The Information Society and the Danger of Cyberterrorism

Author(s):  
G. Giacomello

Computers have always caused psychological uneasiness in the human brain. That a computer is the closet thing to a thinking machine can be discomforting. That average users have little understanding of the complexity and intricacies of how computers and software operate only add to the distress. Networked computers further increased the puzzlement of human beings. The media (suffering from the same poverty of information as the public) have picked up catchwords like cyberwar, netwars, cyberterrorism, and cybercrime. Speaking of Electronic Pearl Harbors and comparing modems to bombs have only contributed to increasing the level of media hysteria and confusion in public opinion. Schwartau (1994) is a classic example. Imagine that poorly informed journalists start telling the general public that ruthless hackers (hired by terrorists) could take over the power grid and shut it down, or cause patients’ death after their medical records have been compromised. The mere suspicion that terrorists could perform such acts would be enough to fueling the fear factor, which regularly happens as a result of this crying wolf. Under these circumstances, cyberterrorism seems like a nightmare come true. As Embar-Seddon (2002) noted, the word terrorism brings together two significant modern fears: the fear of technology and the fear of terrorism. Both technology and terrorism are significant unknowns and unknown threats are generally perceived as more threatening than known threats. To some extent, cyberterrorism does not need to be manifested itself in any significant way because many already believe it to be real. This article will try to dispel some of the myths of cyberterrorism, such as the contention that terrorists could remotely take control of critical infrastructure and thus bring a country to its knees. In fact, today, cybercrime and economic damage caused by hackers are far more real and serious threats than terrorists. Misdeeds are more likely to be committed by disgruntled insiders than skilled outsiders (Randazzo et al., 2004). There is no commonly accepted definition of terrorism, hence cyberterrorism has been variously interpreted. For example, Sofaer et al. (2000) defines it as “intentional use or threat of use, without legally recognized authority, of violence, disruption or interference against cyber systems” (p. 26), resulting in death or injury of people, damage to physical property, civil disorder, or economic harm. The probability, however, that cyberattacks may actually cause victims is extremely low. Furthermore, Sofaer et al. tends to exclude states from committing terrorist acts, which is also debatable. Hughes (2004) observes cyberterrorism as a diverse set of technologies whose purpose is to scare people, but scaring people without getting anything in return is simply useless. Paraphrasing a working definition of terrorism, I would identify cyberterrorism as the use of digital means to threat or undertake acts of organized violence against civilians to achieve political advantages. Perpetrators then could be nonstate groups or sovereign states. Terrorists spreading scary stories to terrify the populace via the Internet would also qualify. Finally, because of cost efficiency, information and communication technologies have blurred the distinction that long existed between the noncombatant and the combatant spheres. The technology on which the military now rely is exactly the same commercial off-the-shelf hardware and software products that civilians have in their homes and offices (Department of the Army, 2003). Military and civilians alike use largely the same computer networks, which were designed for ease of use and not for hardened communications. During the Cold War, dual use technology (civilian hardware and software) was considered “dangerous” because it could help the Soviets close the gap with the West. Paradoxically, dual-use technologies are now “good.” One of the many downsides of such a situation is that if terrorists hit computer networks, in theory, they could hit multiple targets: the economy, law enforcement agencies, emergency services, and (albeit to a lesser extent) even the military. For terrorists this scenario would be a dream come true. Reality, however, is substantially different.

2016 ◽  
pp. 1723-1738
Author(s):  
Iheanyi Chuku Egbuta ◽  
Brychan Thomas ◽  
Said Al-Hasan

The aims of the chapter are to consider the strategic green issues of teleworking in terms of the environment, transport, location, office space, and resource use for modern organisations and business sectors and to formulate a conceptual model of the processes involved. In fact, teleworking technologies are variously implemented for green computing initiatives, and the many advantages include lower greenhouse gas emissions related to travel, greater worker satisfaction, and as a result of lower overhead office costs, increased profit margins. The chapter initially investigates the appropriateness of a working definition of teleworking with regard to green computing, and following this, explores the benefits and barriers of teleworking in a green computing environment. The theoretical frameworks and models of teleworking are then considered, and a conceptual model of the contribution of teleworking to green computing is formulated. It is the intention of the chapter to identify and articulate those teleworking concepts that will be useful to academicians, scientists, business entrepreneurs, practitioners, managers, and policy makers, and to indicate future research directions for research scholars and students with similar interests.


