From car bombs to logic bombs: The growing threat from information terrorism

The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups...

Full description

Saved in:
Bibliographic Details
Published in:Terrorism and political violence Vol. 12; no. 2; pp. 97 - 122
Main Authors: Post, Jerrold M., Ruby, Keven G., Shaw, Eric D.
Format: Journal Article
Language:English
Published: London Taylor & Francis Group 01.06.2000
F. Cass
Subjects:
ISSN:0954-6553, 1556-1836
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications.
AbstractList The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism & identifies two groups likely to find information terrorism attractive: conventional terrorist groups & information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, & information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground group, networked groups, particularly information culture terrorists, may only be in contact electronically, & are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making & risk taking, & has dangerous security implications. Adapted from the source document.
The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. As computer sophisticated youth move into the ranks of conventional terrorist groups, the groups will increase their reliance on computer technology, and information terrorism will be incorporated into a hybrid tactical repertoire. Information culture groups, however, confine their attacks to cyberspace. In contrast to the powerful group dynamics of the traditional underground terrorist group, networked groups, particularly information culture terrorists, may only be in contact electronically, and are subject to a radically different group psychology, virtual group dynamics, that significantly affects their decision making and risk taking, and has dangerous security implications.
The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. Explores definitional aspects of information terrorism and identifies two groups likely to find information terrorism attractive: conventional terrorist groups and information culture groups. (Original abstract - amended)
Author Post, Jerrold M.
Shaw, Eric D.
Ruby, Keven G.
Author_xml – sequence: 1
  givenname: Jerrold M.
  surname: Post
  fullname: Post, Jerrold M.
  organization: Director, Political Psychology Program , George Washington University
– sequence: 2
  givenname: Keven G.
  surname: Ruby
  fullname: Ruby, Keven G.
  organization: Research Analyst with Political Psychology Associates, Ltd
– sequence: 3
  givenname: Eric D.
  surname: Shaw
  fullname: Shaw, Eric D.
  organization: Adjunct Associate Professor of Political Psychology , George Washington University
BookMark eNqNkU1rXCEUhqWk0Mm0P6A7odB2cxMdv0s3JTRNYCCbZH1Rr04M917To0OSf1-nk1UC07oR8XnOOfoeo6M5zwGhj5ScUKLJKTGCSyEIIZqvlJDsDVpQIWRHNZNHaLG77xrA3qHjUu4IoUIKs0Drc8gT9hawy5MruGY85k3y--M3fH0b8AbyQ5o3uN5CsBXHnZHmmGGyNeUZ1wCQIZXpPXob7VjCh-d9iW7Of16fXXTrq1-XZz_WnefG1M45TgOlJnAliYgxSk2d0156ooxuU0fmPPecWse4GHTUgvOBDTwMK-u4Zkv0ZV_3HvLvbSi1n1LxYRztHPK29IoLqogitJGfD5Ktv2pL_BNk2oiVZKsGfj0IUsKk4Ia3CJbo0wv0Lm9hbj_TUyWIpoRI0yi6pzzkUiDE_h7SZOGplep32favsm2OeuH4VP-GUcGm8aD5fW8-B_iQYRz6ap_GDBHs7FN76380PqC_svr6WNkfBkbMsw
CitedBy_id crossref_primary_10_1057_sj_2014_19
crossref_primary_10_1111_j_1467_9221_2009_00705_x
crossref_primary_10_4000_qds_1011
crossref_primary_10_1162_01622880260553624
Cites_doi 10.1017/CBO9780511598821
10.1080/09546559708427387
10.1080/105761099265711
10.1080/105761099265748
10.1080/10576108408435577
10.1080/01449299108924284
10.1111/j.1749-6632.1998.tb09886.x
10.1080/09546559708427388
10.1080/00207284.1986.11491449
ContentType Journal Article
Copyright Copyright Taylor & Francis Group, LLC 2000
