首页 > 最新文献

War and Virtual War最新文献

英文 中文
Cross-Track Approach: A Remedy to Post-Conflict Peace Building? 跨轨道方法:冲突后和平建设的补救办法?
Pub Date : 2004-01-01 DOI: 10.1163/9789004495364_017
{"title":"Cross-Track Approach: A Remedy to Post-Conflict Peace Building?","authors":"","doi":"10.1163/9789004495364_017","DOIUrl":"https://doi.org/10.1163/9789004495364_017","url":null,"abstract":"","PeriodicalId":384069,"journal":{"name":"War and Virtual War","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberterrorism: Media Myth or Clear and Present Danger? 网络恐怖主义:媒体的神话还是明确而现实的危险?
Pub Date : 2004-01-01 DOI: 10.1163/9789004495364_009
M. Conway
The Internet is the instrument of a political power shift. It is the first many-to-many communication system. The ability to communicate words, images, and sound s, which underlies the power to persuade, inform, w itness, debate, and discuss (not to mention the power to sl ander, propagandise, disseminate bad or misleading information, engage in misinformation and/or disinf ormation, etc.) is no longer the sole province of t hose who own printing presses, radio stations, or television networks. Every machine connected to the Internet is potentially a printing press, a broadcasting statio n, a place of assembly. And in the twenty first cen tury, terrorists are availing of the opportunity to connect. The Internet is an ideal propaganda tool for terror ists: in the past they had to communicate through a cts of violence and hope that those acts garnered sufficie nt attention to publicise the perpetrators cause or xplain their ideological justification. With the advent of the I nternet, however, the same groups can disseminate t heir information undiluted by the media and untouched by government sensors. In 1998 it was reported that 1 2 of the 30 terrorist organisations identified by the US Sta te Department had their own websites. Today, a majo rity f the 33 groups on the same list of Designated Foreign Te rrorist Organisations maintain an official online p resence (see Conway 2002). 1 The question that then arises is this: Are terrori st groups who use the Internet in such a manner ‘cyberterrorists’? The answer hinges on what constitutes cyberterrorism. The term cyberterrorism unites two significant mode rn fears: fear of technology and fear of terrorism. Both of these fears are evidenced in this quote from Wal ter Laqueur, one of the most well known figures in terrorism studies: “The electronic age has now made cyberterr o ism possible. A onetime mainstay of science ficti on, the doomsday machine, looms as a real danger. The conju nction of technology and terrorism make for an unce rtain and frightening future” (Laqueur 1999, 254). It is not only academics that are given to sensationalism . Cyberterrorism first became the focus of sustained analysis by government in the mid-1990s. In 1996 Jo hn Deutch, former director of the Central Intelligence Agency (CIA), testified before the Permanent Subco mmittee on Investigations of the United States’ Senate Governmental Affairs C ommittee:
互联网是政治权力转移的工具。这是第一个多对多通信系统。沟通文字、图像和声音的能力,是说服、告知、见证、辩论和讨论的力量(更不用说煽动、宣传、传播不良或误导性信息、参与错误信息和/或虚假信息等的力量)的基础,不再是那些拥有印刷厂、广播电台或电视网络的人的专有领域。每一台连接到互联网的机器都可能是一台印刷机,一个广播站,一个集会场所。在21世纪,恐怖分子正在利用这个机会进行联系。互联网是恐怖分子理想的宣传工具:在过去,他们必须通过暴力行为进行沟通,并希望这些行为能够引起足够的关注,以宣传肇事者的原因或解释他们的意识形态理由。然而,随着互联网的出现,同样的群体可以传播他们的信息,而不受媒体的稀释,也不受政府传感器的影响。1998年,据报道,美国国务院认定的30个恐怖组织中有12个拥有自己的网站。今天,33个被列入指定外国恐怖组织名单的组织中,大多数在网上保持官方存在(见Conway 2002)。接下来的问题是:以这种方式使用互联网的恐怖组织是“网络恐怖分子”吗?答案取决于什么构成了网络恐怖主义。网络恐怖主义一词结合了两种重要的网络恐惧:对技术的恐惧和对恐怖主义的恐惧。这两种担忧在恐怖主义研究领域最著名的人物之一沃尔特·拉克尔(walter Laqueur)的一句话中得到了证明:“电子时代现在使网络恐怖主义成为可能。曾经是科幻小说中流砥柱的“末日机器”(doomsday machine),已成为一种真正的危险。技术和恐怖主义的结合创造了一个可怕的未来”(Laqueur 1999,254)。不仅仅是学术界喜欢哗众取宠。20世纪90年代中期,网络恐怖主义首次成为政府持续分析的焦点。1996年,中央情报局(CIA)前局长约翰·多伊奇在美国参议院政府事务委员会常设调查小组委员会作证时说:
{"title":"Cyberterrorism: Media Myth or Clear and Present Danger?","authors":"M. Conway","doi":"10.1163/9789004495364_009","DOIUrl":"https://doi.org/10.1163/9789004495364_009","url":null,"abstract":"The Internet is the instrument of a political power shift. It is the first many-to-many communication system. The ability to communicate words, images, and sound s, which underlies the power to persuade, inform, w itness, debate, and discuss (not to mention the power to sl ander, propagandise, disseminate bad or misleading information, engage in misinformation and/or disinf ormation, etc.) is no longer the sole province of t hose who own printing presses, radio stations, or television networks. Every machine connected to the Internet is potentially a printing press, a broadcasting statio n, a place of assembly. And in the twenty first cen tury, terrorists are availing of the opportunity to connect. The Internet is an ideal propaganda tool for terror ists: in the past they had to communicate through a cts of violence and hope that those acts garnered sufficie nt attention to publicise the perpetrators cause or xplain their ideological justification. With the advent of the I nternet, however, the same groups can disseminate t heir information undiluted by the media and untouched by government sensors. In 1998 it was reported that 1 2 of the 30 terrorist organisations identified by the US Sta te Department had their own websites. Today, a majo rity f the 33 groups on the same list of Designated Foreign Te rrorist Organisations maintain an official online p resence (see Conway 2002). 1 The question that then arises is this: Are terrori st groups who use the Internet in such a manner ‘cyberterrorists’? The answer hinges on what constitutes cyberterrorism. The term cyberterrorism unites two significant mode rn fears: fear of technology and fear of terrorism. Both of these fears are evidenced in this quote from Wal ter Laqueur, one of the most well known figures in terrorism studies: “The electronic age has now made cyberterr o ism possible. A onetime mainstay of science ficti on, the doomsday machine, looms as a real danger. The conju nction of technology and terrorism make for an unce rtain and frightening future” (Laqueur 1999, 254). It is not only academics that are given to sensationalism . Cyberterrorism first became the focus of sustained analysis by government in the mid-1990s. In 1996 Jo hn Deutch, former director of the Central Intelligence Agency (CIA), testified before the Permanent Subco mmittee on Investigations of the United States’ Senate Governmental Affairs C ommittee:","PeriodicalId":384069,"journal":{"name":"War and Virtual War","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129673922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Peace and Virtual Peace: Challenges to War 和平与虚拟和平:对战争的挑战
Pub Date : 2004-01-01 DOI: 10.1163/9789004495364_016
{"title":"Peace and Virtual Peace: Challenges to War","authors":"","doi":"10.1163/9789004495364_016","DOIUrl":"https://doi.org/10.1163/9789004495364_016","url":null,"abstract":"","PeriodicalId":384069,"journal":{"name":"War and Virtual War","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127895361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
War and Virtual War
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1