Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-8bhkd Total loading time: 0 Render date: 2024-11-06T11:03:15.780Z Has data issue: false hasContentIssue false

35 - The Political Psychology of Cyberterrorism

from Part III - Contemporary Challenges to Democracy

Published online by Cambridge University Press:  17 February 2022

Danny Osborne
Affiliation:
University of Auckland
Chris G. Sibley
Affiliation:
University of Auckland
Get access

Summary

This chapter examines the phenomenon of cyberterrorism through the lens of political psychology. The emergence of cyberterrorism as a novel threat has roiled international security and given rise to a new wave of research that seeks to understand how exposure to destructive digital attacks influences political attitudes and behaviour. In this chapter, we review the leading empirical studies that have emerged as part of this new research focus. We begin by presenting a consolidated political psychology model of exposure to cyberterrorism that guides our analysis throughout the chapter. We then apply this model to the two predominant political outcomes that recur in the empirical literature – public confidence and trust in institutions, and foreign policy attitudes. Finally, we pinpoint the key gaps in our understanding of the psycho-political effects of cyberterrorism exposure and propose a research agenda that accounts for the evolving nature of the field.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Backhaus, S., Canetti, D., Gross, M., Waismel-Manor, I., & Cohen, H. (2020). A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure. Cyberpsychology, Behavior, and Social Networking, 23(9), 595603.Google Scholar
Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In Benson, V. & McAlaney, J. (Eds.), Emerging cyber threats and cognitive vulnerabilities (pp. 7392). Academic Press.Google Scholar
Baldwin, T. E., Ramaprasad, A., & Samsa, M. E. (2008). Understanding public confidence in government to prevent terrorist attacks. Journal of Homeland Security and Emergency Management, 5(1).CrossRefGoogle Scholar
Bleich, A., Gelkopf, M., & Solomon, Z. (2003). Exposure to terrorism, stress-related mental health symptoms, and coping behaviors among a nationally representative sample in Israel. JAMA, 290(5), 612620.CrossRefGoogle ScholarPubMed
Bonanno, G. A., & Jost, J. T. (2006). Conservative shift among high-exposure survivors of the September 11th terrorist attacks. Basic and Applied Social Psychology, 28(4), 311323.Google Scholar
Bumiller, E., & Shanker, T. (2012, 11 October). Panetta warns of dire threat of cyberattack on US. The New York Times. https://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.htmlGoogle Scholar
Canetti, D. (2017). Emotional distress, conflict ideology, and radicalization. PS: Political Science & Politics, 50(4), 940943.Google Scholar
Canetti, D., Gross, M., Waismel-Manor, I., Levanon, A., & Cohen, H. (2017). How cyberattacks terrorize: Cortisol and personal insecurity jump in the wake of cyberattacks. Cyberpsychology, Behavior, and Social Networking, 20(2), 7277.CrossRefGoogle ScholarPubMed
Canetti, D., Rapaport, C., Wayne, C., Hall, B., & Hobfoll, S. (2013). An exposure effect? Evidence from a rigorous study on the psycho-political outcomes of terrorism. In Sinclair, S. J. & Antonius, D. (Eds.), The political psychology of terrorism fears (pp. 193212). Oxford University Press.CrossRefGoogle Scholar
Canetti, D., Russ, E., Luborsky, J., Gerhart, J. I., & Hobfoll, S. E. (2014). Inflamed by the flames? The impact of terrorism and war on immunity. Journal of Traumatic Stress, 27(3), 345352.Google Scholar
Canetti-Nisim, D., Halperin, E., Sharvit, K., & Hobfoll, S. E. (2009). A new stress-based model of political extremism: Personal exposure to terrorism, psychological distress, and exclusionist political attitudes. Journal of Conflict Resolution, 53(3), 363389.Google Scholar
