Veerasamy, Namosha2010-09-092010-09-092010-08Veerasamy, N. 2010. Motivation for cyberterrorism. 9th Annual Information Security South Africa (ISSA) - Towards New Security Paradigms. Sandton Convention Centre, 2 - 4 August 2010, pp 6978-1-4244-5494-5http://hdl.handle.net/10204/43379th Annual Information Security South Africa (ISSA) - Towards New Security Paradigms. Sandton Convention Centre, 2 - 4 August 2010Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation behind terrorism by looking at traditional terrorist groups and how their objectives can be met by Information and Communication Technology (ICT). This paper addresses the reasoning behind cyberterror by discussing a few incidents and elaborating on known terrorist groups before providing a classification of terrorist types and an explanation of some support terrorist functions with regard to ICT infrastructure. In this way, insight can be gained into the objectives that are trying to be achieved by terrorist organizations, as well as shedding light into real-life groups and their operationsenCyberterrorismCyberspace securityCyberspaceCyber terroristTerrorismCyberterrorMotivation for cyberterrorismConference PresentationVeerasamy, N. (2010). Motivation for cyberterrorism. http://hdl.handle.net/10204/4337Veerasamy, Namosha. "Motivation for cyberterrorism." (2010): http://hdl.handle.net/10204/4337Veerasamy N, Motivation for cyberterrorism; 2010. http://hdl.handle.net/10204/4337 .TY - Conference Presentation AU - Veerasamy, Namosha AB - Cyberterrorism represents the convergence of the virtual world of cyberspace and the intimidation techniques of terrorism. To better understand why cyber terrorist acts are committed, this paper investigates the motivation behind terrorism by looking at traditional terrorist groups and how their objectives can be met by Information and Communication Technology (ICT). This paper addresses the reasoning behind cyberterror by discussing a few incidents and elaborating on known terrorist groups before providing a classification of terrorist types and an explanation of some support terrorist functions with regard to ICT infrastructure. In this way, insight can be gained into the objectives that are trying to be achieved by terrorist organizations, as well as shedding light into real-life groups and their operations DA - 2010-08 DB - ResearchSpace DP - CSIR KW - Cyberterrorism KW - Cyberspace security KW - Cyberspace KW - Cyber terrorist KW - Terrorism KW - Cyberterror LK - https://researchspace.csir.co.za PY - 2010 SM - 978-1-4244-5494-5 T1 - Motivation for cyberterrorism TI - Motivation for cyberterrorism UR - http://hdl.handle.net/10204/4337 ER -