No Cover Image

Journal article 1437 views 168 downloads

Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon

Stuart Macdonald Orcid Logo, Lee Jarvis

Perspectives on Terrorism, Volume: 8, Issue: 2, Pages: 52 - 65

Swansea University Author: Stuart Macdonald Orcid Logo

  • Cronfav11.pdf

    PDF | Version of Record

    CC-BY This work is licensed under a Creative Commons Attribution 3.0 License: http://creativecommons.org/licenses/by/3.0/

    Download (342.18KB)

Abstract

This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms....

Full description

Published in: Perspectives on Terrorism
ISSN: 2334-3745
Published: 2014
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa17899
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2014-04-29T01:30:20Z
last_indexed 2020-06-16T12:28:14Z
id cronfa17899
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2020-06-16T10:42:08.5548625</datestamp><bib-version>v2</bib-version><id>17899</id><entry>2014-04-28</entry><title>Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2014-04-28</date><deptcode>LAWD</deptcode><abstract>This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoidance of, other terms including cyber jihad and pure cyberterrorism. The article concludes by exploring the importance of these findings for definitional debates around cyberterrorism and terrorism more broadly, before outlining a number of suggestions for future research.</abstract><type>Journal Article</type><journal>Perspectives on Terrorism</journal><volume>8</volume><journalNumber>2</journalNumber><paginationStart>52</paginationStart><paginationEnd>65</paginationEnd><publisher/><issnElectronic>2334-3745</issnElectronic><keywords>cyberterrorism, terrorism, terrorism studies, definition, cybercrime, cyberwar, hacktivism, survey</keywords><publishedDay>28</publishedDay><publishedMonth>4</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-04-28</publishedDate><doi/><url>https://www.jstor.org/stable/26297136?seq=1#metadata_info_tab_contents</url><notes/><college>COLLEGE NANME</college><department>Law</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2020-06-16T10:42:08.5548625</lastEdited><Created>2014-04-28T08:55:11.9482536</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author></authors><documents><document><filename>0017899-23032016091342.pdf</filename><originalFilename>Cronfav11.pdf</originalFilename><uploaded>2016-03-23T09:13:42.3730000</uploaded><type>Output</type><contentLength>325031</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><embargoDate>2016-03-23T00:00:00.0000000</embargoDate><documentNotes>CC-BY This work is licensed under a Creative Commons Attribution 3.0 License: http://creativecommons.org/licenses/by/3.0/</documentNotes><copyrightCorrect>true</copyrightCorrect></document></documents><OutputDurs/></rfc1807>
spelling 2020-06-16T10:42:08.5548625 v2 17899 2014-04-28 Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2014-04-28 LAWD This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoidance of, other terms including cyber jihad and pure cyberterrorism. The article concludes by exploring the importance of these findings for definitional debates around cyberterrorism and terrorism more broadly, before outlining a number of suggestions for future research. Journal Article Perspectives on Terrorism 8 2 52 65 2334-3745 cyberterrorism, terrorism, terrorism studies, definition, cybercrime, cyberwar, hacktivism, survey 28 4 2014 2014-04-28 https://www.jstor.org/stable/26297136?seq=1#metadata_info_tab_contents COLLEGE NANME Law COLLEGE CODE LAWD Swansea University 2020-06-16T10:42:08.5548625 2014-04-28T08:55:11.9482536 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 0017899-23032016091342.pdf Cronfav11.pdf 2016-03-23T09:13:42.3730000 Output 325031 application/pdf Version of Record true 2016-03-23T00:00:00.0000000 CC-BY This work is licensed under a Creative Commons Attribution 3.0 License: http://creativecommons.org/licenses/by/3.0/ true
title Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
spellingShingle Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
Stuart Macdonald
title_short Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
title_full Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
title_fullStr Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
title_full_unstemmed Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
title_sort Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald
author Stuart Macdonald
author2 Stuart Macdonald
Lee Jarvis
format Journal article
container_title Perspectives on Terrorism
container_volume 8
container_issue 2
container_start_page 52
publishDate 2014
institution Swansea University
issn 2334-3745
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law
url https://www.jstor.org/stable/26297136?seq=1#metadata_info_tab_contents
document_store_str 1
active_str 0
description This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoidance of, other terms including cyber jihad and pure cyberterrorism. The article concludes by exploring the importance of these findings for definitional debates around cyberterrorism and terrorism more broadly, before outlining a number of suggestions for future research.
published_date 2014-04-28T03:20:50Z
_version_ 1763750603231592448
score 11.017797