2004
DOI: 10.28945/302
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Terrorism: A Study of the Extent of Coverage in Computer Science Textbooks

Abstract: Executive SummaryOn September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be described as politically motivated attacks in cyberspace. These attacks are intended to cause grave harm, such as loss of life or severe economic damage. Of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Previous research into the teaching of computer security has revealed various recommendations to include more computer security topics (Prichard & MacDonald, 2004;Vaughn & Boggess, 1999). Some studies have looked at the efficacy of particular programs or courses (National Security Agency, 2009).…”
Section: Information Systems Security and Computer Crime Coverage In mentioning
confidence: 99%
“…Previous research into the teaching of computer security has revealed various recommendations to include more computer security topics (Prichard & MacDonald, 2004;Vaughn & Boggess, 1999). Some studies have looked at the efficacy of particular programs or courses (National Security Agency, 2009).…”
Section: Information Systems Security and Computer Crime Coverage In mentioning
confidence: 99%
“…Aircraft bombed a NATO targets in Kosovo , and suffered their networks to attacks and threats for a long time and continuously, and at the same time there have been attacks on devices and Internet networks for the U.S. military by Russia and China , although it will not affect the Systems Command and control of the bombing of the North Atlantic Treaty Organization , but also did not affect the jurisprudence of NATO for the use of the Internet for the purpose of threats to win the end of Milosevic's regime [3].…”
Section: F Examples Of Computer-based Attacksmentioning
confidence: 99%
“…A recent survey indicates that many books used for teaching computer security lack depth coverage of important concepts such as "cyber terrorism", which is a pressing issue nationally and globally (Prichard & MacDonald, 2004).…”
Section: Information Security Awareness Education Issuesmentioning
confidence: 99%