This article reports on a survey of researchers designed to capture current perspectives on core questions around cyberterrorism. The survey—conducted in 2017 as a follow-on to an initial, 2012, exercise—focused on questions of definition, threat and response. By documenting our findings in each of these areas—and highlighting developments in the years between our surveys—we identify three particularly important trends. First, an increasing convergence around the core characteristics of cyberterrorism, albeit with continuing conceptual disagreements at the concept’s penumbra. Second, increasing researcher concern with the threat posed by cyberterrorism, underpinned by a widespread view that this threat has increased, and a growing feeling t...
This report provides an overview of findings from a research project exploring how mainstream media ...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
This article reports on a survey of researchers designed to capture current perspectives on core que...
This article reports on a recent research project exploring academic perspectives on the threat pose...
This article reports on a recent survey designed to capture understandings of cyberterrorism across ...
In 2012 members of the Cyberterrorism Project conducted a survey of researchers on cyberterrorism. A...
This article reports on findings from a survey on the concept of cyberterrorism from researchers wor...
This report provides an overview of findings from a project designed to capture current understandin...
This article explores original empirical findings from a research project investigating representati...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
This article examines the way in which the English language international news media has constructed...
This study researches the varying threats that emanate from terrorists who carry their activity into...
This article explores constructions of cyberterrorism within the global news media between 2008 and ...
A successful large-scale cyberterrorism attack has never been conducted against the United States, y...
This report provides an overview of findings from a research project exploring how mainstream media ...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...
This article reports on a survey of researchers designed to capture current perspectives on core que...
This article reports on a recent research project exploring academic perspectives on the threat pose...
This article reports on a recent survey designed to capture understandings of cyberterrorism across ...
In 2012 members of the Cyberterrorism Project conducted a survey of researchers on cyberterrorism. A...
This article reports on findings from a survey on the concept of cyberterrorism from researchers wor...
This report provides an overview of findings from a project designed to capture current understandin...
This article explores original empirical findings from a research project investigating representati...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
This article examines the way in which the English language international news media has constructed...
This study researches the varying threats that emanate from terrorists who carry their activity into...
This article explores constructions of cyberterrorism within the global news media between 2008 and ...
A successful large-scale cyberterrorism attack has never been conducted against the United States, y...
This report provides an overview of findings from a research project exploring how mainstream media ...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
Moderate and measured takes on cyber security threats are swamped by the recent flood of research an...