short period.
add_keywords ():
This function is helpful to add relevant keywords and make the application easy to locate in the search engine. This is none other than a search engine optimization technique that is useful to find out this application software at the top of the searched pages. This approach allows the users to visit the website and use this application effectively. Thus, the data collection process can be easier to handle.
The non-functional requirements deal with the requirements that are imposed on the system as per the project requirements. They specify the special quality of software requirements and attributes related to the project requirements. So, some of the common issues like scalability, availability, performance, security, reliability, and other requirements are available under the non-functional requirements (Blanco et al. 2020). These requirements address mainly relevant quality issues of the newly proposed systems. In this assignment, the non-functional requirements are related to the ways used to deal with cyber radicalization.
Usability:
This system provides instant support and is helpful to deal with the legal issues of cyber radicalization. This approach is useful to enhance the platform’s flexibility as well as provide a secured platform that is useful to defeat cyber-criminal activities. By using the tool and techniques used in this project, the cybersecurity issues can be mitigated without any technical hassle. Its technical implementations in this project can improve the performance of the techniques that are used to eliminate cyber radicalizations.
Availability:
The software tool that has been designed for the organizational level to defeat cyber radicalization must be available for all the users in the organization. Ensure that the newly built system has enough capability to analyze the comments of the tweets and generate the finalized report on the collect tweet sets. The proposed system might have a built-in authorization system that only allows the users who are authentic (Mostofa, 2020). The newly developed system allows the users to collect social media-based datasets and other data from various regions. The proposed system can be accessed at any time from any corner of the world. However, the users only need to investigate the platform flexibility of the data.
Security:
This system will include appropriate security features that run the system software that includes unauthorized users. This section offers numerous credentials of the proposed system. Therefore, all the users can access this platform only after a full authorization of the system. To verify the system authenticity, the users need to use the password verification process. In that case, details of the users will be stored in the application software. However, all of the data will be collected from social media platforms and tweet details. If any user fails to authorize with his credentials, that particular will be blocked temporarily to access this account.
Functional Requirements for a Language Detecting Tool
The system requirements are the resources that are useful to run any project successfully. Once both the functional and non-functional requirements are identified appropriately, then the next task is to analyze the most suitable system specifications to meet the project requirements.
In that case, the android studio will require to design the user interface, and the data will be stored in the relational database (Arifin and Siahaan, 2020). Make sure that the proposed system will be flexible both in macOS and Windows-OS platforms.
Language Recognition API
The purpose of this application tool is to detect the language of the Tweets through language recognition technology. By using the language recognition mechanism, the speech of the tweets is converted into meaningful text. Once the audio transaction request is done, additional languages can be engaged to attempt the speech-to-text transcripts. Thus, all the voice posts of the tweet users and social media users can be transferred into relevant text format with predicted language code (Gunton, 2022). A major part of this application programming interface will use the AI-based neural language to make it easier to understand. Thus, several languages and phrases can be converted into easy terms, and it will be helpful to make the platform flexible in completing.
Relational Database:
Once the data are collected from the social media and tweet accounts, the relational database is used to store those data on a primary basis. Thus, all the cyber radicalization-related data are saved to the database. Here, all the data related to the different tables and charts are connected to each other through a relational database platform. The details of the tweet users, along with the category of their comments, are enlisted in a grid format. However, a proper structure is used to make the database easier to access. Each of the tables has a primary key and a foreign key to design a meaningful entity-relationship diagram.
To implement the database, MySQL database management system will be selected among all the database software. Its advanced features with the password encryption process allow the users to provide an extra protection layer to the application software. The XAMPP platform will be used to run the database and complete the project. This server will be helpful to get real-time output from the proposed language processing-based application tool.
Develop Integrated Platform:
It is required to apply the effectively integrated environment to make the proposed application software tool more useful. Once the interface is created, and datasets are extracted from the database, it is necessary to visualize the data by following the development procedure. The android studio under this application can run in the Windows and Mac environments. This feature allows the users to run this application both in Windows and Linux environments. The integrated platform supports the advanced framework that includes C++, Java, and other high-level languages.
Speech-To-Text API will be selected by the project team to make the platform easier to detect cyber radicalization. The API allows the users to collect various languages that receive updates on a regular basis. Thus, the result accuracy can be achieved within a small period. The specific machine learning model has been suggested to the speech detection program.
View Posts Functionality
The actors are the users who play a vital role in running all the activities done throughout the project. All the individual actors are responsible for particular tasks (Fauzan et al. 2019). However, users or actors have multiple tasks to handle, and they can tackle the issues related to the project. The actors have some of the primary activities that are the basic concerns in the project. Otherwise, some common tasks are also there that they need to perform by performing teamwork on a frequent basis.
