2012
DOI: 10.1080/19393555.2011.647250
|View full text |Cite
|
Sign up to set email alerts
|

How Can We Deter Cyber Terrorism?

Abstract: In order to deter cyber terrorism, it is important to identify the terrorists, since punishment may not deter them. The identification probability relies heavily on tracking cyber terrorists. However, there are legal and technical challenges to tracking terrorists. This paper proposes suggestions and insights on overcoming these challenges. Three types of infrastructures must be present in order to deter cyber terrorism: technical, policy, and legal. We list some of the key items that academics as well as prac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
9
0
3

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 34 publications
0
9
0
3
Order By: Relevance
“…Terlebih, kebanyakan teroris di dunia siber, masih sama dengan pola tradisional yang mereka gunakan sebelumnya, menjadikan masyarakat sipil sebagai target. Hanya saja korban mereka bukanlah menjadi target, tetapi korban tersebut memiliki pengaruh kepada target yang sesungguhnya untuk menyebarkan ketakutan dan intimidasi (Hua & Bapna, 2012). Sehingga, perspektif terkait teror siber yang mengancam infrastruktur krusial terkait teknologi komunikasi secara ekstrim menjadi sedikit meluas.…”
Section: B Teror Siberunclassified
See 1 more Smart Citation
“…Terlebih, kebanyakan teroris di dunia siber, masih sama dengan pola tradisional yang mereka gunakan sebelumnya, menjadikan masyarakat sipil sebagai target. Hanya saja korban mereka bukanlah menjadi target, tetapi korban tersebut memiliki pengaruh kepada target yang sesungguhnya untuk menyebarkan ketakutan dan intimidasi (Hua & Bapna, 2012). Sehingga, perspektif terkait teror siber yang mengancam infrastruktur krusial terkait teknologi komunikasi secara ekstrim menjadi sedikit meluas.…”
Section: B Teror Siberunclassified
“…Dari banyak literatur, teror siber dilakukan dengan motivasi yang meliputi: agenda politik dan/atau ideologi (Cavelty, 2007;Holt, 2012;Hua & Bapna, 2012;Luiijf, 2012Luiijf, , 2014Pollitt, 1998;Veerasamy, 2020;Warren, 2007;Weimann, 2005); dan menyebar ketakutan juga mengintimidasi target (Beggs, 2007;Gross, Canetti, & Vashdi, 2016;Hua & Bapna, 2012;Kaplan & Weimann, 2011). Demikian juga diiyakan oleh Cavelty (2007) dengan menekankan dampak psikologis yang terjadi dari teror siber.…”
Section: B Teror Siberunclassified
“…Deterrence has been studied extensively by sociologists and criminologists (Loughran, Paternoster, Piquero, & Pogarsky, 2011;Summers, Lyytinen, Lingham, & Pierce, 2013). Application of deterrence to cybersecurity has focused on more technical aspects (Hua & Bapna, 2012;Wible, 2003) and comparative analysis of common attributes with other types of crimes, such as trespassing (Sharma, 2007).…”
Section: Deterrence In Cybersecuritymentioning
confidence: 99%
“…Criminals engage in illegal activities when their expected payoff is greater than the expected risk and cost involved (Pearson & Weiner, 1985;Straub & Welke, 1998). Although much of the discussion of deterrence theory in criminology focuses on how punishment level influences deterrence (Hua & Bapna, 2012), one might expect that deterrence is also affected by the likelihood of interdiction. Well-known biases in perceptions of chance and uncertainty suggest that cyber-attackers' risk assessment might be subject to distortions.…”
Section: Deterrence In Cybersecuritymentioning
confidence: 99%
“…Some authors (DREMLYUGA, KOROBEYEV, FEDOROV, 2017) argue the need for a broader approach to cyber terrorism, in which the general concept of "cyber terrorism" should cover, on the one hand, directly cyberattacks (terrorist cyberattacks), and, on the other hand, all other actions performed through the information and communication environment to support terrorism. Comparative analysis of scientific views on the understanding of cyberterrorism proposed by foreign researchers (DENNING, n.d., 2007;HUA & BAPNA, 2012;BOSCH, 2004; SHARP PARKER, 2010) ; SHINDER, 2020; CLOUGH, 2015; KRASAVIN, n.d.), allows us to see the general and special constitutive aspects of the phenomenon in question. Some scientists (DINSTEIN,2015;LILIENTHAL, 2015;BROWNLIE, 1963) conclude that in the modern conditions of the scientific and technological progress development, certain negative manifestations of international relations committed in the information environment can be considered as illegal acts (from the standpoint of international criminal law).…”
mentioning
confidence: 99%