Beyond kinetic harm and towards a dynamic conceptualization of
cyberterrorism
- URL: http://arxiv.org/abs/2012.09056v1
- Date: Wed, 16 Dec 2020 16:23:11 GMT
- Title: Beyond kinetic harm and towards a dynamic conceptualization of
cyberterrorism
- Authors: Vince J. Straub
- Abstract summary: After more than two decades of discussion, the concept of cyberterrorism remains plagued by confusion.
This article presents the result of an integrative review which maps the development of the term and situates the communities that have shaped the debate.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: After more than two decades of discussion, the concept of cyberterrorism
remains plagued by confusion. This article presents the result of an
integrative review which maps the development of the term and situates the
epistemic communities that have shaped the debate. After critically assessing
existing accounts and highlighting the key ethical, social, and legal
dimensions at stake in preventing cyberterrorist attacks, it calls for a more
dynamic conceptualization that views cyberterrorism as more abstract, difficult
to predict, and hard to isolate; and which embraces a different conception of
sufficient harm. In concluding it proposes a novel definition of
cyberterrorism, intended to catalyse a new research programme, and sketches a
roadmap for further research.
Related papers
- CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML [0.0]
The study employs an analytical and comparative methodology, examining the synergy between cutting-edge Web3 technologies and information security.
The proposed model incorporates blockchain concepts, cyber non-fungible token (cyberNFT) rewards, machine learning algorithms, and publish/subscribe architectures.
arXiv Detail & Related papers (2024-08-31T21:15:26Z) - Cyber-sensorium: An Extension of the Cyber Public Health Framework [0.5852077003870417]
We draw parallels between the digital network and a biological nervous system essential to human welfare.
Cyberattacks on this system present serious global risks, underlining the need for its protection.
arXiv Detail & Related papers (2024-06-09T22:44:49Z) - Principles of Designing Robust Remote Face Anti-Spoofing Systems [60.05766968805833]
This paper sheds light on the vulnerabilities of state-of-the-art face anti-spoofing methods against digital attacks.
It presents a comprehensive taxonomy of common threats encountered in face anti-spoofing systems.
arXiv Detail & Related papers (2024-06-06T02:05:35Z) - Towards in-situ Psychological Profiling of Cybercriminals Using Dynamically Generated Deception Environments [0.0]
Cybercrime is estimated to cost the global economy almost $10 trillion annually.
Traditional perimeter security approach to cyber defence has so far proved inadequate to combat the growing threat of cybercrime.
Deceptive techniques aim to mislead attackers, diverting them from critical assets whilst simultaneously gathering cyber threat intelligence on the threat actor.
This article presents a proof-of-concept system that has been developed to capture the profile of an attacker in-situ, during a simulated cyber-attack in real time.
arXiv Detail & Related papers (2024-05-19T09:48:59Z) - Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories [15.764094200832071]
Cyber resilience focuses on preparation, response, and recovery from cyber threats that are challenging to prevent.
Game theory, control theory, and learning theories are three major pillars for the design of cyber resilience mechanisms.
This chapter presents various theoretical paradigms, including dynamic asymmetric games, moving horizon control, conjectural learning, and meta-learning.
arXiv Detail & Related papers (2024-04-01T16:02:21Z) - Investigating Human-Identifiable Features Hidden in Adversarial
Perturbations [54.39726653562144]
Our study explores up to five attack algorithms across three datasets.
We identify human-identifiable features in adversarial perturbations.
Using pixel-level annotations, we extract such features and demonstrate their ability to compromise target models.
arXiv Detail & Related papers (2023-09-28T22:31:29Z) - Designing an attack-defense game: how to increase robustness of
financial transaction models via a competition [69.08339915577206]
Given the escalating risks of malicious attacks in the finance sector, understanding adversarial strategies and robust defense mechanisms for machine learning models is critical.
We aim to investigate the current state and dynamics of adversarial attacks and defenses for neural network models that use sequential financial data as the input.
We have designed a competition that allows realistic and detailed investigation of problems in modern financial transaction data.
The participants compete directly against each other, so possible attacks and defenses are examined in close-to-real-life conditions.
arXiv Detail & Related papers (2023-08-22T12:53:09Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Towards a Contemporary Definition of Cybersecurity [0.0]
The article seeks to offer a comprehensive definition of the term "cybersecurity" to accentuate its multidisciplinary perspectives.
The report will offer a unified framework for examining activities that constitute the concept resulting in a new definition.
arXiv Detail & Related papers (2023-02-05T01:25:50Z) - Spatial-Temporal Sequential Hypergraph Network for Crime Prediction [56.41899180029119]
We propose Spatial-Temporal Sequential Hypergraph Network (ST-SHN) to collectively encode complex crime spatial-temporal patterns.
In particular, to handle spatial-temporal dynamics under the long-range and global context, we design a graph-structured message passing architecture.
We conduct extensive experiments on two real-world datasets, showing that our proposed ST-SHN framework can significantly improve the prediction performance.
arXiv Detail & Related papers (2022-01-07T12:46:50Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.