Cyber Terrorism: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
 
(18 intermediate revisions by one other user not shown)
Line 5: Line 5:
==Full Citation==
==Full Citation==


Michael Stohl, ''Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?'' (2006), Journal of Crime, Law and Social Change, Vol. 46, No. 4. [http://https://springerlink.metapress.com/content/y816117ww6058jp7/resource-secured/?target=fulltext.pdf&sid=ukox5aip0s1l2a55lur00i55&sh=www.springerlink.com ''Purchase Online'']   
Michael Stohl, ''Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?'', 46 J. of Crim., L. & Soc. Change 223 (2006).   [http://www.ingentaconnect.com/content/klu/cris/2006/00000046/F0020004/00009061 ''Purchase'']   


[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Stohl:2006 ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Stohl:2006 ''BibTeX'']


==Categorization==
==Categorization==
 
* Threats and Actors: [[Hacktivists]]; [[Terrorists]]; [[The Threat and Skeptics]]
Issues: [[Media Perceptions]]
* Issues: [[Incentives]]; [[Media Perceptions]]; [[Psychology and Politics]]


==Key Words==  
==Key Words==  
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Terrorism | Cyber Terrorism]],
[http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Digital_Pearl_Harbor Digital Pearl Harbor]
[[Keyword_Index_and_Glossary_of_Core_Ideas#Digital_Pearl_Harbor | Digital Pearl Harbor]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hackers]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivism | Hacktivism]]


==Synopsis==
==Synopsis==


Over the past two decades there has developed a voluminous literature on the  
This paper examines the incentives of private actors to invest in cybersecurity. Prior analyses have examined investments in security goods, such as locks or safes that have the characteristics of private goods. The analysis in this paper extends this analysis to examine expenditures on security goods, such as information, that have the characteristics of public goods. In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be necessary to facilitate the production of public security goods, and the protection of information produced by the collective organization should be a central feature of such organizations.
problem of cyber terrorism. The themes developed by those writing on cyber terrorism
While prior analyses have examined the provision of security goods that have the characteristics of private goods, the analysis in this paper examined expenditures on security, such as information, that have the characteristics of public goods.
appear to spring from the titles of Tom Clancy’s fiction, such as Clear and Present
In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case (a category this paper argues cybersecurity belongs to) can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be necessary to facilitate the production of public security goods, and the protection of information produced by the collective organization should be a central feature of such organizations.
Danger, The Sum of All Fears and Breaking Point, or somewhat more cynically, Patriot
Games. This essay examines both the gap between the presumed threat and the known
cyber terror behaviors and the continuing literature which suggests an attack is imminent. It
suggests that at least part of the explanation lies both in the continuing failure to distinguish
between what Denning (Activism, hacktivism, and cyber terrorism: The internet as a tool
for influencing foreign policy, 1999) referred to as hactivism and cyberterrorism and also
the failure to distinguish between the use of digital means for organizational purposes
(information, communication, command and control) and the use of digital communications
to actually commit acts of terror.  
 


==Additional Notes and Highlights==
==Additional Notes and Highlights==
Expertise Required: None


'' * Outline key points of interest
[http://www.blip.tv/file/208051 Video lecture] by Michael Stohl: ''Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games?'' April 12, 2007. [http://www.cits.ucsb.edu/event/cyber-terrorism-a-clear-and-present-danger-the-sum-all-fears-breaking-point-or-patriot-games ''AltWeb'']

Latest revision as of 09:49, 6 August 2012

Full Title of Reference

Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?

Full Citation

Michael Stohl, Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?, 46 J. of Crim., L. & Soc. Change 223 (2006). Purchase

BibTeX

Categorization

Key Words

Cyber Terrorism, Digital Pearl Harbor, Hackers, Hacktivism

Synopsis

This paper examines the incentives of private actors to invest in cybersecurity. Prior analyses have examined investments in security goods, such as locks or safes that have the characteristics of private goods. The analysis in this paper extends this analysis to examine expenditures on security goods, such as information, that have the characteristics of public goods. In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be necessary to facilitate the production of public security goods, and the protection of information produced by the collective organization should be a central feature of such organizations. While prior analyses have examined the provision of security goods that have the characteristics of private goods, the analysis in this paper examined expenditures on security, such as information, that have the characteristics of public goods. In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case (a category this paper argues cybersecurity belongs to) can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be necessary to facilitate the production of public security goods, and the protection of information produced by the collective organization should be a central feature of such organizations.

Additional Notes and Highlights

Expertise Required: None

Video lecture by Michael Stohl: Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games? April 12, 2007. AltWeb