Skip to main content

A consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism

Cybersecurity and Cyberterrorism

Project Title Sort ascending Publication Date Publication Type
A Practical Taxonomy for Online Terrorist Content 2021-07-01T12:00:00 Report
A Surveillance Banner on Compromised Computer Systems Reduces Hackers’ Active Engagement 2015-07-01T12:00:00 Research Brief
An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks 2020-08-01T12:00:00 Journal Article
Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure 2019-07-01T12:00:00 Conference Paper
Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security 2016-02-01T12:00:00 Book Chapter
Cyber-Dependent Crimes: An Interdisciplinary Review 2019-01-01T12:00:00 Journal Article
Cyber-Sophistication Assessment Methodology for Public-Facing Terrorist Web Sites 2017-04-01T12:00:00 Journal Article
Defender–Attacker Games with Asymmetric Player Utilities 2019-09-01T12:00:00 Journal Article
Determining Extremist Organizations' Likelihood of Conducting Cyber Attacks 2016-06-01T12:00:00 Conference Paper
Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups 2019-01-01T12:00:00 Journal Article
Exploring the Subculture of Ideologically Motivated Cyber-Attackers 2017-04-01T12:00:00 Journal Article
Hacking the Human Body: The Cyber-Bio Convergence 2019-04-01T12:00:00 White Paper
Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors 2017-08-01T12:00:00 Journal Article
Influence-to-Action Model and Campaign/Narrative Impact Assessment Tool 2022-05-01T12:00:00 START Reports
Influence-to-Action Model Development: A Tool to Assess the Impact of Foreign Influence Operations 2021-12-01T12:00:00 START Reports
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach 2017-08-01T12:00:00 Journal Article
Repression, Education, and Politically Motivated Cyberattacks 2016-08-01T12:00:00 Journal Article
Research Brief: Significant Multi-Domain Incidents against Critical Infrastructure (SMICI) Dataset 2019-12-01T12:00:00 Research Brief
Taxonomy Expansion and the Global Terrorism Database: Effectively Leveraging Academic Data Collection Initiatives 2021-07-01T12:00:00 Report
The Application of Social Bookmarking Technology to the National Intelligence Domain 2006-06-01T12:00:00 Journal Article
The Damoclean Sword of Offensive Cyber: Policy Uncertainty and Collective Insecurity 2019-03-01T12:00:00 Journal Article
When the Levee Breaks: A Global Trend of Cyber-Physical and Cyber-Operational Attacks Against Critical Infrastructure and Future Implications on the Great Power Competition 2022-09-01T12:00:00 Book Chapter
Title Sort ascending Job Title Institution
Egle M Egle Murauskaite Senior Researcher & Simulation Developer, ICONS Project, START University of Maryland
Gary Ackerman Gary Ackerman Associate Professor, SUNY Albany University at Albany, State University of New York
Lafee Gary LaFree Founding Director, START
Distinguished University Professor, Department of Criminology and Criminal Justice
University of Maryland
Joshua Freilich Joshua Freilich Professor John Jay College of Criminal Justice, City University of New York
Izsak Katherine Katherine Worboys Izsak Academic Director, UMD College of Information (iSchool) University of Maryland
Oleksiy Oleksiy Krylyuk Researcher, GTD University of Maryland
Prabhakar misra Prabhakar Misra Professor of Physics Howard University
person-default Rhyner Washburn Cyber Intelligence Researcher, START University of Maryland
Sin_Steve Steve Sin Director, Unconventional Weapons and Technology (UWT)

Subject Matter Expert Instructor, National Center for Security & Preparedness
University of Maryland
Clark tyler Tyler A. Clark Data Scientist, Doctoral Student University of Maryland