Tabla de Contenidos:
  • TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes
  • With Special Reference To The Financing Terrorist Activity
  • Conforming to al Qaeda's single narrative
  • an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
  • Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index