Purpose: This paper aims to determine the potential predictors of anxiety about digital security, terrorist threats and support for high-tech counter measures. Design/methodology/approach: In Study 1, 195 participants indicated their anxiety about digital security systems, data protection and social networking sites. In Study 2, 107 participants indicated their anxiety about domestic terrorism, international terrorism and extremist groups. In Study 3, 261 participants indicated their support for high-tech counter terrorism measures. Findings: Study 1 suggests that whereas anxiety about digital security systems, data protection and social networking sites were positively predicted by right-wing authoritarianism, anxiety about social networ...
The purpose of this paper is to offer a critical assessment of the way in which the internet and onl...
Since the late 1990’s, the Internet has become a technology that is used daily in our lives, and it ...
This article reports on a recent research project exploring academic perspectives on the threat pose...
Purpose: This paper aims to determine the potential predictors of anxiety about digital security, te...
PurposeThe purpose of this paper is to determine the potential predictors of anxiety about digital s...
Today, terrorism is one of the most significant security risks. The spread of infocommunication tech...
Fear is one of the negative outcomes of terrorist attacks. Currently, there is a need to understand ...
Cyberspace has expanded the arena within which extremists and terrorists operate, posing a range of ...
In an era of digital technology and the Internet, terrorists can communicate their threats directly ...
This article identifies aspects of the Internet that can facilitate terrorist operation
This article analyses the evolution and interplay of national policies and international diplomacy o...
Public interest and policy debates surrounding the role of the Internet in terrorist activities is i...
This paper investigates whether the counter-terrorism measures developed and implemented within the ...
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, ...
The United States is experiencing a growing threat from domestic terrorism, though there is a relati...
The purpose of this paper is to offer a critical assessment of the way in which the internet and onl...
Since the late 1990’s, the Internet has become a technology that is used daily in our lives, and it ...
This article reports on a recent research project exploring academic perspectives on the threat pose...
Purpose: This paper aims to determine the potential predictors of anxiety about digital security, te...
PurposeThe purpose of this paper is to determine the potential predictors of anxiety about digital s...
Today, terrorism is one of the most significant security risks. The spread of infocommunication tech...
Fear is one of the negative outcomes of terrorist attacks. Currently, there is a need to understand ...
Cyberspace has expanded the arena within which extremists and terrorists operate, posing a range of ...
In an era of digital technology and the Internet, terrorists can communicate their threats directly ...
This article identifies aspects of the Internet that can facilitate terrorist operation
This article analyses the evolution and interplay of national policies and international diplomacy o...
Public interest and policy debates surrounding the role of the Internet in terrorist activities is i...
This paper investigates whether the counter-terrorism measures developed and implemented within the ...
Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, ...
The United States is experiencing a growing threat from domestic terrorism, though there is a relati...
The purpose of this paper is to offer a critical assessment of the way in which the internet and onl...
Since the late 1990’s, the Internet has become a technology that is used daily in our lives, and it ...
This article reports on a recent research project exploring academic perspectives on the threat pose...