Edited book 2192 views
Cyberterrorism: Understanding, Assessment & Response
Swansea University Author: Stuart Macdonald
Abstract
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from oth...
ISBN: | 978-1-4939-0961-2 978-1-4939-0962-9 |
---|---|
Published: |
New York
Springer
2014
|
Online Access: |
http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2 |
URI: | https://cronfa.swan.ac.uk/Record/cronfa16643 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2014-07-02T01:30:01Z |
---|---|
last_indexed |
2021-05-12T02:31:35Z |
id |
cronfa16643 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2021-05-11T16:07:23.3108795</datestamp><bib-version>v2</bib-version><id>16643</id><entry>2013-12-17</entry><title>Cyberterrorism: Understanding, Assessment & Response</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2013-12-17</date><deptcode>LAWD</deptcode><abstract>This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.</abstract><type>Edited book</type><journal/><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher>Springer</publisher><placeOfPublication>New York</placeOfPublication><isbnPrint>978-1-4939-0961-2</isbnPrint><isbnElectronic>978-1-4939-0962-9</isbnElectronic><issnPrint/><issnElectronic/><keywords>Cyberterrorism, counterterrorism, cyberattack, cybersecurity, information systems and communication service, computer communication networks, criminal law and law procedure, systems and data security, computer applications social and behavioral science, computer science, data processing, computer networks, computer crimes, society , terrorism, network hardware, data capture and analysis</keywords><publishedDay>31</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-07-31</publishedDate><doi/><url>http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2</url><notes/><college>COLLEGE NANME</college><department>Law</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2021-05-11T16:07:23.3108795</lastEdited><Created>2013-12-17T10:05:10.2627182</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author><author><firstname>Thomas</firstname><surname>Chen</surname><order>3</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2021-05-11T16:07:23.3108795 v2 16643 2013-12-17 Cyberterrorism: Understanding, Assessment & Response 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2013-12-17 LAWD This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security. Edited book Springer New York 978-1-4939-0961-2 978-1-4939-0962-9 Cyberterrorism, counterterrorism, cyberattack, cybersecurity, information systems and communication service, computer communication networks, criminal law and law procedure, systems and data security, computer applications social and behavioral science, computer science, data processing, computer networks, computer crimes, society , terrorism, network hardware, data capture and analysis 31 7 2014 2014-07-31 http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2 COLLEGE NANME Law COLLEGE CODE LAWD Swansea University 2021-05-11T16:07:23.3108795 2013-12-17T10:05:10.2627182 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 Thomas Chen 3 |
title |
Cyberterrorism: Understanding, Assessment & Response |
spellingShingle |
Cyberterrorism: Understanding, Assessment & Response Stuart Macdonald |
title_short |
Cyberterrorism: Understanding, Assessment & Response |
title_full |
Cyberterrorism: Understanding, Assessment & Response |
title_fullStr |
Cyberterrorism: Understanding, Assessment & Response |
title_full_unstemmed |
Cyberterrorism: Understanding, Assessment & Response |
title_sort |
Cyberterrorism: Understanding, Assessment & Response |
author_id_str_mv |
933e714a4cc37c3ac12d4edc277f8f98 |
author_id_fullname_str_mv |
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
author |
Stuart Macdonald |
author2 |
Stuart Macdonald Lee Jarvis Thomas Chen |
format |
Edited book |
publishDate |
2014 |
institution |
Swansea University |
isbn |
978-1-4939-0961-2 978-1-4939-0962-9 |
publisher |
Springer |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
url |
http://www.springer.com/computer/information+systems+and+applications/book/978-1-4939-0961-2 |
document_store_str |
0 |
active_str |
0 |
description |
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada.With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security. |
published_date |
2014-07-31T03:19:02Z |
_version_ |
1763750489637257216 |
score |
11.037581 |