2011
DOI: 10.1109/mts.2011.940293
|View full text |Cite
|
Sign up to set email alerts
|

Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
53
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 133 publications
(62 citation statements)
references
References 12 publications
0
53
0
1
Order By: Relevance
“…Cyber-criminals may be categorized into political and non-politically motivated. Politically motivated cyber crimes are perpetuated by extremist groups as a way of using cyberspace to foster falsehood, online attack, monetary gain or plan and coordinate physical-act of terrorism [16]. Non-politically motivated attacks are mostly for financial gain and other deeply-rooted socio-cultural issues [16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber-criminals may be categorized into political and non-politically motivated. Politically motivated cyber crimes are perpetuated by extremist groups as a way of using cyberspace to foster falsehood, online attack, monetary gain or plan and coordinate physical-act of terrorism [16]. Non-politically motivated attacks are mostly for financial gain and other deeply-rooted socio-cultural issues [16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, ''hacktivists'' are distinguished within the broader category of hackers by their use of technology and hacking as means to achieve political purposes or ''greater good'' (Taylor, 2005). Hacktivism is an important area of study because hacktivist motives stemming from social, political, economic, and cultural (SPEC) conflicts are increasingly cited as reasons why hacker groups plan and execute their attacks (Gandhi et al, 2011;Holt & Kilger, 2012).…”
Section: Introductionmentioning
confidence: 99%
“…Governments, global organizations, operators and services providers have come together on multiple platforms to develop protection standards, technologies and processes for these systems [2]. Cyberspace is now a recognized operational domain for major modern armies and security agencies around the world [3].…”
Section: Introductionmentioning
confidence: 99%