Crossing the Rubicon: Understanding Cyber Terrorism in the European Context

The European Legacy 19 (5):606-621 (2014)
  Copy   BIBTEX

Abstract

The first decade of the twenty-first century introduced a cultural shift where terrorism is concerned by making new technologies such as computers and networks available as both tools and targets for exploitation. The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. Using cyber technologies has many benefits for the user and the potential of causing more damage by a keystroke than a bomb is increasing daily. Despite much recent scholarship on cyber terrorism, however, there continue to be problems not only in defining what cyber terrorism means but in identifying both who are the actors and the panoply of choices actors confront. In this essay, I attempt to clarify these problems by defining key terms and by analyzing the recent escalation in cyber use in the European context.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,963

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Terrorism, Singularity, and the Phenomenology of Understanding.George Teschner - 2008 - Philosophy in the Contemporary World 15 (1):32-43.
Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
Crossing "the rubicon between mechanism and life".Robert Morris Ogden - 1925 - Journal of Philosophy 22 (11):281-293.
Confronting Cyber Warfare: Rethinking the Ethics of Cyber War.Bassam Romaya & Lisa Portmess - 2013 - Journal for Peace and Justice Studies 23 (1):44-60.
Caesar at the Rubicon.Tenney Frank - 1907 - Classical Quarterly 1 (2-3):223-.
Questions regarding a war on terrorism.Claudia Card - 2003 - Hypatia 18 (1):164 - 169.
Justifying Terrorism.Thom Brooks - 2010 - Public Affairs Quarterly 24 (3):189-196.

Analytics

Added to PP
2015-09-03

Downloads
26 (#611,461)

6 months
4 (#792,011)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.

Add more references