Figure 1 - uploaded by Dries Putter
Content may be subject to copyright.
Most used social media platforms in South Africa, users aged 16 to 64 (mid-2021) Source: BusinessTech (2021) 139

Most used social media platforms in South Africa, users aged 16 to 64 (mid-2021) Source: BusinessTech (2021) 139

Source publication
Article
Full-text available
Globally, changes in technology have always shaped the intelligence collection environment. South Africa is no different. The emergence of satellite imagery had a significant influence on the Geospatial Intelligence (GEOINT) capabilities and, similarly, the emergence of the telegram and later the telephone had and equally significant effect on the...

Contexts in source publication

Context 1
... this understanding then the ICT requirement to the product must be managed through the requirements life cycle. As defence institutions operate and maintain numerous ICT capabilities, some need to be managed as projects, and it becomes prudent that defence institutions utilise a unique project management methodology (as proposed in Figure 1) that will address ICT projects across their life cycle from both experience and theory. This component is defined as part of the benefits that have been achieved and the institutionalisation of portfolio and/or project management in the framework. ...
Context 2
... aspect is integrated into all the layers of the framework as no single methodology reigns supreme. The combination of the dimensions (applicable to the DOD case) of the four selected methodologies included in the framework (Figure 1) will be highlighted in the next section. ...
Context 3
... results of the descriptive study, as described in Table 2, are combined and reflected in the conceptual project management framework (Figure 1) for ICT projects described in section C. ...
Context 4
... strong focus of the framework is on a separate project organisation culture (based on project leadership), ICT projects (derived from business objectives), the project management office (PMO), a project organisation (adapted to each project requirement), and the systems development process and project solutions. The framework incorporates the three levels of project management causes of project success based on Nicholas (2001) with respect to participants (A), communication, information sharing and feedback (B), and the project management systems development process (C The conceptual project management framework for ICT projects (Figure 1) is described in this section. This culminated from the results of the descriptive case study and advantages depicted in Table 1 for the identified ICT project management methodologies. ...
Context 5
... moral alignment does not occur between the state and reversal advocates, reversal may still occur if advocates hold the state accountable by activating an external authority or audience, which could be domestic or international courts, or a domestic voter base. 478 Hence, in the case of moral misalignment between the state and reversal advocates, reversal may still occur if advocates engage in accountability politics through an external authority or audience (see Figure 1). Figure 1 below outlines the process of moral discourse that occurs at domestic and international levels. ...
Context 6
... Hence, in the case of moral misalignment between the state and reversal advocates, reversal may still occur if advocates engage in accountability politics through an external authority or audience (see Figure 1). Figure 1 below outlines the process of moral discourse that occurs at domestic and international levels. At a domestic level, the nuclear aspiring or reversing state and NSAs (including domestic NSAs and TNAs) engage in a moral discourse in which they make moral claims. ...
Context 7
... reversal decision by a state therefore could be influenced by this suasion either at domestic or at international level. The theoretical framework depicted in Figure 1 provides an analytical tool to understand the South African case of denuclearisation where reversal occurred in the presence of moral claims. The case is complicated however by the fact that the nuclear weapons programme was conducted in secret, and the state followed a policy of nuclear opacity and strategic uncertainty when it came to taking a position on nuclearisation. ...
Context 8
... this understanding then the ICT requirement to the product must be managed through the requirements life cycle. As defence institutions operate and maintain numerous ICT capabilities, some need to be managed as projects, and it becomes prudent that defence institutions utilise a unique project management methodology (as proposed in Figure 1) that will address ICT projects across their life cycle from both experience and theory. This component is defined as part of the benefits that have been achieved and the institutionalisation of portfolio and/or project management in the framework. ...
Context 9
... aspect is integrated into all the layers of the framework as no single methodology reigns supreme. The combination of the dimensions (applicable to the DOD case) of the four selected methodologies included in the framework (Figure 1) will be highlighted in the next section. ...
Context 10
... results of the descriptive study, as described in Table 2, are combined and reflected in the conceptual project management framework (Figure 1) for ICT projects described in section C. ...
Context 11
... strong focus of the framework is on a separate project organisation culture (based on project leadership), ICT projects (derived from business objectives), the project management office (PMO), a project organisation (adapted to each project requirement), and the systems development process and project solutions. The framework incorporates the three levels of project management causes of project success based on Nicholas (2001) with respect to participants (A), communication, information sharing and feedback (B), and the project management systems development process (C The conceptual project management framework for ICT projects (Figure 1) is described in this section. This culminated from the results of the descriptive case study and advantages depicted in Table 1 for the identified ICT project management methodologies. ...
Context 12
... moral alignment does not occur between the state and reversal advocates, reversal may still occur if advocates hold the state accountable by activating an external authority or audience, which could be domestic or international courts, or a domestic voter base. 478 Hence, in the case of moral misalignment between the state and reversal advocates, reversal may still occur if advocates engage in accountability politics through an external authority or audience (see Figure 1). Figure 1 below outlines the process of moral discourse that occurs at domestic and international levels. ...
Context 13
... Hence, in the case of moral misalignment between the state and reversal advocates, reversal may still occur if advocates engage in accountability politics through an external authority or audience (see Figure 1). Figure 1 below outlines the process of moral discourse that occurs at domestic and international levels. At a domestic level, the nuclear aspiring or reversing state and NSAs (including domestic NSAs and TNAs) engage in a moral discourse in which they make moral claims. ...
Context 14
... reversal decision by a state therefore could be influenced by this suasion either at domestic or at international level. The theoretical framework depicted in Figure 1 provides an analytical tool to understand the South African case of denuclearisation where reversal occurred in the presence of moral claims. The case is complicated however by the fact that the nuclear weapons programme was conducted in secret, and the state followed a policy of nuclear opacity and strategic uncertainty when it came to taking a position on nuclearisation. ...

