Article ID Journal Published Year Pages File Type
897493 Technological Forecasting and Social Change 2007 18 Pages PDF
Abstract

Given that terrorists are quickly acquiring technical skills that increase the utility of cyberspace to an effective distributed organizational network and the likelihood of potential attacks on U.S. critical infrastructure and defense systems, we consider the value of cyberspace to terrorists. To this end, it is necessary to address the following questions pertinent to the attributes of cyberspace to examine why and how terrorists may utilize cyberspace to advance their goals: (1) What is cyberterrorism? (2) Is cyberterrorism warfare? (3) Why would terrorists use cyberspace? (4) What do we know or anticipate that terrorists want to do in cyberspace? (5) How do we deal with terrorists in cyberspace? We conclude with an assessment of the cyberterrorism threat facing the U.S. today and recommendations that address increasing technical capabilities and security measures for intelligence gathering, digital control and supervisory control and data acquisition (DC/SCADA) systems, and emergency response systems.

Related Topics
Social Sciences and Humanities Business, Management and Accounting Business and International Management
Authors
, , ,