Case Study of the Authur Pendragon Cyber Threat at The University of Alabama
Kate Seigfried-Spellar - Purdue University
Oct 28, 2015Size: 213.2MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThis presentation is a detailed case study of the Authur Pendragon cyber
threat that occurred at The University of Alabama on September 21, 2014.
The Authur Pendragon threat instigated mass fear, social media
hyperactivity, and rumor mongering, all of which reached beyond The
University of Alabama campus. A timeline of the event, which includes
social media posts, official University responses, and mass media
coverage, are presented followed by an analysis of the case from a
socio-psychological and communications perspective using Social Attachment
Model and Theory of Proximity. Recommendations for managing University
cyber threats and rumor mongering are discussed.
About the SpeakerDr. Kathryn Seigfried-Spellar is an Assistant Professor in the Department
of Computer and Information Technology (CIT) at Purdue University. Dr.
Seigfried-Spellar has multiple publications, book chapters, and conference
paper presentations, including international presentations in India,
Ireland, Russia, and South Korea on the who and why of cybercrime.
Specifically, Dr. Seigfried-Spellar studies the personality
characteristics and socio-legal factors associated with cyberdeviance,
such as Internet child pornography use, hacking, cyberbullying, trolling,
and cyber threats via social media. Dr. Seigfried-Spellar is a member of
the Digital and Multimedia Sciences section of the American Academy of
Forensic Sciences (AAFS), the IEEE Computer Society, International
Association of Law Enforcement Intelligence Analysts (IALEIA), and the
American Psychological Association (APA). Dr. Seigfried-Spellar also
serves as an editorial board member for the Journal of Digital Forensics,
Security, and Law as well as the International Journal of Psychology and
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.