Cyberterrorism
Hackers as Terrorists? Why it Doesn’t Compute
September 18, 2023The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either. ...
Cyberterrorism: Media Myth or Clear and Present Danger?
September 18, 2023Chapter, “Cyberterrorism: media myth or clear and present danger?” in book: Irwin, Jones, (ed.) War and virtual war: the challenges to communities. ...
Terrorism and the Internet: New Media – New Threat?
September 18, 2023The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. The final section of the ...
Terrorism and New Media: the Cyber-Battlespace
September 18, 2023Chapter, “Terrorism and new media: the cyber-battlespace”, in book: Forest, James F., (ed.) Countering terrorism and insurgency in the 21st Century. ...
Cyberterrorism: Hype and Reality
September 18, 2023Chapter “Cyberterrorism: hype and reality” in book: Armistead, Leigh, (ed.) Information warfare: separating hype from reality ...
Terrorism & Internet Governance: Core Issues
September 18, 2023Both global governance and the sub-set of issues that may be termed ‘internet governance’ are vast and complex issue areas. The difficulties of trying to ‘legislate’ at the global level – efforts that must encompass the economic, cultural, developmental, legal, and political concerns of diverse states and other stakeholders – are further complicated by the ...
Terrorist Use of the Internet and the Challenges of Governing Cyberspace
September 18, 2023Chapter: “Terrorism, the Internet, and international relations: the governance conundrum”, in: Dunn Cavelty, Myriam and Mauer, Victor and Krishna-Hensel, Sai Felicia, (eds.) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. ...
How Social Media Outlets Impact Digital Terrorism and Hate
September 18, 2023An analysis of how social media outlets impact digital terrorism and hate ...
Blogs and Bullets: New Media in Contentious Politics
September 18, 2023In this report a team of scholars critically assesses both the “cyberutopian” and “cyberskeptic” perspectives on the impact of new media on political movements. The authors propose a more complex approach that looks at the role of new media in contentious politics from five interlocking levels of analysis: individual transformation, intergroup relations, collective action, regime ...
Terrorism and the Electric Power Delivery System
September 18, 2023The National Academy of Engineering called the grid the world’s largest integrated machine and a central part of the greatest engineering achievement of the 20th century—electrification of modern society. Reliable electricity service is essential to health, welfare, national security, communication, and commerce. Because of its scale, geographic reach, and complexity, however, the grid also poses ...