2016 Cybersecurity and Cyberforensics Conference (CCC) 2016
DOI: 10.1109/ccc.2016.20
|View full text |Cite
|
Sign up to set email alerts
|

Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Looking at terrorist use of the internet, despite their highly sophisticated use of the internet for recruitment, radicalisation, and propaganda [5], even the so-called Islamic State (IS) at their peak did not manage to engage in cyber-terrorism proper, see following for what that means. As Julian Droogan and Lise Waldek point out, "in the realms of academia, policy and the media [have] provided many foreboding and even doomsday warnings about the future of cyber-terrorism, which in the main have failed to come to realization" [16]. So-called IS used cyberspace to motivate and guide a range of terrorist acts [5], and as counter-terrorism actors stepped up their actionsincluding actions in cyberspace-to disrupt larger high profile terrorist activities around the world [7], so-called IS evolved their strategies [29][30][31] to encourage low technology small group acts of terrorism, using whatever technologies they had at hand-as a spokesperson for so-called IS stated in 2014, "If you are not able to find an IED or a bullet, then single out the disbelieving American, Frenchman, or any of their allies.…”
Section: Cyber Terrorism Has Not Taken Placementioning
confidence: 99%
“…Looking at terrorist use of the internet, despite their highly sophisticated use of the internet for recruitment, radicalisation, and propaganda [5], even the so-called Islamic State (IS) at their peak did not manage to engage in cyber-terrorism proper, see following for what that means. As Julian Droogan and Lise Waldek point out, "in the realms of academia, policy and the media [have] provided many foreboding and even doomsday warnings about the future of cyber-terrorism, which in the main have failed to come to realization" [16]. So-called IS used cyberspace to motivate and guide a range of terrorist acts [5], and as counter-terrorism actors stepped up their actionsincluding actions in cyberspace-to disrupt larger high profile terrorist activities around the world [7], so-called IS evolved their strategies [29][30][31] to encourage low technology small group acts of terrorism, using whatever technologies they had at hand-as a spokesperson for so-called IS stated in 2014, "If you are not able to find an IED or a bullet, then single out the disbelieving American, Frenchman, or any of their allies.…”
Section: Cyber Terrorism Has Not Taken Placementioning
confidence: 99%