From car bombs to logic bombs: The growing threat from information terrorism
The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups...
Gespeichert in:
| Veröffentlicht in: | Terrorism and political violence Jg. 12; H. 2; S. 97 - 122 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
London
Taylor & Francis Group
01.06.2000
F. Cass |
| Schlagworte: | |
| ISSN: | 0954-6553, 1556-1836 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications. |
|---|---|
| AbstractList | The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism & identifies two groups likely to find information terrorism attractive: conventional terrorist groups & information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, & information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground group, networked groups, particularly information culture terrorists, may only be in contact electronically, & are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making & risk taking, & has dangerous security implications. Adapted from the source document. The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications. The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. Explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. (Original abstract - amended) |
| Author | Post, Jerrold M. Shaw, Eric D. Ruby, Keven G. |
| Author_xml | – sequence: 1 givenname: Jerrold M. surname: Post fullname: Post, Jerrold M. organization: Director, Political Psychology Program , George Washington University – sequence: 2 givenname: Keven G. surname: Ruby fullname: Ruby, Keven G. organization: Research Analyst with Political Psychology Associates, Ltd – sequence: 3 givenname: Eric D. surname: Shaw fullname: Shaw, Eric D. organization: Adjunct Associate Professor of Political Psychology , George Washington University |
| BookMark | eNqNkU1rXCEUhqWk0Mm0P6A7odB2cxMdv0s3JTRNYCCbZH1Rr04M917To0OSf1-nk1UC07oR8XnOOfoeo6M5zwGhj5ScUKLJKTGCSyEIIZqvlJDsDVpQIWRHNZNHaLG77xrA3qHjUu4IoUIKs0Drc8gT9hawy5MruGY85k3y--M3fH0b8AbyQ5o3uN5CsBXHnZHmmGGyNeUZ1wCQIZXpPXob7VjCh-d9iW7Of16fXXTrq1-XZz_WnefG1M45TgOlJnAliYgxSk2d0156ooxuU0fmPPecWse4GHTUgvOBDTwMK-u4Zkv0ZV_3HvLvbSi1n1LxYRztHPK29IoLqogitJGfD5Ktv2pL_BNk2oiVZKsGfj0IUsKk4Ia3CJbo0wv0Lm9hbj_TUyWIpoRI0yi6pzzkUiDE_h7SZOGplep32favsm2OeuH4VP-GUcGm8aD5fW8-B_iQYRz6ap_GDBHs7FN76380PqC_svr6WNkfBkbMsw |
| CitedBy_id | crossref_primary_10_1057_sj_2014_19 crossref_primary_10_1111_j_1467_9221_2009_00705_x crossref_primary_10_4000_qds_1011 crossref_primary_10_1162_01622880260553624 |
| Cites_doi | 10.1017/CBO9780511598821 10.1080/09546559708427387 10.1080/105761099265711 10.1080/105761099265748 10.1080/10576108408435577 10.1080/01449299108924284 10.1111/j.1749-6632.1998.tb09886.x 10.1080/09546559708427388 10.1080/00207284.1986.11491449 |
| ContentType | Journal Article |
| Copyright | Copyright Taylor & Francis Group, LLC 2000 |
| Copyright_xml | – notice: Copyright Taylor & Francis Group, LLC 2000 |
