-
An Analysis of the Growth of Computer and Internet Security Breaches
This study uses the modified Gompertz model and sparse data to analyze the growth rates of different types of computer and internet-related crimes. [issuu width=420 height=272 backgroundColor=%23222222 documentId=120131151408-4d6b33a4909b4d8c9808ee10b3f90b5b name=bagchi_security username=futurechallenges tag=cybercrime unit=px id=6a2198cd-8823-3095-f96e-6413717504dc v=2]
Read all posts from ‘Defending the global village’
-
Separating Threat From Hype: What Washington Needs to Know About Cyber Security
Washington has become transfixed by cyber security and with good reason. Cyber threats cost Americans billions of dollars each year and put U.S. troops at risk. Yet, too much of the discussion about cyber security is ill informed, and even sophisticated policymakers struggle to sort hype from reality. [issuu width=420 […]
-
Exploitation of Information and Communication Technology by Terrorist Organisations
Almost every new technology developed has brought great benefits attached with some risks. To each ‘technology’, there is an ‘anti- technology’, making it a double edged weapon. But whatever be the risks, the progress just carries on, and new methods are found to tackle the risks. The phenomenal growth of […]
-
Terrorism and the Internet: New Media – New Threat?
The internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. […]
-
Cyberspace – A New Medium for Communication, Command, and Control by Extremists
Information and Communication Technologies (ICTs) are extending the arena within which extremists and terrorists operate. Among the most active participants are Islamists and the Far Right, whose increasingly networked formats are enhanced by such technologies. These provide them with new benefits: interconnectivity; anonymity; cheapness; power enhancement; new audiences. [issuu width=420 […]