Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 64
To view the access options for this content please click here
Book part
Publication date: 21 June 2014

Close to the edge: Cyberterrorism today

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks…

HTML
PDF (230 KB)
EPUB (284 KB)

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Details

Understanding Terrorism
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2014)0000022015
ISBN: 978-1-78350-828-0

Keywords

  • Cyberterrorism
  • information operations
  • psychological operations
  • computer networks
  • terrorists’ communications

To view the access options for this content please click here
Article
Publication date: 1 April 2004

Cyberterrorism, computer crime, and reality

C. Bryan Foltz

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is…

HTML
PDF (149 KB)

Abstract

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat limited. Government officials and experts are often heard claiming that the world is unprepared for cyberterrorism; however, other officials and experts state that cyberterrorism does not pose a threat to anyone. Examines the reasons for these disparate viewpoints and reviews the theoretical and actual forms in which cyberterrorism may occur. Further, proposes the use (and refocusing) of an existing model of computer security to help understand and defend against cyberterrorism.

Details

Information Management & Computer Security, vol. 12 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/09685220410530799
ISSN: 0968-5227

Keywords

  • Computer crime
  • Information systems
  • Data security
  • Terrorism

To view the access options for this content please click here
Article
Publication date: 9 November 2015

Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study

Abdulrahman Alqahtani

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…

HTML
PDF (2.5 MB)

Abstract

Purpose

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data.

Design/methodology/approach

This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Findings

The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey).

Originality/value

It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
DOI: https://doi.org/10.1108/ICS-09-2014-0060
ISSN: 2056-4961

Keywords

  • Information security modeling
  • National security
  • Terrorism
  • Critical infrastructure
  • Cyberterrorism

To view the access options for this content please click here
Article
Publication date: 9 October 2017

State transgression on electronic expression: is it for real?

Argha Ray and Anjali Kaushik

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries…

HTML
PDF (2.5 MB)

Abstract

Purpose

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These communications are not only an exchange of information but also a catharsis on the socio-political environment of the real world. This explosion of electronic expression is often detrimental to the traditional secretive maneuvers of nation states and the exercise of its power. Unable to come to terms with the new reality nation states through legislative action or otherwise attempt to assert its sovereignty in the space that has no political and societal boundaries. This may lead to an encroachment on basic human rights that often have constitutional guarantees in the real world but may be violated in the online milieu. This paper aims to investigate this issue in detail and evaluate whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression.

Design/methodology/approach

The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which expresses deep concern at the negative impact that surveillance and interception of communications may have on human rights”. It further says “The General Assembly called on all States to review their procedures, practices and legislation related to communications surveillance, interception and collection of personal data and emphasized the need for States to ensure the full and effective implementation of their obligations under international human rights law”. With this development, this paper seeks to unravel the role of nation states in using cybersecurity as a propaganda tool by raising the specter of threat to national security and economic wellbeing. The paper is based on exploratory research with data compilation from secondary sources. To collect data, various research papers, books and journals have been referenced and data available in public domain has been accumulated.

Findings

This paper has tried to unravel state action on cyberspace which often runs counter to the concept of civil liberties. It indicates that in terms of both national security and economic impact, cybercrime represent a very nominal threat vector. Also, cybercrime as compared with other forms of crime is again nominal. Finally, cyber laws and policies of different countries need to be more nuanced such as to allow space for civil liberties. Overall, the propaganda surrounding the malaise of cybercrime seems to be more hype than real. We already have examples of countries who have transgressed into electronic expression in cyber space. Therefore, UN has a valid reason to raise a red flag on this unfolding issue.

Originality/value

This paper was published at 21st Americas Conference of Information Systems held at Puerto Rico, USA, between August 13-15, 2015 (AMCIS, 2015). The authors of this paper seek review by Editors of the Journal for Republication of original work. The authors have taken cognizance of the Originality Guidelines for Emerald published at this URL www.emeraldgrouppublishing.com/authors/writing/originality.htm

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/ICS-03-2016-0024
ISSN: 2056-4961

Keywords

  • Privacy
  • Surveillance
  • Censorship
  • Cyber security
  • Civil liberties

To view the access options for this content please click here
Book part
Publication date: 21 June 2014

Introduction

HTML
PDF (105 KB)
EPUB (203 KB)

Abstract

Details

Understanding Terrorism
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2014)0000022005
ISBN: 978-1-78350-828-0

Content available
Article
Publication date: 1 September 2000

Next: The Even More Certain Millennium

Danielle Mihram and G. Arthur Mihram

HTML

Abstract

Details

Library Hi Tech News, vol. 17 no. 9
Type: Research Article
DOI: https://doi.org/10.1108/lhtn.2000.23917iac.003
ISSN: 0741-9058

To view the access options for this content please click here
Article
Publication date: 25 May 2020

Effect of cybercrime laws on protecting citizens and businesses in the United Arab Emirates (UAE)

Hassan Younies and Tareq Na'el Al-Tawil

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the…

HTML
PDF (288 KB)

Abstract

Purpose

The purpose of this paper is to explore the extent to which cybercrime laws protect citizens and businesses in the United Arab Emirates (UAE). Pertinent questions over the lax regulatory environment and incomprehensible cybersecurity policies have influenced the discussions.