| DBID | AAYXX CITATION HFIND IOIBA K30 PAAUG PAWHS PAWZZ PAXOH PBHAV PBQSW PBYQZ PCIWU PCMID PCZJX PDGRG PDWWI PETMR PFVGT PGXDX PIHIL PISVA PJCTQ PJTMS PLCHJ PMHAD PNQDJ POUND PPLAD PQAPC PQCAN PQCMW PQEME PQHKH PQMID PQNCT PQNET PQSCT PQSET PSVJG PVMQY PZGFC C18 8BJ FQK JBE 7UB |
| DOI | 10.1080/09546550008427563 |
| DatabaseName | CrossRef Periodicals Index Online Segment 16 Periodicals Index Online Segment 29 Periodicals Index Online Primary Sources Access—Foundation Edition (Plan E) - West Primary Sources Access (Plan D) - International Primary Sources Access & Build (Plan A) - MEA Primary Sources Access—Foundation Edition (Plan E) - Midwest Primary Sources Access—Foundation Edition (Plan E) - Northeast Primary Sources Access (Plan D) - Southeast Primary Sources Access (Plan D) - North Central Primary Sources Access—Foundation Edition (Plan E) - Southeast Primary Sources Access (Plan D) - South Central Primary Sources Access & Build (Plan A) - UK / I Primary Sources Access (Plan D) - Canada Primary Sources Access (Plan D) - EMEALA Primary Sources Access—Foundation Edition (Plan E) - North Central Primary Sources Access—Foundation Edition (Plan E) - South Central Primary Sources Access & Build (Plan A) - International Primary Sources Access—Foundation Edition (Plan E) - International Primary Sources Access (Plan D) - West Periodicals Index Online Segments 1-50 Primary Sources Access (Plan D) - APAC Primary Sources Access (Plan D) - Midwest Primary Sources Access (Plan D) - MEA Primary Sources Access—Foundation Edition (Plan E) - Canada Primary Sources Access—Foundation Edition (Plan E) - UK / I Primary Sources Access—Foundation Edition (Plan E) - EMEALA Primary Sources Access & Build (Plan A) - APAC Primary Sources Access & Build (Plan A) - Canada Primary Sources Access & Build (Plan A) - West Primary Sources Access & Build (Plan A) - EMEALA Primary Sources Access (Plan D) - Northeast Primary Sources Access & Build (Plan A) - Midwest Primary Sources Access & Build (Plan A) - North Central Primary Sources Access & Build (Plan A) - Northeast Primary Sources Access & Build (Plan A) - South Central Primary Sources Access & Build (Plan A) - Southeast Primary Sources Access (Plan D) - UK / I Primary Sources Access—Foundation Edition (Plan E) - APAC Primary Sources Access—Foundation Edition (Plan E) - MEA Humanities Index International Bibliography of the Social Sciences (IBSS) International Bibliography of the Social Sciences International Bibliography of the Social Sciences Worldwide Political Science Abstracts |
| DatabaseTitle | CrossRef Periodicals Index Online Segments 1-50 Periodicals Index Online Segment 16 Periodicals Index Online Periodicals Index Online Segment 29 British Humanities Index (BHI) International Bibliography of the Social Sciences (IBSS) Worldwide Political Science Abstracts |
| DatabaseTitleList | Worldwide Political Science Abstracts British Humanities Index (BHI) British Humanities Index (BHI) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work International Relations |
| EISSN | 1556-1836 |
| EndPage | 122 |
