期刊文献+

浅议网络恐怖主义现状、发展趋势及对策 被引量:9

Discussion on Cyberterrorism's Present Situation,Development Trend and Countermeasures
下载PDF
导出
摘要 随着网络技术的发展,恐怖主义向网络空间渗透,并紧密融合在一起,形成网络恐怖主义。网络恐怖主义具有攻击手段多元交错且活动分散隐蔽、网络恐怖活动向集团化方向发展但综合协同攻击技术尚未完全形成的特点,表现为实施网络恐怖心理战、组织网络恐怖宣传战和发动网络恐怖袭击战。提出加强网络恐怖主义预防和控制、完善反网络恐怖主义法律体系、建立反恐情报共享平台、加强国际反恐交流与合作等措施,以有效防控打击网络恐怖主义。 With the development of network technology, terrorists permeates into cyberspace and integrates closely with each other, posing a new grave threat to human society. Cyberterrorism has the characteristics of muhiple methods of terrorist attacks, scattered and hidden activities, and network terrorist activities developing towards collectiv- ization, but the comprehensive coordinated attack technology has not been fully formed. The manifestation of cyberterrorism is psychological operations, propoganda and backings. To prevent and control cyberterrorism, countemeasures like improving the legal system against cyber terrorism, establishing a counter-terrorism intelligence-sharing platformand strengthening international counter-terrorism exchanges and cooperation are proposed.
作者 周骥 李丽娟 陆惠龙 滕亮亮 ZHOU Ji;LI Lijuan;LU Huilong;TENG Liangliang(China People's Police University,Langfang,Hebei Province 065000,China)
出处 《武警学院学报》 2018年第10期78-83,共6页 Journal of the Armed Police Academy
关键词 网络恐怖主义 网络空间 网络技术 network terrorism network space network technology
  • 相关文献

参考文献5

二级参考文献57

  • 1莫拉.康威,朱美荣.恐怖主义与大众传媒[J].国外社会科学文摘,2005(1):39-41. 被引量:7
  • 2[俄]对外情报总局 联邦安全总局等著 杨晖总译审.信息恐怖主义——国际安全的新威胁[M].军事谊文出版社,2002—10..
  • 3李永刚.互联网与国家安全.民主与科学[EB/OL].蓝色战略网,2003—04—19.
  • 4Mark M. Pollitt. CYBERTERRORISM Fact or Fancy? . FBI Laboratory, 935 Pennsylvania Ave. NW Washington, D. C. 20535. http ://www. cs. georgetown. edu/- denning/infosec/pollitt.html.
  • 5Dorothy E. Denning. CYBERTERRORISM, Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Georgetown University, May 23, 2000. http://www.cs. georgetown.edu/-denning/infosec/cyberterror.html.
  • 6布热津斯基:《大抉择:美国站在十字路口》,新华出版社,2005年,第11、24页.
  • 7Gabriel Weimann," Howmodern terrorism uses the internet",Special Report 116,march 2004,United States Institute Of Peace.
  • 8Jessica Stern,The Ultimate Terrorists,Harvard University Press,2000.P.9.
  • 9新华社北京12月15日电:《公安部就公布“东突”恐怖组织和恐怖分子答记者问》,人民网:http://www.people.com.cn/GB/junshi/1076/2247883.html
  • 10GabrielWeimann," How modern terrorism uses the internet",Special Report 116,march 2004,United States Institute Of Peace.

共引文献83

同被引文献103

引证文献9

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部