Emerging Cyber Threats and Cognitive Vulnerabilities 2020
DOI: 10.1016/b978-0-12-816203-3.00002-2
|View full text |Cite
|
Sign up to set email alerts
|

Cyberterrorism – the spectre that is the convergence of the physical and virtual worlds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
0
0
1
Order By: Relevance
“…Cyberterrorism is widely used and reasonably well understood, owing mainly to the tendency of terrorist groups to use the Internet and the ever-increasing level of sophistication with which these terrorists use the Internet [3]. The convergence of increased permeation and use of the Internet and the emergence and proliferation of both domestic and international terrorism has shifted the focus of 21st-century counterterrorism efforts and measures from the more conventional forms of terrorism to less conventional ones such as cyberterrorism [4].…”
Section: Domestic Cyberterrorismmentioning
confidence: 99%
See 3 more Smart Citations
“…Cyberterrorism is widely used and reasonably well understood, owing mainly to the tendency of terrorist groups to use the Internet and the ever-increasing level of sophistication with which these terrorists use the Internet [3]. The convergence of increased permeation and use of the Internet and the emergence and proliferation of both domestic and international terrorism has shifted the focus of 21st-century counterterrorism efforts and measures from the more conventional forms of terrorism to less conventional ones such as cyberterrorism [4].…”
Section: Domestic Cyberterrorismmentioning
confidence: 99%
“…Moreover, some researchers agree that for cyber terrorists, the likelihood of launching a cyberattack depends on the perceived ease of getting caught [4] [5] [16]. As rational actors, cyberterrorists weigh their actions' costs and benefits before deciding whether to launch an attack.…”
Section: Cybersecurity Information Sharing Actmentioning
confidence: 99%
See 2 more Smart Citations
“…Dari banyak literatur, teror siber dilakukan dengan motivasi yang meliputi: agenda politik dan/atau ideologi (Cavelty, 2007;Holt, 2012;Hua & Bapna, 2012;Luiijf, 2012Luiijf, , 2014Pollitt, 1998;Veerasamy, 2020;Warren, 2007;Weimann, 2005); dan menyebar ketakutan juga mengintimidasi target (Beggs, 2007;Gross, Canetti, & Vashdi, 2016;Hua & Bapna, 2012;Kaplan & Weimann, 2011). Demikian juga diiyakan oleh Cavelty (2007) dengan menekankan dampak psikologis yang terjadi dari teror siber.…”
Section: B Teror Siberunclassified