Professional Documents
Culture Documents
Clemente, Dave. International Security: Cyber Security As A Wicked Problem. Vol. 67, no. 10,
Hanes, Mark, and Matt Roll. Internet Safety. Vol. 89, no. 10, 2008, pp. 785785.,
Horne, Richard. Establishing the First Line of Defence. Vol. 68, no. 7, 2012, pp. 3637.,
Lambrechts, Robert J. The U.S. Electrical Grid: Surviving Cyber-Terrorism and Solar Flares.
Vol. 25, no. 4, 2011, pp. 4245., www.jstor.org/stable/23054852. Accessed 2 May 2017.
Westby, Jody R. Countering Terrorism with Cyber Security. Vol. 47, no. 3, 2007, pp. 297313.,
countries are using information and communication technologies (ICTs) to recruit and
spread propaganda, raise money, train jihadists, and communicate and conspire. Their
high-tech strategy outpaces the traditional approach of the United States and other
countries who are relying upon traditional strategies aimed at tracking, capturing, and
killing an enemy. The three problems that most frustrate governments in countering
terrorists' use of ICTs are (1) difficulties in tracking and tracing cyber communications,
(2) the lack of harmonized laws and procedures in investigating cybercrimes, and (3)
address these three areas of cyber security if they are to hope to win the battle against
terror.
Yorke, Claire. CYBERSECURITY AND SOCIETY: Bigsociety.com. Vol. 66, no. 12, 2010, pp.
Platt, Victor. Still the Fire-Proof House? An Analysis of Canada's Cyber Security
www.jstor.org/stable/23265971.