Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy

  • Dennis Broeders*
  • , Fabio Cristiano
  • , Daan Weggemans
  • *Corresponding author for this work

    Research output: Contribution to journalArticleAcademicpeer-review

    Abstract

    This article analyses the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG). First, it reveals how – through the extension of preemptive measures to low-impact cyber activities and online content – national policies progressively articulate cyber terrorism as an issue of information security. Second, it problematizes how – through the adoption of comprehensive and imprecise definitions – the diplomatic language on cyber terrorism might lend international support to those authoritarian regimes keen on leveraging counter-terrorism to persecute domestic oppositions and vulnerable groups. Third, it concludes that – with UN diplomatic efforts increasingly discussing countering (dis)information operations – combining normative debates on cyber terrorism with those on information security requires precision of language to safeguard human rights globally.
    Original languageEnglish
    Pages (from-to)2426-2453
    Number of pages28
    JournalStudies in Conflict and Terrorism
    Volume46
    Issue number12
    Early online date2 Jun 2021
    DOIs
    Publication statusPublished - 2023

    Bibliographical note

    Publisher Copyright:
    © 2021 The Author(s). Published with license by Taylor & Francis Group, LLC.

    UN SDGs

    This output contributes to the following UN Sustainable Development Goals (SDGs)

    1. SDG 16 - Peace, Justice and Strong Institutions
      SDG 16 Peace, Justice and Strong Institutions

    Fingerprint

    Dive into the research topics of 'Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy'. Together they form a unique fingerprint.

    Cite this