2006
DOI: 10.1007/s10611-007-9061-9
|View full text |Cite
|
Sign up to set email alerts
|

Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?

Abstract: Over the past two decades there has developed a voluminous literature on the problem of cyber terrorism. The themes developed by those writing on cyber terrorism appear to spring from the titles of Tom Clancy's fiction, such as Clear and Present Danger, The Sum of All Fears and Breaking Point, or somewhat more cynically, Patriot Games. This essay examines both the gap between the presumed threat and the known cyber terror behaviors and the continuing literature which suggests an attack is imminent. It suggests… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(25 citation statements)
references
References 12 publications
0
25
0
Order By: Relevance
“…Cyberterrorism is defined as an act that is motivated politically, socially, economically, or religiously to threaten or harm an outside party with the intent of creating fear or destroying assets using cyber systems (Stohl, 2006). Cyberterrorism stems from a rational choice evaluation in which the cost of taking action is low in comparison to the benefits (e.g., terrorists begin attacking via cyber systems as an efficient alternative to traditional [physical] actions; Stohl, 2014).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cyberterrorism is defined as an act that is motivated politically, socially, economically, or religiously to threaten or harm an outside party with the intent of creating fear or destroying assets using cyber systems (Stohl, 2006). Cyberterrorism stems from a rational choice evaluation in which the cost of taking action is low in comparison to the benefits (e.g., terrorists begin attacking via cyber systems as an efficient alternative to traditional [physical] actions; Stohl, 2014).…”
Section: Resultsmentioning
confidence: 99%
“…Effects-based terrorism is a form of hostile aggression in which the behavior is a reaction to being insulted or threatened, in perception or in reality (Stohl, 2006). The attacker’s motives are fear and ideology; attackers use ingroup and outgroup activity to prove how human interaction can lead to violence toward outgroup members.…”
Section: Resultsmentioning
confidence: 99%
“…These attacks prevented servers from answering network connections and crashed computers, causing a blue screen to appear. See also Stohl (2006). 11 On 18 March 1998, federal criminal charges were unsealed against a computer hacker who had disabled a key telephone company computer servicing Worcester airport.…”
Section: Cyber Terrorismmentioning
confidence: 99%
“…I will not discuss cyberpiracy, which is in many respects a different and contentious form of cybercrime, nor cybersex crimes, which is treated elsewhere in this volume (Cuijpers & Van der Knaap, 2010). Also omitted are cyberterrorism and cyberwarfare (Denning, 2001;Stohl, 2007;Brenner, 2009) , which are forms of cyberattacks with elements of crime, but which have a different context than the classic crime perspective taken in this chapter.…”
Section: Introductionmentioning
confidence: 99%