| ExternalDocumentID | 10_1080_09546550008427563 8427563 |
| GroupedDBID | -~X .7I .QK 0BK 0R~ 123 2DF 4.4 5VS 6TJ AAGDL AAGZJ AAHIA AAMFJ AAMIU AAPUL AASRH AATTQ AAZMC ABCCY ABFIM ABIVO ABJNI ABLIJ ABLJU ABPEM ABRLO ABSWM ABTAI ABUHB ABXUL ABXYU ACGFO ACGFS ACHQT ACNCT ACTIO ACTOA ADAHI ADCVX ADJSV ADKVQ ADLRE ADMHG ADXPE AECIN AEFOU AEISY AEKEX AEOZL AEPSL AEYOC AEZRU AFQOA AFRVT AFUDY AGDLA AGMYJ AGRBW AHDZW AIJEM AIYEW AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AQTUD AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CAG CCCUG COF CQ1 CS3 DGFLZ DKSSO DU5 EBS EGFNH EJD EOKQO E~B E~C G-F GTTXZ H13 HZ~ J.O KYCEM M4Z NA5 O-. O9- P2P PQQKQ RJUPY RNANH ROSJB RSYQP RUHSF S-F STATR TASJS TBQAZ TDBHL TEY TFH TFL TFW TGHSC TN5 TNTFI TUROJ ULE UT5 UT9 VAE ~01 ~45 ~S~ 07O 29Q AAYXX ABXRD ABYCP ABZLS ACCDN ACKUB AFXCT AGDMU AJWEG ALVGD AWVEE C0J CITATION CKGAX EKLNC HF~ IPNFZ ITHFX JVVPG L82 L83 LJTGL RIG S10 TAY UC8 UV2 HFIND IOIBA K30 PAAUG PAWHS PAWZZ PAXOH PBHAV PBQSW PBYQZ PCIWU PCMID PCZJX PDGRG PDWWI PETMR PFVGT PGXDX PIHIL PISVA PJCTQ PJTMS PLCHJ PMHAD PNQDJ POUND PPLAD PQAPC PQCAN PQCMW PQEME PQHKH PQMID PQNCT PQNET PQSCT PQSET PSVJG PVMQY PZGFC C18 8BJ FQK JBE 7UB |
| ID | FETCH-LOGICAL-c499t-bb41e119e47605fff681bb8c6c0798155f3bc4c41ab345d8f8544d3d4ed2ab483 |
| IEDL.DBID | TFW |
| ISICitedReferencesCount | 17 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000208297200006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0954-6553 |
| IngestDate | Wed Oct 01 14:02:35 EDT 2025 Thu Sep 04 17:10:45 EDT 2025 Thu Oct 02 10:20:12 EDT 2025 Fri Sep 05 14:18:28 EDT 2025 Sun Nov 09 07:58:53 EST 2025 Sat Nov 29 05:33:11 EST 2025 Tue Nov 18 22:33:42 EST 2025 Mon Oct 20 23:40:12 EDT 2025 Mon May 13 12:09:58 EDT 2019 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c499t-bb41e119e47605fff681bb8c6c0798155f3bc4c41ab345d8f8544d3d4ed2ab483 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 1750810069 |
| PQPubID | 24074 |
| PageCount | 26 |
| ParticipantIDs | informaworld_taylorfrancis_310_1080_09546550008427563 crossref_primary_10_1080_09546550008427563 proquest_miscellaneous_60577775 proquest_miscellaneous_1036549456 crossref_citationtrail_10_1080_09546550008427563 proquest_journals_1750810069 proquest_miscellaneous_38952632 proquest_miscellaneous_745170701 |
| PublicationCentury | 2000 |
| PublicationDate | 2000-06-01 |
| PublicationDateYYYYMMDD | 2000-06-01 |
| PublicationDate_xml | – month: 06 year: 2000 text: 2000-06-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Terrorism and political violence |
| PublicationYear | 2000 |
| Publisher | Taylor & Francis Group F. Cass |
| Publisher_xml | – name: Taylor & Francis Group – name: F. Cass |
