Terrorist Use of Cyberspace and Cyber Terrorism : New Challenges and Responses.
Material type:
- text
- computer
- online resource
- 9781614995289
- 005.8
- TK5105.59 .T477 2015
TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES -- Foreword -- Contents -- The Use of Internet Technology by Cyber Terrorists & -- Cyber Criminals: The 2014 Report -- Steganography in Support of the Global Terrorism -- Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries -- Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals -- The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity -- Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack -- From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation -- How Human Issues Impact Confronting Cyber Terrorism -- Human Factor Dual Role in Modern Cyberspace Social Engineering -- Tackling Terrorists' Use of the Internet: Propaganda Dispersion & -- the Threat of Radicalization -- Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace -- Cultural Aspects of Information Sharing and Collaboration -- Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do) -- The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace -- Assessing and Responding to the Cyberterrorism Threat -- Subject Index -- Author Index.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.