{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T12:09:50Z","timestamp":1774440590079,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T00:00:00Z","timestamp":1483574400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11948-016-9864-0","type":"journal-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T10:06:21Z","timestamp":1483610781000},"page":"993-1006","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Cyber Attacks and Terrorism: A Twenty-First Century Conundrum"],"prefix":"10.1007","volume":"25","author":[{"given":"Marwan","family":"Albahar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,5]]},"reference":[{"issue":"3","key":"9864_CR1","first-page":"33","volume":"16","author":"D Bieda","year":"2015","unstructured":"Bieda, D., Riddle, E., & Halawi, L. (2015). Cyberspace: A venue for terrorism. Issues in Information Systems,\n                           16(3), 33\u201342.","journal-title":"Issues in Information Systems"},{"key":"9864_CR2","volume-title":"Inside cyber warfare","author":"J Carr","year":"2010","unstructured":"Carr, J., & Shepherd, L. (2010). Inside cyber warfare. Sebastopol, CA: O\u2019Reilly Media Inc."},{"key":"9864_CR3","first-page":"239","volume-title":"Networks and netwars the future of terror, crime, and militancy","author":"D Denning","year":"2001","unstructured":"Denning, D. (2001). Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars the future of terror, crime, and militancy (1st ed., pp. 239\u2013288). Santa Monica, CA: RAND.","edition":"1"},{"key":"9864_CR4","unstructured":"Dhs.gov. (2015). Cybersecurity|Homeland Security. Retrieved from \n                    http:\/\/www.dhs.gov\/topic\/cybersecurity\n                    \n                  . Accessed December 24, 2015."},{"key":"9864_CR5","unstructured":"Dynes, R. (2006). Natural Hazards Observer\u2014November 2006|Natural Hazards Center. Colorado.edu, Retrieved from \n                    http:\/\/www.colorado.edu\/hazards\/o\/archives\/2006\/nov06\/nov06c.html\n                    \n                   Accessed December 25, 2015."},{"issue":"2","key":"9864_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5038\/1944-0472.4.2.3","volume":"4","author":"S Herzog","year":"2011","unstructured":"Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security,\n                           4(2), 49\u201360.","journal-title":"Journal of Strategic Security"},{"key":"9864_CR7","volume-title":"The Stuxnet Computer Worm: Harbinger of an emerging warfare capability","author":"P Kerr","year":"2009","unstructured":"Kerr, P., Rollins, J., & Theohary, C. (2009). The Stuxnet Computer Worm: Harbinger of an emerging warfare capability. Washington, DC: Department of Homeland Security."},{"key":"9864_CR8","volume-title":"Assessing the risks of cybertwrrorism, cyber war, and other cyber threats","author":"J Lewis","year":"2002","unstructured":"Lewis, J. (2002). Assessing the risks of cybertwrrorism, cyber war, and other cyber threats. Washington, DC: Center for Strategic and International Studies."},{"key":"9864_CR9","unstructured":"Lewis, J. (2009). The \u201cKorean\u201d cyber attacks and their implications for cyber conflict|Center for Strategic and International Studies, Csis.org. Retrieved from \n                    http:\/\/csis.org\/publication\/korean-cyber-attacks-and-their-implications-cyber-conflict\n                    \n                  . Accessed December 26, 2015."},{"key":"9864_CR10","volume-title":"Strategic concept for the defence and security of the members of the North Atlantic Treaty Organisation","author":"NATO","year":"2010","unstructured":"NATO. (2010). Strategic concept for the defence and security of the members of the North Atlantic Treaty Organisation. Lisbon: NATO."},{"key":"9864_CR11","volume-title":"Zero day","author":"R O\u2019Harrow","year":"2013","unstructured":"O\u2019Harrow, R. (2013). Zero day. New York: Diversion Books."},{"key":"9864_CR12","unstructured":"Rademacher, K. (2005). Clarke: ID theft prevention tied to anti-terrorism efforts. LasVegasSun.com. Retrieved from \n                    http:\/\/lasvegassun.com\/news\/2005\/apr\/13\/clarke-id-theft-prevention-tied-to-anti-terrorism\n                    \n                  . Accessed December 23, 2015."},{"issue":"1","key":"9864_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/03071847.2012.664354","volume":"157","author":"T Rid","year":"2012","unstructured":"Rid, T., & McBurney, P. (2012). Cyber-weapons. The RUSI Journal,\n                           157(1), 6\u201313.","journal-title":"The RUSI Journal"},{"key":"9864_CR14","volume-title":"Terrorist capabilities for cyberattack: Overview and policy","author":"J Rollins","year":"2007","unstructured":"Rollins, J., & Wilson, C. (2007). Terrorist capabilities for cyberattack: Overview and policy. Washington, DC: Congressional Research Service."},{"issue":"3","key":"9864_CR15","first-page":"32","volume":"41","author":"RM Rustici","year":"2011","unstructured":"Rustici, R. M. (2011). Cyberweapons: Leveling the international playing field\u201d. Parameters,\n                           41(3), 32\u201342.","journal-title":"Parameters"},{"key":"9864_CR16","volume-title":"Cyberwarfare and cyberterrorism: In brief","author":"C Theohary","year":"2015","unstructured":"Theohary, C., & Rollins, J. (2015). Cyberwarfare and cyberterrorism: In brief. Washington, DC: Congressional Research Service."},{"issue":"2","key":"9864_CR17","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/10576100590905110","volume":"28","author":"G Weimann","year":"2005","unstructured":"Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict & Terrorism,\n                           28(2), 129\u2013149.","journal-title":"Studies in Conflict & Terrorism"},{"key":"9864_CR18","unstructured":"Weimann, G. (2008). Al-Qaida\u2019s extensive use of the Internet, Ctc.usma.edu. Retrieved from \n                    https:\/\/www.ctc.usma.edu\/posts\/al-qaida%E2%80%99s-extensive-use-of-the-internet\n                    \n                  . Accessed December 15, 2015."},{"key":"9864_CR19","volume-title":"Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress","author":"C Wilson","year":"2003","unstructured":"Wilson, C. (2003). Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress. Washington, DC: Congressional Research Service."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-016-9864-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-016-9864-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-016-9864-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T15:10:03Z","timestamp":1563808203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-016-9864-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,5]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["9864"],"URL":"https:\/\/doi.org\/10.1007\/s11948-016-9864-0","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,5]]},"assertion":[{"value":"15 February 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2016","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}