Abstract
The author provides a detailed description of the characteristics of IT terrorism, explaining how IT attacks for terrorist purposes constitute a crime under domestic law. The article also expands on anti-terrorist detection and prevention mechanisms and on how these may restrict freedom, especially in cyberspace.
References
.

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright (c) 2025 Academic Journal of Internal Affairs
Downloads
Download data is not yet available.