Chanley, V. A. (2002). Trust in government in the aftermath of 9/11: Determinants and consequences. Political Psychology, 23(3), 469483.Google Scholar
Cheung-Blunden, V., Cropper, K., Panis, A., & Davis, K. (2019). Functional divergence of two threat-induced emotions: Fear-based versus anxiety-based cybersecurity preferences. Emotion, 19(8), Article 1353.Google Scholar
Cheung‐Blunden, V., & Ju, J. (2016). Anxiety as a barrier to information processing in the event of a cyberattack. Political Psychology, 37(3), 387400.Google Scholar
Denning, D. E. (2000). Cyberterrorism: Testimony before the special oversight panel on terrorism Committee on Armed Services. US House of Representatives. Focus on Terrorism, 9, 7176.Google Scholar
Denning, D. E. (2007). A view of cyberterrorism five years later. In Himma, K. (Ed.), Internet security: Hacking, counterhacking, and society (pp. 123141). Jones and Bartlett Publishers.Google Scholar
Denning, D. E. (2009). Barriers to entry: Are they lower for cyber warfare? IO Journal, 1(1), Article 4.Google Scholar
Dunn Cavelty, M. (2012). The militarisation of cyberspace: Why less may be better. In 2012 4th International Conference on Cyber Conflict (CYCON June 2012) (pp. 113). IEEE.Google Scholar
Dunn Cavelty, M. (2019). The materiality of cyberthreats: Securitization logics in popular visual culture. Critical Studies on Security, 7(2), 138151.Google Scholar
Egloff, F. (2020). Intentions and cyberterrorism. In Cornish, P. (Ed.), Oxford handbook of cyber security (pp. 124). Oxford University Press.Google Scholar
Eun, Y.-S., & Aßmann, J. S. (2016). Cyberwar: Taking stock of security and warfare in the digital age. International Studies Perspectives, 17(3), 343360.Google Scholar
Fischer, A. H., & Roseman, I. J. (2007). Beat them or ban them: The characteristics and social functions of anger and contempt. Journal of Personality and Social Psychology, 93(1), 103115.Google Scholar
Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 4173.Google Scholar
Gomez, M. (2021). Strategic preferences in cyberspace: A cognitive-cultural approach [Working Paper].Google Scholar
Gomez, M., & Whyte, C. (2021). Cyber malaise: The effects of extended exposure to cybersecurity incidents [Working Paper].Google Scholar
Gomez, M. A., & Villar, E. B. (2018). Fear, uncertainty, and dread: Cognitive heuristics and cyber threats. Politics and Governance, 6(2), 6172.Google Scholar
Gomez, M. A., & Whyte, C. (2020). Cyber wargaming: Grappling with uncertainty in a complex domain. Defense Strategy & Assessment Journal, 10(1), 95135.Google Scholar
Gross, M. L., Canetti, D., & Vashdi, D. R. (2016). The psychological effects of cyber-terrorism. Bulletin of the Atomic Scientists, 72(5), 284291.Google Scholar
Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: Its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 4958.Google Scholar
Halperin, E., Russell, A. G., Dweck, C. S., & Gross, J. J. (2011). Anger, hatred, and the quest for peace: Anger can be constructive in the absence of hatred. Journal of Conflict Resolution, 55(2), 274291.CrossRefGoogle Scholar
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 11551175.Google Scholar
Hetherington, M. J., & Nelson, M. (2003). Anatomy of a rally effect: George W. Bush and the war on terrorism. PS: Political Science & Politics, 36(1), 3742.Google Scholar
Holt, T. J., Kilger, M., Chiang, L., & Yang, C. S. (2017). Exploring the correlates of individual willingness to engage in ideologically motivated cyberattacks. Deviant Behavior, 38(3), 356373.Google Scholar
Hua, J., Chen, Y., & Luo, X. R. (2018). Are we ready for cyberterrorist attacks? Examining the role of individual resilience. Information & Management, 55(7), 928938.Google Scholar
Huddy, L., Feldman, S., Taber, C., & Lahav, G. (2005). Threat, anxiety, and support of antiterrorism policies. American Journal of Political Science, 49(3), 593608.Google Scholar
Janoff-Bulman, R. (1992). Shattered assumptions: Towards a new psychology of trauma. Free Press.Google Scholar
