Results 1 to 10 of about 4,180 (175)

Public Opinion and Cyberterrorism. [PDF]

open access: yesPublic Opin Q, 2023
Abstract Research into cyber-conflict, public opinion, and international security is burgeoning, yet the field suffers from an absence of conceptual agreement about key terms. For instance, every time a cyberattack takes place, a public debate erupts as to whether it constitutes cyberterrorism. This debate bears significant consequences,
Shandler R, Kostyuk N, Oppenheimer H.
europepmc   +4 more sources

Cyberterrorism as a global threat: a review on repercussions and countermeasures [PDF]

open access: yesPeerJ Computer Science
An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological power through threat or intimidation.
Saman Iftikhar
doaj   +3 more sources

KEBIJAKAN ANTISIPATIF HUKUM PIDANA UNTUK PENANGGULANGAN CYBERTERRORISM [PDF]

open access: yesMasalah-Masalah Hukum, 2014
This article attempts to explain briefly associated with a set of issues relating to cyberterrorism. It also needs to think about the future of criminal law anticipatory policy in the mengelminir cyberterrorism as a trend of crime in the future. Analysis
Ufran Ufran
doaj   +2 more sources

Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon [PDF]

open access: yesPerspectives on Terrorism, 2014
This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between ...
Lee Jarvis, Stuart Macdonald
doaj   +1 more source

Against Cyberterrorism: Why cyber-based terrorist attacks are unlikely to occur [PDF]

open access: yesCommunications of the ACM, 2011
Why cyber-based terrorist attacks are unlikely to occur.
Conway, Maura
core   +2 more sources

A Strategic Vision for Combating Cyberterrorism

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Cyberterrorism has become a well-known cybersecurity subject in today's digital world. The spread of cybercrimes calls for disseminating ethical values and peace between countries and individuals.
Mathkar Alsubaie
doaj   +1 more source

Analysis and Assessment of Cyberthreats to the National Financial System of Russia in the Digital Economy [PDF]

open access: yesФинансовый журнал, 2021
The relevance of the topic of this scientific article lies in the need for a theoretical and practical study of the problem of escalating numbers and quality of cyber threats and attacks committed against institutions of the Russian financial system ...
Sergey V. Shkodinsky   +2 more
doaj   +1 more source

The nature of Contemporary Terrorism: Selected Features and Statistical Data

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2016
The paper presents selected features of contemporary terrorism. It emphasizes the role of a religious factor, which to a large extent determines the specificity of the contemporary wave of this phenomenon.
Lech Chojnowski
doaj   +12 more sources

EUROPEAN REGIONAL SYSTEM FOR COMBATING CYBERTERRORISM: POLITICAL, INSTITUTIONAL AND LEGAL MECHANISMS

open access: yesВісник Харківського національного університету імені В. Н. Каразіна: Серія "Питання політології", 2021
The current stage of development of cyberterrorism in Europe is considered. The progression of this phenomenon is facilitated by the Internet, which has a significant impact on all spheres of public life, providing a huge amount of information to any ...
Oleksandra Zinchenko
doaj   +1 more source

A LEGAL ASSESSEMENT OF MANAGEMENT OF THE EUROPEAN UNION CYBERTERRORISM POLICY [PDF]

open access: yesModern Management Review, 2017
In addition to traditional threats such as spying or revealing state or business secrets, the new threats have appeared, among which the most dangerous is cyberterrorism.
Izabela OLEKSIEWICZ
doaj   +1 more source

Home - About - Disclaimer - Privacy