Addressing the spectre of cyber terrorism: a comparative perspective
MetadataShow full item record
This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future. The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists. The horrific events of 9/11 provided the impetus for many countries to introduce antiterrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.
Showing items related by title, author, creator and subject.
Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study Cassim, F (2009)The article looks at cyber legislation formulated to address cybercrime in the United States of America, the United Kingdom, Australia, India, the Gulf States and South Africa. The study reveals that the inability of ...
Erlank, W. (2015)The fields of virtual property and property in space are both new areas of property law that could not have been envisaged a hundred years ago. In both of these new fields, things and other objects of property are located ...
Lehobye, Nafta Mokate (North-West University (Potchefstroom Campus), Faculty of Law, 2010)More often than not, there exists some form of infringement relating to the use of other authors' work. This is particularly so in instances in which novice authors make use of the information available within the ...