The system administrator is responsible for authorizing the users once the users are ready to access the website effectively. The administration department verifies the user credentials before allowing the users to use this application. Once user login to the system, he/she needs to enter the user credentials such as user I.D. and password to complete the system verification step. The admin verifies whether the credentials are matched with the system database. If the data is not found in the system, then that user is considered an illegal user. In that case, the request for access has been denied here. However, this actor is responsible for registering the new user data and modifying the details of the existing users accordingly. If it has been summarized the tasks of the Administration, then it has been stated below:
- Accept request access of the existing users after user verification is completed successfully.
- The new users will be registered under the assistance of the Administration.
- The Administration allows only the authentic users, and they send a confirmation message to the respective users.
The system analyst in this proposed system has several tasks that they need to perform on a frequent basis. The system analyst collects the dataset against cyberterrorism from different social media accounts. Both the tweeters and other social media accounts of users play a vital role in performing it effectively. They must be aware of the collection of methods on the research topic. In the initial stage, they will collect responses from different resources and prioritize as per the relevant texts.
Once the data collection process is done successfully, then information of the Tweet users is extracted from a large dataset. However, the dataset might be relevant to the topic. If any user provides a response that is beyond the scope of the project, then it might be ignored by the system analyst.
Here, the language conversion tool is used to track the data, and the system analyst will send requests for the language conversion tool to prepare the report. Once the tool has been connected to the database, then the report outline has been designed by the analyst.
Finally, the analyst provides the dataset according to the social media dataset, and then the data visualization will be done according to the data. If it is summarized as per the activities, then the following activities are done one after another.
- A system analyst collects the dataset against cyberterrorism from different social media accounts.
- Prioritize the user data as per the relevant texts
- Verify the data relevancy and filter the irrelevant data.
- Prepare the report as per the summary of the datasets.
- Perform project visualization based on the generated dataset.
A manager is responsible for generating a performance report according to the provided dataset that is given by the system analyst. The manager will perform a cross-verification process whether all data are verified or not. He is responsible for preparing the report according to the filtered dataset and visualized data. Once it is done completely, then the manager will add keywords to the newly launched software tool and make the project easier to handle. Besides this, he/she is responsible for viewing the employee data along with staff performance graphs. However, he is responsible for evaluating the dataset as well as reviewing the performance graph of the employee as per the users’ requirements. Finally, he will monitor the performance of the software and dataset efficiency level after verifying the data authenticity. According to the review report, the software will be updated for further improvement.
Provide Report Functionality
Figure 1: Use Case Diagram on Combatting Cyber Radicalisation
(Source: Created by Author)
Use Case Name |
User Login |
Participant Actors |
Existing or Registered Users |
Flow of Events |
· Once a user wants to use the language tools to detect cyber radicalization, then that user needs to register himself. · A registered user will get a user I.D. and password to access the application. · The system will verify the user credentials after entering them into the respective data fields. · For the internal users, the administrative details will be given by the Administration. So, the admin portal will perform this user authentication process. · A correct login credential will allow the users to access the application, and the users can view the home page after a successful login. In the case of wrong data, user access will be denied on a temporary basis. |
Entry Condition |
The users must have login credentials to get access to the required application program. |
Exit Condition |
The registered users can use the newly launched applications according to the requirements. However, there has a certain access limit that has been controlled by the Administration. |
Table 1: User Login Use Case
(Source: Created by Author)
Use Case Name |
View Engagement of the post |
Participant Actors |
The System Analysts |
Flow of Events |
· The users need to log in to the new tools and go to the tweet posts section. · If any post is there, then verify that users whether he/she is authorized or not. · If the authentication is successful, then view that post only. · Once that post is viewed by the system users, then that respective post will be marked as “read.” · The system will display the next post for the users, and the same process will be repeated until all the posts are visible to the users. · The users can use the data filter option to extract the required details only. · This system allows the users to give replies and retweets among the cybercriminal protest groups. |
Entry Condition |
The language tool users must have login credentials, and they must be verified by the administrations. |
Exit Condition |
The users will have a list of engagement pots, and then it will be reviewed for checking further. Finally, the engagement posts are collected on the post requirements. |
Table 2: View Post Engagement Use Case
(Source: Created by Author)
Use Case Name |
Request Tweets and Dataset |
Participant Actors |
System Analyst System Admin |
Flow of Events |
