This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoi...
Introduction Violence conducted in cyberspace presents important challenges for academic disciplines...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
This article reports on a recent survey designed to capture understandings of cyberterrorism across ...
This article reports on a recent research project exploring academic perspectives on the threat pose...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
This article explores the definition of the term “cyberterrorism” in light of available literature a...
This article reports on a survey of researchers designed to capture current perspectives on core que...
This article reports on a survey of researchers designed to capture current perspectives on core que...
This article explores original empirical findings from a research project investigating representati...
A 1999 study prepared for the Defense Intelligence Agency and produced at the Naval Postgraduate Sch...
This article examines the way in which the English language international news media has constructed...
This report provides an overview of findings from a project designed to capture current understandin...
In 2012 members of the Cyberterrorism Project conducted a survey of researchers on cyberterrorism. A...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
Introduction Violence conducted in cyberspace presents important challenges for academic disciplines...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The range of counterterrorism tools available to states and other actors is both large and diverse. ...
This article reports on a recent survey designed to capture understandings of cyberterrorism across ...
This article reports on a recent research project exploring academic perspectives on the threat pose...
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks ...
This article explores the definition of the term “cyberterrorism” in light of available literature a...
This article reports on a survey of researchers designed to capture current perspectives on core que...
This article reports on a survey of researchers designed to capture current perspectives on core que...
This article explores original empirical findings from a research project investigating representati...
A 1999 study prepared for the Defense Intelligence Agency and produced at the Naval Postgraduate Sch...
This article examines the way in which the English language international news media has constructed...
This report provides an overview of findings from a project designed to capture current understandin...
In 2012 members of the Cyberterrorism Project conducted a survey of researchers on cyberterrorism. A...
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The artic...
Introduction Violence conducted in cyberspace presents important challenges for academic disciplines...
The range of counter-terrorism tools available to states and other actors is both large and diverse....
The range of counterterrorism tools available to states and other actors is both large and diverse. ...