Copyright_xml – notice: Copyright Taylor & Francis Group, LLC 2000
DBID AAYXX
CITATION
HFIND
IOIBA
K30
PAAUG
PAWHS
PAWZZ
PAXOH
PBHAV
PBQSW
PBYQZ
PCIWU
PCMID
PCZJX
PDGRG
PDWWI
PETMR
PFVGT
PGXDX
PIHIL
PISVA
PJCTQ
PJTMS
PLCHJ
PMHAD
PNQDJ
POUND
PPLAD
PQAPC
PQCAN
PQCMW
PQEME
PQHKH
PQMID
PQNCT
PQNET
PQSCT
PQSET
PSVJG
PVMQY
PZGFC
C18
8BJ
FQK
JBE
7UB
DOI 10.1080/09546550008427563
DatabaseName CrossRef
Periodicals Index Online Segment 16
Periodicals Index Online Segment 29
Periodicals Index Online
Primary Sources Access—Foundation Edition (Plan E) - West
Primary Sources Access (Plan D) - International
Primary Sources Access & Build (Plan A) - MEA
Primary Sources Access—Foundation Edition (Plan E) - Midwest
Primary Sources Access—Foundation Edition (Plan E) - Northeast
Primary Sources Access (Plan D) - Southeast
Primary Sources Access (Plan D) - North Central
Primary Sources Access—Foundation Edition (Plan E) - Southeast
Primary Sources Access (Plan D) - South Central
Primary Sources Access & Build (Plan A) - UK / I
Primary Sources Access (Plan D) - Canada
Primary Sources Access (Plan D) - EMEALA
Primary Sources Access—Foundation Edition (Plan E) - North Central
Primary Sources Access—Foundation Edition (Plan E) - South Central
Primary Sources Access & Build (Plan A) - International
Primary Sources Access—Foundation Edition (Plan E) - International
Primary Sources Access (Plan D) - West
Periodicals Index Online Segments 1-50
Primary Sources Access (Plan D) - APAC
Primary Sources Access (Plan D) - Midwest
Primary Sources Access (Plan D) - MEA
Primary Sources Access—Foundation Edition (Plan E) - Canada
Primary Sources Access—Foundation Edition (Plan E) - UK / I
Primary Sources Access—Foundation Edition (Plan E) - EMEALA
Primary Sources Access & Build (Plan A) - APAC
Primary Sources Access & Build (Plan A) - Canada
Primary Sources Access & Build (Plan A) - West
Primary Sources Access & Build (Plan A) - EMEALA
Primary Sources Access (Plan D) - Northeast
Primary Sources Access & Build (Plan A) - Midwest
Primary Sources Access & Build (Plan A) - North Central
Primary Sources Access & Build (Plan A) - Northeast
Primary Sources Access & Build (Plan A) - South Central
Primary Sources Access & Build (Plan A) - Southeast
Primary Sources Access (Plan D) - UK / I
Primary Sources Access—Foundation Edition (Plan E) - APAC
Primary Sources Access—Foundation Edition (Plan E) - MEA
Humanities Index
International Bibliography of the Social Sciences (IBSS)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
Worldwide Political Science Abstracts
DatabaseTitle CrossRef
Periodicals Index Online Segments 1-50
Periodicals Index Online Segment 16
Periodicals Index Online
Periodicals Index Online Segment 29
British Humanities Index (BHI)
International Bibliography of the Social Sciences (IBSS)
Worldwide Political Science Abstracts
DatabaseTitleList Worldwide Political Science Abstracts

British Humanities Index (BHI)
British Humanities Index (BHI)
DeliveryMethod fulltext_linktorsrc
Discipline Social Welfare & Social Work
International Relations
EISSN 1556-1836
EndPage 122
ExternalDocumentID 10_1080_09546550008427563
8427563
GroupedDBID -~X
.7I
.QK
0BK
0R~
123
2DF
4.4
5VS
6TJ
AAGDL
AAGZJ
AAHIA
AAMFJ
AAMIU
AAPUL
AASRH
AATTQ
AAZMC
ABCCY
ABFIM
ABIVO
ABJNI
ABLIJ
ABLJU
ABPEM
ABRLO
ABSWM
ABTAI
ABUHB
ABXUL
ABXYU
ACGFO
ACGFS
ACHQT
ACNCT
ACTIO
ACTOA
ADAHI
ADCVX
ADJSV
ADKVQ
ADLRE
ADMHG
ADXPE
AECIN
AEFOU
AEISY
AEKEX
AEOZL
AEPSL
AEYOC
AEZRU
AFQOA
AFRVT
AFUDY
AGDLA
AGMYJ
AGRBW
AHDZW
AIJEM
AIYEW
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQTUD
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CAG
CCCUG
COF
CQ1
CS3
DGFLZ
DKSSO
DU5
EBS
EGFNH
EJD
EOKQO
E~B
E~C
G-F
GTTXZ
H13
HZ~
J.O
KYCEM
M4Z
NA5
O-.
