Next generation of terrorism

Ubiquitous cyber terrorism with the accumulation of all intangible fears

Hai Cheng Chu, Der Jiunn Deng, Han Chieh Chao, Yueh-Min Huang

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on civilians, corporations or the governments physically thousands of miles away and accomplish severe death polls than the traditional one. The government in the public sector or the private critical infrastructure administrators should not underestimate these potential cyber attacks. In this paper, we presented the cyber terrorism, the next generation of terrorism, to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terrorism phenomena. This paper explicitly demonstrates the feasibility of launching cyber attacks toward critical infrastructures that might cause severe casualties.

Original languageEnglish
Pages (from-to)2391-2404
Number of pages14
JournalJournal of Universal Computer Science
Volume15
Issue number12
Publication statusPublished - 2009 Nov 20

Fingerprint

Terrorism
Critical infrastructures
Critical Infrastructure
Attack
Public Sector
Launching
Cracking
Computer Networks
Computer networks
Damage
Scenarios
Demonstrate
Industry
Government

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

@article{8ff6bac604ea4d70a94f8eaa33c256c7,
title = "Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears",
abstract = "It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on civilians, corporations or the governments physically thousands of miles away and accomplish severe death polls than the traditional one. The government in the public sector or the private critical infrastructure administrators should not underestimate these potential cyber attacks. In this paper, we presented the cyber terrorism, the next generation of terrorism, to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terrorism phenomena. This paper explicitly demonstrates the feasibility of launching cyber attacks toward critical infrastructures that might cause severe casualties.",
author = "Chu, {Hai Cheng} and Deng, {Der Jiunn} and Chao, {Han Chieh} and Yueh-Min Huang",
year = "2009",
month = "11",
day = "20",
language = "English",
volume = "15",
pages = "2391--2404",
journal = "Journal of Universal Computer Science",
issn = "0948-695X",
publisher = "Springer Verlag",
number = "12",

}

Next generation of terrorism : Ubiquitous cyber terrorism with the accumulation of all intangible fears. / Chu, Hai Cheng; Deng, Der Jiunn; Chao, Han Chieh; Huang, Yueh-Min.

In: Journal of Universal Computer Science, Vol. 15, No. 12, 20.11.2009, p. 2391-2404.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Next generation of terrorism

T2 - Ubiquitous cyber terrorism with the accumulation of all intangible fears

AU - Chu, Hai Cheng

AU - Deng, Der Jiunn

AU - Chao, Han Chieh

AU - Huang, Yueh-Min

PY - 2009/11/20

Y1 - 2009/11/20

N2 - It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on civilians, corporations or the governments physically thousands of miles away and accomplish severe death polls than the traditional one. The government in the public sector or the private critical infrastructure administrators should not underestimate these potential cyber attacks. In this paper, we presented the cyber terrorism, the next generation of terrorism, to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terrorism phenomena. This paper explicitly demonstrates the feasibility of launching cyber attacks toward critical infrastructures that might cause severe casualties.

AB - It is an urgent, imminent and present danger that we have to focus on the traditional terrorists, who are transforming ICT into the modern attacking tools that can devastate the metropolitan areas with the deconstruction of critical infrastructures via the computer network using state-of-the-art hacking and cracking technologies. The cyber terrorists could inflict catastrophic loss or damage on civilians, corporations or the governments physically thousands of miles away and accomplish severe death polls than the traditional one. The government in the public sector or the private critical infrastructure administrators should not underestimate these potential cyber attacks. In this paper, we presented the cyber terrorism, the next generation of terrorism, to be a forthcoming and unavoidable threat to the global community as well as providing a potential rational cyber terrorist scenario, which could be the global cyber terrorism phenomena. This paper explicitly demonstrates the feasibility of launching cyber attacks toward critical infrastructures that might cause severe casualties.

UR - http://www.scopus.com/inward/record.url?scp=70449589193&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70449589193&partnerID=8YFLogxK

M3 - Article

VL - 15

SP - 2391

EP - 2404

JO - Journal of Universal Computer Science

JF - Journal of Universal Computer Science

SN - 0948-695X

IS - 12

ER -