WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws

被引:5
|
作者
Hardy, Keiran [1 ]
机构
[1] Univ New S Wales, Fac Law, Gilbert Tobin Ctr Publ Law, Sydney, NSW, Australia
关键词
Cyber-attacks; Electronic systems; Infrastructure; Definitions of terrorism; Anti-terror legislation;
D O I
10.1016/j.clsr.2011.01.008
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article compares and contrasts the legislation that would be used to prosecute acts of cyber-terrorism in five western democracies: Australia, the United Kingdom, Canada, New Zealand and the United States. It argues that each of the four Commonwealth jurisdictions sets too low a threshold for prosecuting acts of cyber-terrorism against electronic and other infrastructure systems. By contrast, the United States has enacted more finely calibrated legislation that sets a much higher threshold for acts of cyber-terrorism deserving life imprisonment. (C) 2011 Keiran Hardy. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 50 条
  • [31] Framework for enhancing the operational resilience of cyber-manufacturing systems against cyber-attacks
    Espinoza-Zelaya, Carlos
    Moon, Young Bai
    MANUFACTURING LETTERS, 2023, 35 : 843 - 850
  • [32] Framework for enhancing the operational resilience of cyber-manufacturing systems against cyber-attacks
    Espinoza-Zelaya, Carlos
    Moon, Young Bai
    MANUFACTURING LETTERS, 2023, 35 : 843 - 850
  • [34] Resilience of multi-object density fusion against cyber-attacks
    Gao, Lin
    Battistelli, Giorgio
    Chisci, Luigi
    2022 11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (ICCAIS), 2022, : 7 - 12
  • [35] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks
    Zhang, Haili
    Li, Linlin
    Qiao, Liang
    2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [36] September 11, anti-terror laws and civil liberties: Britain, France and Germany compared
    Haubrich, D
    GOVERNMENT AND OPPOSITION, 2003, 38 (01) : 3 - 28
  • [37] Safety securing approach against cyber-attacks for process control system
    Hashimoto, Yoshihiro
    Toyoshima, Takeshi
    Yogo, Shuichi
    Koike, Masato
    Hamaguchi, Takashi
    Jing, Sun
    Koshijima, Ichiro
    COMPUTERS & CHEMICAL ENGINEERING, 2013, 57 : 181 - 186
  • [38] Resilient Design of Leader-Follower Consensus Against Cyber-Attacks
    Sadabadi, Mahdieh S.
    Atman, Made Widhi Surya
    Aynala, Anirudh
    Gusrialdi, Azwirman
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 1080 - 1092
  • [39] KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks
    Iwendi, Celestine
    Jalil, Zunera
    Javed, Abdul Rehman
    Reddy, Thippa G.
    Kaluri, Rajesh
    Srivastava, Gautam
    Jo, Ohyun
    IEEE ACCESS, 2020, 8 : 72650 - 72660
  • [40] Multivariable secure guidance for interceptors against cyber-attacks in guidance commands
    Wang, Yu
    Wang, Zhihui
    Wang, Chenliang
    Bai, Linling
    Qiao, Jianzhong
    Guo, Lei
    AEROSPACE SCIENCE AND TECHNOLOGY, 2023, 139