Criminologie ◽  
2005 ◽  
Vol 30 (2) ◽  
pp. 27-45 ◽  
Author(s):  
Deborah Harrison

This paper applies a broad definition of violence to the physically and economically vulnerable situation of Canadian military wives. Its reports some of the results of an institutional ethnography of Canadian military wives ' work which was carried out during the early 1990s, and which made some important discoveries about how the military's priorities and forms of organization structure the way the military treats wives, tries to control wives, and benefits from wives' unpaid work. The military's major priority, combat readiness, necessitates the control the military exercises over its members and the specific mechanism of military control known as combat unit bonding. Combat bonding is in turn characterized by cultural homogeneity and its corollaries of sexism, racism, derogation of, and violence against women. Nevertheless, the military extends a diluted form of combat bonding to military wives, in order to exert control over them and appropriate their unpaid labour, loyalty — and frequently, silence. Combat-related obsession with unit morale also often translates into the cover-up of problems, which is a consideration that adds to the isolation of the many survivors of woman abuse who are members of the military community. The greater public accountability of the Canadian military which may result from the Somalia Inquiry makes this an especially opportune time to study woman abuse and other forms of family violence in the Canadian military community.


Author(s):  
Laura E. Felschow

As Supernatural enters season 5, its status as a cult hit is becoming more evident both in the press and within the text of the series itself. The open acknowledgment of the show's fandom within 4.18 "The Monster at the End of This Book" has altered the power relationship between the product and its fans and brought on controversy regarding the creative team's attitude toward fandom in general. To investigate this relationship between Supernatural and its devoted fans, I will first develop a working definition of the cult fan and illustrate the many ways in which Supernatural is an ideal cult text, despite not having been marketed by its producers and network as such. Having set forth this framework, I will outline the dynamic that existed between Supernatural and its cult fans prior to "The Monster at the End of This Book." I will then demonstrate how "The Monster at the End of This Book" simultaneously empowers and disempowers Supernatural's cult fans by representing them within the show's diegesis and what the consequences of these (mis)representations might be.


2020 ◽  
pp. 707-714
Author(s):  
V. Savechko ◽  
A. Kozlov

The article deals with the main results of the interim report for 2019 of the research work “Development of a methodology for establishing the conformity of actions (inactions) of officials with the requirements of regulatory documents on the organization of storage of missiles and ammunition and other means of destruction at arsenals, bases and warehouses” on the implementation of the activity of the troops (forces) of the Alliance’s military standards, the definition of the subject, object, main tasks and indicative list of issues of military expertise on the study of storage organization of missiles and ammunition. Application of the methodology relates to the research of the following issues: – the formation of arsenals, bases and warehouses; planning and organizing of daily life tasks and official activities; security and defense organization; countering sabotage and terrorist attacks; fire safety; storage of missiles and ammunition; fail safe; – determining the causal link between the actions (inactions) of the officials of the Armed Forces of Ukraine, other forces formed in accordance with the laws of the military forces, law enforcement agencies of the security and defense sector to the current legislation (functional duties, instructions).


