Results 61 to 70 of about 4,199 (192)

La tasca legislativa del Consell d'Europa davant la utilització d'Internet amb finalitats terroristes

open access: yesIDP, 2009
El terme ciberterrorisme salta a la llum pública en grans titulars periodístics a finals del segle passat i principis del present, particularment, a partir dels atemptats de l'11-S a Nova York.
Alicia Chicharro Lázaro
doaj   +1 more source

Terror from behind the keyboard: conceptualising faceless detractors and guarantors of security in cyberspace [PDF]

open access: yes, 2016
By reflecting on active public-domain government documents and statements, this article seeks to develop securitisation theory’s articulation of the dichotomy between legitimate and illegitimate violence as it is reflected in British government policy ...
Mott, G
core   +2 more sources

The War on Cyberterrorism [PDF]

open access: yesDemocracy and Security, 2018
This article addresses the problem of international law enforcement within the War on Cyberterrorism.
openaire   +3 more sources

Ciberespacio y el Crimen Organizado. Los nuevos desafíos del siglo XXI [PDF]

open access: yesRevista Enfoques, 2012
The Occidental Societies are becoming more vulnerable by the possible cybernetic attacks because of their large dependency on Computer and Electronics Systems and fraud in the network. Moreover, Internet is an easily accessible, where any person, keeping
Gema Sánchez Medero
doaj  

The Law and Economics of Cybersecurity: An Introduction [PDF]

open access: yes, 2004
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the ...
Grady, Mark F., Parisi, Francesco
core   +2 more sources

India and Cyberterrorism [PDF]

open access: yesInternational Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 2020
To live peacefully in this world of danger and uncertainty, courage is prerequisite. There are two way to meet the danger: one, remain indifference to danger and two, prepare and motivate yourselves through knowledge and training and face the danger head-on.
openaire   +1 more source

You want peace ? Get ready for war...in cyberspace

open access: yesJournal of Modern Science
Objectives A phenomenon is emerging in relations between states that is the opposite of a declaration of war, i.e. the phenomenon of 'unspeakable war', which, according to US experts, may even lead to a so-called 'electronic Pearl Harbour'.
Zbigniew Witkowski
doaj   +1 more source

The impact of cyberattacks on the stability of global financial markets as a manifestation of economic terrorism

open access: yesZeszyty Naukowe Wyższej Szkoły Finansów i Prawa w Bielsku-Białej
Artykuł przeprowadza kompleksową analizę wpływu cyberataków na globalne rynki finansowe, skupiając się na ich charakterystyce jako formy terroryzmu ekonomicznego.
Katarzyna Cyrkun   +3 more
doaj   +1 more source

Cyber-Terrorism in The Context of Proselytizing, Coordination, Security, and Mobility

open access: yesJournal of Islamic World and Politics, 2020
The simplicity and flexibility of information and technology have made human life much easier. Terrorist groups nowadays have been using these things to disseminate terror, recruit new members, fundraise, and mobilize their activities.
Iqbal Ramadhan
doaj   +1 more source

Constructing Cyberterrorism as a Security Threat: a Study of International News Media Coverage [PDF]

open access: yes, 2015
This article examines the way in which the English language international news media has constructed the threat of cyberterrorism. Analysing 535 news items published by 31 different media outlets across 7 countries between 2008 and 2013, we show that ...
Andrew Whiting, Stuart Macdonald
core  

Home - About - Disclaimer - Privacy