Table of Contents.
Detailed Table of Contents.
1: Setting the Scene for Cyberterrorism and Other Cyber Attacks.
2: The Security Practitioners' Perspective.
3: Economic, Political, and Social Threats in the Information Age.
4: Critical Information Infrastructure and Cyber-Terrorism.
5: Attackers: Internal and External.
6: Threats, Vulnerability, Uncertainty, and Information Risk.
7: ICT and Security Governance: Doing the Right Things the Right Way (and Well Enough).
8: Concerns about What Will Happen Next: Should These Things Keep You Awake at Night?.
9: Law and Policy Perspectives.
10: Introduction: Weak Legal Framework and Limited International Cooperation.
11: To Define or Not to Define: Law and Policy Conundrums for the Cybercrime, National Security, International Law and Military Law Communities.
12: Anonymity, Actual Incidents, Cyber Attacks, and Digital Immobilization.
13: Culture Clashes: Freedom, Privacy, and Government Surveillance Issues Arising in Relation to National Security and Internet Use.
14: What Is Cyberterrorism and How Real Is the Threat? A Review of the Academic Literature, 1996 – 2009.
15: Cyber-Search and Cyber-Seizure: Policy Considerations of Cyber Operations and Fourth Amendment Implications.
16: Terrorism and the Internet: Do We Need an International Solution?.
17: Case Studies.
18: Case Study: India - Terrorism and Terrorist Use of the Internet/Technology.
19: China's Cyber Tool: Striving to Attain Electronic Shi?.
20: The United Kingdom's Centre for the Protection of National Infrastructure: An Evaluation of the UK Government's Response Mechanism to Cyber Attacks on Critical Infrastructures.
Compilation of References.
About the Contributors.