The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal Terror on the Internet. Even though al-Qaeda's …
The aim of this article is to examine the new Prevent Strategy 2011 in the United Kingdom and critically analyze its impact upon British Muslim communities. The UK government's …
JR Lindsay - Journal of Cybersecurity, 2015 - academic.oup.com
Cyber attackers rely on deception to exploit vulnerabilities and obfuscate their identity, which makes many pessimistic about cyber deterrence. The attribution problem appears to make …
Abstract Information system designers must consider the influence of users' intrinsic motivations, in addition to commonly studied extrinsic motivations, to ensure that users will …
L Barreto, A Amaral - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
The diffusion of new digital technologies renders digital transformation relevant to nearly every economic activity sector, including in the agriculture sector. Farming and how farmers …
S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological …
The text contains five parts, the first of which discusses the nature of crime, law, and criminal justice. Chapters address such topics as formal and informal criminal justice processes …
S Lawson - Journal of Information Technology & Politics, 2013 - Taylor & Francis
Cybersecurity proponents often rely on cyber-doom scenarios as a key tactic for calling attention to prospective cyberthreats. This article critically examines cyber-doom scenarios …
M Albahar - Science and engineering ethics, 2019 - Springer
In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio …