Query Result Set
Skip Navigation Links
   ActiveUsers:1119Hits:18666731Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBERTERRORISM (19) answer(s).
 
SrlItem
1
ID:   123884


An SDI for cyberspace? / Alexander, David   Journal Article
Alexander, david Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract In this article, the author discusses strategic defense initiative for cyberspace citing reference to an address delivered by U.S. President Barack Obama who warned people of consequences of cyber-attacks. Also discussed is an announcement made by the cyber security company Mandiant Corp. accusing China of a sponsored campaigns of cyber-espionage.
        Export Export
2
ID:   137896


Asia in 2014: a pretty good year / Dittmer, Lowell   Article
Dittmer, Lowell Article
0 Rating(s) & 0 Review(s)
Summary/Abstract THOUGH SOME MAY HAVE APPROACHED the centenary of the outbreak of World War One with a certain superstitious foreboding, 2014 in Asia was a pretty good year. As Xi Jinping put it in his May 21 address to the CICA (Conference on Interaction and Confidence Building Measures in Asia), ‘‘Asia today, though facing more risks and challenges, is still the most dynamic and promising region in the world.’’1 Economically, Asia remains the fastest growing region, averaging an estimated 6.1% GDP growth for the year, and the forecasting consensus predicts an even better next year. This is an impressive performance in the wake of the global 2009–13 slowdown and particularly the recent cooling of the Chinese locomotive. Politically, the headline for the year is democratic resilience, with relatively honest elections in Afghanistan, India, Bangladesh, Indonesia, and (jumping a few days into 2015) Sri Lanka. As for international security, on the other hand, it was a year of rising tensions: violent terrorist attacks in Afghanistan, Pakistan, Burma/Myanmar, India’s Assam, China’s Xinjiang; continuing confrontations over maritime boundaries in the South and East China Seas; and renewed fighting between India and Pakistan over Kashmir.
Key Words SAARC  Economics  GDP  ASian Security  China  India 
Bangladesh  Cambodia  Cyberterrorism  BJP  Political  Asia 2014 
Good Year  Pakistan - 1967-1977  BRICS 
        Export Export
3
ID:   069465


Cyber terrorism: political and economic implications / Colarik, Andrew M 2006  Book
Colarik, Andrew M Book
0 Rating(s) & 0 Review(s)
Publication Hershey, Idea publishing, 2006.
Description xvii, 172p.
Standard Number 1599040212
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
051124363.325/COL 051124MainOn ShelfGeneral 
4
ID:   075274


Cyberterrorism: a tool of asymmetric warfare / Lakhanpal, Vikrant   Journal Article
Lakhanpal, Vikrant Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
        Export Export
5
ID:   060660


Cyberterrorism: the sum of all fears? / Weimann, Gabriel Mar-Apr 2005  Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc, and paralyzing nations. This is a frightening scenario, but how likely is it to occur? Could terrorists cripple critical military, financial, and service computer systems? This article charts the rise of cyberangst and examines the evidence cited by those who predict imminent catastrophe. Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term “cyberterrorism.” The fear of random, violent victimization segues well with the distrust and outright fear of computer technology. Many of these fears, the report contends, are exaggerated: not a single case of cyberterrorism has yet been recorded, hackers are regularly mistaken for terrorists, and cyberdefenses are more robust than is commonly supposed. Even so, the potential threat is undeniable and seems likely to increase, making it all the more important to address the danger without inflating or manipulating it.
Key Words Terrorism  Cyberterrorism 
        Export Export
6
ID:   132231


Cyberterrorism threat: findings from a survey of researchers / Jarvis, Lee; Macdonald, Stuart; Nouri, Lella   Journal Article
Jarvis, Lee Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.
        Export Export
7
ID:   188761


