Journal article 1696 views 201 downloads
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
Perspectives on Terrorism, Volume: 8, Issue: 2, Pages: 52 - 65
Swansea University Author: Stuart Macdonald
-
PDF | Version of Record
CC-BY This work is licensed under a Creative Commons Attribution 3.0 License: http://creativecommons.org/licenses/by/3.0/
Download (342.18KB)
Abstract
This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms....
Published in: | Perspectives on Terrorism |
---|---|
ISSN: | 2334-3745 |
Published: |
2014
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa17899 |
first_indexed |
2014-04-29T01:30:20Z |
---|---|
last_indexed |
2020-06-16T12:28:14Z |
id |
cronfa17899 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2020-06-16T10:42:08.5548625</datestamp><bib-version>v2</bib-version><id>17899</id><entry>2014-04-28</entry><title>Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2014-04-28</date><deptcode>HRCL</deptcode><abstract>This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoidance of, other terms including cyber jihad and pure cyberterrorism. The article concludes by exploring the importance of these findings for definitional debates around cyberterrorism and terrorism more broadly, before outlining a number of suggestions for future research.</abstract><type>Journal Article</type><journal>Perspectives on Terrorism</journal><volume>8</volume><journalNumber>2</journalNumber><paginationStart>52</paginationStart><paginationEnd>65</paginationEnd><publisher/><issnElectronic>2334-3745</issnElectronic><keywords>cyberterrorism, terrorism, terrorism studies, definition, cybercrime, cyberwar, hacktivism, survey</keywords><publishedDay>28</publishedDay><publishedMonth>4</publishedMonth><publishedYear>2014</publishedYear><publishedDate>2014-04-28</publishedDate><doi/><url>https://www.jstor.org/stable/26297136?seq=1#metadata_info_tab_contents</url><notes/><college>COLLEGE NANME</college><department>Hillary Rodham Clinton Law School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>HRCL</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2020-06-16T10:42:08.5548625</lastEdited><Created>2014-04-28T08:55:11.9482536</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author></authors><documents><document><filename>0017899-23032016091342.pdf</filename><originalFilename>Cronfav11.pdf</originalFilename><uploaded>2016-03-23T09:13:42.3730000</uploaded><type>Output</type><contentLength>325031</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><embargoDate>2016-03-23T00:00:00.0000000</embargoDate><documentNotes>CC-BY This work is licensed under a Creative Commons Attribution 3.0 License: http://creativecommons.org/licenses/by/3.0/</documentNotes><copyrightCorrect>true</copyrightCorrect></document></documents><OutputDurs/></rfc1807> |
spelling |
2020-06-16T10:42:08.5548625 v2 17899 2014-04-28 Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2014-04-28 HRCL This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoidance of, other terms including cyber jihad and pure cyberterrorism. The article concludes by exploring the importance of these findings for definitional debates around cyberterrorism and terrorism more broadly, before outlining a number of suggestions for future research. Journal Article Perspectives on Terrorism 8 2 52 65 2334-3745 cyberterrorism, terrorism, terrorism studies, definition, cybercrime, cyberwar, hacktivism, survey 28 4 2014 2014-04-28 https://www.jstor.org/stable/26297136?seq=1#metadata_info_tab_contents COLLEGE NANME Hillary Rodham Clinton Law School COLLEGE CODE HRCL Swansea University 2020-06-16T10:42:08.5548625 2014-04-28T08:55:11.9482536 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 0017899-23032016091342.pdf Cronfav11.pdf 2016-03-23T09:13:42.3730000 Output 325031 application/pdf Version of Record true 2016-03-23T00:00:00.0000000 CC-BY This work is licensed under a Creative Commons Attribution 3.0 License: http://creativecommons.org/licenses/by/3.0/ true |
title |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon |
spellingShingle |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon Stuart Macdonald |
title_short |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon |
title_full |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon |
title_fullStr |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon |
title_full_unstemmed |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon |
title_sort |
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon |
author_id_str_mv |
933e714a4cc37c3ac12d4edc277f8f98 |
author_id_fullname_str_mv |
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
author |
Stuart Macdonald |
author2 |
Stuart Macdonald Lee Jarvis |
format |
Journal article |
container_title |
Perspectives on Terrorism |
container_volume |
8 |
container_issue |
2 |
container_start_page |
52 |
publishDate |
2014 |
institution |
Swansea University |
issn |
2334-3745 |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
url |
https://www.jstor.org/stable/26297136?seq=1#metadata_info_tab_contents |
document_store_str |
1 |
active_str |
0 |
description |
This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions from our survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these concepts amongst the global research community? Our findings include: First, high levels of familiarity with the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread avoidance of, other terms including cyber jihad and pure cyberterrorism. The article concludes by exploring the importance of these findings for definitional debates around cyberterrorism and terrorism more broadly, before outlining a number of suggestions for future research. |
published_date |
2014-04-28T18:33:50Z |
_version_ |
1821340892650274816 |
score |
11.04748 |