Logic Tester for the Classification of Cyberterrorism Attacks

2019 ◽  
pp. 487-503
Author(s):  
N. Veerasamy ◽  
M.M. Grobler

The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber attacks. Although there have been no reported cases of Information Communication Technologies causing life-threatening situations or death, this research aims to show that cyberterrorism is not a negligible threat but instead a dangerous risk that should not be overlooked. This research will investigate the merging of terrorism with the cyber domain and present a multi-layered definition for cyberterrorism. This proposed definition is founded on the definition for traditional terrorism and incorporates elements of the international understanding of cyberterrorism. The research future presents a Logic Tester that uses Boolean logic to test the application of the multi-layered definition for cyberterrorism in terms of past international cyber incidents. The merit of the Logic Tester is presented through its application on a number of potential cyberterrorism scenarios, using the definition to classify these as either cyberterrorism or cyber attacks.

2015 ◽  
Vol 5 (1) ◽  
pp. 30-46
Author(s):  
N. Veerasamy ◽  
M.M. Grobler

The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber attacks. Although there have been no reported cases of Information Communication Technologies causing life-threatening situations or death, this research aims to show that cyberterrorism is not a negligible threat but instead a dangerous risk that should not be overlooked. This research will investigate the merging of terrorism with the cyber domain and present a multi-layered definition for cyberterrorism. This proposed definition is founded on the definition for traditional terrorism and incorporates elements of the international understanding of cyberterrorism. The research future presents a Logic Tester that uses Boolean logic to test the application of the multi-layered definition for cyberterrorism in terms of past international cyber incidents. The merit of the Logic Tester is presented through its application on a number of potential cyberterrorism scenarios, using the definition to classify these as either cyberterrorism or cyber attacks.


Author(s):  
Stan Karanasios ◽  
Stephen Burgess ◽  
Carmine Sellitto

This chapter introduces mobile technology and discusses its emergence in the tourism industry. As has been the case with other Information Communication Technologies (ICTs), tourism has manifested as one of the most well suited sectors to mobile technology and mobile applications. In contrast to other ICTs in the tourism domain however, mobile applications are capable of enhancing the tourist experience at the destination, creating a paradigm shift in how information is accessed and digested, and transactions performed. Nonetheless, little is known concerning how mobile technologies are changing the landscape of tourism and tourist behaviour and the content offered by tourism applications. In order to address the scarcity of research in this emergent area this paper focuses on mobile applications in the tourism industry and based on a literature survey proposes a framework for evaluating mobile tourism applications.


Author(s):  
John B. Sheldon

This chapter examines the impact of cyberpower on the conduct of war and what it means for the future of strategy and conflict. Cyberspace is a globally connected domain created by the rapid spread of information-communication technologies around the world. As a result, various actors, from individuals and small groups to non-state actors and governments, are now capable of launching cyber-attacks that present enormous challenges for strategists. The chapter first provides an overview of terms and definitions relating to cyberspace, cyberpower, and cyberwar before discussing the characteristics and attributes of cyberspace, cyberpower, and the infosphere. It then explains how cyberspace has emerged as a place of constant conflict, focusing on the problem of cyber security as well as the challenges and unknowns of cyber-attack. It concludes with an analysis of how cyberpower may trigger a twenty-first-century revolution in military affairs by reshaping international politics and altering the character of war.


2020 ◽  
pp. 81-92
Author(s):  
Andrey Ivanovich Shutenko ◽  
◽  
Elena Nikolaevn Shutenko ◽  
Julia Petrovna Derevyanko ◽  
◽  
...  

The article is devoted to the problem of educational communications development as a sphere of implementation of modern information-communication technologies in the higher education system. The purpose of the article is to present the structure and functions of educational communications aimed at the development of personal potential and self-realization of students. Methodology. The study is based on the methodology of personal and communicative-informational approaches in education, psychological-pedagogical provisions on the structure of communication, the leading role of learning activity, didactic principles of building an educational-informational environment. In theoretical terms, the study is based on the idea of the indirect implementation of ICT in education through the development of educational communications. The developing structure of educational communications, including didactic, informational-gnostic, interactive, psychological, attractive-motivational, value-semantic components, is presented. The possibilities of developing personal potential in educational communications are considered. The author’s developmental model of ICT functions is presented, which includes clusters of actual and latent functions aimed at the formation of information-educational space for the development of students’ personal potential. In conclusion, a inference was made about the prospects of the indirect introduction of modern ICT as tools for the development and functioning of various educational communications. At the same time, it is essential that these communications perform psychological and pedagogical tasks and functions.


2016 ◽  
Vol 4 (3) ◽  
pp. 178-203 ◽  
Author(s):  
Zuzana Sándorová

Abstract Along with mastery of the grammar and vocabulary of a given language, contemporary students are also expected to acquire intercultural communicative competence (ICC), i.e., the ability to use the language efficiently with regard to the sociocultural background of the communicative situation. This requirement should also be reflected in FL course-books, which are considered to be fundamental didactic tools in FL education, even in an era of information communication technologies. Therefore, the aim of the present paper is to report the results of the research focused on the investigation of intercultural component in the New Opportunities Pre-Intermediate and Intermediate course-book packages. To validate the findings of the content analysis, as the main research method, the method of triangulation was used, i.e., the results of the course-book package analyses were compared with those of observation and interview analyses. The findings of the research revealed that in the investigated course-book packages only some aspects of the intercultural component could be considered relevant because they were suitably treated.


2010 ◽  
Vol 1 (1) ◽  
pp. 37 ◽  
Author(s):  
Karin Geiselhart

In an environment of globalisation and rapidly expanding deployment of interactive digital communication, this paper takes a complex systems approach to the mapping of large scale global indicators onto electronic flows of information and intent. It argues that democracy is being transformed by online technologies, and that governments which embrace and encourage citizen inputs and monitoring of public information can establish vital groundwork for more effective forms of global governance. Growing awareness of issues that transcend jurisdictions makes such transformations both necessary and increasingly acceptable. The prism for this bird’s eye view is the Australian Government’s evolution in its uses of information communication technologies (ICTs) for citizen engagement.


Sign in / Sign up

Export Citation Format

Share Document