Cyberterrorism Today? Findings From a Follow-on Survey of Researchers / Macdonald, Stuart; Jarvis, Lee; Lavis, Simon M   Journal Article
Jarvis, Lee Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article reports on a survey of researchers designed to capture current perspectives on core questions around cyberterrorism. The survey—conducted in 2017 as a follow-on to an initial, 2012, exercise—focused on questions of definition, threat and response. By documenting our findings in each of these areas—and highlighting developments in the years between our surveys—we identify three particularly important trends. First, an increasing convergence around the core characteristics of cyberterrorism, albeit with continuing conceptual disagreements at the concept’s penumbra. Second, increasing researcher concern with the threat posed by cyberterrorism, underpinned by a widespread view that this threat has increased, and a growing feeling that cyberterrorist attacks have now taken place. Third, support for a diversity of counter-measures to this threat, although perhaps counter-intuitively little suggestion that resort to exceptional or draconian measures is needed. In order to inform future research, the article concludes by detailing some of the major limitations, gaps and weaknesses within academic research to date as identified by our respondents.
Key Words Cyberterrorism 
        Export Export
8
ID:   178932


Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups / Holt, Thomas J; Stonhouse, Mattisen; Freilich, Joshua; Chermak, Steven M   Journal Article
Chermak, Steven M Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Over the last two decades, there has been a massive increase in research examining terror and extremist-related violence. Few have considered the extent to which these same groups may engage in attacks against digital infrastructure and the Internet, whether through hacking or other methods. The absence of empirical evidence calls to question the nature and dynamics of cyberattacks performed by extremists and ideologically motivated actors. This study attempted to address this gap in the literature through a qualitative investigation of 26 attacks performed by far-left groups against targets in the UK, US, and Canada from 2000 to 2015. This data was compared to physical attacks documented in the Extremist Crime Database during the same period. The findings demonstrated that there was an increase in cyberattacks during a period of decreased physical violence by far-left groups. Additionally, there was some parity in the targets of far-left groups on- and off-line, with similar motivations to cause harm to or embarrass businesses, government organizations, and individuals. The implications of this study for our understanding of terror and future research were discussed in detail.
Key Words Cyberterrorism  Hacking  Ecoterrorism  Cybercrime  Terror  Far Left 
        Export Export
9
ID:   115540


International relations and security in digital age / Eriksson , Johan (ed.); Giacomello , Giampiero (ed.) 2007  Book
Eriksson , Johan (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Oxon, Routledge, 2007.
Description xx,230p.
Standard Number 0415401852
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056876327.10254678/ERI 056876MainOn ShelfGeneral 
10
ID:   077651


International relations and security in the digital age / Eriksson, Johan (ed); Giacomello, Giampiero (ed) 2007  Book
Eriksson, Johan Book
0 Rating(s) & 0 Review(s)
Publication London, Routledge, 2007.
Description xx, 230p.
Series Routledge advances in international relations and global politics
Standard Number 9780415401852
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
052350327.102854678/ERI 052350MainOn ShelfGeneral 
11
ID:   094831


Internet in Indonesia: development and impact of radical websites / Hui, Jennifer Yang   Journal Article
Hui, Jennifer Yang Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract The Internet has become a crucial part of modern society's life due to its ability to facilitate communication and structure contemporary society. Indonesia has not been left out of this global phenomenon. The Internet came to Indonesia in 1983 and its usage has continued to expand ever since, especially within institutions of learning and in the government sector. The study of radical websites must be situated within the development of the Internet in Indonesia in general instead of being examined by itself. The impact of certain activities such as cyberterrorism must then be examined in perspective, given the vast expanse of Indonesia as an archipelago and the resulting difficulties in linking the entire country to the Internet. This article seeks to trace the development of the Internet in Indonesia and examine the resulting impact on the reach of the radical Bahasa Indonesia Islamic websites in the Indonesian Archipelago and beyond. It also highlights typical narrative and operations of the radical websites, which serves to distinguish them from radical websites from elsewhere, such as the Middle East.
Key Words Indonesia  Internet  Cyberterrorism  Modern Society  Islamic Websites 
        Export Export
12
ID:   151976


Law of armed conflict: an introduction / Jha, U C; Ratnabali, K 2017  Book
Jha, U C Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Vij Books India Pvt Ltd, 2017.
Description xvi, 602p.hbk
Standard Number 9789385563904
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058988341.6/JHA 058988MainOn ShelfGeneral 
13
ID:   068054


