Journal article 2107 views 392 downloads
State Cyberterrorism: A Contradiction in Terms?
Journal of Terrorism Research, Volume: 6, Issue: 3, Pages: 62 - 75
Swansea University Authors: Stuart Macdonald , Lella Nouri
DOI (Published version): 10.15664/jtr.1162
Abstract
This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications fo...
Published in: | Journal of Terrorism Research |
---|---|
ISSN: | 2049-7040 |
Published: |
2015
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa23520 |
first_indexed |
2015-10-01T02:09:34Z |
---|---|
last_indexed |
2018-02-09T05:02:24Z |
id |
cronfa23520 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2017-03-29T17:32:41.8193594</datestamp><bib-version>v2</bib-version><id>23520</id><entry>2015-09-30</entry><title>State Cyberterrorism: A Contradiction in Terms?</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>1ae4927ec437ac78d6aa11dc4b76e08f</sid><ORCID>0000-0003-2228-588X</ORCID><firstname>Lella</firstname><surname>Nouri</surname><name>Lella Nouri</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2015-09-30</date><deptcode>HRCL</deptcode><abstract>This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses.</abstract><type>Journal Article</type><journal>Journal of Terrorism Research</journal><volume>6</volume><journalNumber>3</journalNumber><paginationStart>62</paginationStart><paginationEnd>75</paginationEnd><publisher/><issnElectronic>2049-7040</issnElectronic><keywords>State terrorism; Cyberterrorism; Terrorism; Internet; Threat; Security; Survey</keywords><publishedDay>29</publishedDay><publishedMonth>9</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-09-29</publishedDate><doi>10.15664/jtr.1162</doi><url>http://doi.org/10.15664/jtr.1162</url><notes></notes><college>COLLEGE NANME</college><department>Hillary Rodham Clinton Law School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>HRCL</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2017-03-29T17:32:41.8193594</lastEdited><Created>2015-09-30T14:12:40.9527782</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author><author><firstname>Lee</firstname><surname>Jarvis</surname><order>2</order></author><author><firstname>Lella</firstname><surname>Nouri</surname><orcid>0000-0003-2228-588X</orcid><order>3</order></author></authors><documents><document><filename>0023520-23032016090515.pdf</filename><originalFilename>Cronfav7.pdf</originalFilename><uploaded>2016-03-23T09:05:15.4170000</uploaded><type>Output</type><contentLength>234690</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><embargoDate>2016-03-23T00:00:00.0000000</embargoDate><documentNotes>CC BY 3.0</documentNotes><copyrightCorrect>true</copyrightCorrect></document></documents><OutputDurs/></rfc1807> |
spelling |
2017-03-29T17:32:41.8193594 v2 23520 2015-09-30 State Cyberterrorism: A Contradiction in Terms? 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 1ae4927ec437ac78d6aa11dc4b76e08f 0000-0003-2228-588X Lella Nouri Lella Nouri true false 2015-09-30 HRCL This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses. Journal Article Journal of Terrorism Research 6 3 62 75 2049-7040 State terrorism; Cyberterrorism; Terrorism; Internet; Threat; Security; Survey 29 9 2015 2015-09-29 10.15664/jtr.1162 http://doi.org/10.15664/jtr.1162 COLLEGE NANME Hillary Rodham Clinton Law School COLLEGE CODE HRCL Swansea University 2017-03-29T17:32:41.8193594 2015-09-30T14:12:40.9527782 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 Lee Jarvis 2 Lella Nouri 0000-0003-2228-588X 3 0023520-23032016090515.pdf Cronfav7.pdf 2016-03-23T09:05:15.4170000 Output 234690 application/pdf Version of Record true 2016-03-23T00:00:00.0000000 CC BY 3.0 true |
title |
State Cyberterrorism: A Contradiction in Terms? |
spellingShingle |
State Cyberterrorism: A Contradiction in Terms? Stuart Macdonald Lella Nouri |
title_short |
State Cyberterrorism: A Contradiction in Terms? |
title_full |
State Cyberterrorism: A Contradiction in Terms? |
title_fullStr |
State Cyberterrorism: A Contradiction in Terms? |
title_full_unstemmed |
State Cyberterrorism: A Contradiction in Terms? |
title_sort |
State Cyberterrorism: A Contradiction in Terms? |
author_id_str_mv |
933e714a4cc37c3ac12d4edc277f8f98 1ae4927ec437ac78d6aa11dc4b76e08f |
author_id_fullname_str_mv |
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald 1ae4927ec437ac78d6aa11dc4b76e08f_***_Lella Nouri |
author |
Stuart Macdonald Lella Nouri |
author2 |
Stuart Macdonald Lee Jarvis Lella Nouri |
format |
Journal article |
container_title |
Journal of Terrorism Research |
container_volume |
6 |
container_issue |
3 |
container_start_page |
62 |
publishDate |
2015 |
institution |
Swansea University |
issn |
2049-7040 |
doi_str_mv |
10.15664/jtr.1162 |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
url |
http://doi.org/10.15664/jtr.1162 |
document_store_str |
1 |
active_str |
0 |
description |
This article explores findings from a global survey of the terrorism research community to explore whether states may be deemed capable of conducting cyberterrorism. The article begins with a brief review of recent literature on state terrorism, identifying empirical and analytical justifications for greater use of this concept. Following a discussion of our research methodology we make two arguments. First, that there exists considerable ‘expert’ support for the validity of the proposition that states can indeed engage in cyberterrorism. Second, that whether states are deemed capable of cyberterrorism has implications for subsidiary debates, including around the threat that cyberterrorism poses. |
published_date |
2015-09-29T00:53:28Z |
_version_ |
1821364776680292352 |
score |
11.04748 |