Link Search Menu Expand Document
  1. Appendix B: Interview Questions
    1. Opening Questions
    2. Research Question Focused Questions
    3. Punctuated Equilibrium Focused Questions
    4. Closing Question

Appendix B: Interview Questions

Opening Questions

  1. What is your profession?

  2. What is your role in your current profession?

  3. How many years have you worked in your current profession?

  4. How many years have your professional responsibilities been associated with aspects of cyber or terrorism?

  5. What have been the different focuses in your current area of expertise?

Research Question Focused Questions

  1. What have been the biggest priorities of executives and decision-makers senior to you?
  2. What do you view as the greatest risks to U.S. national security?
  3. Please explain your understanding of cyberterrorism.
  4. How much common understanding regarding aspects of cyber and terrorism do you see across organizations that have the ability to influence national cyberterrorism policy?
  5. How likely do you think it is that terrorists currently possess capabilities to conduct a large-scale cyberattack against the United States? Please explain.
  6. Describe your overall satisfaction with U.S. preparations for large-scale cyberterrorism attacks.
  7. In your opinion, what precautionary measures, if any, can the United States implement to minimize the threat of a large-scale cyberterrorism attack?
  8. To what extent should the United States consider international law when preparing for or responding to a large-scale cyberterrorism attack?
  9. How do you think the United States would respond to a successful large-scale cyberterrorism attack with results comparable to or greater than 9/11?

Punctuated Equilibrium Focused Questions

  1. What do you think influences the perceptions of national policy makers related to your area of expertise?
  2. What are the main drivers of the most important policy issues relating to your area of expertise?
  3. What positive or negative external factors have affected aligning cyberterrorism awareness with the national security agenda? Please explain.

Closing Question

  1. What additional information can you provide related to attacks against the United States utilizing cyber or terrorism means?

Table of Contents