Cyber-terrorism in context

被引:5
|
作者
Hinde, S [1 ]
机构
[1] BUPA Grp, London, England
关键词
D O I
10.1016/S0167-4048(03)00303-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-terrorism has been much discussed in the media, especially at times of heightened international tension. The Institute for Security Technology Studies has tracked previous attacks and, using conflicts such as the Israel-Palestine and India-Pakistan as examples, shows there is a strong correlation between political and military conflicts and the incidence of cyber-terrorism. Research group IDC has recently predicted that in the next year we can expect to experience a cyber-terrorist attack as a result of a war on Iraq, resulting in short term economic disruptions.
引用
收藏
页码:188 / 192
页数:5
相关论文
共 50 条
  • [21] Cybersecurity and cyber-terrorism challenges to energy-related infrastructures - Cybersecurity frameworks and economics - Comprehensive review
    Venkatachary, Sampath Kumar
    Prasad, Jagdish
    Alagappan, Annamalai
    Andrews, Leo John Baptist
    Raj, Raymon Antony
    Duraisamy, Sarathkumar
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 45
  • [22] Cyber-terrorism weapons: A laptop, phone and guile: Hacker insurance is a $100-million-a-year business
    [J]. 2003, McGraw-Hill Companies, 1221 Avenue of the Americas, New York, NY 10020, United States (250):
  • [23] Crossing the Rubicon: Understanding Cyber Terrorism in the European Context
    Archer, Emerald M.
    [J]. EUROPEAN LEGACY-TOWARD NEW PARADIGMS, 2014, 19 (05): : 606 - 621
  • [24] THE LEGAL BASIS OF COUNTERING CYBER-TERRORISM IN RUSSIA AND IN OTHER COUNTRIES FROM THE STANDPOINT OF ITS SOCIAL AND POLITICAL DIMENSION
    Kuleshova, Galina P.
    Kapitonova, Elena A.
    Romanovsky, Georgy B.
    [J]. RUSSIAN JOURNAL OF CRIMINOLOGY, 2020, 14 (01): : 156 - 165
  • [25] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [26] Cybercrime and cyber terrorism
    Nisbet, C
    [J]. SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 31 - 37
  • [27] Cyber Terrorism: Electronic Jihad
    Heickero, Roland
    [J]. STRATEGIC ANALYSIS, 2014, 38 (04) : 554 - 565
  • [28] A rational jurisdiction for cyber terrorism
    Tehrani, Pardis Moslemzadeh
    Manap, Nazura Abdul
    [J]. COMPUTER LAW & SECURITY REVIEW, 2013, 29 (06) : 689 - 701
  • [29] Internet forensics and cyber terrorism
    Antolis, Krunoslav
    [J]. POLICIJA I SIGURNOST-POLICE AND SECURITY, 2010, 19 (01): : 121 - 128
  • [30] Cyber-Fatwas and Terrorism
    Weimann, Gabriel
    [J]. STUDIES IN CONFLICT & TERRORISM, 2011, 34 (10) : 765 - 781