Search results

1 – 10 of 63
Article
Publication date: 1 April 2004

C. Bryan Foltz

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat…

7023

Abstract

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat limited. Government officials and experts are often heard claiming that the world is unprepared for cyberterrorism; however, other officials and experts state that cyberterrorism does not pose a threat to anyone. Examines the reasons for these disparate viewpoints and reviews the theoretical and actual forms in which cyberterrorism may occur. Further, proposes the use (and refocusing) of an existing model of computer security to help understand and defend against cyberterrorism.

Details

Information Management & Computer Security, vol. 12 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 9 November 2015

Abdulrahman Alqahtani

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…

1142

Abstract

Purpose

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data.

Design/methodology/approach

This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Findings

The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey).

Originality/value

It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 October 2017

Argha Ray and Anjali Kaushik

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These…

Abstract

Purpose

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression.

Design/methodology/approach

The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated.

Findings

This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue.

Originality/value

This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Article
Publication date: 1 September 2000

Danielle Mihram and G. Arthur Mihram

90

Abstract

Details

Library Hi Tech News, vol. 17 no. 9
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 5 June 2020

Hassan Younies and Tareq Na'el Al-Tawil

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax…

1629

Abstract

Purpose

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.

Design/methodology/approach

This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.

Findings

The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.

Originality/value

The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 August 2003

Jill Slay

System security today focuses on the design of safe and secure information systems and their operation. In the analysis of any information system, whether small or large, one…

1582

Abstract

System security today focuses on the design of safe and secure information systems and their operation. In the analysis of any information system, whether small or large, one observes within it a “set of human activities related to each other so they can be viewed as a whole”. If one particularly focuses on security aspects of large information systems, and then considers the many layers of complexity comprising the human activity systems within them, it becomes apparent that one of these layers, or subsystems, is a cultural one. This paper proposes that the perspective gained on the impact of culture in such a system by the application of a systems theory, augmented by perspectives supplied by worldview theory, is helpful in designing appropriate learning, e‐commerce or other kinds of distributed environments for multicultural settings.

Details

Campus-Wide Information Systems, vol. 20 no. 3
Type: Research Article
ISSN: 1065-0741

Keywords

Article
Publication date: 1 March 1996

Arnaud de Borchgrave

An inexpensive, unmanned aerial vehicle, launched from a vessel off the Atlantic coast, or even a radio‐guided toy plane propelled from a speedboat on the Potomac, disperses one…

Abstract

An inexpensive, unmanned aerial vehicle, launched from a vessel off the Atlantic coast, or even a radio‐guided toy plane propelled from a speedboat on the Potomac, disperses one gram of anthrax over the Capitol dome while the president is delivering the State of the Union message. The entire U.S. government, from the president to the chairman of the joint chiefs, from 535 members of Congress to the entire Cabinet, die a horrible death. Lungs implode and victims drown in their own blood.

Details

Strategy & Leadership, vol. 24 no. 6
Type: Research Article
ISSN: 1087-8572

Article
Publication date: 1 April 2004

Carlos Rodríguez Casal

This article is based on a report to the Committee on Citizens' Freedoms and Rights, Justice and Home Affairs of the European Parliament by IPTS, addressing increasing concerns…

1632

Abstract

This article is based on a report to the Committee on Citizens' Freedoms and Rights, Justice and Home Affairs of the European Parliament by IPTS, addressing increasing concerns about the impact of emerging information and communication technologies and services on security and personal privacy. This paper presents the findings on location‐based services from the above report. It explores in more depth the effect that the processing of location data (for use in services supported by mobility and integrated within the ambient intelligence context), will have on the future balance between security and privacy.

Details

info, vol. 6 no. 2
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 February 1999

Robert I. Olson

The end of the Cold War, the proliferation of “troubled states” and the rise of new kinds of transnational problems is forcing the USA and others to reappraise the nature of…

Abstract

The end of the Cold War, the proliferation of “troubled states” and the rise of new kinds of transnational problems is forcing the USA and others to reappraise the nature of national security. This article explores the role of the US military in responding to these new challenges, specifically focusing on military operations other than war (OOTW), ie deterring war, resolving conflict, peacekeeping, nation building, disaster relief and humanitarian assistance. Through a consideration of driving forces and the construction of four scenarios (Turbulent Third Wave, The Dark Side, Global Mind Change and Technology Transformation), the article highlights key findings. Across all scenarios, demand for involvement in OOTW was found to increase substantially between now and 2020.

Details

Foresight, vol. 1 no. 1
Type: Research Article
ISSN: 1463-6689

Keywords

Abstract

Details

Social Studies Research and Practice, vol. 17 no. 1
Type: Research Article
ISSN: 1933-5415

1 – 10 of 63