2013
DOI: 10.1016/j.jsis.2012.10.004
|View full text |Cite
|
Sign up to set email alerts
|

The economic impact of cyber terrorism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(27 citation statements)
references
References 45 publications
0
19
0
2
Order By: Relevance
“…Existing and potential dangers in the circle of cybersecurity are among the most genuine difficulties of the 21st century. To ensure E-Governance extends there is a requirement for data security best practices (Hua, & Bapna, 2013). Security policies, practices, and techniques must be set up just as the use of security technology.…”
Section: Cyber Security In E-governance Case Studymentioning
confidence: 99%
“…Existing and potential dangers in the circle of cybersecurity are among the most genuine difficulties of the 21st century. To ensure E-Governance extends there is a requirement for data security best practices (Hua, & Bapna, 2013). Security policies, practices, and techniques must be set up just as the use of security technology.…”
Section: Cyber Security In E-governance Case Studymentioning
confidence: 99%
“…Consistent with the syntax view of information, which characterizes the vast majority of these papers (84%), these papers assume that systems can achieve a state of (dynamic) equilibrium with their environment. The premise style is mostly based on practical problems related to different areas of concern such as software development (Chiang & Mookerjee, 2004;Port & Bui, 2009), IT service pricing (Das, Du, Gopal, & Ramesh, 2010;Sen, Raghu, & Vinze, 2009), risk management (Hu, Shao, Hua, & Wong, 2012;Hua & Bapna, 2013;Kumar, Park, & Subramaniam, 2008), and dynamic resource allocation (Ba, Stallaert, & Zhang, 2010;Velu, Madnick, & Van Alstyne, 2013). The inference style is mostly based on the literature concerning equilibrium models (e.g., game theory, differential equations, etc.)…”
Section: Qualitative Analysis Of Stylized Factsmentioning
confidence: 99%
“…Therefore, cyberterrorism is not just the manipulation of data or software that causes a large number of people to lose considerable sums of money through the internet, unless such loss entails economic ruin and a consequent impact on the life or health of its victims. The destruction of data that generates the loss of relevant scientific or academic information is also not a case of cyberterrorism, unless it implies danger to the life or health of others, for example, if the formula of a medicine is changed through the internet to make it harmful or even lethal (Hua & Bapna, 2013). Meanwhile, the mere attack of web pages by a cyberterrorist group, for example, DoS (Denial of Services) or DDoS (Distributed Denial of Services) attacks against sites supposedly contrary to the values of Islam (Denning, 2011) or belonging to state agencies (Hardy & Williams, 2014) do not constitute cyberterrorism.…”
Section: Elementsmentioning
confidence: 99%
“…However, cyberterrorism constitutes a threat against which certain precautions must be taken, especially if it is considered that it can operate as a complement or suitable support for traditional terrorism (Denning, 2000). From this point of view, it is very likely that terrorism tends to combine attacks in the real world and attacks "in" or "through" the virtual world (Hua & Bapna, 2013).…”
Section: The Challenges That Cyberterrorism Createsmentioning
confidence: 99%
See 1 more Smart Citation