Janoff-Bulman, R., & Usoof-Thowfeek, R. (2009). Shifting moralities: Post-9/11 responses to shattered national assumptions. In Morgan, M. J. (Ed.), The impact of 9/11 on psychology and education (pp. 8196). Palgrave Macmillan.Google Scholar
Jardine, E., & Porter, N. D. (2020). Pick your poison: The attribution paradox in cyberwar. SocArXiv, etb72.Google Scholar
Jarvis, L., Macdonald, S., & Whiting, A. (2017). Unpacking cyberterrorism discourse: Specificity, status, and scale in news media constructions of threat. European Journal of International Security, 2(1), 6487.Google Scholar
Jensen, B., & Valeriano, B. (2019). Cyber escalation dynamics: Results from war game experiments. International Studies Association, Annual Meeting Panel: War Gaming and Simulations in International Conflict, 27 March.Google Scholar
Kertzer, J. D., Oppenheimer, H., & Zeitzoff, T. (2021). Do cyberattacks corrode?: Cyberattacks and domestic politics [Working Paper].Google Scholar
Kostyuk, N., & Wayne, C. (2020). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2), Article ogz077.Google Scholar
Kreps, S., & Schneider, J. (2019). Escalation firebreaks in the cyber, conventional, and nuclear domains: Moving beyond effects-based logics. Journal of Cybersecurity, 5(1), Article tyz007.Google Scholar
Kruglanski, A. (2019, October). What prevents cyber-terrorism? The psychology of a puzzle [Paper presented at the International Cyber-Terrorism Symposium, Haifa, Israel].Google Scholar
Lachow, I. (2009). Cyber-terrorism: Menace or myth. In Kramer, F. D., Starr, S. H., & Wentz, L. K. (Eds.), Cyberpower and national security (pp. 434467). National Defense University Press.Google Scholar
Lawson, S. T. (2019). Cybersecurity discourse in the United States: Cyber-doom rhetoric and beyond. Routledge.Google Scholar
Lee, C., Choi, K. S., Shandler, R., & Kayser, C. (2021). Mapping global cyberterror networks: An empirical study of Al-Qaeda and ISIS cyberterrorism events. Journal of Contemporary Criminal Justice. https://doi.org/10.1177/10439862211001606Google Scholar
Lerner, J. S., & Keltner, D. (2001). Fear, anger, and risk. Journal of Personality and Social Psychology, 81(1), 146159.Google Scholar
Lindsay, J. R. (2013, April). Proxy wars: Control problems in irregular warfare and cyber operations. In International Studies Association Annual Meeting, San Francisco. http://www.jonrlindsay.com/papersGoogle Scholar
Lindsay, J. R. (2015). Tipping the scales: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 5367.Google Scholar
Macdonald, S., Jarvis, L., & Nouri, L. (2015). State cyberterrorism: A contradiction in terms? Contemporary Voices: St Andrews Journal of International Relations, 6(3), 6275.Google Scholar
Maschmeyer, L., Deibert, R. J., & Lindsay, J. R. (2020). A tale of two cybers: How threat reporting by cybersecurity firms systematically underrepresents threats to civil society. Journal of Information Technology & Politics, 18(1), 120.CrossRefGoogle Scholar
Matzkin, S., Shandler, R., & Canetti, D. (2021). Off-track, on confidence: Public confidence following cyber terrorism – a survey – experiments in trilateral democracies [Working Paper].Google Scholar
McCarthy, J. (2016, 10 February). Americans cite cyberterrorism among top three threats to U.S. Gallup. https://news.gallup.com/poll/189161/americans-cite-cyberterrorism-among-top-three-threats.aspxGoogle Scholar
McDermott, R. (2010). Decision making under uncertainty. In Proceedings of a workshop deterring cyberattacks: Informing strategies and developing options for U.S. policy (pp. 227241). National Academies Press.Google Scholar
McDermott, R. (2019). Some emotional considerations in cyber conflict. Journal of Cyber Policy, 4(3), 309325.CrossRefGoogle Scholar
McDermott, R., & Hatemi, P. K. (2014). The study of international politics in the neurobiological revolution: A review of leadership and political violence. Millennium, 43(1), 92123.Google Scholar