Design/methodology/approach

This paper will first offer a global outlook of cybersecurity laws and legislation. The global outlook will present the basis for examining best practices that the UAE could emulate. The paper will then examine the legislative landscape of cyber laws in the UAE, including cross-country comparisons. The comparisons are critical, as the country’s cybercrime laws are in their infancy phase.

Findings

The UAE has taken decisive and proactive measures to deter the threat of cybercrimes and cyberattacks. The UAE strategy comprehensive strategy has been effective in protecting the economy and populations from the adverse effects of cybercrimes. The success lies in the enactment of comprehensive and streamlines laws and regulations with harsher penalties. The stringent legal measures, including longer jail terms, stiffer fines and deportation of foreigners, have ensured robust deterrence to cybercriminals.

Originality/value

The analysis has shown that the UAE has a higher score of preparedness against cybercrimes and cyberattacks. The UAE has specifically crafted a broader and effective legislative framework of cybercrime laws. Although the UAE has comprehensive cybercrime laws, the remarkable level of technological advances in the country makes citizens and businesses lucrative targets. The UAE now has the burden of doubling down its legal efforts to deter emerging cybersecurity risks.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/JFC-04-2020-0055
ISSN: 1359-0790

Keywords

  • UAE
  • Cyber-crimes law
  • Cyberbullying
  • Social media

To view the access options for this content please click here
Book part
Publication date: 7 May 2019

ICT, Politics, and Cyber Intelligence: Revisiting the Case of Snowden

Emanuel Boussios

This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with…

HTML
PDF (547 KB)
EPUB (23 KB)

Abstract

This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing citizen’s activity in cyberspace. The emphasis in the discussion is placed on the constitutionality of state actions and the shifting boundaries in which the state can act in the name of security to protect its people from the nation’s enemies. A second piece of this discussion is which state actors and agencies can control the mechanisms by which this sensitive cyber information is collected, stored, and if needed, acted upon. The most salient case with regard to this debate is that of Edward Snowden. It reveals the US government’s abuses of this surveillance machinery prompting major debates around the topics of privacy, national security, and mass digital surveillance. When observing the response to Snowden’s disclosures one can ask what point of view is being ignored, or what questions are not being answered. By considering the silence as a part of our everyday language we can improve our understanding of mediated discourses. Recommendations on cyber-intelligence reforms in response to Snowden’s revelations – and whether these are in fact practical in modern, high-technology societies such as the US – follow.

Details

Politics and Technology in the Post-Truth Era
Type: Book
DOI: https://doi.org/10.1108/978-1-78756-983-620191008
ISBN: 978-1-78756-984-3

Keywords

  • Cyber intelligence
  • cyberterrorism
  • homeland security
  • surveillance
  • privacy
  • Snowden

To view the access options for this content please click here
Article
Publication date: 1 August 2003

IS security, trust and culture: a theoretical framework for managing IS security in multicultural settings

Jill Slay

System security today focuses on the design of safe and secure information systems and their operation. In the analysis of any information system, whether small or large…

HTML
PDF (70 KB)

Abstract

System security today focuses on the design of safe and secure information systems and their operation. In the analysis of any information system, whether small or large, one observes within it a “set of human activities related to each other so they can be viewed as a whole”. If one particularly focuses on security aspects of large information systems, and then considers the many layers of complexity comprising the human activity systems within them, it becomes apparent that one of these layers, or subsystems, is a cultural one. This paper proposes that the perspective gained on the impact of culture in such a system by the application of a systems theory, augmented by perspectives supplied by worldview theory, is helpful in designing appropriate learning, e‐commerce or other kinds of distributed environments for multicultural settings.

Details

Campus-Wide Information Systems, vol. 20 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/10650740310484241
ISSN: 1065-0741

Keywords

  • Information systems
  • Systems theory
  • Multi‐cultural society

To view the access options for this content please click here
Article
Publication date: 1 March 1996

Transnational crime the new empire of evil

Arnaud de Borchgrave

An inexpensive, unmanned aerial vehicle, launched from a vessel off the Atlantic coast, or even a radio‐guided toy plane propelled from a speedboat on the Potomac…

HTML
PDF (575 KB)

Abstract

An inexpensive, unmanned aerial vehicle, launched from a vessel off the Atlantic coast, or even a radio‐guided toy plane propelled from a speedboat on the Potomac, disperses one gram of anthrax over the Capitol dome while the president is delivering the State of the Union message. The entire U.S. government, from the president to the chairman of the joint chiefs, from 535 members of Congress to the entire Cabinet, die a horrible death. Lungs implode and victims drown in their own blood.

Details

Strategy & Leadership, vol. 24 no. 6
Type: Research Article
DOI: https://doi.org/10.1108/eb054572
ISSN: 1087-8572

Access
Only content I have access to
Only Open Access
Year
  • Last 3 months (1)
  • Last 6 months (4)
  • Last 12 months (8)
  • All dates (64)
Content type
  • Article (52)
  • Book part (9)
  • Earlycite article (2)
  • Expert briefing (1)
1 – 10 of 64
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here