A3 Refereed book chapter or chapter in a compilation book

Identifying Terrorists in Cyber Space: Evaluating the Potential Role of Emerging Radical Technologies and Technology Disruption in Terrorism Foresight




AuthorsJari Kaivo-oja

EditorsTheodore J. Gordon, Elizabeth Florescu, Jerome C. Glenn, Yair Sharan

Publication year2017

Book title Identification of Potential Terrorists and Adversary Planning. Emerging Technologies and New Counter-Terror Strategies

Series titleNATO Science for Peace and Security Series - E: Human and Societal Dynamics

Volume132

First page 137

Last page153

Number of pages17

ISBN978-1-61499-747-4

eISBN978-1-61499-748-1

ISSN1874-6276

DOIhttps://doi.org/10.3233/978-1-61499-748-1-137

Web address http://ebooks.iospress.nl/volume/identification-of-potential-terrorists-and-adversary-planning-emerging-technologies-and-new-counter-terror-strategies

Self-archived copy’s web addresshttp://ebooks.iospress.nl/volume/identification-of-potential-terrorists-and-adversary-planning-emerging-technologies-and-new-counter-terror-strategies


Abstract

The presentation focuses on the future challenges of identifying terrorists in cyber space. In the presentation special attention is paid to new available technologies, which help in the identification process. Author notes that disruptive technologies can be double-edged sword, as cyber terrorists can use the new disruptive technologies. Author first presents background theories of terrorist profiling and identification with special attention to geographical, behavioral, and sociological aspects. In the second phase, author evaluates the potential role of emerging radical and disruptive technologies in the identification process of individual terrorists and terrorist groups. Author also presents key systemic aspects of terrorism foresight paying special attention to advanced weak signal analysis and Wild Card methodology. WE-WI-analysis (weak signal-wild card analysis) can be helpful in operational risk identification, risk assessment, and risk mitigation. Author presents various models which are relevant for terrorism foresight.



Last updated on 2024-26-11 at 14:25