Citations

... This is used in the five-part classification presented by Lowenthal and Clark: HUMINT, GEOINT, MASINT, SIGINT, and OSINT, where HUMINT refers to personal intelligence, GEOINT to geospatial intelligence, MASINT to measurement and sensor intelligence, SIGINT to signal intelligence, and OSINT to open-source intelligence (Lowenthal and Clark, 2015;Althoff, 2015). Moreover, Henrico and Putter (2024); see also Putter and Henrico (2022) recognize SOCMINT (social media intelligence) similarly. For all of these, the type or technique used to obtain the information determines the name of the intelligence category. ...
Article
Full-text available
This article elaborates on the conceptualization of CITINT, i.e., the intelligence activities conducted by citizens and NGOs. This article is a preliminary attempt to establish foundation and perspectives for future research and to provide for initial conceptualization of CITINT. Moreover, this article elucidates CITINT’s implications from legislative perspective within the Finnish context. A semi-systematic, limited literature review incorporating academic literature, governmental outlets, and news was executed to explore the contexts and definitions regarding CITINT. Interviews with a journalist, an active CITINT individual, and a detective superintendent of the Finnish National Bureau of Investigation were conducted to clarify and provide backrest for conceptualization. The key contributions of this article are further elucidation of CITINT as a concept and its implications. Moreover, this article discusses the shift in power relations from centralized issue ownership of intelligence activities toward a more fragmented scene in which individuals and non-governmental organizations (NGOs) have more relevance, possibilities, and weight. Within CITINT, this article points out the differentiation between governmentally facilitated CITINT and the bottom-up CITINT conducted by individuals and NGOs on their own terms and tools. One key contribution of this article is connecting CITINT to societal participation through the CCSCM framework. Although the interviews comprise an empirical component, support contextualization, and provide tangible examples, this article’s focus is on the theoretical and conceptual aspects of CITINT. The article concludes with a discussion on the outlook, possibilities, and challenges of CITINT and provokes questions for further discussion on the matter.
... Excessive increases in activity on platforms such as Twitter have already been detected. Other social media platforms will also fall victim to this trend of gathering social media intelligence (SOCMINT) (Putter & Henrico, 2022). ...
Article
Full-text available
This article argues that both Russia and China will re-invigorate and expand their international espionage activities. Russia's renewed vigour in engaging in aggressive espionage campaigns is due to the current setbacks that it is facing as a result of its ill-fated invasion of Ukraine. The sanction-induced prohibitions that limit access to state-of-the-art technologies will unleash renewed enthusiasm to obtain these latest technologies by covert means, be it HUMINT and/or cyberespionage. The future robustness of China's aggressive espionage activities is projected to be fuelled by its systematic 'de-coupling' from those nations leading in science, engineering and technology, such as the United States, as well as the growing opposition to the use of developmental institutions such as the Confucius Institute and the Belt and Road Initiative (BRI) as intelligence collection platforms. This article predicts that as Russia and China become 'outsiders', they will becoming increasingly isolated and will in the end suffer economically, diplomatically and in terms of power projections.
Article
Full-text available
With the rise of mediatization, open-source intelligence (OSINT) has evolved into a decentralized form of intelligence gathering, influenced by both political and commercial logic. This transformation has positioned social media as a primary source of OSINT, enhancing the capabilities of non-state actors and significantly impacting international politics, particularly in the realm of great-power competition. Through an analysis spanning individual, state, and systemic levels, this article examines OSINT’s role in shaping contemporary international politics. By exploring case studies such as the Russo-Ukrainian War, Israel-Hamas War, and strategic competition between China and the United States, this article illuminates how OSINT influences decision-making processes and global power struggles and contributes to a deeper understanding of the evolving landscape of intelligence and its implications for statecraft.
Article
Full-text available
According to Ofcom, half of children used TikTok in 2021 and it is the third most used platform behind YouTube and WhatsApp. TikTok is a social media app with one billion monthly active users (Cervi et al., 2022; Dellatto, 2021). installed on devices, 3.5 billion times, available in 154 countries and accessible in thirty-nine languages. TikTok is offered to children of 13 years old (Independent Digital News and Media, 2022; Hoegh, 2022). TikTok was founded in 2018 with a mission to inspire creativity and bring joy (TikTok, 2023). However, its screentime consumption for children has experienced revolutionary change. One in five UK internet users are children according to the UK department for science Innovation and Technology, (2021) most of whom are on TikTok. Children are exposed to over one billion videos on TikTok every day This paper seeks to comparatively investigate the cultural differences, approaches, and challenges to parenting, responsible social media use by children in the United Kingdom and Nigeria (Attrill et al., 2016). To ascertain, whether the existing legal framework is sufficient in enforcing safeguarding measures required of TikTok and other social media platforms.