2013
DOI: 10.1016/j.clsr.2013.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…The findings show that blockchain can transform digital transactions by: (a) reducing transaction overhead cost; (b) providing secure and speedy (2Ss) transactions; and (c) providing security, privacy, transparency, trust and traceability (3Ts) in the digital transactions. The literature indicates that in today's digital world, security is greatly needed (Shackelford 2016;Tehrani, Manap, and Taji 2013). Our analysis shows that users feel that blockchain may provide security to digital transactions.…”
Section: Resultsmentioning
confidence: 89%
See 1 more Smart Citation
“…The findings show that blockchain can transform digital transactions by: (a) reducing transaction overhead cost; (b) providing secure and speedy (2Ss) transactions; and (c) providing security, privacy, transparency, trust and traceability (3Ts) in the digital transactions. The literature indicates that in today's digital world, security is greatly needed (Shackelford 2016;Tehrani, Manap, and Taji 2013). Our analysis shows that users feel that blockchain may provide security to digital transactions.…”
Section: Resultsmentioning
confidence: 89%
“…The informational characteristics are more frequently discussed and shared compared to technological characteristics, but the influence of the technological characteristics is greater compared to the informational characteristics ( Figure 6). This may be due to the higher need for cybersecurity (Shackelford 2016;Tehrani, Manap, and Taji 2013) for digital transactions which can be provided by the immutability of the records (Huckle and White 2016;Nordrum 2017;Lu and Xu 2017;Tai, Sun, and Guo 2016).…”
Section: Rq1mentioning
confidence: 99%
“…attack to disable the supervisory control and data acquisition (SCADA) systems (i.e., systems that control the operation of machinery) of power plants or in other electrical grid components should be treated as a plausible scenario given that it could be perpetrated not only by nation states but also cyber terrorist groups. Attacks by cyber terrorist groups are very difficult to deter because retaliation is hampered by a lack of international treaties and enforcement mechanisms against such groups (Tehrani et al, 2013). Importantly, such attacks need not necessarily be limited to a given country or region as SCADA systems are increasingly interconnected through proprietary networks (Korkali et al, 2017) and sometimes even reachable via the Internet (Pliatsios et al, 2020).…”
Section: Coordinated Cyberattacksmentioning
confidence: 99%
“…One country’s definition of cyberterrorism may differ from another’s definition of resistance or war. Based on geopolitical factors, historical conflicts, and ideological differences, different contexts are understood differently by cyberterrorism ( Tehrani, Manap & Taji, 2013 ). For instance, in the ongoing conflict in Ukraine, a cyberterrorist aiming for the United States might be viewed as a soldier defending their interests in Russia.…”
Section: Introductionmentioning
confidence: 99%