{"title":"越界:网络空间中的恐怖主义和现实空间中的目标","authors":"L. Constantine","doi":"10.1109/CW.2011.49","DOIUrl":null,"url":null,"abstract":"The boundaries between virtual reality and physical reality are becoming ever more blurred as activities in cyber worlds bleed into everyday life and sophisticated software now crosses the line from digital interaction to physical destruction. This paper examines what might be learned from the real-world exploits of the sophisticated software worm known as Stuxnet and from the speculations and extrapolations of fictional counterparts.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Crossing the Line: Terrorism in Cyberspace and Targets in Real-Space\",\"authors\":\"L. Constantine\",\"doi\":\"10.1109/CW.2011.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The boundaries between virtual reality and physical reality are becoming ever more blurred as activities in cyber worlds bleed into everyday life and sophisticated software now crosses the line from digital interaction to physical destruction. This paper examines what might be learned from the real-world exploits of the sophisticated software worm known as Stuxnet and from the speculations and extrapolations of fictional counterparts.\",\"PeriodicalId\":231796,\"journal\":{\"name\":\"2011 International Conference on Cyberworlds\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Cyberworlds\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CW.2011.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Cyberworlds","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CW.2011.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Crossing the Line: Terrorism in Cyberspace and Targets in Real-Space
The boundaries between virtual reality and physical reality are becoming ever more blurred as activities in cyber worlds bleed into everyday life and sophisticated software now crosses the line from digital interaction to physical destruction. This paper examines what might be learned from the real-world exploits of the sophisticated software worm known as Stuxnet and from the speculations and extrapolations of fictional counterparts.