Author:Veerasamy, Namosha; Grobler, M; Von Solms, BDate:Jul 2012Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, ...Read more
Author:Veerasamy, NamoshaDate:Apr 2009Uneasiness arises from the possibility of random cyber attacks. In the global information and network warfare battle, cyberterrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to ...Read more
Author:Veerasamy, Namosha; Grobler, MDate:Oct 2010Cyberterrorism addresses the convergence of the fear-causing world of terrorism with the abstract realm of cyberspace, computers and networks. While cyberterrorism can be executed using various technical security exploits, it inherently stems ...Read more
Author:Veerasamy, NamoshaDate:Sep 2020Technological advancements continue to progress and so too grows the prospect of cyberterrorism. Hacking tools are growing in sophistication, and agitated terrorist groups may look for an innovative outlet for their political, religious or ...Read more
Author:Veerasamy, NamoshaDate:Apr 2010The aim of this paper is to describe how various observations made by sections of the world population direct people into making decisions and committing acts of cyberterror. The paper will thus look at issues like the environmental factors, ...Read more
Author:Veerasamy, Namosha; Grobler, MMDate:2015The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as ...Read more
Author:Veerasamy, NamoshaDate:Aug 2010Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation behind terrorism ...Read more
Author:Veerasamy, Namosha; Grobler, M; Von Solms, SDate:Aug 2012Cyberterrorism has emerged as a new threat in the Information and Communication Technology (ICT) landscape. The ease of use, affordability, remote capabilities and access to critical targets makes cyberterrorism a potential threat to cause ...Read more