Terrorism in Transition: The Implications of Cyber-Terrorism

2015 ◽  
pp. 207-220
Author(s):  
Trevor Calafato ◽  
Paul Caruana
Keyword(s):  
Author(s):  
Ryan Shandler ◽  
Michael L. Gross ◽  
Sophia Backhaus ◽  
Daphna Canetti

Abstract Does exposure to cyber terrorism prompt calls for retaliatory military strikes? By what psychological mechanism does it do so? Through a series of controlled, randomized experiments, this study exposed respondents (n = 2,028) to television news reports depicting cyber and conventional terror attacks against critical infrastructures in the United States, United Kingdom and Israel. The findings indicate that only lethal cyber terrorism triggers strong support for retaliation. Findings also confirm that anger bridges exposure to cyber terrorism and retaliation, rather than psychological mechanisms such as threat perception or anxiety as other studies propose. These findings extend to the cyber realm a recent trend that views anger as a primary mechanism linking exposure to terrorism with militant preferences. With cyber terrorism a mounting international concern, this study demonstrates how exposure to this threat can generate strong public support for retaliatory policies, depending on the lethality of the attack.


2020 ◽  
Vol 13 (1) ◽  
pp. 291
Author(s):  
Masike Malatji ◽  
Annlizé L. Marnewick ◽  
Suné von Solms

The water and wastewater sector is an important lifeline upon which other economic sectors depend. Securing the sector’s critical infrastructure is therefore important for any country’s economy. Like many other nations, South Africa has an overarching national cybersecurity strategy aimed at addressing cyber terrorism, cybercriminal activities, cyber vandalism, and cyber sabotage. The aim of this study is to contextualise the water and wastewater sector’s cybersecurity responsibilities within the national cybersecurity legislative and policy environment. This is achieved by conducting a detailed analysis of the international, national and sector cybersecurity stakeholders; legislation and policies; and challenges pertaining to the protection of the water and wastewater sector. The study found some concerning challenges and improvement gaps regarding the complex manner in which the national government is implementing the cybersecurity strategy. The study also found that, along with the National Cybersecurity Policy Framework (the national cybersecurity strategy of South Africa), the Electronic Communications and Transactions Act, Critical Infrastructure Protection Act, and other supporting legislation and policies make provision for the water and wastewater sector’s computer security incidents response team to be established without the need to propose any new laws or amend existing ones. This is conducive for the immediate development of the sector-specific cybersecurity governance framework and resilience strategy to protect the water and wastewater assets.


2019 ◽  
Vol 28 (110) ◽  
pp. 19-58
Author(s):  
الزعابي ، ناصر محمد البكر ◽  
بني إبراهيم ، سلطان راشد بني رشيد

2012 ◽  
Vol 03 (03) ◽  
pp. 209-214 ◽  
Author(s):  
Rabiah Ahmad ◽  
Zahri Yunos
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document