Cyber Terrorism

Business & Finance
Cover of the book Cyber Terrorism by Christian Nitschke, GRIN Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christian Nitschke ISBN: 9783638277631
Publisher: GRIN Publishing Publication: May 21, 2004
Imprint: GRIN Publishing Language: English
Author: Christian Nitschke
ISBN: 9783638277631
Publisher: GRIN Publishing
Publication: May 21, 2004
Imprint: GRIN Publishing
Language: English

Essay from the year 2003 in the subject Business economics - Miscellaneous, grade: 2,0 (B), Stellenbosch Universitiy (Business School), language: English, abstract: The dependency on Information Systems and Technology is a given fact of today's world either in public or in business. But this dependency also creates vulnerabilities in form of new targets for particular groups instead of the supposed improvements of overall life quality. Cyber attacks therefore pose complex problems to national security and public policy as well as to the economy. Cyber terrorism occurs in the virtual world of bits and is being seen as a convergence of terrorism and cyberspace. It can take place in simple structured styles up to complex coordinated ways of attacking and should be differentiated in conventional or unique manners of execution. To provide a deeper understanding of the field of cyber terrorism it is investigated with the method of 'semiotics'. This is be done through the Morphological, Empirical, Syntactical, Semantic and Pragmatic layer to be able to classify and categorize cyber terrorism on risk and the rate of impact. The concluding part deals with the economic costs of cyber terrorism on the hand and provides a prevention model for terrorism on the other. Economic costs do not only cover the direct costs involved for security there are as well opportunity cost involved which have to be taken into account. The loss of intellectual property, the lower productivity caused by cyber attacks and the hurt of third party liability are non monetary measures for the ladder. The prevention model is based on the cybernetic approach to build up a system where the complex structure of 'cause and affect' of the anti terrorism variables is incorporated. The sensitivity of this tough system is shown on some particular elements. The model provides a network for the development of sustainable solutions to limit the overall economical costs of the fight against terrorism.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Essay from the year 2003 in the subject Business economics - Miscellaneous, grade: 2,0 (B), Stellenbosch Universitiy (Business School), language: English, abstract: The dependency on Information Systems and Technology is a given fact of today's world either in public or in business. But this dependency also creates vulnerabilities in form of new targets for particular groups instead of the supposed improvements of overall life quality. Cyber attacks therefore pose complex problems to national security and public policy as well as to the economy. Cyber terrorism occurs in the virtual world of bits and is being seen as a convergence of terrorism and cyberspace. It can take place in simple structured styles up to complex coordinated ways of attacking and should be differentiated in conventional or unique manners of execution. To provide a deeper understanding of the field of cyber terrorism it is investigated with the method of 'semiotics'. This is be done through the Morphological, Empirical, Syntactical, Semantic and Pragmatic layer to be able to classify and categorize cyber terrorism on risk and the rate of impact. The concluding part deals with the economic costs of cyber terrorism on the hand and provides a prevention model for terrorism on the other. Economic costs do not only cover the direct costs involved for security there are as well opportunity cost involved which have to be taken into account. The loss of intellectual property, the lower productivity caused by cyber attacks and the hurt of third party liability are non monetary measures for the ladder. The prevention model is based on the cybernetic approach to build up a system where the complex structure of 'cause and affect' of the anti terrorism variables is incorporated. The sensitivity of this tough system is shown on some particular elements. The model provides a network for the development of sustainable solutions to limit the overall economical costs of the fight against terrorism.

More books from GRIN Publishing

Cover of the book Political Polling in the United States and Germany. A Comparison by Christian Nitschke
Cover of the book Who is an intellectual What should the role of intellectuals be in society? by Christian Nitschke
Cover of the book Wertorientierte Anreizgestaltung by Christian Nitschke
Cover of the book Chong Son - The development of true-view landscape painting by Christian Nitschke
Cover of the book Analysis of the questionnaire used in 'ERASMUS Programme as Promoter of Tolerance comparing Latvia to France and Switzerland' by Christian Nitschke
Cover of the book The U.S. Service Sector - International Trade of Services and the Information and Communication Technology (ICT) by Christian Nitschke
Cover of the book The Sapir-Whorf Hypothesis by Christian Nitschke
Cover of the book Germany vs. US - Two Welfare Regimes seen from the Gender perspective by Christian Nitschke
Cover of the book The Concept of Love in Shakespeare's 'A Midsummer Night's Dream'' by Christian Nitschke
Cover of the book The influence of politics on the development of newspapers between 1660 and 1855, at the example of 'The Times' by Christian Nitschke
Cover of the book The Simile of the Avalanche in Shelley's Prometheus Unbound by Christian Nitschke
Cover of the book 'Solvitur acris hiems' - ein Frühlingsgedicht des Horaz by Christian Nitschke
Cover of the book Stundenkonzept für die Sekundarstufe I: Hinduismus - Das Kastensystem in Indien by Christian Nitschke
Cover of the book How do documentary collections reduce the risk for customers in export/import transactions? by Christian Nitschke
Cover of the book Post Keynesian Methodology by Christian Nitschke
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy