Search results

1 – 10 of 84
Book part
Publication date: 21 June 2014

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak…

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Article
Publication date: 1 April 2004

C. Bryan Foltz

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat…

7028

Abstract

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat limited. Government officials and experts are often heard claiming that the world is unprepared for cyberterrorism; however, other officials and experts state that cyberterrorism does not pose a threat to anyone. Examines the reasons for these disparate viewpoints and reviews the theoretical and actual forms in which cyberterrorism may occur. Further, proposes the use (and refocusing) of an existing model of computer security to help understand and defend against cyberterrorism.

Details

Information Management & Computer Security, vol. 12 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 9 November 2015

Abdulrahman Alqahtani

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…

1144

Abstract

Purpose

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data.

Design/methodology/approach

This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Findings

The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey).

Originality/value

It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 October 2017

Argha Ray and Anjali Kaushik

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These…

Abstract

Purpose

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression.

Design/methodology/approach

The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated.

Findings

This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue.

Originality/value

This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Content available
Book part
Publication date: 19 July 2022

Abstract

Details

Big Data: A Game Changer for Insurance Industry
Type: Book
ISBN: 978-1-80262-606-3

Book part
Publication date: 21 June 2014

Abstract

Details

Understanding Terrorism
Type: Book
ISBN: 978-1-78350-828-0

Content available
Article
Publication date: 1 September 2000

Danielle Mihram and G. Arthur Mihram

90

Abstract

Details

Library Hi Tech News, vol. 17 no. 9
Type: Research Article
ISSN: 0741-9058

Article
Publication date: 22 August 2023

Deymah Alweqyan

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field…

Abstract

Purpose

This paper aims to manage the dilemma of cyberspace operations, as the incidence of cybercrimes has increased tremendously in the past few decades, turning cyberspace into a field of war in which all nations must fight. For many countries, cyberattacks and conflicts, and even the basic operation of cyberspace in general, are new territories. Furthermore, international law today does not address many aspects of cyber warfare, as it typically has dealt with only traditional warfare.

Design/methodology/approach

This study examined this crime whether it is a domestic or an international crime and whether cyber wars are under international law or domestic law to address these issues.

Findings

Although many attempts to criminalize these actions occurred, the findings suggest that the world has failed to frame the legal instruments against cyberattacks. The findings also suggest recommendations to solve this issue.

Originality/value

To the best of the author’s knowledge, this study analyzed the comparison between the same crime in the perspective of domestic and international law, highlighting an unsolved dilemma in the world, suggesting some unprecedented solutions to solve.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 5 June 2020

Hassan Younies and Tareq Na'el Al-Tawil

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax…

1636

Abstract

Purpose

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.

Design/methodology/approach

This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.

Findings

The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.

Originality/value

The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Book part
Publication date: 7 May 2019

Emanuel Boussios

This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing…

Abstract

This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing citizen’s activity in cyberspace. The emphasis in the discussion is placed on the constitutionality of state actions and the shifting boundaries in which the state can act in the name of security to protect its people from the nation’s enemies. A second piece of this discussion is which state actors and agencies can control the mechanisms by which this sensitive cyber information is collected, stored, and if needed, acted upon. The most salient case with regard to this debate is that of Edward Snowden. It reveals the US government’s abuses of this surveillance machinery prompting major debates around the topics of privacy, national security, and mass digital surveillance. When observing the response to Snowden’s disclosures one can ask what point of view is being ignored, or what questions are not being answered. By considering the silence as a part of our everyday language we can improve our understanding of mediated discourses. Recommendations on cyber-intelligence reforms in response to Snowden’s revelations – and whether these are in fact practical in modern, high-technology societies such as the US – follow.

Details

Politics and Technology in the Post-Truth Era
Type: Book
ISBN: 978-1-78756-984-3

Keywords

1 – 10 of 84