Merolla, J. L., & Zechmeister, E. J. (2009). Democracy at risk: How terrorist threats affect the public. The University of Chicago Press.Google Scholar
Neria, Y., DiGrande, L., & Adams, B. G. (2011). Posttraumatic stress disorder following the September 11, 2001, terrorist attacks: A review of the literature among highly exposed populations. American Psychologist, 66(6), 429446.Google Scholar
Norman, J. (2018, 5 March). North Korea, cyberterrorism top threats to U.S. Gallup. https://news.gallup.com/poll/228437/north-korea-cyberterrorism-top-threats.aspxGoogle Scholar
Nurse, J. R. C. (2018). Cybercrime and you: How criminals attack and the human factors that they seek to exploit. In Attrill-Smith, A., Fullwood, C., Keep, M., & Kuss, D. J. (Eds.), Oxford handbook of cyberpsychology (2nd ed., pp. 663691). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780198812746.013.35Google Scholar
Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 1838.Google Scholar
Ojeda, C. (2016). The effect of 9/11 on the heritability of political trust. Political Psychology, 37(1), 7388.Google Scholar
Robles, F., & Perlroth, N. (2021, 8 February). ‘Dangerous stuff’: Hackers tried to poison water supply of Florida Town. The New York Times. https://www.nytimes.com/2021/02/08/us/oldsmar-florida-water-supply-hack.htmlGoogle Scholar
Schneider, J. (2017, March). Cyber and crisis escalation: Insights from wargaming. USASOC Futures Forum.Google Scholar
Shandler, R., Gross, M. G., Backhaus, S., & Canetti, D. (2021). Cyber terrorism and public support for retaliation: A multi-country survey experiment. British Journal of Political Science, 1–19.Google Scholar
Shandler, R., Gross, M. G., & Canetti, D. (2021). A fragile public preference for using cyber strikes: Evidence from survey experiments in the United States, United Kingdom and Israel. Contemporary Security Policy, 42(2), 135162.Google Scholar
Silver, R. C., Holman, E. A., McIntosh, D. N., Poulin, M., & Gil-Rivas, V. (2002). Nationwide longitudinal study of psychological responses to September 11. JAMA, 288(10), 12351244.Google Scholar
Slayton, R. (2017). What is the cyber offense-defense balance? Conceptions, causes, and assessment. International Security, 41(3), 72109.Google Scholar
Slone, M., & Shoshani, A. (2006). Evaluation of preparatory measures for coping with anxiety raised by media coverage of terrorism. Journal of Counseling Psychology, 53(4), 535542.Google Scholar
Snider, K., Hefetz, A., Shandler, R., & Canetti, D. (2021). Threatened by cyberattacks and supporting surveillance policies in the big brother state [Working Paper].Google Scholar
Snider, K., Zandani, S., Shandler, R., & Canetti, D. (2021). Cyber attacks, cyber threats and attitudes toward cybersecurity policies. Journal of Cybersecurity [Manuscript submitted for publication].Google Scholar
Sunstein, C. R. (2009). Worst-case scenarios. Harvard University Press.Google Scholar
Tidy, J. (2020, 18 September). Police launch homicide inquiry after German hospital hack. BBC. https://www.bbc.com/news/technology-54204356Google Scholar
Valeriano, B., & Gomez, M. A. (2020). The failure of academic progress in cybersecurity. Council on Foreign Relations Blog. www.cfr.org/blog/failure-academic-progress-cybersecurityGoogle Scholar
Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.Google Scholar
Valeriano, B., & Maness, R. C. (2018). International relations theory and cyber security. In Brown, C. & Eckersley, R. (Eds.), The Oxford handbook of international political theory (pp. 259273). Oxford University Press.Google Scholar
Valeriano, B. G., & Jensen, B. (2019). The myth of the cyber offense: The case for cyber restraint. Cato Institute Policy Analysis, no. 862.Google Scholar
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547559.Google Scholar
Wayne, C. (2019). Risk or retribution: The micro-foundations of state responses to terror [Doctoral dissertation, University of Michigan].Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×