Introducing and Exploring the Extremist Cybercrime Database (ECCD) Article Swipe
Related Concepts
Cybercrime
Computer security
State (computer science)
Ideology
Reliability (semiconductor)
Political science
Politics
Computer science
Criminology
Quality (philosophy)
Internet privacy
World Wide Web
Psychology
The Internet
Law
Epistemology
Quantum mechanics
Power (physics)
Philosophy
Algorithm
Physics
Thomas J. Holt
,
Steven M. Chermak
,
Joshua D. Freilich
,
Noah D. Turner
,
Emily Greene‐Colozzi
·
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1177/00111287221083899
· OA: W4221047680
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1177/00111287221083899
· OA: W4221047680
This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that includes scheme, offender and target codebooks to address gaps in existing research and better inform policymakers. We describe our open source collection procedures, the type of information uncovered, and how we assessed their quality and reliability. We highlight our findings, compare these extremist cyber-crimes to extremist real world violence, and discuss their conceptual and policy implications.
Related Topics
Finding more related topics…