SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Breen GM. J. Appl. Secur. Res. 2008; 3(2): 191.

Copyright

(Copyright © 2008, Informa - Taylor and Francis Group)

DOI

10.1080/19361610802135888

PMID

unavailable

Abstract

A greater understanding of cyberterrorism and its interpersonal implications is needed. In addition, strategies need to be developed to prevent and/or prepare for cyberterrorist attacks. As such, this analysis is unique and important in that it examines social network theory and current counter-terrorism practices as a method of understanding how to crack, prevent, and prepare for cyberterrorism strikes. Moreover, present counter-terrorism tactics are examined in an attempt to apply them into the realm of counter-cyberterrorism. A discussion section is provided, which includes future directions for researchers interested in this area.

Keywords: Computer-mediated communication; cyberterrorism; damage; government; hacking; interpersonal communication; networks; preparedness; prevention; social; terrorism

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print