Should we be afraid of cyber-terrorism?

被引:1
作者
Droogan, Julian [1 ]
Waldek, Lise [1 ]
机构
[1] Macquarie Univ, Dept Secur Studies & Criminol, N Ryde, NSW, Australia
关键词
cyber-terrorism; online radicalisation; audience reception theory;
D O I
10.1504/IJESDF.2018.10013064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article explores the extent to which we should fear cyber-terrorism through providing a review of scholarship and debates over the nature of cyber-terrorism, in particular speculation about its future affordances. It questions whether terrorists have ever really been able to weaponise the internet much beyond using it as an effective communication tool, thus greatly reducing the likelihood of direct internet facilitated terrorism. First, the history of warnings regarding the imminent threat posed by the internet of becoming weaponised is presented, even though these warnings have tended to fail to materialise into reality. It is argued that speculations by individuals within the academic and policy community have failed to be born out in practice largely because the internet has instead been used less as a weapon by terrorists and more as a sophisticated communication tool. It continues by posing a series of questions regarding online audiences that are in need of future research if we are to better understand the role of the internet in spreading and supporting violent extremist discourse and cultivating terrorism. The most important question involves a better understanding of the role of audiences as autonomous agents in navigating, reacting and responding to online violent extremist materials.
引用
收藏
页码:242 / 254
页数:13
相关论文
共 48 条
[41]   Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies [J].
Al Mazari, Ali ;
Anjariny, Ahmed H. ;
Habib, Shakeel A. ;
Nyakwende, Emmanuel .
INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2016, 6 (01) :1-12
[42]   Exploring the role of encryption and the dark web in cyber terrorism: legal challenges and countermeasures in India [J].
Sayyed, Hifajatali ;
Paul, Sanu Rani .
COGENT SOCIAL SCIENCES, 2025, 11 (01)
[43]   Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo [J].
Matusitz, Jonathan .
INFORMATION SECURITY JOURNAL, 2011, 20 (01) :34-44
[44]   US Foreign Policy Challenges of Non-State Actors' Cyber Terrorism against Critical Infrastructure [J].
Tereshchenko, Natalia .
INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (04) :28-48
[45]   Cyber terrorism and Indian legal regime: a critical appraisal of Section 66 (F) of the Information Technology Act [J].
Singh, Vijay P. .
SRI LANKA JOURNAL OF SOCIAL SCIENCES, 2021, 44 (01) :71-81
[46]   Understanding the Vulnerabilities of Critical Energy Infrastructure to Cyber Terrorism and Threats: How to Secure Our Energy Systems [J].
Gucuyener, Ayhan .
STRATEGIC CYBER DEFENSE: A MULTIDISCIPLINARY PERSPECTIVE, 2017, 48 :74-85
[48]   Identifying Terrorists in Cyber Space: Evaluating the Potential Role of Emerging Radical Technologies and Technology Disruption in Terrorism Foresight [J].
Kaivo-Oja, Jari .
IDENTIFICATION OF POTENTIAL TERRORISTS AND ADVERSARY PLANNING: EMERGING TECHNOLOGIES AND NEW COUNTER-TERROR STRATEGIES, 2017, 132 :137-153