Author(s):  
Iheanyi Chuku Egbuta ◽  
Brychan Thomas ◽  
Said Al-Hasan

The aims of the chapter are to consider the strategic green issues of teleworking in terms of the environment, transport, location, office space, and resource use for modern organisations and business sectors and to formulate a conceptual model of the processes involved. In fact, teleworking technologies are variously implemented for green computing initiatives, and the many advantages include lower greenhouse gas emissions related to travel, greater worker satisfaction, and as a result of lower overhead office costs, increased profit margins. The chapter initially investigates the appropriateness of a working definition of teleworking with regard to green computing, and following this, explores the benefits and barriers of teleworking in a green computing environment. The theoretical frameworks and models of teleworking are then considered, and a conceptual model of the contribution of teleworking to green computing is formulated. It is the intention of the chapter to identify and articulate those teleworking concepts that will be useful to academicians, scientists, business entrepreneurs, practitioners, managers, and policy makers, and to indicate future research directions for research scholars and students with similar interests.


2021 ◽  
Vol 10 (2) ◽  
pp. 19-30
Author(s):  
Anuradha Iddagoda ◽  
Narayanage Jayantha Dewasiri ◽  
Manoaj Keppetipola

Employee behavior within the organization is governed by organizational culture, which includes values, beliefs, stories, and symbols. Military organizations preserve the sovereignty of the state. Representing the public image and reputation, organizational culture creates a positive atmosphere for the employees. Undoubtedly, certain military metaphors are applicable in the management context. Hence, the study of military organizational culture is essential. This study intends to conceptualize the concept of military organizational culture. In addition, the study also aims at introducing a working definition of organizational culture in the military context and a tool to measure it. The dimensions identified thorough systematic literature review are values, beliefs, symbols, stories, and heroes, and the study intends to develop an instrument to measure the variable of military organizational culture.


2017 ◽  
Author(s):  
David Yamane

American gun culture has undergone a profound change over the past half century, from a culture rooted in hunting and recreational shooting to one centered on armed citizenship and personal defense. As shorthand, I describe this as an evolution from Gun Culture 1.0 to Gun Culture 2.0. In this paper, I begin by giving a brief history of the rise of Gun Culture 2.0. I then propose a cultural approach to studying gun culture, based on a working definition of culture that emphasizes the ways in which culture helps us to understand the world by defining problems and prospects and helps us to act in the world by suggesting recipes and providing tools for action in relation to those problems and prospects. Here, objects of material culture like guns and gun-related accessories play an important role. Far from being static entities, in addressing the problems associated with carrying concealed weapons in everyday life, these technologies respond to and facilitate the cultural practice of gun carrying which is central to Gun Culture 2.0. I apply this cultural approach to studying gun culture using ethnographic observation of a Concealed Carry Expo to explore some of the many technologies that have been developed to help those who want to be armed citizens reconcile the competing demands of carrying a concealed handgun in public. These material culture technologies include guns and holsters, as well as products designed to address women’s specific carry needs.


2021 ◽  
pp. 73-100
Author(s):  
Neal M. Krause

Many researchers focus primarily on the frequency of church attendance when they study the religion-and-health relationship. The many shortcomings of this strategy are discussed in this chapter. A plea is made for focusing on communities of faith instead. Four issues involving communities of faith are examined: (1) a preliminary working definition of communities of faith is provided; (2) because communities of faith constitute a vast conceptual domain, a good deal of this chapter is spent on identifying the key characteristics of communities of faith and explaining how they arise and are maintained; (3) in an effort to move the literature forward, a detailed research plan for devising measures of communities of faith is presented; and (4) a submodel is provided that further illuminates the relationship between religious identities and communities of faith.


PsycCRITIQUES ◽  
2013 ◽  
Vol 58 (25) ◽  
Author(s):  
Robert Farr

2013 ◽  
Vol 42 (4) ◽  
pp. 3-9
Author(s):  
Armin Geertz

This introduction to the special issue on narrative discusses various ways of approaching religious narrative. It looks at various evolutionary hypotheses and distinguishes between three fundamental aspects of narrative: 1. the neurobiological, psychological, social and cultural mechanisms and processes, 2. the many media and methods used in human communication, and 3. the variety of expressive genres. The introduction ends with a definition of narrative.


Sign in / Sign up

Export Citation Format

Share Document