Cyber Security
Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
September 18, 2023Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility ...
Syria’s Electronic Armies
September 18, 2023Over the last four years as the Syrian uprising has grown into a full-blown civil war, a sinister parallel conflict has been fought out in cyberspace, with combatants wielding bytes and software rather than guns as they have battled for supremacy on Syria’s internet frontline. But the consequences of this secret cyber war have been ...
Why the Internet is Not Increasing Terrorism
September 18, 2023Policymakers and scholars fear that the Internet has increased the ability of transnational terrorists, like al Qaeda, to attack targets in the West, even in the face of increased policing and military efforts. Although access to the Internet has increased across the globe, there has been no corresponding increase in completed transnational terrorist attacks. This ...
‘Weighing the Role of the Internet in Past, Present, and Future Terrorism’ Dr Maura Conway
September 18, 2023VOX-Pol Coordinator Dr Maura Conway discussing the role of the Internet in the past, the present & the future of terrorism, at the 2014 Symposium of Cyber Terrorism Project at Swansea University. ...
An Introduction by the Editors
September 18, 2023An introductory note of the Journal ‘Dynamics of Asymmetric Conflicts’ ...
Panel on Monitoring the Net for Violent Extremist Material, organised by VOX-Pol at CPDP2015
September 18, 2023Panel on Monitoring the Net for Violent Extremist Material, organised by VOX-Pol at CPDP2015 ...
Hackers as Terrorists? Why it Doesn’t Compute
September 18, 2023The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either. ...
Cyberterrorism: Hype and Reality
September 18, 2023Chapter “Cyberterrorism: hype and reality” in book: Armistead, Leigh, (ed.) Information warfare: separating hype from reality ...
Terrorism & Internet Governance: Core Issues
September 18, 2023Both global governance and the sub-set of issues that may be termed ‘internet governance’ are vast and complex issue areas. The difficulties of trying to ‘legislate’ at the global level – efforts that must encompass the economic, cultural, developmental, legal, and political concerns of diverse states and other stakeholders – are further complicated by the ...
Terrorist Use of the Internet and the Challenges of Governing Cyberspace
September 18, 2023Chapter: “Terrorism, the Internet, and international relations: the governance conundrum”, in: Dunn Cavelty, Myriam and Mauer, Victor and Krishna-Hensel, Sai Felicia, (eds.) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. ...