A greater understanding of cyberterrorism and its interpersonal implications is needed. In addition, strategies need to be developed to prevent and/or prepare for cyberterrorist attacks. As such, this analysis is unique and important in that it examines social network theory and current counter-terrorism practices as a method of understanding how to crack, prevent, and prepare for cyberterrorism strikes. Moreover, present counterterrorism tactics are examined in an attempt to apply them into the realm of counter-cyberterrorism. A discussion section is provided, which includes future directions for researchers interested in this area. © 2008 by The Haworth Press
This paper uses social network theory to compare the social network of the Jewish Revolt in 66-73 AD...
Crime has typically converged with aspects of warfare. This symbiotic relationship further complicat...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
A greater understanding of cyberterrorism and its interpersonal implications is needed. In addition,...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The potential utility of social network analysis (SNA) for understanding and combating criminal and ...
Terrorism poses a significant challenge to societies worldwide, employing various social strategies ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
Social networks can offer many services to the users for sharing activities events and their ideas. ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for ...
This article analyzes how law enforcement agencies, cyber security labs (i.e., in universities), and...
This paper uses social network theory to compare the social network of the Jewish Revolt in 66-73 AD...
Abstract: This paper deals with the categorical cyber terrorism threats on social media and preventi...
This paper uses social network theory to compare the social network of the Jewish Revolt in 66-73 AD...
Crime has typically converged with aspects of warfare. This symbiotic relationship further complicat...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
A greater understanding of cyberterrorism and its interpersonal implications is needed. In addition,...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The potential utility of social network analysis (SNA) for understanding and combating criminal and ...
Terrorism poses a significant challenge to societies worldwide, employing various social strategies ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
Social networks can offer many services to the users for sharing activities events and their ideas. ...
Prevention of near-term terrorist attacks requires an understanding of current terrorist organizatio...
Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for ...
This article analyzes how law enforcement agencies, cyber security labs (i.e., in universities), and...
This paper uses social network theory to compare the social network of the Jewish Revolt in 66-73 AD...
Abstract: This paper deals with the categorical cyber terrorism threats on social media and preventi...
This paper uses social network theory to compare the social network of the Jewish Revolt in 66-73 AD...
Crime has typically converged with aspects of warfare. This symbiotic relationship further complicat...
The range of counterterrorism tools available to states and other actors is both large and diverse. ...