Managerial guide for handling cyber-terrorism and information warfare / Janczewski, Lech J; Colarik, Andrew M 2005  Book
Janczewski, Lech J Book
0 Rating(s) & 0 Review(s)
Publication Hershey, Idea Group Publishing, 2005.
Description xiv, 229p.Hbk
Standard Number 1591405831
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
050939658.478/JAN 050939MainOn ShelfGeneral 
14
ID:   069315


Networks and netwars: the future of terror, crime and militancy / Arquilla, John (ed.); Ronfeldt, David (ed.) 2001  Book
Arquilla, John Book
0 Rating(s) & 0 Review(s)
Publication Santa Monica, Rand Corporation, 2001.
Description xiv, 374p.
Standard Number 0833030302
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
045231303.625/ARQ 045231MainOn ShelfGeneral 
15
ID:   081922


Power and security in the information age: investigating the role of the state in cyberspcae / Cavelty, Myriam Dunn (ed); Mauer, Victor (ed); Krishna-Hensel, Sai Felicia (ed) 2007  Book
Cavelty, Myriam Dunn Book
0 Rating(s) & 0 Review(s)
Publication Hampshire, Ashgate Publishing Limited, 2007.
Description xiv, 165p.
Standard Number 9780754670889
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
053558005.8/CAV 053558MainOn ShelfGeneral 
16
ID:   123094


Tallinn Manual on the International Law Applicable to Cyber Warfare: Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence / Schmitt, Michael N (ed.) 2013  Book
Schmitt, Michael N (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Cambridge, Cambridge University Press, 2013.
Description xix, 282p.Pbk
Standard Number 9781107613775
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057413341.63/SCH 057413MainOn ShelfGeneral 
17
ID:   151571


Unpacking cyberterrorism discourse: specificity, status, and scale in news media constructions of threat / Jarvis, Lee ; Whiting, Andrew ; Macdonald, Stuart   Journal Article
Jarvis, Lee Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article explores original empirical findings from a research project investigating representations of cyberterrorism in the international news media. Drawing on a sample of 535 items published by 31 outlets between 2008 and 2013, it focuses on four questions. First, how individuated a presence is cyberterrorism given within news media coverage? Second, how significant a threat is cyberterrorism deemed to pose? Third, how is the identity of ‘cyberterrorists’ portrayed? And, fourth, who or what is identified as the referent – that which is threatened – within this coverage? The article argues that constructions of specificity, status, and scale play an important, yet hitherto under-explored, role within articulations of concern about the threat posed by cyberterrorism. Moreover, unpacking news coverage of cyberterrorism in this way leads to a more variegated picture than that of the vague and hyperbolic media discourse often identified by critics. The article concludes by pointing to several promising future research agendas to build on this work.
Key Words Media  Cyberterrorism  Threat  Discourse  Construction 
        Export Export
18
ID:   023125


What is Cyberterrorism? / Conway Maura Dec 2002  Article
Conway Maura Article
0 Rating(s) & 0 Review(s)
Publication Dec 2002.
Description 436-442
Key Words Terrorism  Cyberterrorism 
        Export Export
19
ID:   140866


What is cyberterrorism? findings from a survey of researchers / Jarvis, Lee; Macdonald, Stuart   Article
Jarvis, Lee Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article reports on a recent survey designed to capture understandings of cyberterrorism across the global research community. Specifically, it explores competing views, and the importance thereof, amongst 118 respondents on three definitional issues: (a) the need for a specific definition of cyberterrorism for either policymakers or researchers; (b) the core characteristics or constituent parts of this concept; and (c) the value of applying the term “cyberterrorism” to a range of actual or potential scenarios. The article concludes by arguing that while a majority of researchers believe a specific definition of cyberterrorism is necessary for academics and policymakers, disagreement around what this might look like has additional potential to stimulate a rethinking of terrorism more widely.
        Export Export