Cyber Terrorism: An Examination of the Critical Issues
ABSTRACT
This paper examines the critical issues relevant to Cyber terrorism. A review of the literature indicates that incidences of computer crime and cyber terrorism are increasing. The cyber attacks on the U.S.’s critical infrastructure are no longer random, but rather are coordinated and precise. The types of attacks are discussed and documented instances are examined. Lastly, policy recommendations are discussed that to further assist the U.S. in defending its critical infrastructures and essential operations.
AUTHORS
Department of Criminal Justice & Legal Studies, University of Central Florida
Mark Henych is currently a criminal investigator for the U.S. Customs Service. Prior to this he assisted with numerous international law enforcement assistance projects. Presently he is pursuing a Ph.D. in Public Affairs at the University of Central Florida. He has authored numerous articles dealing with computer crime, cyber terrorism, law enforcement canines, and select topics in corrections. His areas of interest and expertise include, cyber crime, computer crime and cyber terrorism.
Department of Criminal Justice & Legal Studies, University of Central Florida
Stephen T. Holmes is an Associate Professor of Criminal Justice at the University of Central Florida. Prior to this position, he was a social science analyst with the National Institute of Justice in Washington, DC. He has authored over 10 books and more than 18 articles dealing with policing, drug testing, probation and parole issues, and violent crime.
Department of Criminal Justice & Legal Studies, University of Central Florida
Charles Mesloh is a former law enforcement officer and K-9 handler and trainer with a Master’s degree in Public Administration from Florida Gulf Coast University. Currently, he is the Administrative Services Coordinator at the University of Central Florida Police Department pursuing a Ph.D. in Public Affairs. His areas of research include law enforcement training, canine utilization, forfeiture, and use of force.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive