Handbook of Terrorism and Counter Terrorism Post 9/11
Show Less

Handbook of Terrorism and Counter Terrorism Post 9/11

Edited by David Martin Jones, Paul Schulte, Carl Ungerer and M. L.R. Smith

Almost two decades after the events of 9/11, this Handbook offers a comprehensive insight into the evolution and development of terrorism and insurgency since then. Gathering contributions from a broad range of perspectives, it both identifies new technological developments in terrorism and insurgency, and addresses the distinct state responses to the threat of political, or religiously motivated violence; not only in the Middle East and Europe, but also in Africa, South and Southeast Asia, and North and South America.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 4: Strategic cyberterrorism: problems of ends, ways and means

Tim Stevens

Abstract

Given the much-vaunted ‘democratization’ of information communications technologies (ICT) and the ubiquity of potential targets, we have not, as yet, seen a single verifiable case of cyberterrorism, even against countries and populations considered the richest targets. Why? This chapter addresses this question through the lens of the strategy of terrorism. Much existing literature either promotes the probability of cyberterrorism, or denies its possibility. This has generated useful insights but, in the absence of evidence, a different approach may be necessary, one that is less hampered by a sample size of zero and is less likely to be invalidated should the empirical record suddenly change. Cyberterrorism can be analysed using the same conceptual tools as for other modes of terrorism and we can determine why terrorists would select cyberterrorism to attain their political goals and why they might choose not to. The intention is not to assess the quantitative likelihood of a cyberterrorist event but to identify how ends, ways and means articulate within a possible strategy of cyberterrorism.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.


Further information

or login to access all content.