· The system analyst will send requests to the tweet users to post their thoughts and suggestions. · Once the users accept the request, then they are provided individual links for post purposes. · After accepting requests, they need to fill up their personal details for user authentication. This section is controlled by the system admin. · Once they become registered users, the users will be eligible to post against the cyber-criminal activities from their own perspectives. · Finally, the dataset is collected from social media accounts, and the whole dataset is verified by the system admin. |
Entry Condition |
The system analyst and other internal users must have login credentials to get access to the required application program. |
Exit Condition |
The system analyst will generate the dataset by extracting the relevant social media posts. |
Table 3: Request Tweets and Dataset Use Case
(Source: Created by Author)
Use Case Name |
Report Generation |
Participant Actors |
System Analyst System Admin |
Flow of Events |
· Once the social media posts are viewed, then all the datasets are collected by the system analyst. · Once those datasets are collected on a real-time basis, then those data are categorized as per the comments and posts. · The system will provide a summary of the details that are given by the tweet users. · The report will contain the demographic details of individuals. · Finally, the report will be generated by gathering all the data along with the number of respondents. |
Entry Condition |
The system analyst has to verify their credentials for working or report generation. |
Exit Condition |
The system analyst will generate a full report on the collected dataset. This process will be helpful to minimize the time complexity of the project, and it will also visualize the data. |
Table 4: Report Generation Use Case
(Source: Created by Author)
Use Case Name |
Decode Collected Information |
Participant Actors |
System Admin |
Flow of Events |
· The system allows the users to analyze the collected information from different social media accounts. · The manager will audit them according to the types of media used to collect the data from different demographic regions. · Once the audit is done, then the system will decode the data into appropriate information that is useful to run this project successfully. |
Entry Condition |
The system admin will verify whether all the relevant data are present in the generated report. If any data are missed out, then he will send a request to the analyst to resend the dataset. |
Exit Condition |
The visualized data will be decoded into the desired format, and it will be verified as per the requirements. |
Table 5: Decode Data Use Case
(Source: Created by Author)
Use Case Name |
View Employee Details |
Participant Actors |
System Admin Managers |
Flow of Events |
· Admin will open the staff database. Here, he/she will see a full list of staff data in a grid format. · The admin can extract the data of a particular employee by entering the employee’s ID and user name. · The admin can modify the data of the employee according to the requirements as well as enter new employee data or remove it from the database if required. |
Entry Condition |
The system admin will verify whether all the relevant data are present in the generated report. If any data are missed out, then he will send a request to the analyst to resend the dataset. |
Exit Condition |
The visualized data will be decoded into the desired format, and it will be verified as per the requirements. |
Table 6: View Employee Details Use Case
(Source: Created by Author)
Use Case Name |
Software Update |
Participant Actors |
System Admin System Manager |
Flow of Events |
· The admin needs to log in to the system and verify the comments given by the social media users. · Now, the admin will update several parts of the system for further improvement. · Confirm the features of the newly developed application. |
Entry Condition |
The system admin will authorize themselves, and then, the system will be checked whether it is ready to take the update or not. |
Exit Condition |
Once the features of the proposed application are revised with new significant data, then this system will be revised with more powerful techniques to combat the cybercriminal issues. |
Table 7: Software Update Use Case
(Source: Created by Author)
Use Case Name |
Add Keywords |
Participant Actors |
System Admin |
Flow of Events |
· The Administration will check the rank of the application tool. · The admin will identify relevant keywords and map them accordingly. · Prioritize the keywords according to the significance of the keywords on the cybercrime issues. |
Entry Condition |
The system admin will open the application by using the admin credentials. |
Exit Condition |
He will add relevant keywords and examine whether the process is working or not. If it is failed, then review the keywords with the relevant details. |
Table 8: Add Keywords Use Case
(Source: Created by Author)
In the sequence diagrams, the users can easily identify the activities that need to be done accordingly. Moreover, the tasks and activities are done here in a sequence manner (Nouh, 2019). Therefore, the diagrams will be helpful to implement the tasks related to the cyber radicalization process effectively.
Figure 2: Login Sequence Diagram
(Created by Author)
Figure 3: View Engagement Sequence Diagram
(Source: Created by Author)
Figure 4: Request Tweets and Dataset Sequence Diagram
(Source: Created by Author)
Figure 5: Report Generation Sequence Diagram
(Source: Created by Author)
Figure 6: Decode Data Sequence Diagram
(Source: Created by Author)
Figure 7: Employee Details
(Source: Created by Author)
Figure 8: Software Update Sequence Diagram
(Source: Created by Author)
Figure 9: Add Keywords Sequence Diagram
(Source: Created by Author)
Figure 10: ERD on Cyber Radicalisation Detection
(Source: Created by Author)
Pseudocode is the style to implement the algorithm that holds an informal description of the proposed application. It is useful to outline the purpose of the program and the stages that will be taken to run each module of the program.
