LEADER 04755nam 22007335 450 001 9910298991103321 005 20251117075009.0 010 $a1-4939-0962-2 024 7 $a10.1007/978-1-4939-0962-9 035 $a(CKB)3710000000143782 035 $a(EBL)1782052 035 $a(SSID)ssj0001274312 035 $a(PQKBManifestationID)11993872 035 $a(PQKBTitleCode)TC0001274312 035 $a(PQKBWorkID)11325243 035 $a(PQKB)10000496 035 $a(MiAaPQ)EBC1782052 035 $a(DE-He213)978-1-4939-0962-9 035 $a(PPN)179763652 035 $a(EXLCZ)993710000000143782 100 $a20140624d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyberterrorism $eUnderstanding, Assessment, and Response /$fedited by Thomas M. Chen, Lee Jarvis, Stuart Macdonald 205 $aFirst edition. 210 1$aNew York, NY :$cSpringer New York :$cImprint: Springer,$d2014. 215 $a1 online resource 300 $aDescription based upon print version of record. 311 08$a1-322-13312-3 311 08$a1-4939-0961-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aWhat is 'Cyberterrorism'? Computer and Internet Technology in Legal Definitions of Terrorism -- Understanding, Locating and Constructing 'Cyberterrorism' -- Rethinking the Threat of Cyberterrorism -- Putting the 'Cyber' into Cyberterrorism: Re-reading Technological Risk in a Hyperconnected World -- Dr. Strangeweb: Or How they Stopped Worrying and Learned to Love Cyber War -- Reality Check: Assessing the (Un)Likelihood of Cyberterrorism -- Cyber Threats to Critical Information Infrastructure -- The Citadel and its Sentinels: State Strategies for Contesting Cyberterrorism in the UK -- The Criminalisation of Terrorists' Online Preparatory Acts -- Adaptive Responses to Cyberterrorism. 330 $aThis is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security. 606 $aComputers 606 $aComputer networks 606 $aCriminal law 606 $aApplication software 606 $aComputer security 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCriminal Law and Criminal Procedure Law$3https://scigraph.springernature.com/ontologies/product-market-codes/R13006 606 $aComputer Appl. in Social and Behavioral Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/I23028 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputers. 615 0$aComputer networks. 615 0$aCriminal law. 615 0$aApplication software. 615 0$aComputer security. 615 14$aInformation Systems and Communication Service. 615 24$aComputer Communication Networks. 615 24$aCriminal Law and Criminal Procedure Law. 615 24$aComputer Appl. in Social and Behavioral Sciences. 615 24$aSystems and Data Security. 676 $a364.168 702 $aChen$b Thomas M.$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJarvis$b Lee$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMacDonald$b Stuart$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910298991103321 996 $aCyberterrorism$92025291 997 $aUNINA