| References | CIT0032 CIT0031 Coldwell R. (CIT0042) 1990; 22 Gilboa N. (CIT0043) 1994 Clough B. (CIT0039) 1992 Cilluffo F. (CIT0008) 1997; 9 Bruno F. (CIT0018) 1990 CIT0041 CIT0040 Alexander Y. (CIT0020) 1993 Hoffman B. (CIT0029) 1997; 9 Rozen A. (CIT0022) 1988 Chantler N. (CIT0034) 1995 Glave J. (CIT0001) 1998 Post J. (CIT0051) 2000 Shaw E. (CIT0033) 1999 Turkle S. (CIT0052) 1995 CIT0003 CIT0049 CIT0004 Sandberg J. (CIT0005) 2000 Brown M. (CIT0009) 1996 Jäger H. (CIT0024) 1981 Sprinzak E. (CIT0015) 1990 CIT0050 Thompsen P. (CIT0053) 1996 Post J. (CIT0028) 1987 CIT0054 CIT0011 Schmid A. (CIT0014) 1988 Meeks B. (CIT0002) 1998 Kaplan D. (CIT0030) 1996 Devost M. (CIT0007) 1997; 9 Post J. (CIT0047) 1986; 36 Werry C. (CIT0048) 1996 Collin B. (CIT0006) 1997 Pincus W. (CIT0019) 1997 CIT0013 CIT0016 CIT0017 Whiteside T. (CIT0023) 1978 Glave J. (CIT0046) 1998 Arquilla J. (CIT0012) 1999; 22 Campbell D. (CIT0021) 1988 Walker L. (CIT0045) 1998 Haffner Katie (CIT0036) 1991 Hoffman B. (CIT0027) 1999 Littman J. (CIT0038) 1997 CIT0025 Dreyfuss S. (CIT0035) 1997 CIT0026 Freedman D. (CIT0037) 1997 Slatalla M. (CIT0044) 1995 Davis N. (CIT0010) 1997 |
| References_xml | – ident: CIT0040 – volume-title: Masters of Deception: The Gang that Ruled Cyberspace year: 1995 ident: CIT0044 – start-page: 79 volume-title: In Athena's Camp: Preparing for Conflict in the Information Age year: 1997 ident: CIT0010 – volume: 22 start-page: 45 year: 1990 ident: CIT0042 publication-title: The Australian Computer Journal – volume-title: Computer‐Mediated Communication year: 1996 ident: CIT0048 – volume-title: Approaching Zero: Data Crime and the Computer Underworld year: 1992 ident: CIT0039 – start-page: 31 volume-title: Cyberwar: Security, Strategy and Conflict in the Information Age year: 1996 ident: CIT0009 – year: 1998 ident: CIT0001 publication-title: Wired – ident: CIT0031 – volume-title: Risk: Profile of a Computer Hacker year: 1995 ident: CIT0034 – year: 1998 ident: CIT0046 publication-title: Wired – volume: 9 start-page: 1 year: 1997 ident: CIT0029 publication-title: Terrorism and Political Violence – ident: CIT0054 doi: 10.1017/CBO9780511598821 – start-page: 34 year: 1999 ident: CIT0033 publication-title: Security Management – volume: 9 start-page: 72 year: 1997 ident: CIT0007 publication-title: Terrorism and Political Violence doi: 10.1080/09546559708427387 – start-page: 61 volume-title: Origins of Terrorism: Psychologies, Ideologies, Theologies, and States of Mind year: 1990 ident: CIT0018 – start-page: 52 year: 1988 ident: CIT0021 publication-title: Security Management – ident: CIT0026 – ident: CIT0011 doi: 10.1080/105761099265711 – ident: CIT0032 – start-page: B1 year: 1998 ident: CIT0045 publication-title: Washington Post – start-page: 41 year: 1988 ident: CIT0022 publication-title: Security Management – start-page: 275 volume-title: Communication and Cyberspace year: 1996 ident: CIT0053 – year: 1994 ident: CIT0043 publication-title: Gray Area – volume-title: Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud year: 1978 ident: CIT0023 – volume-title: The Cult at the End of the World year: 1996 ident: CIT0030 – ident: CIT0050 doi: 10.1080/105761099265748 – volume-title: Life on the Screen: Identity in the Age of the Internet year: 1995 ident: CIT0052 – ident: CIT0017 – volume: 22 start-page: 195 