1-16 of 16
Keywords: cyberterrorism
Sort by
Journal Article
Michael L. Gross and others
Journal of Cybersecurity, Volume 3, Issue 1, March 2017, Pages 49–58, https://doi.org/10.1093/cybsec/tyw018
Published: 15 February 2017
.../by-nc/4.0/ ), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited. For commercial re-use, please contact [email protected] cyberterrorism cyberwar cybersecurity threat perception stress exposure public...
Chapter
Published: 10 December 2011
... mining and invasions of data privacy, activism becomes all too easily equated with cyberterrorism. Third, the assertion that greater secrecy ultimately yields greater security is wrong, and the cult of secrecy gives rise to a global resurgence of irrational rumorology online. The chapter also considers...
Chapter
Published: 17 December 2015
... that cyberattacks do not cause sufficient harm to violate noncombatant immunity, we dispute this. The chapter examines the effects of long-term destruction brought about in the course of regular warfare to draw conclusions about the probable knock-on effects of cyberterrorism. To evaluate the psychological effects...
Chapter
Published: 06 August 2020
...This chapter focuses on understandings and debates around cyberterrorism as well as the effect particular representations of this phenomenon have upon assessing its threat. The chapter begins by introducing various understandings of cyberterrorism and differentiates between narrow and broad...
Chapter
Published: 02 June 2014
..., pornography, prostitution, cyberbullying, cyberstalking, and cyberterrorism. The challenges inherent in measuring these offenses and pertinent theoretical and empirical issues are examined in depth. cybercrime technology hacking piracy fraud cyberstalking pornography cyberterrorism malware Over...
Chapter
Published: 26 March 2009
...-century law enforcement encountered when criminals were close at hand. This chapter develops a taxonomy of cyberthreats; that is, it defines cybercrime, cyberterrorism, and cyberwarfare. automobiles used in crime Bonnie and Clyde gang crime jurisdiction law enforcement Department of Justice U S...
Chapter
Published: 18 September 2023
... of cyberterrorism, and positions a role for political psychology in understanding this nascent phenomenon. Canetti Daphne Matzkin Sharon Shandler Ryan Snider Keren L G terrorism realistic threat s intergroup conflict Jentleson B W military intervention pretty prudent public realistic group conflict theory...
Chapter
Published: 01 October 2004
.... The social, ethical, and aesthetic adequacy of the creative arts in the age of knowledge work seems to depend on acquiring such an aesthetic legitimation. What is socially redeeming about an art that resembles “cyberterrorism,” which in turn resembles “bioterrorism,” which itself is the “poor man's version...
Chapter
Published: 05 February 2018
... in counterterrorism. Finally, it examines the geospatial and temporal patterns of terrorism to show how geoprofiling can be used to analyze seditious graffiti, insurgency attacks, cyberterrorism, and bioterrorism. counterinsurgency COIN counterterrorism crime pattern theory geographic profiling geoprofiling...
Chapter
Published: 08 December 2021
...This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence...
Chapter
Published: 01 March 2015
...This chapter examines the UK’s criminal justice-based response to the threat of cyberterrorism. In recent years the UK has introduced a range of terrorism-related legislation, which has significantly extended the reach of the criminal law, indirectly diminished the procedural rights of suspected...
Chapter
Published: 01 May 2016
... technology also provides terrorists and criminals with increased means and methods of inspiring fear and carrying out virtual attacks. This reality had been acknowledged before 9/11. 130 Consequently, there is a growing body of literature dealing with the relationship between cyberterrorism...
Chapter
Published: 17 December 2015
... or otherwise) is not always entirely clear. This chapter distinguishes between cyberwar, cyberterrorism, cybercrime, cyberespionage, and what the chapter refers to as “covert political cyberaction”—a species of covert political action. The chapter argues that many, if not most, cyberattacks perpetrated...
Chapter
Published: 26 March 2009
... attackers overwhelm websites and servers by bombarding them with data, or “traffic.” The chapter then discusses the distinctions between cyberwarfare, cyberterrorism, or cybercrime. botnets bots Distributed Denial of Service attacks DDoS Estonia zombies centralized command structure command structures...
Chapter
Published: 01 September 2015
... warfare, before drawing a distinction between terrorism and other phenomena, such as ‘political assassination’ and ‘cyberterrorism’. It concludes with a discussion on a formidable empirical problem in relation to the way the author (and many others) have conceptualized terrorism: how does one prove what...
Chapter
Published: 15 December 2022
... airlines bombings United States v Yousef United States v Reumayr Denial of Service DOS attacks Digital Liberation Front DLF Computer Fraud and Abuse Act collateral damage Akehurst Michael Protective Principle extraterritorial jurisdiction non-state actors cyberterrorism customary international...