computer terrorism

using attacks based on the Internet or other computer and telecommunications networks for terrorist purposes
Thing activity Q1137004
Press Enter · cited answer in seconds

computer terrorism

Summary

computer terrorism is an activity[1]. It draws 171 Wikipedia views per month (activity category, ranking #88 of 272).[2]

Key Facts

  • computer terrorism's instance of is recorded as activity[3].
  • computer terrorism's Library of Congress authority ID is recorded as sh00001974[4].
  • computer terrorism's Bibliothèque nationale de France ID is recorded as 15061494m[5].
  • computer terrorism's subclass of is recorded as terrorism[6].
  • computer terrorism's BNCF Thesaurus ID is recorded as 58923[7].
  • computer terrorism's Freebase ID is recorded as /m/03b4hp[8].
  • computer terrorism's NL CR AUT ID is recorded as ph224031[9].
  • computer terrorism's National Library of Latvia ID is recorded as 000083395[10].
  • computer terrorism's uses is recorded as cyberattack[11].
  • computer terrorism's uses is recorded as telecommunications network[12].
  • computer terrorism's uses is recorded as disinformation[13].
  • computer terrorism's uses is recorded as social engineering[14].
  • computer terrorism's uses is recorded as denial-of-service attack[15].
  • computer terrorism's uses is recorded as misappropriation[16].
  • computer terrorism's practiced by is recorded as cyberterrorist[17].
  • computer terrorism's Quora topic ID is recorded as Cyberterrorism[18].
  • computer terrorism's JSTOR topic ID is recorded as cyberterrorism[19].
  • computer terrorism's Microsoft Academic ID is recorded as 2777200954[20].
  • computer terrorism's National Library of Israel J9U ID is recorded as 987007285534705171[21].
  • computer terrorism's Lex ID is recorded as Cyberterrorisme[22].
  • computer terrorism's KBpedia ID is recorded as CyberTerrorism[23].
  • computer terrorism's AniDB tag ID is recorded as 3964[24].
  • computer terrorism's ScienceDirect topic ID is recorded as computer-science/cyber-terrorism[25].
  • computer terrorism's Yale LUX ID is recorded as concept/b6a4cae7-49e3-404b-91d4-ff3f71ccf8d2[26].

Why It Matters

computer terrorism draws 171 Wikipedia views per month (activity category, ranking #88 of 272).[2] It has Wikipedia articles in 23 language editions, a strong signal of global cultural recognition.[27] It is known by 42 alternative names across languages and contexts.[28]

References

Programmatic citations — every numbered marker resolves to a verifiable graph row below.

Direct Wikidata claims

  1. [3] . wikidata.org.
  2. [4] . wikidata.org.
  3. [5] . wikidata.org.
  4. [6] . wikidata.org.
  5. [7] . wikidata.org.
  6. [8] . Freebase Data Dumps. wikidata.org.
  7. [9] . wikidata.org.
  8. [10] . wikidata.org.
  9. [11] . wikidata.org.
  10. [12] . wikidata.org.
  11. [13] . wikidata.org.
  12. [14] . wikidata.org.
  13. [15] . wikidata.org.
  14. [16] . wikidata.org.
  15. [17] . wikidata.org.
  16. [18] . Quora. wikidata.org.
  17. [19] . wikidata.org.
  18. [20] . wikidata.org.
  19. [21] . National Library of Israel. wikidata.org.
  20. [22] . wikidata.org.
  21. [23] . KBpedia. Retrieved . wikidata.org.
  22. [24] . wikidata.org.
  23. [25] . wikidata.org.
  24. [26] . wikidata.org.

Class ancestry

  1. [1] . Wikidata. wikidata.org.

Aggregate / graph-position facts

  1. [2] . Wikimedia Foundation. dumps.wikimedia.org.
  2. [27] . Wikidata sitelinks. wikidata.org.
  3. [28] . Wikidata aliases. wikidata.org.

📑 Cite this page

Use these citations when quoting this entity in research, articles, AI prompts, or wherever provenance matters. We aggregate Wikidata + Wikipedia + authoritative open-data sources; the stitched, scored, cross-referenced view is what 4ort.xyz contributes.

APA 4ort.xyz Knowledge Graph. (2026). computer terrorism. Retrieved May 3, 2026, from https://4ort.xyz/entity/computer-terrorism
MLA “computer terrorism.” 4ort.xyz Knowledge Graph, 4ort.xyz, 3 May. 2026, https://4ort.xyz/entity/computer-terrorism.
BibTeX @misc{4ortxyz_computer-terrorism_2026, author = {{4ort.xyz Knowledge Graph}}, title = {{computer terrorism}}, year = {2026}, url = {https://4ort.xyz/entity/computer-terrorism}, note = {Accessed: 2026-05-03}}
LLM prompt According to 4ort.xyz Knowledge Graph (aggregator of Wikidata, Wikipedia, and authoritative open-data sources): computer terrorism — https://4ort.xyz/entity/computer-terrorism (retrieved 2026-05-03)

Canonical URL: https://4ort.xyz/entity/computer-terrorism · Last refreshed: