Cyberterrorism

Peter Grabosky, Michael Stohl

    Research output: Contribution to journalArticle

    Abstract

    In the conventional definition of terrorism, the key elements are coercion and intimidation. Because of the lack of them, the hacking, harass and annoy information could not be categorised as terrorism. Meanwhile, it is possible to attack online to the critical infrastructures. The increasing number of infrastructures connected to internet accompanies a new risk, once it is comprised by terrorists, it will inflict significant harm to persons or property by attacking the victim's information systems. There have been incidents of convey political information by hacking. The terrorists also use cyberspace in furtherance of terrorism. The intelligence, communications, propaganda, etc. can be enhanced via internet. The physical air - gap to internet is useful, but by no means ideal way of counter - cyberterrorism. The domestic law is not adequate to combat cyber terrorism for the sovereignty issues.
    Original languageEnglish
    Pages (from-to)55-61
    JournalJournal of Henan Police College (He'nan Gongan Gaodeng Zhuanke Xuexiao xuebao)
    Volume25
    Issue number4
    Publication statusPublished - 2016

    Fingerprint Dive into the research topics of 'Cyberterrorism'. Together they form a unique fingerprint.

    Cite this