{"title":"意图与网络恐怖主义","authors":"Florian J. Egloff","doi":"10.1093/oxfordhb/9780198800682.013.10","DOIUrl":null,"url":null,"abstract":"This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1048 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Intentions and Cyberterrorism\",\"authors\":\"Florian J. Egloff\",\"doi\":\"10.1093/oxfordhb/9780198800682.013.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.\",\"PeriodicalId\":336846,\"journal\":{\"name\":\"The Oxford Handbook of Cyber Security\",\"volume\":\"1048 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Oxford Handbook of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oxfordhb/9780198800682.013.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This chapter focuses on intentions and cyberterrorists. In defining cyberterrorism as the use, or threat of use, of cyberspace to deliver violence, through the disruption or destruction of digital data, the chapter captures potentially novel behaviour. It highlights the claims made by intelligence officials about terrorists’ intentions of using cyberspace. It then interrogates to what extent this matches the literature on terrorist motivations and intentions, and whether cyberspace is an attractive means for carrying out terrorist attacks. Finding that a simple cost–benefit analysis does not favour cyberspace as a means of carrying out terrorist acts, the chapter interrogates the vectors of change both on the intentions and capability side of the assessment. It closes with the analysis of a hypothetical case that would match the definition of cyberterror: a religiously inspired version of the Ashley Madison hack.