Abstract—Many nations all over the world have increased their dependency on cyberspace by maximizing the use of Information and Communication Technology (ICT). In this digital age, the concept of cyber terrorism or the use of cyberspace to carry out terrorist activities has emerged. Interestingly, there are many concepts of cyber terrorism provided by researchers, policy makers and individuals. This paper proposes a framework describing the core components of cyber terrorism. The authors have analyzed the data by using a grounded theory approach, in which the framework is drawn. The framework defines cyber terrorism from six perspectives: Target, motivation, method of attack, domain, action by perpetrator, and impact. In addition, the propo...
The convergence between the physical and digital world is growing exponentially as a result of ever ...
The flourishing synergy arising between organized crimes and the Internet has increased the insecuri...
Uneasiness arises from the possibility of random cyber attacks. In the global information and networ...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
In the recent years of advanced cyber attacks over the critical information infrastructure (CII) wit...
This paper examines some of the most widely researched trends and developments within the phenomenon...
Cyber terrorism is a term which represents an act of terrorising using cyberspace as a medium. Thi...
The advancement of information technology is changing the pattern of radical group propaganda from c...
—Cyber terrorism is a term which represents an act of terrorising using cyberspace as a medium. Th...
In order to police a crime there must be an act that is considered a crime and punishable under the ...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
Attacks on computer systems for both criminal and political purposes are on the rise in both the Uni...
Although it seems to be a global phenomenon, the internet is a part of human society for relatively ...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The convergence between the physical and digital world is growing exponentially as a result of ever ...
The flourishing synergy arising between organized crimes and the Internet has increased the insecuri...
Uneasiness arises from the possibility of random cyber attacks. In the global information and networ...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
In the recent years of advanced cyber attacks over the critical information infrastructure (CII) wit...
This paper examines some of the most widely researched trends and developments within the phenomenon...
Cyber terrorism is a term which represents an act of terrorising using cyberspace as a medium. Thi...
The advancement of information technology is changing the pattern of radical group propaganda from c...
—Cyber terrorism is a term which represents an act of terrorising using cyberspace as a medium. Th...
In order to police a crime there must be an act that is considered a crime and punishable under the ...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
Attacks on computer systems for both criminal and political purposes are on the rise in both the Uni...
Although it seems to be a global phenomenon, the internet is a part of human society for relatively ...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The convergence between the physical and digital world is growing exponentially as a result of ever ...
The flourishing synergy arising between organized crimes and the Internet has increased the insecuri...
Uneasiness arises from the possibility of random cyber attacks. In the global information and networ...