2002
DOI: 10.1016/s0167-4048(02)01116-1
|View full text |Cite
|
Sign up to set email alerts
|

Cyberterrorism?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
26
0
2

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(28 citation statements)
references
References 3 publications
0
26
0
2
Order By: Relevance
“…76 The International Red Cross/ Red Crescent released a study that includes a chapter on how to manage sensitive data online. 77 The paper warns aid workers of the potential consequences of posting sensitive information (e.g., pictures of people in crisis areas, Tweets disclosing locations of refugees, etc.) lest they are used to harm at-risk groups.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…76 The International Red Cross/ Red Crescent released a study that includes a chapter on how to manage sensitive data online. 77 The paper warns aid workers of the potential consequences of posting sensitive information (e.g., pictures of people in crisis areas, Tweets disclosing locations of refugees, etc.) lest they are used to harm at-risk groups.…”
Section: Discussionmentioning
confidence: 99%
“…in order to complete his mission, whatever that may be." 77 In removing the computer-as-target condition of cyberterrorism from their definitions, these authors equate terrorists' use of information technology with cyberterrorism. 78 Terrorists use information technology for all sorts of reasons-some of them directly related to their attacks, some not.…”
Section: Concept Stretchingmentioning
confidence: 99%
See 2 more Smart Citations
“…The term 'cyberterrorism' was first coined by Barry Collin in the 1980s (Brickey 2012), and has become a 'buzzword' not just in terrorism studies and cyber-security circles, but also -recognising cyberterror's prowess for eye-catching copy -within the media (Weimann 2005, 131;Gordon and Ford 2002;Jones 2005, 7). This media-friendly characteristic has perhaps encouraged a propensity to conflate cyberterrorism with hacking and cyberattacks more broadly (Taliharm 2010, 62-63), which has applied weight to the need for common conceptual understanding.…”
Section: Introductionmentioning
confidence: 99%