Should we be afraid of cyber-terrorism?

被引:1
作者
Droogan, Julian [1 ]
Waldek, Lise [1 ]
机构
[1] Macquarie Univ, Dept Secur Studies & Criminol, N Ryde, NSW, Australia
关键词
cyber-terrorism; online radicalisation; audience reception theory;
D O I
10.1504/IJESDF.2018.10013064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article explores the extent to which we should fear cyber-terrorism through providing a review of scholarship and debates over the nature of cyber-terrorism, in particular speculation about its future affordances. It questions whether terrorists have ever really been able to weaponise the internet much beyond using it as an effective communication tool, thus greatly reducing the likelihood of direct internet facilitated terrorism. First, the history of warnings regarding the imminent threat posed by the internet of becoming weaponised is presented, even though these warnings have tended to fail to materialise into reality. It is argued that speculations by individuals within the academic and policy community have failed to be born out in practice largely because the internet has instead been used less as a weapon by terrorists and more as a sophisticated communication tool. It continues by posing a series of questions regarding online audiences that are in need of future research if we are to better understand the role of the internet in spreading and supporting violent extremist discourse and cultivating terrorism. The most important question involves a better understanding of the role of audiences as autonomous agents in navigating, reacting and responding to online violent extremist materials.
引用
收藏
页码:242 / 254
页数:13
相关论文
共 48 条
[21]   Steganalysis - a Way Forward Against Cyber Terrorism [J].
Bogdanoski, Mitko ;
Risteski, Aleksandar ;
Pejoski, Slavche .
2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, :681-684
[22]   Cyber Terrorism and Effective Counteraction to it in Modern Conditions [J].
Minakova, Irina V. ;
Bukreeva, Tatyana N. ;
Popova, Anastasia V. ;
Baroyan, Anna A. .
EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, :9103-9108
[23]   Fighting Cyber Terrorism: comparison of Turkey and Russia [J].
Bicak, Melih Burak ;
Bogdanova, Dana .
2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT), 2018, :98-101
[24]   A Layered Network Collapse Method in Cyber Terrorism [J].
Alhajjar, Elie ;
Morse, Steve .
PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, :18-22
[25]   A Comprehensive Review of Cyber Terrorism in the Current Scenario [J].
Vats, Prashant .
2016 2ND IEEE INTERNATIONAL INNOVATIVE APPLICATIONS OF COMPUTATIONAL INTELLIGENCE ON POWER, ENERGY AND CONTROLS WITH THEIR IMPACT ON HUMANITY (CIPECH), 2016, :277-281
[26]   Cyber terrorism cases and stock market valuation effects [J].
Smith, Katherine Taken ;
Smith, Lawrence Murphy ;
Burger, Marcus ;
Boyle, Erik S. .
INFORMATION AND COMPUTER SECURITY, 2023, 31 (04) :385-403
[27]   CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS [J].
Prislan, Kaja ;
Bernik, Igor .
POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS, 2011, :175-+
[28]   Assessing the Risks of Cyber Terrorism in Central Asian countries [J].
Zholdoshbaev, Ruslan .
COUNTERING TERRORIST RECRUITMENT IN THE CONTEXT OF ARMED COUNTER-TERRORISM OPERATIONS, 2016, 125 :102-106
[29]   A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia [J].
Yunos, Zahri ;
Ahmad, Rabiah ;
Sabri, Nor Amalina Mohd .
INFORMATION SECURITY JOURNAL, 2015, 24 (1-3) :15-23
[30]   Cyber Terrorism Taxonomies: Definition, Targets, Patterns and Mitigation Strategies [J].
Al Mazari, Ali ;
Anjariny, Ahmed ;
Habib, Shakeel ;
Nyakwende, Emmanuel .
PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, :11-18