2005
DOI: 10.1080/10576100590905110
|View full text |Cite
|
Sign up to set email alerts
|

Cyberterrorism: The Sum of All Fears?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
58
0
12

Year Published

2006
2006
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(70 citation statements)
references
References 6 publications
0
58
0
12
Order By: Relevance
“…7 After 9/11 Clarke incorporated the concept of the post 9/11 world to continue to advance his agenda. Thus Weimann [42]:133) argues that "Following an October 2001 meeting with high-tech executives, including several from the security firm Network Associates, President Bush appointed Richard Clarke as his first special advisor on cyberspace security. After 11 September, Clarke created for himself the position of cybersecurity czar and continued heralding the threat of cyberattack.…”
Section: State Of Siegementioning
confidence: 97%
See 1 more Smart Citation
“…7 After 9/11 Clarke incorporated the concept of the post 9/11 world to continue to advance his agenda. Thus Weimann [42]:133) argues that "Following an October 2001 meeting with high-tech executives, including several from the security firm Network Associates, President Bush appointed Richard Clarke as his first special advisor on cyberspace security. After 11 September, Clarke created for himself the position of cybersecurity czar and continued heralding the threat of cyberattack.…”
Section: State Of Siegementioning
confidence: 97%
“…Likewise, Weimann argues "from a psychological perspective, two of the greatest fears of modern time are combined in the term 'cyber terrorism' ( [42]:131)." Thomas ([39]:115-116) elaborates further…”
Section: State Of Siegementioning
confidence: 98%
“…Without loss of generality, cyberterrorism is the exploitation of computer network tools to incur malfunction, cripple, or shut down critical infrastructures such as energy, transportation, and government operations [2][3][4][5]. Traditional terrorist or extremist attacks launched devastating attacks in metropolitan areas with deadly explosive materials.…”
Section: Introductionmentioning
confidence: 99%
“…17 Studies have indicated that critical infrastructures that include SCADA systems may be vulnerable to a cyberterrorist attack because the infrastructure and the computer systems used are highly complex, making it effectively impossible to eliminate all potential weaknesses. 18 It is believed by many security professionals that a terrorist's ability to control, disrupt, or alter the command and monitoring functions performed by SCADA systems could threaten regional or national security. 19 Cyberterrorism, when considered generally, may be conducted by either state or non-state actors, but the calculus and implications can be quite different for each category.…”
Section: Cyberspace and Cyberterrorism 24mentioning
confidence: 99%