O9-
P2P
PQQKQ
RJUPY
RNANH
ROSJB
RSYQP
RUHSF
S-F
STATR
TASJS
TBQAZ
TDBHL
TEY
TFH
TFL
TFW
TGHSC
TN5
TNTFI
TUROJ
ULE
UT5
UT9
VAE
~01
~45
~S~
07O
29Q
AAYXX
ABXRD
ABYCP
ABZLS
ACCDN
ACKUB
AFXCT
AGDMU
AJWEG
ALVGD
AWVEE
C0J
CITATION
CKGAX
EKLNC
HF~
IPNFZ
ITHFX
JVVPG
L82
L83
LJTGL
RIG
S10
TAY
UC8
UV2
HFIND
IOIBA
K30
PAAUG
PAWHS
PAWZZ
PAXOH
PBHAV
PBQSW
PBYQZ
PCIWU
PCMID
PCZJX
PDGRG
PDWWI
PETMR
PFVGT
PGXDX
PIHIL
PISVA
PJCTQ
PJTMS
PLCHJ
PMHAD
PNQDJ
POUND
PPLAD
PQAPC
PQCAN
PQCMW
PQEME
PQHKH
PQMID
PQNCT
PQNET
PQSCT
PQSET
PSVJG
PVMQY
PZGFC
C18
8BJ
FQK
JBE
7UB
ID FETCH-LOGICAL-c499t-bb41e119e47605fff681bb8c6c0798155f3bc4c41ab345d8f8544d3d4ed2ab483
IEDL.DBID TFW
ISICitedReferencesCount 17
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000208297200006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0954-6553
IngestDate Wed Oct 01 14:02:35 EDT 2025
Thu Sep 04 17:10:45 EDT 2025
Thu Oct 02 10:20:12 EDT 2025
Fri Sep 05 14:18:28 EDT 2025
Sun Nov 09 07:58:53 EST 2025
Sat Nov 29 05:33:11 EST 2025
Tue Nov 18 22:33:42 EST 2025
Mon Oct 20 23:40:12 EDT 2025
Mon May 13 12:09:58 EDT 2019
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c499t-bb41e119e47605fff681bb8c6c0798155f3bc4c41ab345d8f8544d3d4ed2ab483
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 1750810069
PQPubID 24074
PageCount 26
ParticipantIDs informaworld_taylorfrancis_310_1080_09546550008427563
crossref_primary_10_1080_09546550008427563
proquest_miscellaneous_60577775
proquest_miscellaneous_1036549456
crossref_citationtrail_10_1080_09546550008427563
proquest_journals_1750810069
proquest_miscellaneous_38952632
proquest_miscellaneous_745170701
PublicationCentury 2000
PublicationDate 2000-06-01
PublicationDateYYYYMMDD 2000-06-01
PublicationDate_xml – month: 06
  year: 2000
  text: 2000-06-01
  day: 01
PublicationDecade 2000
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Terrorism and political violence
PublicationYear 2000
Publisher Taylor & Francis Group
F. Cass
Publisher_xml – name: Taylor & Francis Group
– name: F. Cass
References CIT0032
CIT0031
Coldwell R. (CIT0042) 1990; 22
Gilboa N. (CIT0043) 1994
Clough B. (CIT0039) 1992
Cilluffo F. (CIT0008) 1997; 9
Bruno F. (CIT0018) 1990
CIT0041
CIT0040
Alexander Y. (CIT0020) 1993
Hoffman B. (CIT0029) 1997; 9
Rozen A. (CIT0022) 1988
Chantler N. (CIT0034) 1995
Glave J. (CIT0001) 1998
Post J. (CIT0051) 2000
Shaw E. (CIT0033) 1999
Turkle S. (CIT0052) 1995
CIT0003
CIT0049
CIT0004
Sandberg J. (CIT0005) 2000
Brown M. (CIT0009) 1996
Jäger H. (CIT0024) 1981
Sprinzak E. (CIT0015) 1990
CIT0050
Thompsen P. (CIT0053) 1996
Post J. (CIT0028) 1987
CIT0054
CIT0011
Schmid A. (CIT0014) 1988
Meeks B. (CIT0002) 1998
Kaplan D. (CIT0030) 1996
Devost M. (CIT0007) 1997; 9
Post J. (CIT0047) 1986; 36
Werry C. (CIT0048) 1996
Collin B. (CIT0006) 1997
Pincus W. (CIT0019) 1997
CIT0013
CIT0016
CIT0017
Whiteside T. (CIT0023) 1978
Glave J. (CIT0046) 1998
