Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
53,621
result(s) for
"Cyberterrorism"
Sort by:
Constructing the cyberterrorist : critical reflections on the UK case
\"This book maps and analyses the official British construction of the threat of cyberterrorism. By using interpretive discourse analysis, this book identifies 'strands' from a corpus of policy documents, statements and speeches from UK ministers, MPs and peers, between 12 May 2010 and 24 June 2016. The book examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. The author makes novel contributions to the Copenhagen School's 'securitisation theory' framework by outlining a 'tiered' rather than monolithic audience system; refining the 'temporal' and 'spatial' conditioning of a securitisation with reference to the distinctive characteristics of cyberterrorism; and, lastly, by detailing the way in which popular fiction can be ascribed agency to 'fill in' an absence of 'cyberterrorism' case studies. He also argues that the UK government's classification of cyberterrorism as a 'Tier One' threat created a central strand upon which a discursive securitisation was established. This book will be of interest to students of critical security studies, terrorism studies, UK politics and IR\"-- Provided by publisher.
Cybersecurity breaches and cash holdings: Spillover effect
by
Garg, Priya
in
Cyberterrorism
2020
This paper shows that firms significantly increase cash holdings after they have experienced a cybersecurity attack, and this behavior persists for years. A cyberattack increases cash holdings from a base level of 23% of assets to 26.87%. Similar firms, defined by industry and geographical proximity also increase their cash holdings. Suppliers of attacked firms are also affected. Overall, the results of this study indicate that the detrimental effects of a cybersecurity breach are not isolated to the attacked firms, and peer firms are quick to follow in taking precaution.
Journal Article
Cyber blockades
This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study.
Correction: Mathematical analysis of the dynamics of cyberattack propagation in IoT networks
2025
[This corrects the article DOI: 10.1371/journal.pone.0322391.].
Journal Article
Optimizing cyberdeterrence : a comprehensive strategy for preventing foreign cyberattacks
Cyberattacks are one of the greatest fears for both governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing. Robert Mandel offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. Mandel says that cyberdeterrence must alter a potential attacker's decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve public-private partnerships, cross-domain responses must be considered, not just retaliation in kind. The book includes twelve twenty-first century cyberattack case studies in order to draw insights into cyberdeterrence and determine the conditions under which it works most effectively. Mandel concludes by making recommendations for implementing cyberdeterrence and integrating it into broader national security policy.
RETRACTED: Ortiz-Garces et al. Development of a Platform for Learning Cybersecurity Using Capturing the Flag Competitions. Electronics 2023, 12, 1753
2025
The journal retracts the article, Development of a Platform for Learning Cybersecurity Using Capturing the Flag Competitions [...]
Journal Article