Volume : 3, Issue : 3, JUL 2019

A STUDY ON CYBER TERRORISM PROMINENT CASE LAWS AND WAYS TO COMBAT IT

R. Dinesh

Abstract

In this research paper we have discussed about the phenomenon of Cyber terrorism and its growing impact in the current scenario. We have reviewed the laws and acts in various countries like US, UK, Canada, Australia and in India. We have also tried to review the Cyber terrorism from the aspect of the Indian IT Act 2000. We have carried out a comparative review of the various laws made by these individual countries to deal with the Cyber Terrorism. In the end we have concluded that the existing laws in various countries are not efficient to restrain the cyber-crimes and, thus urging a need for implementing modifications through which these activities can be prevented. There is a need of international cooperation of nations to crack down the efficiency on the cyber-crime.

Keywords

Article : Download PDF

Cite This Article

Cyber terrorism, cyber-crimes, laws, countries, Prevention, National Security.

Article No : 15

Number of Downloads : 1

References

  1. Book Black ice: The invisible threat of cyber-terrorism D Verton, J Brownlow - 2003 - dl.acm.org
  2. Assessing the risks of cyber terrorism, cyber war and other cyber threats JA Lewis - 2002 - steptoe.com
  3. Computer attack and cyberterrorism: vulnerabilities and policy issues for congress C Wilson - Focus on Terrorism, 2003 - books.google.com
  4. Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? M Stohl - Crime, law and social change, 2006 - Springer
  5. [PDF] academia.edu Computer hacking and cyber terrorism: The real threats in the new millennium? SM Furnell, MJ Warren - Computers & Security, 1999 - Elsevier
  6. Against cyberterrorism M Conway - Communications of the ACM, 2011 - dl.acm.org
  7. Cyber terrorism: political and economic implications AM Colarik - 2006 - books.google.com
  8. Assessing the risks of cyber terrorism, cyber war and other cyber threats JA Lewis - 2002 - steptoe.com
  9. Digital crime and digital terrorism RW Taylor, EJ Fritsch, J Liederbach - 2014 - dl.acm.org
  10. Managerial guide for handling cyber-terrorism and information warfare L Janczewski, AM Colarik - 2005 - books.google.com
  11. Computer hacking and cyber terrorism: The real threats in the new millennium? SM Furnell, MJ Warren - Computers & Security, 1999 - Elsevier
  12. Computer attack and cyberterrorism: vulnerabilities and policy issues for congress C Wilson - Focus on Terrorism, 2003 - books.google.com
  13. Cyber Terrorism: A Study of the Extent of Coverage in Computer Science Textbooks JJ Prichard, LE MacDonald - Journal of Information Technology …, 2004 - learntechlib.org
  14. Cyber‐terrorism: The shape of future conflict? A Rathmell - The RUSI Journal, 1997 - Taylor & Francis
  15. Cyberterrorism: Testimony before the special oversight panel on terrorism committee on armed services US House of Representatives DE Denning - Focus on Terrorism, 2000 - books.google.com
  16. Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? M Stohl - Crime, law and social change, 2006 - Springer
  17. [PDF] ccdcoe.org Developing an international cooperation on cyber defense and deterrence against cyber terrorism M Dogrul, A Aslan, E Celik - Cyber conflict (ICCC), 2011 3rd …, 2011 - ieeexplore.ieee.org
  18. Cyber-terrorism in a post-stuxnet world M Kenney - Orbis, 2015 - Elsevier
  19. Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy DE Denning - … netwars: The future of terror, crime, and militancy, 2001 - books.google.com
  20. What is cyberterrorism? M Conway - Current History, 2002 - search.proquest.com