Arquilla J. (CIT0012) 1999; 22
Campbell D. (CIT0021) 1988
Walker L. (CIT0045) 1998
Haffner Katie (CIT0036) 1991
Hoffman B. (CIT0027) 1999
Littman J. (CIT0038) 1997
CIT0025
Dreyfuss S. (CIT0035) 1997
CIT0026
Freedman D. (CIT0037) 1997
Slatalla M. (CIT0044) 1995
Davis N. (CIT0010) 1997
References_xml – ident: CIT0040
– volume-title: Masters of Deception: The Gang that Ruled Cyberspace
  year: 1995
  ident: CIT0044
– start-page: 79
  volume-title: In Athena's Camp: Preparing for Conflict in the Information Age
  year: 1997
  ident: CIT0010
– volume: 22
  start-page: 45
  year: 1990
  ident: CIT0042
  publication-title: The Australian Computer Journal
– volume-title: Computer‐Mediated Communication
  year: 1996
  ident: CIT0048
– volume-title: Approaching Zero: Data Crime and the Computer Underworld
  year: 1992
  ident: CIT0039
– start-page: 31
  volume-title: Cyberwar: Security, Strategy and Conflict in the Information Age
  year: 1996
  ident: CIT0009
– year: 1998
  ident: CIT0001
  publication-title: Wired
– ident: CIT0031
– volume-title: Risk: Profile of a Computer Hacker
  year: 1995
  ident: CIT0034
– year: 1998
  ident: CIT0046
  publication-title: Wired
– volume: 9
  start-page: 1
  year: 1997
  ident: CIT0029
  publication-title: Terrorism and Political Violence
– ident: CIT0054
  doi: 10.1017/CBO9780511598821
– start-page: 34
  year: 1999
  ident: CIT0033
  publication-title: Security Management
– volume: 9
  start-page: 72
  year: 1997
  ident: CIT0007
  publication-title: Terrorism and Political Violence
  doi: 10.1080/09546559708427387
– start-page: 61
  volume-title: Origins of Terrorism: Psychologies, Ideologies, Theologies, and States of Mind
  year: 1990
  ident: CIT0018
– start-page: 52
  year: 1988
  ident: CIT0021
  publication-title: Security Management
– ident: CIT0026
– ident: CIT0011
  doi: 10.1080/105761099265711
– ident: CIT0032
– start-page: B1
  year: 1998
  ident: CIT0045
  publication-title: Washington Post
– start-page: 41
  year: 1988
  ident: CIT0022
  publication-title: Security Management
– start-page: 275
  volume-title: Communication and Cyberspace
  year: 1996
  ident: CIT0053
– year: 1994
  ident: CIT0043
  publication-title: Gray Area
– volume-title: Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud
  year: 1978
  ident: CIT0023
– volume-title: The Cult at the End of the World
  year: 1996
  ident: CIT0030
– ident: CIT0050
  doi: 10.1080/105761099265748
– volume-title: Life on the Screen: Identity in the Age of the Internet
  year: 1995
  ident: CIT0052
– ident: CIT0017
– volume: 22
  start-page: 195
  year: 1999
  ident: CIT0012
  publication-title: Studies in Conflict & Terrorism
– ident: CIT0013
– volume-title: Analysen zum Terrorismus 2: Lebenslaufanalysen
  year: 1981
  ident: CIT0024
– volume-title: Cyberpunk
  year: 1991
  ident: CIT0036
– ident: CIT0025
  doi: 10.1080/10576108408435577
