SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Helms R, Costanza SE, Johnson N. Secur. J. 2012; 25(1): 57-75.

Copyright

(Copyright © 2012, Holtzbrinck Springer Nature Publishing Group -- Palgrave-Macmillan)

DOI

10.1057/sj.2011.6

PMID

unavailable

Abstract

Known cases of cyber-attacks on sovereign powers are rare, thus examination of cyber-terror remains somewhat anecdotal. Terrorism discourse itself remains mired in ambiguity as little agreement exists as to thresholds that would make unambiguous distinctions between criminal and terror attacks. In this article, we examine a composite of cyber-terror that highlights symbolism and public sentiment and delineates between real and perceived threats. An objective analysis of historical incidents would indicate that first-world powers' adaptive technologies and sophistication have provided adequate protection against 'cybergeddon'. However, this reality must be juxtaposed with the mythos that popular media has conjured regarding digital doomsday. In examining this dichotomy between real and perceived threats, we visit the idea that the current direction of cyber-legislation risks heightening international inequality. As the world evolves toward more cyber-dependent relations, dominant economic powers have the ability to be more inclusive as they work toward global law enforcement legislation. This article appeals for attentiveness to social justice in the attempt to alleviate national anxieties associated with cyber-threats.

Keywords: terrorism; terror; cyber-crime; security; legislation; state


Language: en

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print