z-logo
open-access-imgOpen Access
Use of Cyber Space by Terrorist Organizations
Author(s) -
Kaukab Jamal Zuberi
Publication year - 2018
Publication title -
international journal for electronic crime investigation
Language(s) - English
Resource type - Journals
eISSN - 2616-6003
pISSN - 2522-3429
DOI - 10.54692/ijeci.2018.020111
Subject(s) - cyber space , terrorism , space (punctuation) , cyber crime , workforce , computer security , anonymity , plan (archaeology) , cyber attack , business , upgrade , computer science , political science , law , geography , the internet , archaeology , world wide web , operating system
Prevention of Electronic Crime Act 2016 of Pakistan, defines and include cyber terrorism as a cyber-crime. Due to its anonymity cyber space is a popular tool used by terrorists. Terrorists use cyber space to launch their propaganda, recruit new workforce, radicalize target groups, raise financing, train the new recruits or upgrade the skills of existing workforce, raise funding for their operations, establish communication infrastructure to communicate within and outside the organization and execute their operations. This article discusses the various ways cyber space is used by the terrorist organizations to execute their plan

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here