– volume-title: Europe's Red Terrorists: The Fighting Communist Organizations
  year: 1993
  ident: CIT0020
– ident: CIT0041
  doi: 10.1080/01449299108924284
– start-page: 28
  volume-title: Toxic Terror
  year: 2000
  ident: CIT0051
– ident: CIT0004
– ident: CIT0016
  doi: 10.1111/j.1749-6632.1998.tb09886.x
– volume: 9
  start-page: 84
  year: 1997
  ident: CIT0008
  publication-title: Terrorism and Political Violence
  doi: 10.1080/09546559708427388
– start-page: A6
  year: 1997
  ident: CIT0019
  publication-title: Washington Post
– start-page: 65
  volume-title: Origins of Terrorism: Psychologies, Ideologies, Theologies, and States of Mind
  year: 1990
  ident: CIT0015
– ident: CIT0049
– volume-title: Large: The Strange Case of the World's Biggest Internet Invasion
  year: 1997
  ident: CIT0037
– ident: CIT0003
– volume-title: Political Terrorism: A New Guide to Actors, Authors, Concepts, Concepts, Data Bases, Theories, and Literature
  year: 1988
  ident: CIT0014
– start-page: 38
  year: 2000
  ident: CIT0005
  publication-title: Newsweek
– year: 1998
  ident: CIT0002
  publication-title: MSNBC
– volume-title: Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
  year: 1997
  ident: CIT0035
– volume-title: Convergence of the Physical and Virtual Worlds
  year: 1997
  ident: CIT0006
– volume-title: Preventing Nuclear Terrorism
  year: 1987
  ident: CIT0028
– volume-title: The Watchman: The Twisted Life and Times of Serial Hacker Kevin Poulson
  year: 1997
  ident: CIT0038
– start-page: 20
  volume-title: Countering the New Terrorism
  year: 1999
  ident: CIT0027
– volume: 36
  start-page: 211
  year: 1986
  ident: CIT0047
  publication-title: International Journal of Group Psychotherapy
  doi: 10.1080/00207284.1986.11491449
SSID ssj0015659
Score 1.6132263
Snippet The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. This article explores...
The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. Explores definitional aspects...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 97
SubjectTerms Computers
Electronic Technology
Group Dynamics
Information society
Information Technology
International security
Internet
New technology
Terrorism
Terrorists
Threat
Violence
Title From car bombs to logic bombs: The growing threat from information terrorism
URI https://www.tandfonline.com/doi/abs/10.1080/09546550008427563
https://www.proquest.com/docview/1750810069
https://www.proquest.com/docview/1036549456
https://www.proquest.com/docview/38952632
https://www.proquest.com/docview/60577775
https://www.proquest.com/docview/745170701
Volume 12
WOSCitedRecordID wos000208297200006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAWR
  databaseName: Taylor and Francis Online Journals
  customDbUrl:
  eissn: 1556-1836
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0015659
  issn: 0954-6553
  databaseCode: TFW
  dateStart: 19890101
