Assessing Terrorist Cyber Threats: Engineering a Functional Construct
Terrorist organizations and individuals make use of the Internet for supportive activities such as communication, recruiting, financing, training, and planning operations. However, little is known about the level of computer-based (“cyber”) threat such terrorist organizations and individuals pose....
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English |
Published: |
University of North Texas
2014
|
Subjects: | |
Online Access: | https://digital.library.unt.edu/ark:/67531/metadc799463/ |