Assessing Terrorist Cyber Threats: Engineering a Functional Construct

Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose....

Full description

Bibliographic Details
Main Author: Morgan, Deanne
Other Authors: O'Connor, Brian Clark
Format: Others
Language:English
Published: University of North Texas 2014
Subjects:
Online Access:https://digital.library.unt.edu/ark:/67531/metadc799463/