No Cover Image

Edited book 844 views

Cyberterrorism: Understanding, Assessment & Response

Stuart Macdonald Orcid Logo, Lee Jarvis, Thomas Chen

Swansea University Author: Stuart Macdonald Orcid Logo

Abstract

This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from oth...

Full description

ISBN: 978-1-4939-0961-2 978-1-4939-0962-9
Published: New York Springer 2014
Online Access: http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2
URI: https://cronfa.swan.ac.uk/Record/cronfa16643
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2014-07-02T01:30:01Z
last_indexed 2021-05-12T02:31:35Z
id cronfa16643
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2021-05-11T16:07:23.3108795</datestamp><bib-version>v2</bib-version><id>16643</id><entry>2013-12-17</entry><title>Cyberterrorism: Understanding, Assessment &amp; Response</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2013-12-17</date><deptcode>LAWD</deptcode><abstract>This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.</abstract><type>Edited book</type><journal/><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher>Springer</publisher><placeOfPublication>New York</placeOfPublication><isbnPrint>978-1-4939-0961-2</isbnPrint><isbnElectronic>978-1-4939-0962-9</isbnElectronic><issnPrint/><issnElectronic/><keywords>Cyberterrorism, counterterrorism, cyberattack, cybersecurity, information systems and communication service, computer communication networks, criminal law and law procedure, systems and data security, computer applications social and behavioral science, computer science, data processing, computer networks, computer crimes, society , terrorism, network hardware, data capture and analysis</keywords><publishedDay>31</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-07-31</publishedDate><doi/><url>http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2</url><notes/><college>COLLEGE NANME</college><department>Law</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2021-05-11T16:07:23.3108795</lastEdited><Created>2013-12-17T10:05:10.2627182</Created><path><level id="1">Hillary Rodham Clinton School of Law</level><level id="2">Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author><author><firstname>Thomas</firstname><surname>Chen</surname><order>3</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2021-05-11T16:07:23.3108795 v2 16643 2013-12-17 Cyberterrorism: Understanding, Assessment & Response 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2013-12-17 LAWD This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security. Edited book Springer New York 978-1-4939-0961-2 978-1-4939-0962-9 Cyberterrorism, counterterrorism, cyberattack, cybersecurity, information systems and communication service, computer communication networks, criminal law and law procedure, systems and data security, computer applications social and behavioral science, computer science, data processing, computer networks, computer crimes, society , terrorism, network hardware, data capture and analysis 31 7 2014 2014-07-31 http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2 COLLEGE NANME Law COLLEGE CODE LAWD Swansea University 2021-05-11T16:07:23.3108795 2013-12-17T10:05:10.2627182 Hillary Rodham Clinton School of Law Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 Thomas Chen 3
title Cyberterrorism: Understanding, Assessment & Response
spellingShingle Cyberterrorism: Understanding, Assessment & Response
Stuart, Macdonald
title_short Cyberterrorism: Understanding, Assessment & Response
title_full Cyberterrorism: Understanding, Assessment & Response
title_fullStr Cyberterrorism: Understanding, Assessment & Response
title_full_unstemmed Cyberterrorism: Understanding, Assessment & Response
title_sort Cyberterrorism: Understanding, Assessment & Response
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart, Macdonald_***_0000-0002-7483-9023
author Stuart, Macdonald
author2 Stuart Macdonald
Lee Jarvis
Thomas Chen
format Edited book
publishDate 2014
institution Swansea University
isbn 978-1-4939-0961-2
978-1-4939-0962-9
publisher Springer
college_str Hillary Rodham Clinton School of Law
hierarchytype
hierarchy_top_id hillaryrodhamclintonschooloflaw
hierarchy_top_title Hillary Rodham Clinton School of Law
hierarchy_parent_id hillaryrodhamclintonschooloflaw
hierarchy_parent_title Hillary Rodham Clinton School of Law
department_str Law{{{_:::_}}}Hillary Rodham Clinton School of Law{{{_:::_}}}Law
url http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2
document_store_str 0
active_str 0
description This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
published_date 2014-07-31T03:32:32Z
_version_ 1722986479191326720
score 10.853168