Results 31 to 40 of about 4,199 (192)

State Cyberterrorism: A Contradiction in Terms? [PDF]

open access: yes, 2015
This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism.
Jarvis, Lee   +2 more
core   +2 more sources

The nature of Contemporary Terrorism: Selected Features and Statistical Data [PDF]

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej, 2018
The paper presents selected features of contemporary terrorism. It emphasizes the role of a religious factor, which to a large extent determines the specificity of the contemporary wave of this phenomenon.
Lech Chojnowski
doaj   +1 more source

Reality Check: assessing the (un)likelihood of cyberterrorism [PDF]

open access: yes, 2014
This chapter argues that debates around the threat posed by cyberterrorism have been dominated by a focus on issues relating to technological potentialities.
Conway, Maura
core   +1 more source

Evolution of Cyberterrorism: Challenges and Solutions

open access: yesUluslararası İlişkiler Çalışmaları Dergisi
Cyberterrorism is an important international relations issue as it poses formidable challenges to international security due to its unanimity and easier reach to broad masses. Fighting cyberterrorism necessitates understanding what kinds of actors resort
Mücahit Ergün, Gülşen Şeker Aydın
doaj   +1 more source

Cyberterrorism and Religious Fundamentalism: New Challenges for Europe in the Age of Universal Internet Access

open access: yesReligions, 2023
Digital technology is now a fundamental and indispensable component of daily life. While the great opportunities offered by cyberspace are undoubted, the growing security challenges and threats it brings should not be overlooked.
Silvia Baldassarre
doaj   +1 more source

Cyberterrorism: Addressing the challenges for establishing an international legal framework [PDF]

open access: yes, 2012
The increase of international cyberterrorism in recent years has resulted in computer-based criminal activities that generate worldwide fear, destruction and disruption.
Prasad, Krishna
core   +2 more sources

Cyber Terrorism and its Prevention in Indonesia

open access: yesJurnal Media Hukum, 2020
Cyber technology gives birth to criminal activities carried out inside the cyberspace which is technically referred to as cybercrimes. Cybercrime appears in various forms including the so-called cyberterrorism.  The purpose of this research is to discuss
Dian Alan Setiawan
doaj  

Analogy and Authority in Cyberterrorism Discourse: An Analysis of Global News Media Coverage [PDF]

open access: yes, 2016
This article explores constructions of cyberterrorism within the global news media between 2008 and 2013. It begins by arguing that the preoccupation with questions of definition, threat and response in academic literature on cyberterrorism is ...
Jarvis, Lee   +2 more
core   +4 more sources

Terrorism and the Internet: new media - new threat? [PDF]

open access: yes, 2006
The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and ...
Conway, Maura
core   +1 more source

Home - About - Disclaimer - Privacy