Intentions and Cyberterrorism

Florian J. Egloff
{"title":"Intentions and Cyberterrorism","authors":"Florian J. Egloff","doi":"10.1093/oxfordhb/9780198800682.013.10","DOIUrl":null,"url":null,"abstract":"This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1048 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.
意图与网络恐怖主义
本章主要讨论意图和网络恐怖分子。在将网络恐怖主义定义为利用或威胁使用网络空间,通过破坏或破坏数字数据来实施暴力时,本章捕捉到了潜在的新奇行为。它强调了情报官员关于恐怖分子利用网络空间的意图的说法。然后,它会询问这在多大程度上符合恐怖分子动机和意图的文献,以及网络空间是否是实施恐怖袭击的有吸引力的手段。发现简单的成本效益分析并不支持将网络空间作为实施恐怖主义行为的手段,本章从评估的意图和能力两方面对变革的载体进行了询问。文章最后分析了一个符合网络恐怖定义的假想案例:一个受宗教启发的阿什利·麦迪逊(Ashley Madison)黑客事件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信