Matches in SemOpenAlex for { <https://semopenalex.org/work/W2311453857> ?p ?o ?g. }
Showing items 1 to 56 of
56
with 100 items per page.
- W2311453857 endingPage "361" @default.
- W2311453857 startingPage "352" @default.
- W2311453857 abstract "In the developed world, the influence of information systems can now be seen in most operational areas of business. A significant result of these advances is that organizations have become increasingly dependent upon the availability of systems and reliant upon the data that they hold. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first WWW applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups (Rathmell, 1997). The term terrorist or terrorism is a highly emotive term. Generally it is used to denote “revolutionaries who seek to use terror systematically to further their views or to govern a particular area” (Warren, 1998). ‘Cyber-terrorism’ is a different form of terrorism since physical systematic terror does not usually occur (although it can if it causes disruption to a critical system), but a widespread destruction of information resources can. The problem of defining the term ‘terrorist’ relates to the fact that a terrorist group could easily be perceived as a resistance group carrying out lawful or morally legitimate actions. In the context of the chapter the term cyber-terrorist/terrorism will refer to all terrorist/resistance groups in order to give a neutral perception of their activities and aims. Another new term related to the Information Society is ‘electronic commerce.’ The notion of ‘electronic commerce’ is proposed as a means of drawing together a wide range of business support services. It includes such elements as inter-organizational e-mail; on-line directories; trading support systems for commodities, products, customised products and custom-built goods and services; ordering and logistic support systems; settlement support systems; and management information and statistical reporting systems (Warren et al, 1999). Business around the world has become more of a target of cyber terrorism due to the fact that they are increasingly dependent upon information technology (Howard, 1997). Therefore there are many more high technology targets to prey upon. Increasingly in the future, businesses will use electronic commerce and on-line systems as a method of conducting trade. These on-line methods are very vulnerable to attacks. In a recent, informal survey of Australian IT managers (Hutchinson and Warren, 1999), 80% of replies said that their sites had never been attacked, 66% do not feel their competitors would attack their site, and 66% had no policy about dealing with an attack. This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: • describe the background of cyber-terrorism; • describe what cyber-terrorism is; • describe the vulnerabilities of electronic commerce to cyber-terrorism; • discuss the future of electronic commerce and cyber-terrorism." @default.
- W2311453857 created "2016-06-24" @default.
- W2311453857 creator A5000077858 @default.
- W2311453857 creator A5084370797 @default.
- W2311453857 date "2011-05-24" @default.
- W2311453857 modified "2023-09-24" @default.
- W2311453857 title "The Use of the Internet by Terrorists and Its Impact Upon Electronic Commerce" @default.
- W2311453857 doi "https://doi.org/10.4018/978-1-878289-76-6.ch022" @default.
- W2311453857 hasPublicationYear "2011" @default.
- W2311453857 type Work @default.
- W2311453857 sameAs 2311453857 @default.
- W2311453857 citedByCount "0" @default.
- W2311453857 crossrefType "book-chapter" @default.
- W2311453857 hasAuthorship W2311453857A5000077858 @default.
- W2311453857 hasAuthorship W2311453857A5084370797 @default.
- W2311453857 hasConcept C108827166 @default.
- W2311453857 hasConcept C110875604 @default.
- W2311453857 hasConcept C136764020 @default.
- W2311453857 hasConcept C38652104 @default.
- W2311453857 hasConcept C41008148 @default.
- W2311453857 hasConcept C78597825 @default.
- W2311453857 hasConceptScore W2311453857C108827166 @default.
- W2311453857 hasConceptScore W2311453857C110875604 @default.
- W2311453857 hasConceptScore W2311453857C136764020 @default.
- W2311453857 hasConceptScore W2311453857C38652104 @default.
- W2311453857 hasConceptScore W2311453857C41008148 @default.
- W2311453857 hasConceptScore W2311453857C78597825 @default.
- W2311453857 hasLocation W23114538571 @default.
- W2311453857 hasOpenAccess W2311453857 @default.
- W2311453857 hasPrimaryLocation W23114538571 @default.
- W2311453857 hasRelatedWork W105493978 @default.
- W2311453857 hasRelatedWork W1504279965 @default.
- W2311453857 hasRelatedWork W1507065829 @default.
- W2311453857 hasRelatedWork W2019047852 @default.
- W2311453857 hasRelatedWork W2023543134 @default.
- W2311453857 hasRelatedWork W2084456074 @default.
- W2311453857 hasRelatedWork W2151292089 @default.
- W2311453857 hasRelatedWork W2277325930 @default.
- W2311453857 hasRelatedWork W2328978270 @default.
- W2311453857 hasRelatedWork W2354482659 @default.
- W2311453857 hasRelatedWork W2362059108 @default.
- W2311453857 hasRelatedWork W2368731053 @default.
- W2311453857 hasRelatedWork W2373860120 @default.
- W2311453857 hasRelatedWork W2376374103 @default.
- W2311453857 hasRelatedWork W2379418267 @default.
- W2311453857 hasRelatedWork W2388041155 @default.
- W2311453857 hasRelatedWork W2391688895 @default.
- W2311453857 hasRelatedWork W2393418063 @default.
- W2311453857 hasRelatedWork W2505174399 @default.
- W2311453857 hasRelatedWork W2756533636 @default.
- W2311453857 isParatext "false" @default.
- W2311453857 isRetracted "false" @default.
- W2311453857 magId "2311453857" @default.
- W2311453857 workType "book-chapter" @default.