Start
Display login screen with two blank text boxes
Input user login credentials
Validate login details by the system
If user =” Admin” Then
Display “Dataset Management”, “View Social Media Report”, “Software Update”,
“Add Keywords”
Else If user= “Manager” Then
Display “Generate Performance Report,” “View Employee Details”
Else If user= “Analyst” Then
Display “View Post Engagement”, “Tweet Request”, “Dataset Management”, “View Social Media Report”
End
Start
Display View Tweet Posts
Validate Tweet Users
Display already viewed User Posts (Marked as “READ”)
Select the “Next” option
Display rest tweet posts
Set filtered option to extract the data
Get Retweet Option
Set Retweet amongst cybercriminal protest groups
End
Start
Display Request to Post Tweet posts and Thoughts
Accept Post Requests by Tweet Users
Send individual Links to the users
Set User Authentication Scheme
If User =” Registered” Then
Grant dataset of the registered Users
Else
Revoke the user data
Verify the collected dataset by Administration
Get the dataset relevant to the cyber-attack radicalization
End
Start
Get all the Tweet and Social Media datasets relevant to the cyber-crime on a real-time basis
Categorize the posts based on priority and relevancy
Summarize tweet posts and generate the report by analyst
Set all the demographic data of individuals
Store records into the database in an organized format
Identify user details and Count the number of respondents
Collect Dataset Functionality
Visualize data in chart format
End
Start
Analyse collected data from various resources
Audit the data based on demographic regions
If audit= completed, then
Decode the dataset
Else
Review the dataset and view the result
End
Start
View employee details
Input employee id by admin
If employee id =valid, then
Display employee details
Modify employee details and update details
Else
Display wrong input, try again
Repeat input step and proceed
End
Start
Perform login details and verify social media users
Update specific features of system where employee id is given
Verify new features and set relevant one
If feature= grant, then
Confirm system tool new features
Else
Reset the new features with new records
End
Start
Verify the web-based rank of the proposed application tool
Identify relevant keywords and use them in the application features
Prioritize relevant features and add new keywords
Repeat the process
End
Conclusion
In this assignment, the researcher has proposed effective techniques to combat the cybers radicalization issues. To identify the issues and mitigate the problems, a new application tool has been suggested to make the user platform free from major cybersecurity issues. To perform the system analysis and requirements, the functional and non-functional requirements have been discussed with appropriate details. It makes it easier to proceed with the task further. Moreover, this approach makes the process useful to design the prototypes from the researchers’ ends. Similarly, different use cases have been discussed in the modular format and it helps the users to understand the actual theme of the project. Besides this, the database design can be done easily due to the implementation of an entity-relationship diagram on the proposed design. After that, the interface prototype design provides an outline of the project, and it is useful to prepare a mock design. As a result, the researchers will get a scope to change the design if required. It minimizes the time complexity as well as eliminates unnecessary design issues. Finally, the PSEUDO Code has been designed for each module of the project. Therefore, it will be helpful to design this android-based solution according to the responses given by the anti-social media groups.
References
Arifin, M.N. and Siahaan, D., 2020. Structural and Semantic Similarity Measurement of UML Use Case Diagram. Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, 11(2), p.88.
Blanco, J. M., Cohen, J., and Nitsch, H. 2020. Cyber intelligence against radicalisation and violent extremism. In Investigating Radicalization Trends (pp. 55-80). Springer, Cham.
Fauzan, R., Siahaan, D., Rochimah, S. and Triandini, E., 2019, July. Use case diagram similarity measurement: A new approach. In 2019 12th International Conference on Information & Communication Technology and System (ICTS) (pp. 3-7). IEEE.
Gunton, K., 2022. The Impact of the Internet and Social Media Platforms on Radicalisation to Terrorism and Violent Extremism. In Privacy, Security And Forensics in The Internet of Things (IoT) (pp. 167-177). Springer, Cham.
Hettiarachchi, S., Sugandhika, C., Kathriarachchi, A., Ahangama, S. and Weerasuriya, G.T., 2019, December. A Scenario-based ER Diagram and Query Generation Engine. In 2019 4th International Conference on Information Technology Research (ICITR) (pp. 1-5). IEEE.
Mostofa, S.M., 2020. Key drivers of female radicalisation in Bangladesh. Counter Terrorist Trends and Analyses, 12(4), pp.27-31.
Neo, L.S., 2021. Detecting markers of radicalisation in social media posts: insights from modified Delphi technique and literature review. International Journal of Cyber Warfare and Terrorism (IJCWT), 11(2), pp.12-28.
Nouh, M.A., 2019. On combating online radicalisation: a framework for cybercrime investigations (Doctoral dissertation, University of Oxford).
Srivastava, S., 2019. ER Diagram.
Thomas-Evans, M., 2022. The Internet, Social Mediaand the Internet of Things in Radicalisation to Terrorism and Violent Extremism. In Privacy, Security And Forensics in The Internet of Things (IoT) (pp. 179-195). Springer, Cham.