Chaos: making a new science
Things that make us smart: defending human attributes in the age of the machine
Things that make us smart: defending human attributes in the age of the machine
Small worlds: the dynamics of networks between order and randomness
Small worlds: the dynamics of networks between order and randomness
Unofficial Guide to Ethical Hacking
Unofficial Guide to Ethical Hacking
Digital Mythologies: The Hidden Complexities of the Internet
Digital Mythologies: The Hidden Complexities of the Internet
Cybercrime: Security and Surveillance in the Information Age
Cybercrime: Security and Surveillance in the Information Age
The Next War Zone: Confronting the Global Threat of Cyberterrorism
The Next War Zone: Confronting the Global Threat of Cyberterrorism
Scalable and Secure Internet Services and Architecture (Chapman & Hall/Crc Computer & I)
Scalable and Secure Internet Services and Architecture (Chapman & Hall/Crc Computer & I)
Strategies for Protecting National Critical Infrastructure Assets: A Focus on Problem-Solving
Strategies for Protecting National Critical Infrastructure Assets: A Focus on Problem-Solving
Complete Guide to Security and Privacy Metrics
Complete Guide to Security and Privacy Metrics
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology Security)
Invasion of privacy big brother and the company hackers
Invasion of privacy big brother and the company hackers
Postmodernism and Networks of Cyberterrorists
Journal of Digital Forensic Practice
Cyber Warfare and Cyber Terrorism
Cyber Warfare and Cyber Terrorism
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook
Ontology goes postmodern in ICT
SAICSIT '10 Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
Cyber-Terrorism and Ethical Journalism: A Need for Rationalism
International Journal of Technoethics
Hi-index | 0.00 |
This paper examines cyberterrorism and its potential to create a postmodern state of chaos. In general, chaos refers to a state of extreme confusion and disorder. This analysis breaks new ground in that it describes chaos theory as a foundation for better understanding cyberterrorism and explains how chaos theory and game theory are tightly coupled. The author also contrasts modern, conventional terrorism with postmodern, innovative cyberterrorism. The main idea is that the postmodern state of chaos caused by cyberterrorist attacks differs dramatically from the destruction caused by conventional terrorist acts. This comparison serves as the basis for making the point that cyberterrorism is not three-dimensional, it is not analog (but it is digital), and it exposes actors of cyberspace to new concepts of time and space. Another important argument is that the postmodern state of chaos implies the danger of cascading failures brought forth by cyberterrorists. A cascading failure is a succession of failures (i.e., cascade) caused by the elimination of a crucial node (i.e., a point or location in an infrastructural system) from a network. This paper is groundbreaking in that it adds fresh, new insights on scholarly perceptions of cyberterrorism. While most of the literature on the subject is technical and political, this paper brings a philosophical outlook to the association between postmodernism and the evolving face of terrorism. This paper begins with a thorough description of cyberterrorism, which refers to attacks conducted against computers, networks, and systems. Of equal relevance is the distinction between cyberterrorism and simple hacking. This paper then proceeds to explain postmodernism, asserting that cyberspace needs to be framed in the context of hyperreal (the blurring of distinctions between the real in the unreal). What comes next is the heart of the paper: the postmodern state of chaos. This paper ends with a discussion that also includes suggestions for future research.