Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyberterrorism

Media and Terrorism in the 21st Century
The use of the internet for terrorist purposes.
Published in Chapter:
Media Development Trends as a Counter for Terrorism in Ukraine
Nadezhda Anatolievna Lebedeva (International Personnel Academy, Indonesia)
Copyright: © 2022 |Pages: 20
DOI: 10.4018/978-1-7998-9755-2.ch008
Abstract
The aim of the chapter is to examine the trends in the development of mass media as countering terrorism in Ukraine. The novelty of the research for the international scientific community lies in the description of Ukraine's experience in countering information terrorism. This chapter will be useful for theorists studying the manifestation of media terrorism in various countries, as a component of the European context of this problem. For Ukraine, information activities are only developing. The threat of terrorism is not an internal problem, but an external one, which is created by foreign states. Information terrorism has two types of influence. It is material and intellectual. Ukrainian media can resist both types of influence on society. Media terrorism of foreign countries is aimed at individuals. This chapter focuses on strengthening the communication component of antiterrorist activities, improving the information policy of the state, the inclusion of civil society and public television potential in the system of combating information media terrorism.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Financial Fraud, Technology Disruption, and Cyber-Governance
An premeditated, politically motivated attack against data, information, computer systems and programs, digital networks, and architecture implemented through computers that results in violence, death and/or destruction and creates terror for the purpose of coercing a third party, usually Governments, to change its policies. It is usually committed by antiestablishment agents at national or international levels. Against considered powerful entities which have abused their position, it is taking the form of monetary harms, denial of services or damages to reputation operated by groups of activities self-justifying their illegal acts as being done on behalf of the weak influential categories of the world population. The main objective is to create disruption, paralysis and dysfunction in the decision-making of focused targets.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberterrorism and Its Impact on Contemporary Conflicts and Society
The use of computer and telecommunication technologies (first of all, the Internet) for terrorist purposes.
Full Text Chapter Download: US $37.50 Add to Cart
International Context of Cybercrime and Cyber Law
The use of information and communication technology to cause grave disruption or pervasive fear.
Full Text Chapter Download: US $37.50 Add to Cart
Mitigating Unconventional Cyber-Warfare: Scenario of Cyber 9/11
Is defined as the intentional and premeditated use of computer, networks, and the public internet to harm, sabotage, and/or severely disrupt normal operations for personal, financial, rivalry, ideological, or political reasons. Objectives of cyberterrorism include the creation of panic, alarm, disruption, or theft of vital financial information or security details by means of an array of information technology tools.
Full Text Chapter Download: US $37.50 Add to Cart
International Cooperation and Legal Response to Cybercrime in Pakistan
The use of information and communication technology to cause grave disruption or pervasive fear.
Full Text Chapter Download: US $37.50 Add to Cart
Homegrown Terrorism: An Analysis of Its Effects on PESTLE Factors
Particular type of terrorism which uses the Internet as the main means of attack. It can cause economic losses, damage infrastructure or cause people’s death through the use, for example, of malware and viruses.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR