Journal article 1893 views
Responding to Cyberterrorism: Options and Avenues
Georgetown Journal of International Affairs, Volume: Summer, Issue: Cyber V, Pages: 134 - 143
Swansea University Author: Stuart Macdonald
Full text not available from this repository: check for access using links below.
Abstract
The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which...
Published in: | Georgetown Journal of International Affairs |
---|---|
ISSN: | 1526-0054 |
Published: |
2015
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa21460 |
first_indexed |
2015-11-02T01:47:34Z |
---|---|
last_indexed |
2019-08-09T15:03:16Z |
id |
cronfa21460 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2019-08-06T13:13:57.8723375</datestamp><bib-version>v2</bib-version><id>21460</id><entry>2015-05-17</entry><title>Responding to Cyberterrorism: Options and Avenues</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2015-05-17</date><deptcode>HRCL</deptcode><abstract>The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which a new addition to the terrorism ‘family’ has been or might be confronted: cyberterrorism. Although a contested concept (in part - but not only - because of the broader contestability of ‘terrorism’), a growing literature is now taking shape on how best to confront this ‘threat’, if it is, indeed, a threat. Our article seeks to take stock of some of this literature, to point to relevant related debates within terrorism research, and to identify some of the particularities of dealing with cyberterrorism.</abstract><type>Journal Article</type><journal>Georgetown Journal of International Affairs</journal><volume>Summer</volume><journalNumber>Cyber V</journalNumber><paginationStart>134</paginationStart><paginationEnd>143</paginationEnd><publisher/><issnPrint>1526-0054</issnPrint><keywords>Terrorism; cyberterrorism; attribution; vulnerability; constructivism; deconstructivism</keywords><publishedDay>5</publishedDay><publishedMonth>10</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-10-05</publishedDate><doi/><url/><notes></notes><college>COLLEGE NANME</college><department>Hillary Rodham Clinton Law School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>HRCL</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2019-08-06T13:13:57.8723375</lastEdited><Created>2015-05-17T08:23:50.0861830</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2019-08-06T13:13:57.8723375 v2 21460 2015-05-17 Responding to Cyberterrorism: Options and Avenues 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2015-05-17 HRCL The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which a new addition to the terrorism ‘family’ has been or might be confronted: cyberterrorism. Although a contested concept (in part - but not only - because of the broader contestability of ‘terrorism’), a growing literature is now taking shape on how best to confront this ‘threat’, if it is, indeed, a threat. Our article seeks to take stock of some of this literature, to point to relevant related debates within terrorism research, and to identify some of the particularities of dealing with cyberterrorism. Journal Article Georgetown Journal of International Affairs Summer Cyber V 134 143 1526-0054 Terrorism; cyberterrorism; attribution; vulnerability; constructivism; deconstructivism 5 10 2015 2015-10-05 COLLEGE NANME Hillary Rodham Clinton Law School COLLEGE CODE HRCL Swansea University 2019-08-06T13:13:57.8723375 2015-05-17T08:23:50.0861830 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 |
title |
Responding to Cyberterrorism: Options and Avenues |
spellingShingle |
Responding to Cyberterrorism: Options and Avenues Stuart Macdonald |
title_short |
Responding to Cyberterrorism: Options and Avenues |
title_full |
Responding to Cyberterrorism: Options and Avenues |
title_fullStr |
Responding to Cyberterrorism: Options and Avenues |
title_full_unstemmed |
Responding to Cyberterrorism: Options and Avenues |
title_sort |
Responding to Cyberterrorism: Options and Avenues |
author_id_str_mv |
933e714a4cc37c3ac12d4edc277f8f98 |
author_id_fullname_str_mv |
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
author |
Stuart Macdonald |
author2 |
Stuart Macdonald Lee Jarvis |
format |
Journal article |
container_title |
Georgetown Journal of International Affairs |
container_volume |
Summer |
container_issue |
Cyber V |
container_start_page |
134 |
publishDate |
2015 |
institution |
Swansea University |
issn |
1526-0054 |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
document_store_str |
0 |
active_str |
0 |
description |
The range of counterterrorism tools available to states and other actors is both large and diverse. Military, legal, and political instruments are all widely used - often underpinned by competing conceptions of what ‘terrorism’ is. In this article, we seek briefly to sketch some of the ways in which a new addition to the terrorism ‘family’ has been or might be confronted: cyberterrorism. Although a contested concept (in part - but not only - because of the broader contestability of ‘terrorism’), a growing literature is now taking shape on how best to confront this ‘threat’, if it is, indeed, a threat. Our article seeks to take stock of some of this literature, to point to relevant related debates within terrorism research, and to identify some of the particularities of dealing with cyberterrorism. |
published_date |
2015-10-05T18:41:28Z |
_version_ |
1821341373109895168 |
score |
11.04748 |