Atnaujinkite slapukų nuostatas

Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses [Minkštas viršelis]

  • Formatas: Paperback / softback, 224 pages
  • Išleidimo metai: 29-Apr-2025
  • Leidėjas: IOS Press,US
  • ISBN-10: 1614995273
  • ISBN-13: 9781614995272
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 224 pages
  • Išleidimo metai: 29-Apr-2025
  • Leidėjas: IOS Press,US
  • ISBN-10: 1614995273
  • ISBN-13: 9781614995272
Kitos knygos pagal šią temą:
ICT plays a crucial role in the pursuit of modernization in the countries of Slovenia, Croatia, Albania and Bulgaria, which form the South Eastern European (SEE) region., The quest for Euro-Atlantic integration and the undeniable necessity for direct foreign investment have encouraged the SEE countries to invest in the development of cyber technology, and it has become the dominant area for social, economic and political interaction within the region. This has had both positive and negative consequences. This book presents the proceedings of the NATO Advanced Training Course (ATC), held in Ohrid, former Yugoslav Republic of Macedonia, in December 2014. The ATC addressed serious concerns about terrorist use of cyber technology in South Eastern Europe, which not only has the potential to destabilize regional efforts to create a platform for increased development by creating a breeding ground for the training of extremists and the launching of cyber attacks, but also represents a direct and indirect threat to the security and stability of other NATO partner countries. The book will be of interest to all those involved in countering the threat posed by terrorist use of the Internet worldwide.
Foreword v
Mehmet Nesip Ogun
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report
1(14)
Alan Brill
Steganography in Support of the Global Terrorism
15(14)
Metro Bogdanoski
Aleksandar Risteski
Marjan Bogdanoski
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries
29(16)
Ronald S. Bearse
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals
45(12)
Alan Brill
The Use of Cyber Space for Terrorist Purposes -- with Special Reference to the Financing Terrorist Activity
57(16)
Ivica Simonovski
Conforming to al Qaeda's Single Narrative -- an Analysis of al Shabaab's Tweets During the Westgate Terrorist Attack
73(13)
David Mair
From Al-Qaeda to the Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion of Use of `Electronic Technologies' Up To Today's Embrace of Social Media to Attract a New Jihadi Generation
86(16)
Elliot Zweig
How Human Issues Impact Confronting Cyber Terrorism
102(14)
Nancy Houston
Human Factor Dual Role in Modem Cyberspace Social Engineering
116(13)
Zlatogor Minchev
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
129(20)
Arthur L. Brocato
Southeast European(SEE) States' International Legal Rights and Obligations in the Cyberspace
149(12)
Metodi Hadji-Janev
Cultural Aspects of Information Sharing and Collaboration
161(12)
Nancy Houston
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do)
173(10)
Raoul Chiesa
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace
183(17)
Stefano Mele
Assessing and Responding to the Cyberterrorism Threat
200(11)
Stuart Macdonald
Subject Index 211(2)
Author Index 213