Semiotic emergent framework to address the reality of cyberterrorism

Kevin C. Desouza, Tobin Hensgen

Research output: Contribution to journalArticle

21 Citations (Scopus)

Abstract

The following paper examines concepts associated with cyberterrorism. Most of the current attention given terrorism involves both probability and consequences related to the physical world. Focuses in "what-if" scenarios involve threats to the economy and the population from an enemy that has all the discretion in selecting the battlefield. But what if the target of terrorism activity is a virtual world? The economic and communications infrastructure of many countries depend on cyber thoroughfares at least as much as they do those of concrete or steel. Yet little attention is given to the notion of attacks that can occur in cyberspace. This discussion examines what cyberterrorism means, the forms it may take and how it may occur, and safeguards that should be considered in preparation for cyber warfare. To this end, we draw from current theories involving semiotics, emergence, and complexity to ground our work.

Original languageEnglish (US)
Pages (from-to)385-396
Number of pages12
JournalTechnological Forecasting and Social Change
Volume70
Issue number4
DOIs
StatePublished - May 2003
Externally publishedYes

Fingerprint

Terrorism
Semiotics
Military operations
Steel
Economics
Concretes
Communication
Population
Cyberterrorism
Warfare
Virtual worlds
Attack
Safeguards
Threat
Preparation
Discretion
Cyberspace
Scenarios

Keywords

  • Complexity
  • Cyberterrorism
  • Emergence
  • Semiotics
  • Steganography

ASJC Scopus subject areas

  • Business and International Management
  • Management of Technology and Innovation
  • Applied Psychology

Cite this

Semiotic emergent framework to address the reality of cyberterrorism. / Desouza, Kevin C.; Hensgen, Tobin.

In: Technological Forecasting and Social Change, Vol. 70, No. 4, 05.2003, p. 385-396.

Research output: Contribution to journalArticle

Desouza, Kevin C. ; Hensgen, Tobin. / Semiotic emergent framework to address the reality of cyberterrorism. In: Technological Forecasting and Social Change. 2003 ; Vol. 70, No. 4. pp. 385-396.
@article{bb5a8767cb734a7f974471c2e0db1ff6,
title = "Semiotic emergent framework to address the reality of cyberterrorism",
abstract = "The following paper examines concepts associated with cyberterrorism. Most of the current attention given terrorism involves both probability and consequences related to the physical world. Focuses in {"}what-if{"} scenarios involve threats to the economy and the population from an enemy that has all the discretion in selecting the battlefield. But what if the target of terrorism activity is a virtual world? The economic and communications infrastructure of many countries depend on cyber thoroughfares at least as much as they do those of concrete or steel. Yet little attention is given to the notion of attacks that can occur in cyberspace. This discussion examines what cyberterrorism means, the forms it may take and how it may occur, and safeguards that should be considered in preparation for cyber warfare. To this end, we draw from current theories involving semiotics, emergence, and complexity to ground our work.",
keywords = "Complexity, Cyberterrorism, Emergence, Semiotics, Steganography",
author = "Desouza, {Kevin C.} and Tobin Hensgen",
year = "2003",
month = "5",
doi = "10.1016/S0040-1625(03)00003-9",
language = "English (US)",
volume = "70",
pages = "385--396",
journal = "Technological Forecasting and Social Change",
issn = "0040-1625",
publisher = "Elsevier Inc.",
number = "4",

}

TY - JOUR

T1 - Semiotic emergent framework to address the reality of cyberterrorism

AU - Desouza, Kevin C.

AU - Hensgen, Tobin

PY - 2003/5

Y1 - 2003/5

N2 - The following paper examines concepts associated with cyberterrorism. Most of the current attention given terrorism involves both probability and consequences related to the physical world. Focuses in "what-if" scenarios involve threats to the economy and the population from an enemy that has all the discretion in selecting the battlefield. But what if the target of terrorism activity is a virtual world? The economic and communications infrastructure of many countries depend on cyber thoroughfares at least as much as they do those of concrete or steel. Yet little attention is given to the notion of attacks that can occur in cyberspace. This discussion examines what cyberterrorism means, the forms it may take and how it may occur, and safeguards that should be considered in preparation for cyber warfare. To this end, we draw from current theories involving semiotics, emergence, and complexity to ground our work.

AB - The following paper examines concepts associated with cyberterrorism. Most of the current attention given terrorism involves both probability and consequences related to the physical world. Focuses in "what-if" scenarios involve threats to the economy and the population from an enemy that has all the discretion in selecting the battlefield. But what if the target of terrorism activity is a virtual world? The economic and communications infrastructure of many countries depend on cyber thoroughfares at least as much as they do those of concrete or steel. Yet little attention is given to the notion of attacks that can occur in cyberspace. This discussion examines what cyberterrorism means, the forms it may take and how it may occur, and safeguards that should be considered in preparation for cyber warfare. To this end, we draw from current theories involving semiotics, emergence, and complexity to ground our work.

KW - Complexity

KW - Cyberterrorism

KW - Emergence

KW - Semiotics

KW - Steganography

UR - http://www.scopus.com/inward/record.url?scp=0037401061&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0037401061&partnerID=8YFLogxK

U2 - 10.1016/S0040-1625(03)00003-9

DO - 10.1016/S0040-1625(03)00003-9

M3 - Article

AN - SCOPUS:0037401061

VL - 70

SP - 385

EP - 396

JO - Technological Forecasting and Social Change

JF - Technological Forecasting and Social Change

SN - 0040-1625

IS - 4

ER -