Results 21 to 30 of about 4,199 (192)

Cybersecurity in the GCC: From Economic Development to Geopolitical Controversy

open access: yesMiddle East Policy, Volume 29, Issue 1, Page 90-103, Spring 2022., 2022
Abstract While the Gulf Cooperation Council (GCC) countries are not alone in their increasing exposure to the negative side effects of greater digital dependency, their status as technological leaders—not just in the region, but also in the world—means that they are vulnerable to a variety of cybersecurity threats.
Bassant Hassib, James Shires
wiley   +1 more source

Military Information Leak Response Technology through OSINT Information Analysis Using SNSes

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Open‐source intelligence (OSINT), an information gathering and analysis system that utilizes public information on SNSes, is a necessary information gathering activity to counter terrorism and cyberterrorism. Although it is not possible to patrol cyberspace directly, as in real space, cyberspace can be patrolled by collecting information using OSINT ...
Yong-Joon Lee   +3 more
wiley   +1 more source

Multiagency programs with police as a partner for reducing radicalisation to violence

open access: yesCampbell Systematic Reviews, Volume 17, Issue 2, June 2021., 2021
Abstract Background Multiagency responses to reduce radicalisation often involve collaborations between police, government, nongovernment, business and/or community organisations. The complexities of radicalisation suggest it is impossible for any single agency to address the problem alone.
Lorraine Mazerolle   +4 more
wiley   +1 more source

Future‐proof: bunkered data centres and the selling of ultra‐secure cloud storage

open access: yesJournal of the Royal Anthropological Institute, Volume 27, Issue S1, Page 76-94, April 2021., 2021
Abstract Abandoned after the Cold War, nuclear bunkers around the world have found afterlives as ultra‐secure data storage sites for cloud computing providers. The operators of these bunkered data centres capitalize on the spatial, temporal, and material security affordances of their subterranean fortresses, promoting them as ‘future‐proof’ cloud ...
A.R.E. Taylor
wiley   +1 more source

The Cyberterrorism Threat: Findings from a Survey of Researchers [PDF]

open access: yes, 2013
This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries.
Jarvis, Lee   +2 more
core   +2 more sources

Deterring and Dissuading Cyberterrorism

open access: yesJournal of Strategic Security, 2015
Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested.
John J. Klein
doaj   +1 more source

Technology: Negotiating Tomorrow’s Armed Conflict and Terrorism in West Africa [PDF]

open access: yesУченые записки Института Африки Российской академии наук, 2019
This paper, using the case of Boko Haram in Nigeria, examines the impact of technology on future armed conflicts and violent extremism in Nigeria and West Africa.
Bukola Adeyemi OYENIYI
doaj   +1 more source

COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM

open access: yesRUDN Journal of Law, 2020
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies.
Lev R. Klebanov   +1 more
doaj   +1 more source

Unpacking cyberterrorism discourse: Specificity, status, and scale in news media constructions of threat [PDF]

open access: yes, 2016
This article explores original empirical findings from a research project investigating representations of cyberterrorism in the international news media.
Al-Garni   +17 more
core   +4 more sources

Hackers as terrorists? Why it doesn't compute [PDF]

open access: yes, 2003
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core   +1 more source

Home - About - Disclaimer - Privacy