/

GlobalView
  • Change Site
  • GlobalView
  • Research Output
  • Past Exam Papers
  • Special Collections
  • Advanced Search
  • Expert Search
  • Sign In
    • Help
    • Search History
    • Clear Session
  • Browse
    • Entire Repository  
    • Recent Additions
    • Communities & Collections
    • By Title
    • By Creator
    • By Subject
    • By Contributor
    • Most Accessed Papers
    • Most Accessed Items
    • Most Accessed Authors
  • Quick Collection  
Sign In
  • Help
  • Search History
  • Clear Session

MODS Metadata of Towards a cyberterrorism life-cycle (CLC) model

roleTerm ( text )
author 
namePart
Veerasamy, N. 
roleTerm ( text )
author 
namePart
Von Solms, S. 
roleTerm ( text )
author 
namePart
Grobler, M. 
dateAccessioned
2014-03-28T17:49:36Z 
dateAvailable
2014-03-28T17:49:36Z 
dateIssued
2012 
text
Veerasamy, N., Von Solms, S. & Grobler, M. 2012. Towards a cyberterrorism life-cycle (CLC) model. Proceedings of PICMET '12: Technology Management for Emerging Technologies. 
identifier ( issn )
978-1-4673-2853-1 
identifier ( uri )
http://hdl.handle.net/10210/9888 
abstract
Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause wide-scale damage. Cyberterrorism is often incorrectly perceived as encompassing all cybercrimes. However, cyberterrorism differs from cybercrime in various ways including motivation, attack goals, techniques and effects. Motivations for cyberterrorism, which is similar to terrorism in general, stem from religious, social and political views. Cyberterrorists generally would seek to have high impact in order to gain publicity for their cause, whereas cybercriminals often prefer to have their acts undetected in order to hide their financial theft, fraud or espionage. Therefore, there are various factors that drive the development of a cyberterrorist. This paper proposes a model for the development of cyberterrorism in order to show the various influential forces. The Cyberterrorism Life-Cycle (CLC) model presented in this paper is composed of five phases: Prepare, Acquaint, Choose, Execute, and Deter (PACED). In addition the paper looks at various factors, including social, practices, objectives, targets and countermeasures, which are mapped onto the PACED phases in order to show the interaction and dynamic nature during the life-cycle development. 
languageTerm ( rfc3066 )
en 
publisher
Proceedings of PICMET '12: Technology Management for Emerging Technologies. 
accessCondition ( useAndReproduction )
© 2012, Author; Proceedings of PICMET '12: Technology Management for Emerging Technologies. 
topic
Cybercrime 
topic
Cyberterrorism 
title
Towards a cyberterrorism life-cycle (CLC) model 
genre
Article 

Permalink

http://hdl.handle.net/10210/162991
  • English (United States)
  • English (United States)
  • Disclaimer
  • Privacy
  • Copyright
  • Contact
  • About Vital

‹ › ×

    Clear Session

    Are you sure you would like to clear your session, including search history and login status?