No Cover Image

Journal article 1781 views 364 downloads

State Cyberterrorism: A Contradiction in Terms?

Stuart Macdonald Orcid Logo, Lee Jarvis, Lella Nouri Orcid Logo

Journal of Terrorism Research, Volume: 6, Issue: 3, Pages: 62 - 75

Swansea University Authors: Stuart Macdonald Orcid Logo, Lella Nouri Orcid Logo

Check full text

DOI (Published version): 10.15664/jtr.1162

Abstract

This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications fo...

Full description

Published in: Journal of Terrorism Research
ISSN: 2049-7040
Published: 2015
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa23520
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2015-10-01T02:09:34Z
last_indexed 2018-02-09T05:02:24Z
id cronfa23520
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2017-03-29T17:32:41.8193594</datestamp><bib-version>v2</bib-version><id>23520</id><entry>2015-09-30</entry><title>State Cyberterrorism: A Contradiction in Terms?</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>1ae4927ec437ac78d6aa11dc4b76e08f</sid><ORCID>0000-0003-2228-588X</ORCID><firstname>Lella</firstname><surname>Nouri</surname><name>Lella Nouri</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2015-09-30</date><deptcode>LAWD</deptcode><abstract>This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable &#x2018;expert&#x2019; support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses.</abstract><type>Journal Article</type><journal>Journal of Terrorism Research</journal><volume>6</volume><journalNumber>3</journalNumber><paginationStart>62</paginationStart><paginationEnd>75</paginationEnd><publisher/><issnElectronic>2049-7040</issnElectronic><keywords>State terrorism; Cyberterrorism; Terrorism; Internet; Threat; Security; Survey</keywords><publishedDay>29</publishedDay><publishedMonth>9</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-09-29</publishedDate><doi>10.15664/jtr.1162</doi><url>http://doi.org/10.15664/jtr.1162</url><notes></notes><college>COLLEGE NANME</college><department>Law</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2017-03-29T17:32:41.8193594</lastEdited><Created>2015-09-30T14:12:40.9527782</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author><author><firstname>Lella</firstname><surname>Nouri</surname><orcid>0000-0003-2228-588X</orcid><order>3</order></author></authors><documents><document><filename>0023520-23032016090515.pdf</filename><originalFilename>Cronfav7.pdf</originalFilename><uploaded>2016-03-23T09:05:15.4170000</uploaded><type>Output</type><contentLength>234690</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><embargoDate>2016-03-23T00:00:00.0000000</embargoDate><documentNotes>CC BY 3.0</documentNotes><copyrightCorrect>true</copyrightCorrect></document></documents><OutputDurs/></rfc1807>
spelling 2017-03-29T17:32:41.8193594 v2 23520 2015-09-30 State Cyberterrorism: A Contradiction in Terms? 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 1ae4927ec437ac78d6aa11dc4b76e08f 0000-0003-2228-588X Lella Nouri Lella Nouri true false 2015-09-30 LAWD This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses. Journal Article Journal of Terrorism Research 6 3 62 75 2049-7040 State terrorism; Cyberterrorism; Terrorism; Internet; Threat; Security; Survey 29 9 2015 2015-09-29 10.15664/jtr.1162 http://doi.org/10.15664/jtr.1162 COLLEGE NANME Law COLLEGE CODE LAWD Swansea University 2017-03-29T17:32:41.8193594 2015-09-30T14:12:40.9527782 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 Lella Nouri 0000-0003-2228-588X 3 0023520-23032016090515.pdf Cronfav7.pdf 2016-03-23T09:05:15.4170000 Output 234690 application/pdf Version of Record true 2016-03-23T00:00:00.0000000 CC BY 3.0 true
title State Cyberterrorism: A Contradiction in Terms?
spellingShingle State Cyberterrorism: A Contradiction in Terms?
Stuart Macdonald
Lella Nouri
title_short State Cyberterrorism: A Contradiction in Terms?
title_full State Cyberterrorism: A Contradiction in Terms?
title_fullStr State Cyberterrorism: A Contradiction in Terms?
title_full_unstemmed State Cyberterrorism: A Contradiction in Terms?
title_sort State Cyberterrorism: A Contradiction in Terms?
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
1ae4927ec437ac78d6aa11dc4b76e08f
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald
1ae4927ec437ac78d6aa11dc4b76e08f_***_Lella Nouri
author Stuart Macdonald
Lella Nouri
author2 Stuart Macdonald
Lee Jarvis
Lella Nouri
format Journal article
container_title Journal of Terrorism Research
container_volume 6
container_issue 3
container_start_page 62
publishDate 2015
institution Swansea University
issn 2049-7040
doi_str_mv 10.15664/jtr.1162
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law
url http://doi.org/10.15664/jtr.1162
document_store_str 1
active_str 0
description This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses.
published_date 2015-09-29T03:27:44Z
_version_ 1763751037278093312
score 10.993396