year: 1999 ident: CIT0012 publication-title: Studies in Conflict & Terrorism – ident: CIT0013 – volume-title: Analysen zum Terrorismus 2: Lebenslaufanalysen year: 1981 ident: CIT0024 – volume-title: Cyberpunk year: 1991 ident: CIT0036 – ident: CIT0025 doi: 10.1080/10576108408435577 – volume-title: Europe's Red Terrorists: The Fighting Communist Organizations year: 1993 ident: CIT0020 – ident: CIT0041 doi: 10.1080/01449299108924284 – start-page: 28 volume-title: Toxic Terror year: 2000 ident: CIT0051 – ident: CIT0004 – ident: CIT0016 doi: 10.1111/j.1749-6632.1998.tb09886.x – volume: 9 start-page: 84 year: 1997 ident: CIT0008 publication-title: Terrorism and Political Violence doi: 10.1080/09546559708427388 – start-page: A6 year: 1997 ident: CIT0019 publication-title: Washington Post – start-page: 65 volume-title: Origins of Terrorism: Psychologies, Ideologies, Theologies, and States of Mind year: 1990 ident: CIT0015 – ident: CIT0049 – volume-title: Large: The Strange Case of the World's Biggest Internet Invasion year: 1997 ident: CIT0037 – ident: CIT0003 – volume-title: Political Terrorism: A New Guide to Actors, Authors, Concepts, Concepts, Data Bases, Theories, and Literature year: 1988 ident: CIT0014 – start-page: 38 year: 2000 ident: CIT0005 publication-title: Newsweek – year: 1998 ident: CIT0002 publication-title: MSNBC – volume-title: Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier year: 1997 ident: CIT0035 – volume-title: Convergence of the Physical and Virtual Worlds year: 1997 ident: CIT0006 – volume-title: Preventing Nuclear Terrorism year: 1987 ident: CIT0028 – volume-title: The Watchman: The Twisted Life and Times of Serial Hacker Kevin Poulson year: 1997 ident: CIT0038 – start-page: 20 volume-title: Countering the New Terrorism year: 1999 ident: CIT0027 – volume: 36 start-page: 211 year: 1986 ident: CIT0047 publication-title: International Journal of Group Psychotherapy doi: 10.1080/00207284.1986.11491449 |
| SSID | ssj0015659 |
| Score | 1.6132263 |
| Snippet | The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores... The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. Explores definitional aspects... |
| SourceID | proquest crossref informaworld |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 97 |
| SubjectTerms | Computers Electronic Technology Group Dynamics Information society Information Technology International security Internet New technology Terrorism Terrorists Threat Violence |
| Title | From car bombs to logic bombs: The growing threat from information terrorism |
| URI | https://www.tandfonline.com/doi/abs/10.1080/09546550008427563 https://www.proquest.com/docview/1750810069 https://www.proquest.com/docview/1036549456 https://www.proquest.com/docview/38952632 https://www.proquest.com/docview/60577775 https://www.proquest.com/docview/745170701 |
| Volume | 12 |
