Menu
Home
Log in / Register
 
Home arrow Communication arrow Social media warfare : equal weapons for all
Source

Seminar Group Project

Divide participants into multiple groups with each group taking 10—15 minutes to develop a list of social media warfare tactics that rangers employ in their activities. Upon completion, have groups exchange their lists of social media warfare tactics with groups taking 10—15 minutes to develop defensive measures to effectively counter the tactics used by rangers. Meet as a group and discuss the offensive tactics selected by the groups and the defensive measures to counter the tactics that were developed by the groups.

References

  • 1. Fiverr. Fiverr’s terms of service. Accessed September 15, 2016. https://www.fiverr. com/terms_of_service.
  • 2. Wikipedia. Anonymous (group). Accessed September 16, 2016. https://en.wikipedia. org/wiki/Anonymous_(group).

3. Raza, Ali. 2016. 8 most awesome hacks conducted by Anonymous

hackers. HackRead, Accessed September 16, 2016. https://www.hackread. com/8-most-awesome-hacks-conducted-by-anonymous-hackers/

  • 4. WikiLeaks. 2015. What is WikiLeaks? Accessed September 16, 2016. https:// wikileaks.org/What-is-Wikileaks.html.
  • 5. Free Press. What we do. Accessed September 16, 2016. http://www.freepress.net/ about.
  • 6. Free Press. The declaration of Internet freedom. Accessed September 16, 2016. http://www.internetdeclaration.org/.
 
Source
Found a mistake? Please highlight the word and press Shift + Enter  
< Prev   CONTENTS   Next >
 
Subjects
Accounting
Business & Finance
Communication
Computer Science
Economics
Education
Engineering
Environment
Geography
Health
History
Language & Literature
Law
Management
Marketing
Mathematics
Political science
Philosophy
Psychology
Religion
Sociology
Travel