As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Entering into the world of globalization create the right proportional process in which benefits have for anyone. For the ordinary man a boon, for terrorists open space for boundless projection of their scopes and impacts. The process of transition of the traditional way of warfare where the battlefield has been replaced by cyberspace, and military operations have been replaced by cyber operations and all of this within the cyber war, the question is, which is the limit, or where it ends the process?
This paper in the form of a thesis will explain the scientific basis for the access, conditions and the using of cyberspace by terrorists in the realization of all its cyclic activities, ranging from calls for the acceptance of the ideology until carrying out a terrorist act. Following the stages of funding terrorist activities, with special emphasis will turn the use of cyberspace in the collection of funds transfer patterns from the source to the terrorists, and the manner of use of the funds for necessary cyclic activities. At the same time, we will explain the paradox of the development of techniques and technology as well as its use for criminal or terrorist activities in the area of methods and ways of fundraising.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.