This paper examines cyberterrorism and its potential to create a postmodern state of chaos. In general, chaos refers to a state of extreme confusion and disorder. This analysis breaks new ground in that it describes chaos theory as a foundation for better understanding cyberterrorism and explains how chaos theory and game theory are tightly coupled. The author also contrasts modern, conventional terrorism with postmodern, innovative cyberterrorism. The main idea is that the postmodern state of chaos caused by cyberterrorist attacks differs dramatically from the destruction caused by conventional terrorist acts. This comparison serves as the basis for making the point that cyberterrorism is not three-dimensional, it is not analog (but it is ...
This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterr...
Terrorism is one major problem that plagues our world today. The memories of the bombings in the Lon...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
This paper examines cyberterrorism and its potential to create a postmodern state of chaos. In gener...
This article exemplifies the very notion that cyberterrorist networks are postmodern types of networ...
This article analyzes how the battle between computer security experts and cyberterrorists can be ex...
The following paper examines concepts associated with cyberterrorism. Most of the current attention ...
The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and inf...
The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and inf...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
The convergence between the physical and digital world is growing exponentially as a result of ever ...
Improvements in cybernetics have made likely far reaching shifts in all areas of life. Thus, the sci...
Everyone is well aware that the technological revolution of the 21st century is considered to be the...
The past decades have witnessed two major phenomena, the intersection of which has presented a signi...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterr...
Terrorism is one major problem that plagues our world today. The memories of the bombings in the Lon...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...
This paper examines cyberterrorism and its potential to create a postmodern state of chaos. In gener...
This article exemplifies the very notion that cyberterrorist networks are postmodern types of networ...
This article analyzes how the battle between computer security experts and cyberterrorists can be ex...
The following paper examines concepts associated with cyberterrorism. Most of the current attention ...
The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and inf...
The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and inf...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
The convergence between the physical and digital world is growing exponentially as a result of ever ...
Improvements in cybernetics have made likely far reaching shifts in all areas of life. Thus, the sci...
Everyone is well aware that the technological revolution of the 21st century is considered to be the...
The past decades have witnessed two major phenomena, the intersection of which has presented a signi...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterr...
Terrorism is one major problem that plagues our world today. The memories of the bombings in the Lon...
© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assess...