2012
DOI: 10.4314/pelj.v15i2.14
|View full text |Cite
|
Sign up to set email alerts
|

Addressing the spectre of cyber terrorism: a comparative perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…40 Concerned assessments of cyberterrorism tend to view cyberterrorists as "computer savvy individuals who look for vulnerabilities that can be easily exploited." 41 Due to "the number of potential targets and the lack of proper and adequate safeguards," preventing cyberterrorism is here seen as a "daunting" task for the security services. 42 According to Thomas Homer-Dixon:…”
Section: Assessing the Cyberterrorism Threatmentioning
confidence: 99%
“…40 Concerned assessments of cyberterrorism tend to view cyberterrorists as "computer savvy individuals who look for vulnerabilities that can be easily exploited." 41 Due to "the number of potential targets and the lack of proper and adequate safeguards," preventing cyberterrorism is here seen as a "daunting" task for the security services. 42 According to Thomas Homer-Dixon:…”
Section: Assessing the Cyberterrorism Threatmentioning
confidence: 99%
“…On the other hand, existing proposals to fight cyber terrorism tend to focus on the establishment of international conventions and cooperation (see for example Cassim 2012, Sofaer et al 2000, and Tehrani, Manap, and Taji 2013. While there is every reason to continue to pursue such avenues, it is unrealistic to believe that these alone will be sufficient.…”
Section: Possible Cyber Villains: Rouge States?mentioning
confidence: 99%
“…RICA requires all customers with cell phone numbers on cellular networks in South Africa to register their details with their respective networks. Customers are required to furnish service providers with full names and addresses, a copy of identity documents and proof of residence (Cassim 2012, Virtual Private Network 2013. The Electronic Communications and Transactions Act (2002) is meant to provide for the facilitation and regulation of electronic communication in South Africa (Republic of South Africa 2002).…”
Section: Internet-related Privacymentioning
confidence: 99%