No Cover Image

Journal article 1039 views

Responding to Cyberterrorism: Options and Avenues

Stuart Macdonald Orcid Logo, Lee Jarvis

Georgetown Journal of International Affairs, Volume: Summer, Issue: Cyber V, Pages: 134 - 143

Swansea University Author: Stuart Macdonald Orcid Logo

Full text not available from this repository: check for access using links below.

Abstract

The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which...

Full description

Published in: Georgetown Journal of International Affairs
ISSN: 1526-0054
Published: 2015
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa21460
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2015-11-02T01:47:34Z
last_indexed 2019-08-09T15:03:16Z
id cronfa21460
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2019-08-06T13:13:57.8723375</datestamp><bib-version>v2</bib-version><id>21460</id><entry>2015-05-17</entry><title>Responding to Cyberterrorism: Options and Avenues</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2015-05-17</date><deptcode>LAWD</deptcode><abstract>The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what &#x2018;terrorism&#x2019; is. In this article, we seek briefly to sketch some of the ways in which a new addition to the terrorism &#x2018;family&#x2019; has been or might be confronted: cyberterrorism. Although a contested concept (in part - but not only - because of the broader contestability of &#x2018;terrorism&#x2019;), a growing literature is now taking shape on how best to confront this &#x2018;threat&#x2019;, if it is, indeed, a threat. Our article seeks to take stock of some of this literature, to point to relevant related debates within terrorism research, and to identify some of the particularities of dealing with cyberterrorism.</abstract><type>Journal Article</type><journal>Georgetown Journal of International Affairs</journal><volume>Summer</volume><journalNumber>Cyber V</journalNumber><paginationStart>134</paginationStart><paginationEnd>143</paginationEnd><publisher/><issnPrint>1526-0054</issnPrint><keywords>Terrorism; cyberterrorism; attribution; vulnerability; constructivism; deconstructivism</keywords><publishedDay>5</publishedDay><publishedMonth>10</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-10-05</publishedDate><doi/><url/><notes></notes><college>COLLEGE NANME</college><department>Law</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2019-08-06T13:13:57.8723375</lastEdited><Created>2015-05-17T08:23:50.0861830</Created><path><level id="1">Hillary Rodham Clinton School of Law</level><level id="2">Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2019-08-06T13:13:57.8723375 v2 21460 2015-05-17 Responding to Cyberterrorism: Options and Avenues 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2015-05-17 LAWD The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which a new addition to the terrorism ‘family’ has been or might be confronted: cyberterrorism. Although a contested concept (in part - but not only - because of the broader contestability of ‘terrorism’), a growing literature is now taking shape on how best to confront this ‘threat’, if it is, indeed, a threat. Our article seeks to take stock of some of this literature, to point to relevant related debates within terrorism research, and to identify some of the particularities of dealing with cyberterrorism. Journal Article Georgetown Journal of International Affairs Summer Cyber V 134 143 1526-0054 Terrorism; cyberterrorism; attribution; vulnerability; constructivism; deconstructivism 5 10 2015 2015-10-05 COLLEGE NANME Law COLLEGE CODE LAWD Swansea University 2019-08-06T13:13:57.8723375 2015-05-17T08:23:50.0861830 Hillary Rodham Clinton School of Law Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2
title Responding to Cyberterrorism: Options and Avenues
spellingShingle Responding to Cyberterrorism: Options and Avenues
Stuart, Macdonald
title_short Responding to Cyberterrorism: Options and Avenues
title_full Responding to Cyberterrorism: Options and Avenues
title_fullStr Responding to Cyberterrorism: Options and Avenues
title_full_unstemmed Responding to Cyberterrorism: Options and Avenues
title_sort Responding to Cyberterrorism: Options and Avenues
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart, Macdonald_***_0000-0002-7483-9023
author Stuart, Macdonald
author2 Stuart Macdonald
Lee Jarvis
format Journal article
container_title Georgetown Journal of International Affairs
container_volume Summer
container_issue Cyber V
container_start_page 134
publishDate 2015
institution Swansea University
issn 1526-0054
college_str Hillary Rodham Clinton School of Law
hierarchytype
hierarchy_top_id hillaryrodhamclintonschooloflaw
hierarchy_top_title Hillary Rodham Clinton School of Law
hierarchy_parent_id hillaryrodhamclintonschooloflaw
hierarchy_parent_title Hillary Rodham Clinton School of Law
department_str Law{{{_:::_}}}Hillary Rodham Clinton School of Law{{{_:::_}}}Law
document_store_str 0
active_str 0
description The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which a new addition to the terrorism ‘family’ has been or might be confronted: cyberterrorism. Although a contested concept (in part - but not only - because of the broader contestability of ‘terrorism’), a growing literature is now taking shape on how best to confront this ‘threat’, if it is, indeed, a threat. Our article seeks to take stock of some of this literature, to point to relevant related debates within terrorism research, and to identify some of the particularities of dealing with cyberterrorism.
published_date 2015-10-05T03:39:04Z
_version_ 1722805696580288512
score 10.852431