  isFulltext: true
  titleUrlDefault: https://www.tandfonline.com
  providerName: Taylor & Francis
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB6higMXHuUVWNpBQhyQIpJmEie9VairHqqKQ1F7i2zHBkS7qZK06s9nJo8VS7t7gNySTOI4tme-scffAHyItGcdp7kFrKKQqFBhwVY-rDLPOpOEgk33ySbUyUl-fl58HWNz2jGsUnxoPxBF9LpaBrc27RQR95lRgbB-ifkiYS8Xrk9G9dK_T-dnyzUEhioj0x6FLJ5Ma5r3vWHFKq1wlt7R0b3hmT_5z09-Co9HxIkHQxd5Bg_cYhtercwE4jIkbhtmw4ZdPHMXXjcOP-J0oW5-PYfjeVNfotUNmvrStNjV2GvP4XQfudvhd3bt2SJi90MQKcoOFhwrK4Ugl9zUwl34Ar7ND0-_HIVjRobQsmfUhcZQ7OK4cKTYDfLeZ4x6TW4zG6kiZ2jiE2PJUqxNQmmV-zwlqpKKXLWnDeXJS9ha1Av3GpD1RJGkDAdTE5H1iWbZymexJrVnstwFEE0tUtqRrlyyZlyU8cRq-vc_DeDT8pGrgatjk3D0ZzOXXT9B4odsJnfFy-62CyDd8EiyoajZ1IXKUUO0JcM2RmNCFB3A--VtHtuyYKMXrr5mGYYX7L8zxg1gd40MA85UOPfXS3BLKT7SAHCNhKI0Vqz74zf_WMO38GigKJDZqRlsdc21ewcP7U33s212-mH5G6mdMlk
linkProvider Taylor & Francis
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB7BggQXHssrUNhBQhyQIpL1OE64IUS1iFJxKNq9RbZjA2K3QWkW8fMZ51FRlvYAuSUZ23Fsz3wztj8DPEu0Zx2nuQWsopioUHHBVj6uMs86kwIFm-4Om1DzeX5yUnwcAm6rYVll8KF9TxTR6eowuEMwelwS95JhQaD9CvaLAn25uAxXJOcalvQtpsfrWQQGKwPXHsUsL8ZZzb9lsWGXNlhLL2jpzvRMb_7vR9-CGwPoxNd9L7kNl9xyH-5vBANxvSpuHyb9nl08dqdeNw6f4_igbr7dgdm0qc_Q6gZNfWZW2NbYKdD-9hVyz8PP7N2zUcT2SwClGDax4FDbUAhyyU0d6Avvwqfp28Wbo3g4lCG27By1sTGUujQtHCn2hLz3GQNfk9vMJqrIGZ14YSxZSrURJKvc55KoEhW56lAbysU92FvWS_cAkFVFISQjQmkSsl5olq18lmpShybLXQTJ2CSlHRjLw8EZp2U6Epv--U8jeLFO8r2n69glnPzezmXbxUh8f6DJRfGy_dlGIHckETuKmox9qByUxKpk5MaALHBFR_B0_ZqHd5iz0UtXn7MMIwx24RnmRnCwRYYxpwy0-9sluKUUXzIC3CKhSKaK1X_68B9reADXjhYfZuXs3fz9I7jeMxaEYNUE9trm3D2Gq_ZH-3XVPOnG6C_ZpzZ6
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB5BQYgLjwIlsNBBQhyQoib1JE64VUAEolr1UNTeItuxAbXdVNkU9ed3nMeKbdk9QG5JJnEc2zPf2ONvAN5GyrGOU9wCRlJIlMswZysfVqljnUmegk11ySbkdJodH-cHQ2zOfAir9D6064kiOl3tB_d55caIuB1GBZ71y5sv8uzl4jbc6YixuDsfFkeLRQTGKgPVHoUsL8ZFzb-9YsksLZGW3lDSneUpHv7nNz-CBwPkxL2-jzyGW3a2CVtLU4G4iInbhEm_YxeP7KlTjcV3OF6om5MnsF809Rka1aCuz_Qc2xo79dmffkDud_iDfXs2idj-9JAU_RYWHCrrC0Euuak9eeFT-F58Pvz4JRxSMoSGXaM21JpiG8e5Jcl-kHMuZdirM5OaSOYZYxMntCFDsdKCkipzWUJUiYpstas0ZeIZbMzqmX0OyIoiFwnjwURHZJxQLFu5NFYkd3Wa2QCisUVKM_CV-7QZp2U80ppe_6cBvF88ct6TdawTjv5s5rLtZkhcn87kpnjZXrYBJGseEWuKmoxdqBxUxLxk3MZwzDNFB_BmcZsHt1-xUTNbX7AM4wt24BnkBrC9QoYRZ-JJ91dLcEtJPpIAcIWEpCSWrPzjF_9Yw224d_CpKPe_Tr-9hPs9XYGfqZrARttc2Fdw1_xuf82b190IvQLLcjUe
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=From+car+bombs+to+logic+bombs%3A+the+growing+threat+from+information+terrorism&rft.jtitle=Terrorism+and+political+violence&rft.au=Post%2C+J+M&rft.au=Ruby%2C+K+G&rft.au=Shaw%2C+E+D&rft.date=2000-06-01&rft.issn=0954-6553&rft.volume=12&rft.issue=2&rft.spage=97&rft.epage=122&rft_id=info:doi/10.1080%2F09546550008427563&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0954-6553&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0954-6553&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0954-6553&client=summon