Performance of Virtual Terrorism in Cyber Space

Performance of Virtual Terrorism in Cyber Space

Farzaneh Ejazi
Copyright: © 2022 |Pages: 13
DOI: 10.4018/978-1-7998-9755-2.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the 1980s, Barry Collin coined the term virtual terrorism. Nowadays virtual terrorism is very common all over the world. Virtual terrorism threatened computers, networks, and the information stored. Virtual terrorism makes new opportunity for terrorists such as hide identity, no geographical restrictions, international advertising and membership, and targeting more people. They hack into computers and mobile phones. Virtual terrorism can be controlled remotely. The variety and number of virtual terrorist attacks is enormous. Virtual terrorists use pseudonyms, and their true identities are not traced. Virtual terrorists do not want a lot of forces for their activities. Virtual terrorists just need laptops and Wi-Fi. In this research, the question is how virtual identity and internet are so essential for terrorists. In sociological studies, virtual identity is one of the most important and key issues. Virtual terrorists use this virtual and hidden identity to destroy a country's infrastructure. They are sure that there are no borders or checkpoints in cyberspace.
Chapter Preview
Top

Background Research

There are extremely articles and books about virtual terrorism and cyberspace but all of them more focus on political dimensions and it is not related to this chapter but in the theories, I have pointed out. But this article try to examine the sociological aspect of virtual terrorism.

Key Terms in this Chapter

Cyberspace: It is virtual world created by links between computers and servers.

Complete Chapter List

Search this Book:
Reset