An Assessment of the Harms Associated With Ideologically Motivated Cyberattacks

There has been a dramatic increase in research on terrorism and extremist activities over the last two decades. Despite this growth, the majority of studies focus on either the harm caused by ideologically-motivated violence in physical spaces, or the ways in which individuals radicalize and organiz...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Holt, Thomas J. 1978- (Autor)
Otros Autores: Chermak, Steven M. 1964- ; Freilich, Joshua D. ; Turner, Noah ; Greene-Colozzi, Emily
Tipo de documento: Electrónico Artículo
Lenguaje:Inglés
Publicado: 2025
En: Crime & delinquency
Año: 2025, Volumen: 71, Número: 3, Páginas: 624-655
Acceso en línea: Volltext (lizenzpflichtig)
Journals Online & Print:
Gargar...
Verificar disponibilidad: HBZ Gateway
Palabras clave:

MARC

LEADER 00000naa a22000002c 4500
001 1917860129
003 DE-627
005 20250222054818.0
007 cr uuu---uuuuu
008 250222s2025 xx |||||o 00| ||eng c
024 7 |a 10.1177/00111287241271221  |2 doi 
035 |a (DE-627)1917860129 
035 |a (DE-599)KXP1917860129 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Holt, Thomas J.  |d 1978-  |e VerfasserIn  |0 (DE-588)14391930X  |0 (DE-627)704643197  |0 (DE-576)167596403  |4 aut 
109 |a Holt, Thomas J. 1978-  |a Holt, Thomas Jeffrey 1978- 
245 1 0 |a An Assessment of the Harms Associated With Ideologically Motivated Cyberattacks 
264 1 |c 2025 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a There has been a dramatic increase in research on terrorism and extremist activities over the last two decades. Despite this growth, the majority of studies focus on either the harm caused by ideologically-motivated violence in physical spaces, or the ways in which individuals radicalize and organize in online spaces. There is growing evidence that traditional extremist groups and terrorists engage in cyberattacks, such as computer hacking, in support of their ideological beliefs. Little is known about the degree to which ideologically-motivated cyberattacks cause harm to victims, and the correlates of harm depending on the nature of the attack. This study attempts to address this gap in the literature through a quantitative analysis of 425 victims of 246 cyberattacks captured in the open-source Extremist CyberCrime Database (ECCD). Using situational crime prevention, this analysis attempts to identify the significant factors associated with the loss of time, data, and financial harm experienced by victims of cyberattacks performed by ideological actors with and without state sponsorship. The findings demonstrate that the forms of attack reported, as well as the unique attack methods, such as zero-day vulnerabilities, are more likely to lead victims to report the loss of time to the victim, as well as sensitive data and financial losses. The target type is also associated with the loss of both time and sensitive data, however there is no relationship between targets and the financial losses reported from cyberattacks. Additionally, financial harm was more likely to result from non-state sponsored ideological actors, such as racial and ethnically motivated individuals and jihadists. This analysis demonstrates support for the application of situational crime prevention frameworks traditionally used for physical terrorism to virtual ideological attacks. Further, this study demonstrates the importance of assessing cyberattacks as a form of ideologically-motivated crime. Finally, the findings demonstrate the need for increased resources to improve the state of cybersecurity for individuals, businesses, and government agencies to reduce the risk of harm associated with cyberattacks performed by both nation-state sponsored and non-state ideological actors alike. 
650 4 |a Cybersecurity 
650 4 |a Extremism 
650 4 |a Terrorism 
650 4 |a nation-state sponsored cyberattacks 
650 4 |a Hacking 
650 4 |a Cybercrime 
700 1 |a Chermak, Steven M.  |d 1964-  |e VerfasserIn  |0 (DE-588)1127256297  |0 (DE-627)881706507  |0 (DE-576)171603303  |4 aut 
700 1 |a Freilich, Joshua D.  |e VerfasserIn  |0 (DE-588)1075831423  |0 (DE-627)833977083  |0 (DE-576)18457045X  |4 aut 
700 1 |a Turner, Noah  |e VerfasserIn  |0 (DE-588)1317233689  |0 (DE-627)1878978497  |4 aut 
700 1 |a Greene-Colozzi, Emily  |e VerfasserIn  |0 (DE-588)1313645869  |0 (DE-627)1876224517  |4 aut 
773 0 8 |i Enthalten in  |t Crime & delinquency  |d Thousand Oaks, Calif. [u.a.] : Sage Publications, 1960  |g 71(2025), 3, Seite 624-655  |h Online-Ressource  |w (DE-627)306655128  |w (DE-600)1499997-3  |w (DE-576)081985045  |x 1552-387X  |7 nnas 
773 1 8 |g volume:71  |g year:2025  |g number:3  |g pages:624-655 
856 4 0 |u https://doi.org/10.1177/00111287241271221  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4669390120 
LOK |0 003 DE-627 
LOK |0 004 1917860129 
LOK |0 005 20250222043606 
LOK |0 008 250222||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2025-02-21#141533345A522DF8A1EFF1E0AAF359AF0E7366B5 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw