This chapter focuses on understandings and debates around cyberterrorism as well as the effect particular representations of this phenomenon have upon assessing its threat. The chapter begins by introducing various understandings of cyberterrorism and differentiates between narrow and broad conceptions as well as effects and intent based definitions. Moving onto consider the threat of cyberterrorism the chapter identifies an ongoing debate between ‘concerned’ and ‘sceptical’ voices as well as those that contest whether cyberterrorism has ever taken place. The chapter then introduces a range of broadly constructivist studies which question the orthodox approach to cyberterrorism as an ontological reality and highlight the importance of med...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to caus...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
This chapter focuses on understandings and debates around cyberterrorism as well as the effect parti...
This chapter focuses on contemporary debates surrounding cyberterrorism. It begins with an overview ...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
This article explores original empirical findings from a research project investigating representati...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
This article explores constructions of cyberterrorism within the global news media between 2008 and ...
This article explores original empirical findings from a research project investigating representati...
This article explores original empirical findings from a research project investigating representati...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
Utilization of cyberspace is increasingly developing along with the advancement of information techn...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to caus...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
This chapter focuses on understandings and debates around cyberterrorism as well as the effect parti...
This chapter focuses on contemporary debates surrounding cyberterrorism. It begins with an overview ...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
This article explores original empirical findings from a research project investigating representati...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
This article explores constructions of cyberterrorism within the global news media between 2008 and ...
This article explores original empirical findings from a research project investigating representati...
This article explores original empirical findings from a research project investigating representati...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
Utilization of cyberspace is increasingly developing along with the advancement of information techn...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophisticati...
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to caus...
The range of counter-terrorism tools available to states and other actors is both large and diverse....