A3 Vertaisarvioitu kirjan tai muun kokoomateoksen osa
Identifying Terrorists in Cyber Space: Evaluating the Potential Role of Emerging Radical Technologies and Technology Disruption in Terrorism Foresight
Tekijät: Jari Kaivo-oja
Toimittaja: Theodore J. Gordon, Elizabeth Florescu, Jerome C. Glenn, Yair Sharan
Julkaisuvuosi: 2017
Kokoomateoksen nimi: Identification of Potential Terrorists and Adversary Planning. Emerging Technologies and New Counter-Terror Strategies
Sarjan nimi: NATO Science for Peace and Security Series - E: Human and Societal Dynamics
Vuosikerta: 132
Aloitussivu: 137
Lopetussivu: 153
Sivujen määrä: 17
ISBN: 978-1-61499-747-4
eISBN: 978-1-61499-748-1
ISSN: 1874-6276
DOI: https://doi.org/10.3233/978-1-61499-748-1-137
Verkko-osoite: http://ebooks.iospress.nl/volume/identification-of-potential-terrorists-and-adversary-planning-emerging-technologies-and-new-counter-terror-strategies
Rinnakkaistallenteen osoite: http://ebooks.iospress.nl/volume/identification-of-potential-terrorists-and-adversary-planning-emerging-technologies-and-new-counter-terror-strategies
The presentation focuses on the future challenges of identifying terrorists in cyber space. In the presentation special attention is paid to new available technologies, which help in the identification process. Author notes that disruptive technologies can be double-edged sword, as cyber terrorists can use the new disruptive technologies. Author first presents background theories of terrorist profiling and identification with special attention to geographical, behavioral, and sociological aspects. In the second phase, author evaluates the potential role of emerging radical and disruptive technologies in the identification process of individual terrorists and terrorist groups. Author also presents key systemic aspects of terrorism foresight paying special attention to advanced weak signal analysis and Wild Card methodology. WE-WI-analysis (weak signal-wild card analysis) can be helpful in operational risk identification, risk assessment, and risk mitigation. Author presents various models which are relevant for terrorism foresight.