Browse DORAS
Browse Theses
Latest Additions
Creative Commons License
Except where otherwise noted, content on this site is licensed for use under a:

Reality bytes: cyberterrorism and terrorist 'use' of the Internet

Conway, Maura (2002) Reality bytes: cyberterrorism and terrorist 'use' of the Internet. First Monday, 7 (11). ISSN 1396-0466

Full text available as:

PDF - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
[img]Microsoft Word


This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups' 'use' of the Internet, in particular the content of their Web sites, and their 'misuse' of the medium, as in hacking wars, for example. Terrorist groups' use of the Internet for the purpose of inter-group communication is also surveyed, partly because of its importance for the inter-networked forms of organisation apparently being adopted by these groups, but also due to the part played by the Internet in the events of September 11 and their aftermath.

Item Type:Article (Published)
Uncontrolled Keywords:Cyberterrorism; Internet;
Subjects:Social Sciences > Terrorism
Computer Science > World Wide Web
DCU Faculties and Centres:Research Initiatives and Centres > Centre for International Studies (CIS)
DCU Faculties and Schools > Faculty of Humanities and Social Science > School of Law and Government
Official URL:
Use License:This item is licensed under a Creative Commons Attribution-NonCommercial-Share Alike 3.0 License. View License
ID Code:498
Deposited On:18 Jun 2008 by DORAS Administrator. Last Modified 16 Feb 2009 14:45

Download statistics

Archive Staff Only: edit this record