No Cover Image

Journal article 712 views 104 downloads

The Cyberterrorism Threat: Findings from a Survey of Researchers / Stuart, Macdonald; Lella, Nouri

Studies in Conflict & Terrorism, Volume: 37, Issue: 1, Pages: 68 - 90

Swansea University Authors: Stuart, Macdonald, Lella, Nouri

Abstract

This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing liter...

Full description

Published in: Studies in Conflict & Terrorism
ISSN: 1057-610X 1521-0731
Published: 2014
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa16642
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2013-12-18T03:03:02Z
last_indexed 2018-08-31T12:49:17Z
id cronfa16642
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2018-08-31T12:14:26.8557241</datestamp><bib-version>v2</bib-version><id>16642</id><entry>2013-12-17</entry><title>The Cyberterrorism Threat: Findings from a Survey of Researchers</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>1ae4927ec437ac78d6aa11dc4b76e08f</sid><ORCID>0000-0003-2228-588X</ORCID><firstname>Lella</firstname><surname>Nouri</surname><name>Lella Nouri</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2013-12-17</date><deptcode>LAWD</deptcode><abstract>This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by the imminent threat of cyberterrorism, and other, more sceptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (i) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (ii) Has a cyberterrorism attack ever taken place?&#x2019;; and, (iii) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counter-terrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.</abstract><type>Journal Article</type><journal>Studies in Conflict &amp; Terrorism</journal><volume>37</volume><journalNumber>1</journalNumber><paginationStart>68</paginationStart><paginationEnd>90</paginationEnd><publisher/><issnPrint>1057-610X</issnPrint><issnElectronic>1521-0731</issnElectronic><keywords>Cyberterrorism, counterterrorism, cyberattack</keywords><publishedDay>1</publishedDay><publishedMonth>1</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-01-01</publishedDate><doi>10.1080/1057610X.2014.853603</doi><url>http://www.tandfonline.com/doi/full/10.1080/1057610X.2014.853603</url><notes/><college>COLLEGE NANME</college><department>Legal Studies</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><lastEdited>2018-08-31T12:14:26.8557241</lastEdited><Created>2013-12-17T09:30:29.9494388</Created><path><level id="1">Hillary Rodham Clinton School of Law</level><level id="2">Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author><author><firstname>Lella</firstname><surname>Nouri</surname><orcid>0000-0003-2228-588X</orcid><order>3</order></author></authors><documents><document><filename>0016642-23032016091529.pdf</filename><originalFilename>Cronfav12.pdf</originalFilename><uploaded>2016-03-23T09:15:29.2830000</uploaded><type>Output</type><contentLength>558276</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><action/><embargoDate>2015-04-18T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect></document></documents><OutputDurs/></rfc1807>
spelling 2018-08-31T12:14:26.8557241 v2 16642 2013-12-17 The Cyberterrorism Threat: Findings from a Survey of Researchers 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 1ae4927ec437ac78d6aa11dc4b76e08f 0000-0003-2228-588X Lella Nouri Lella Nouri true false 2013-12-17 LAWD This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by the imminent threat of cyberterrorism, and other, more sceptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (i) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (ii) Has a cyberterrorism attack ever taken place?’; and, (iii) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counter-terrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly. Journal Article Studies in Conflict & Terrorism 37 1 68 90 1057-610X 1521-0731 Cyberterrorism, counterterrorism, cyberattack 1 1 2014 2014-01-01 10.1080/1057610X.2014.853603 http://www.tandfonline.com/doi/full/10.1080/1057610X.2014.853603 COLLEGE NANME Legal Studies COLLEGE CODE LAWD Swansea University 2018-08-31T12:14:26.8557241 2013-12-17T09:30:29.9494388 Hillary Rodham Clinton School of Law Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 Lella Nouri 0000-0003-2228-588X 3 0016642-23032016091529.pdf Cronfav12.pdf 2016-03-23T09:15:29.2830000 Output 558276 application/pdf Accepted Manuscript true 2015-04-18T00:00:00.0000000 true
title The Cyberterrorism Threat: Findings from a Survey of Researchers
spellingShingle The Cyberterrorism Threat: Findings from a Survey of Researchers
Stuart, Macdonald
Lella, Nouri
title_short The Cyberterrorism Threat: Findings from a Survey of Researchers
title_full The Cyberterrorism Threat: Findings from a Survey of Researchers
title_fullStr The Cyberterrorism Threat: Findings from a Survey of Researchers
title_full_unstemmed The Cyberterrorism Threat: Findings from a Survey of Researchers
title_sort The Cyberterrorism Threat: Findings from a Survey of Researchers
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
1ae4927ec437ac78d6aa11dc4b76e08f
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart, Macdonald
1ae4927ec437ac78d6aa11dc4b76e08f_***_Lella, Nouri
author Stuart, Macdonald
Lella, Nouri
format Journal article
container_title Studies in Conflict & Terrorism
container_volume 37
container_issue 1
container_start_page 68
publishDate 2014
institution Swansea University
issn 1057-610X
1521-0731
doi_str_mv 10.1080/1057610X.2014.853603
college_str Hillary Rodham Clinton School of Law
hierarchytype
hierarchy_top_id hillaryrodhamclintonschooloflaw
hierarchy_top_title Hillary Rodham Clinton School of Law
hierarchy_parent_id hillaryrodhamclintonschooloflaw
hierarchy_parent_title Hillary Rodham Clinton School of Law
department_str Law{{{_:::_}}}Hillary Rodham Clinton School of Law{{{_:::_}}}Law
url http://www.tandfonline.com/doi/full/10.1080/1057610X.2014.853603
document_store_str 1
active_str 0
description This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by the imminent threat of cyberterrorism, and other, more sceptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (i) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (ii) Has a cyberterrorism attack ever taken place?’; and, (iii) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counter-terrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.
published_date 2014-01-01T03:32:19Z
_version_ 1674966297887113216
score 10.741233