Cybersecurity in the GCC: From Economic Development to Geopolitical Controversy
Abstract While the Gulf Cooperation Council (GCC) countries are not alone in their increasing exposure to the negative side effects of greater digital dependency, their status as technological leaders—not just in the region, but also in the world—means that they are vulnerable to a variety of cybersecurity threats.
Bassant Hassib, James Shires
wiley +1 more source
Military Information Leak Response Technology through OSINT Information Analysis Using SNSes
Open‐source intelligence (OSINT), an information gathering and analysis system that utilizes public information on SNSes, is a necessary information gathering activity to counter terrorism and cyberterrorism. Although it is not possible to patrol cyberspace directly, as in real space, cyberspace can be patrolled by collecting information using OSINT ...
Yong-Joon Lee +3 more
wiley +1 more source
Multiagency programs with police as a partner for reducing radicalisation to violence
Abstract Background Multiagency responses to reduce radicalisation often involve collaborations between police, government, nongovernment, business and/or community organisations. The complexities of radicalisation suggest it is impossible for any single agency to address the problem alone.
Lorraine Mazerolle +4 more
wiley +1 more source
Future‐proof: bunkered data centres and the selling of ultra‐secure cloud storage
Abstract Abandoned after the Cold War, nuclear bunkers around the world have found afterlives as ultra‐secure data storage sites for cloud computing providers. The operators of these bunkered data centres capitalize on the spatial, temporal, and material security affordances of their subterranean fortresses, promoting them as ‘future‐proof’ cloud ...
A.R.E. Taylor
wiley +1 more source
The Cyberterrorism Threat: Findings from a Survey of Researchers [PDF]
This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries.
Jarvis, Lee +2 more
core +2 more sources
Deterring and Dissuading Cyberterrorism
Cyberterrorism, while being written about since the early 2000s, is still not fully understood as a strategic concept and whether such actions can be deterred is hotly contested.
John J. Klein
doaj +1 more source
Technology: Negotiating Tomorrow’s Armed Conflict and Terrorism in West Africa [PDF]
This paper, using the case of Boko Haram in Nigeria, examines the impact of technology on future armed conflicts and violent extremism in Nigeria and West Africa.
Bukola Adeyemi OYENIYI
doaj +1 more source
COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies.
Lev R. Klebanov +1 more
doaj +1 more source
Unpacking cyberterrorism discourse: Specificity, status, and scale in news media constructions of threat [PDF]
This article explores original empirical findings from a research project investigating representations of cyberterrorism in the international news media.
Al-Garni +17 more
core +4 more sources
Hackers as terrorists? Why it doesn't compute [PDF]
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism.
Conway, Maura
core +1 more source

