TITLE

Socialno-psihološke implikacije kibernetskega terorizma

AUTHOR(S)
Prislan, Kaja; Bernik, Igor
PUB. DATE
September 2013
SOURCE
Varstvoslovje: Journal of Criminal Justice & Security;2013, Vol. 15 Issue 3, p357
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Purpose: This paper intends to present the synergy between unrealistic notions about technology and terrorism and the cyberterrorists' real capabilities and activities. At the same time, the paper also points to the threat, which must not be neglected from the information security point of view, particularly at the national level. Design/Methods/Approach: The paper presents the use of descriptive and comparative methods, which were applied to analyse several assumptions found in professional and scientific publications in the relevant field. The synthesis method was then applied to consider the findings and upgrade current theoretical approaches in order to explain the nature of cybercrime and cyberterrorism perpetrators. Findings: Due to the development of global cyberspace, crime gained entirely new dimensions and opportunities. Apart from modern technology users and typical malevolent perpetrators, cyberterrorists, whose intention is to instigate as much fear and media attention as possible by using technology, are also operating in cyberspace. Psychological effects stemming from the use of technology contribute to the fact that cyberterrorism is characterised by a high level of misunderstanding and consequently fear. When considered in combination with the lack of understanding of modern technology, as well as the fear of its use and potential abuse, the fact that this type of cybercrime does not have a structured political and legal basis generates major intimidation effects. Although cyberterrorism represents a serious threat to information infrastructures owned by states and organisations, its actualisation in the physical environment is merely indirect. At the moment, terrorists mostly use modern technology as instrumentalities for planning attacks and preserving their own existence. Originality/Value: The importance of this paper is demonstrated by its up-to-date nature. Apart from traditional cybercrime, cyberterrorism is also becoming a subject of ever more frequent media attention and controversial debates. Sensationalist reporting often generates dramatic and unrealistic notions regarding cyberterrorism, as well as its potential scenarios and implications. This paper, however, presents the true capabilities and basic characteristics of cyberterrorism, while its originality is demonstrated by its explanatory and interpretative nature.
ACCESSION #
90664866

 

Related Articles

  • Congress's Role in Cyber Warfare. Dycus, Stephen // Journal of National Security Law & Policy;2010, Vol. 4 Issue 1, p155 

    The article discusses the role of Congress in cyber warfare in the U.S. It states that Congress plays an important part in the development of policies for war in cyberspace. It notes that Congress must implement rules to help ensure that cyberspace policies are carried out. It emphasizes the...

  • A BOTNET DETECTION TECHNIQUES. Riya H., Parmar; Kanani, Harshita // Indian Streams Research Journal;May2014, Vol. 4 Issue 4, p1 

    Botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining...

  • Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy. Guinchard, Audrey // Journal of Strategic Security;May2011, Vol. 4 Issue 2, p75 

    Most of the actions that fall under the trilogy of cyber crime, terrorism, and war exploit pre-existing weaknesses in the underlying technology. Because these vulnerabilities that exist in the network are not themselves illegal, they tend to be overlooked in the debate on cyber security. A UK...

  • Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers? Putte, Danny Vande; Verhelst, Marc // Journal of Business Continuity & Emergency Planning;Winter2013/2014, Vol. 7 Issue 2, p126 

    Risk management has never been easy. Finding efficient mitigating measures is not always straightforward. Finding measures for cyber crime, however, is a really huge challenge because cyber threats are changing all the time. As the sophistication of these threats is growing, their impact...

  • The cyber security threat stops in the boardroom. Scully, Tim // Journal of Business Continuity & Emergency Planning;Winter2013/2014, Vol. 7 Issue 2, p138 

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new...

  • Towards a Conceptual Framework for Cyberterrorism. Veerasamy, Namosha // Proceedings of the International Conference on Information Warfa;2009, p129 

    Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. Cyberterrorism reflects a current concern in the way terrorists will seek to strike the innocent and wreak havoc. Since explosives are no longer the only means to bring a system down, many are uneasy about...

  • THE EVOLUTION OF CYBER SECURITY. Belani, Rohyt // Siliconindia;Jan2014, p40 

    The article offers the author's views on the development of cyber security. He states that organizations recognize that cyber threats pose a risk to their businesses. He mentions security solutions such as anti-virus software and firewalls. Other topics include intellectual property and economic...

  • Estonian cyber-war highlights civilian vulnerabilities. Evron, Gadi // eWeek;8/13/2007, Vol. 24 Issue 26, p34 

    The article reports on the cooperative effort that prevented attacks from the cyber-war in Estonia, which highlights civilian vulnerabilities. It is stated that the online attacks against Estonian Web sites are being referred to as the first Internet war, in which simple folks may end up as the...

  • FIREWALL FOLLIES. Garfinkel, Simson // Technology Review;Sep2002, Vol. 105 Issue 7, p33 

    Focuses on the concept of firewalls for computer networks which are installed by businesses to protect their networks from hackers and intruders. Inability of firewalls to protect networks against the damages insiders can inflict; Impact of firewalls on Internet accessibility; Advantages and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics