Comparing civilian willingness to attack critical infrastructure on and off line

Thomas Holt, Max Kilger, Lichun Chiang, Chu Sing Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

As critical infrastructure and governmental resources are increasingly supported by the Internet, there has been a substantial increase in attacks against these sensitive targets. There has also been a concurrent increase in cyberattacks against various governmental and private industry targets by non-state sponsored groups, most notably Anonymous and LulzSec. These conditions facilitate the emergence of civilian cyberwarriors who are encouraged and emboldened by the anonymity afforded on-line to engage in malicious acts against critical infrastructure in countries around the world. As a consequence, there is a need to explore individual willingness to act as a cyberwarrior against foreign and domestic targets, and any relationship this may have to physical acts of protest and violence. This study will compare a sample of students collected at two universities in the United States and Taiwan to understand the rates of participation in physical and cyber-actions against domestic and foreign targets. Implications of this study for legal and governmental security policies will be explored in detail, along with directions for future research to understand emerging threats in cyberspace.

Original languageEnglish
Title of host publicationProceedings of the European Conference on e-Government, ECEG
Pages345-351
Number of pages7
Publication statusPublished - 2012
Event12th European Conference on e-Government, ECEG 2012 - Barcelona, Spain
Duration: 2012 Jun 142012 Jun 15

Publication series

NameProceedings of the European Conference on e-Government, ECEG
ISSN (Print)2049-1034

Other

Other12th European Conference on e-Government, ECEG 2012
Country/TerritorySpain
CityBarcelona
Period12-06-1412-06-15

All Science Journal Classification (ASJC) codes

  • Business and International Management
  • Management of Technology and Innovation
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Comparing civilian willingness to attack critical infrastructure on and off line'. Together they form a unique fingerprint.

Cite this