| WOSCitedRecordID | wos000208297200006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAWR databaseName: Taylor & Francis Online Journals customDbUrl: eissn: 1556-1836 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0015659 issn: 0954-6553 databaseCode: TFW dateStart: 19890101 isFulltext: true titleUrlDefault: https://www.tandfonline.com providerName: Taylor & Francis |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6higOXUkoLKUsZJNRDpYj12okTbgh11QOqOBS1t8h2bEC0mypJET-fmTxWbNvdAxyTjO34NfONPf4M8I4xcRBGxnLqTayETWObOxOHoDNfes82vrtsQp-dZZeX-ZchNqcZwirZhw49UUSnq3lyG9uMEXHvCRUw6xebL8Xs5cz1Saiex_f5_GK5h0BQZWDaUzGJy3FP86EcVqzSCmfpPR3dGZ750__85R3YHhAnfuyHyDN45Be78GJlJRCXIXG7MOkP7OKFvwqm9niE44uq_vkcPs_r6hqdqdFW17bBtsJOe_aPH5CGHX4j154sIrbfGZEin2DBobJcCFLJdcXchXvwdX5y_uk0Hm5kiB15Rm1srRJeiNwrTW5QCCEl1Gszl7qpzjOCJkFap5wSxkqVlFnIEqVKWSpfzoxVmdyHrUW18C8BZ7IMlIlnyjxlU58TEnMqlUFrLYWbRTAde6RwA10535pxVYiR1fRum0ZwvExy03N1bBKe_t3NRdstkIT-NpP74kX7u40g2ZBEbihqMg6hYtAQTUGwjdAYE0VH8Hb5meY2b9iYha9uSYbgBfnvhHEjeLNGhgBnwpz76yWop6hNdRIBrpHQKhGadL84-McavoInPUUBr05NYKutb_1reOx-tT-a-rCbln8A120zLw |
| linkProvider | Taylor & Francis |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwED-NDYm9wBgwMjp2SIgHpIi6duJkbwhRbaJUPBRtb1Hs2IDYGpRmiD-fu3xUlNE-sMckZzv-uvvd2f4Z4CVjYi9yGcqhy0MlTBya1Oah9zpxhXNs45vLJvR0mlxcpJ-6gNui21bJPrRviSIaXc2Tm4PR_Za4NwQLmPaL7Zdi-nJ5B3YisrO8pW82Pl-uIhBY6bj2VEjysl_V_FcWK3ZphbX0hpZuTM_4wW1_eg_ud6AT37aj5CFsufk-HKwEA3G5K24fBu2ZXTx3lz6vHL7C_kVZfX8Ek3FVXqHNKzTllVlgXWKjQNvHE6SRh1_IuyejiPVXBqXIh1iwqy0XglRyVTJ94WP4PH4_e3cadpcyhJacozo0RgknROqUJk_Iex8T8DWJje1QpwmhEy-NVVaJ3EgVFYlPIqUKWShXjHKjEvkEtufl3D0FHMnCUyaOWfOUiV1KYMyqWHqttRR2FMCw75LMdozlfHHGZSZ6YtO_2zSA18skP1q6jk3Cwz_7OaubGIlvLzS5KZ7Vv-oAog1J5IaiBv0YyjolscgIuREgY67oAF4sP9P05jWbfO7Ka5IhhEEuPMHcAI7XyBDmjJh2f70E9RS1qY4CwDUSWkVCk_oXh_9Zw2O4dzr7OMkmZ9MPz2C3ZSzgYNUAtuvq2h3BXfuz_raonjdz9DcVOTdQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB5BWyEuUMorZaFTCXFAirpeO3HSG2qJQFSrHoraWxQ7NiDaTZVNET-fmTxWLGX3AMckYzt-zXxjjz8DvGZM7EUhQzl2RaiEiUOT2iL0XieudI5tfHvZhJ5Ok4uL9LSPzZn3YZXsQ_uOKKLV1Ty5r0s_RMQdECpg1i82X4rZy-Vd2GyJsWg4n2Xni00Ewio91Z4KSV4Om5p_y2LJLC2Rlt5S0q3lyR7-5z9vw4MecuK7bow8gjtutgPPlpYCcRETtwOj7sQunrtLX9QO3-Dwoqq_P4aTrK6u0BY1murKzLGpsFWf3eMh0rjDL-Tbk0nE5itDUuQjLNhXlgtBKrmumLzwCXzO3p8dfQj7KxlCS65RExqjhBMidUqTH-S9jwn2msTGdqzThLCJl8Yqq0RhpIrKxCeRUqUslSsnhVGJfAobs2rmngNOZOkpE8ececrELiUoZlUsvdZaCjsJYDz0SG57vnK-NuMyFwOt6Z9tGsDbRZLrjqxjnfD4927Om3aFxHfXmdwWz5ufTQDRmiRyTVGjYQjlvYqY54TbCI4xU3QA-4vPNLl5x6aYueqGZAhfkANPIDeAvRUyhDgjJt1fLUE9RW2qowBwhYRWkdCk_MXuP9ZwD-6dHmf5ycfppxdwv6Mr4JWqEWw09Y17CVv2R_NtXr9qZ-gvA7w19A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=From+car+bombs+to+logic+bombs%3A+the+growing+threat+from+information+terrorism&rft.jtitle=Terrorism+and+political+violence&rft.au=Post%2C+J+M&rft.au=Ruby%2C+K+G&rft.au=Shaw%2C+E+D&rft.date=2000-06-01&rft.issn=0954-6553&rft.volume=12&rft.issue=2&rft.spage=97&rft.epage=122&rft_id=info:doi/10.1080%2F09546550008427563&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0954-6553&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0954-6553&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0954-6553&client=summon |