全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Domestic Cyberterrorism & Strategic Communications: Literature Review

DOI: 10.4236/jis.2023.144027, PP. 472-489

Keywords: Cyberterrorism, Cybersecurity Information Sharing Act, Mal-Information, Misinformation, Disinformation, Fake News, Propaganda, Strategic Communications

Full-Text   Cite this paper   Add to My Lib

Abstract:

Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the countrys heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.

References

[1]  Harrison Dinniss, H.A. (2018) The Threat of Cyber Terrorism and What International Law Should (Try to) Do about It. Georgetown Journal of International Affairs, 19, 43-50.
https://doi.org/10.1353/gia.2018.0006
[2]  Janparvar, M., Salehabadi, R. and Ahmadi, S. (2019) Management of Strategic Cyberspace Boundaries to Control Cyberterrorism. Soft Power Studies, 8, 99-126.
[3]  Kerttunen, M. (2020) Cyberterrorism: A Schrödinger’s Cat. In: Tikk, E. and Kerttunen, M., Eds., Routledge Handbook of International Cybersecurity, Routledge, London, 161-173.
https://doi.org/10.4324/9781351038904-15
[4]  Veerasamy, N. (2020) Cyberterrorism—The Specter That Is the Convergence of the Physical and Virtual Worlds. In: Benson, V. and Mcalaney, J., Eds., Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press, Cambridge, 27-52.
https://doi.org/10.1016/B978-0-12-816203-3.00002-2
[5]  Droogan, J. and Waldek, L. (2018) Should We Be Afraid of Cyber-Terrorism? International Journal of Electronic Security and Digital Forensics, 10, 242-254.
https://doi.org/10.1504/IJESDF.2018.093017
[6]  Jarvis, L. and Macdonald, S. (2015) What Is Cyberterrorism? Findings from a Survey of Researchers. Terrorism and Political Violence, 27, 657-678.
https://doi.org/10.1080/09546553.2013.847827
[7]  Mayer Lux, L. (2018) Defining Cyberterrorism. Revista chilena de derecho y tecnología, 7, 5-25.
https://doi.org/10.5354/0719-2584.2018.51028
[8]  Schoen, F. and Lamb, C.J. (2012) Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference. National Defense University Press, Washington DC.
[9]  Broeders, D., Cristiano, F. and Weggemans, D. (2021) Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy. Studies in Conflict & Terrorism.
https://doi.org/10.1080/1057610X.2021.1928887
[10]  Jarvis, L., Macdonald, S. and Nouri, L. (2014) The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, 37, 68-90.
https://doi.org/10.1080/1057610X.2014.853603
[11]  Klein, J.J. (2015) Deterring and Dissuading Cyberterrorism. Journal of Strategic Security, 8, 23-38.
https://doi.org/10.5038/1944-0472.8.4.1460
[12]  Denning, D.E. (2001) Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In: Arquilla, J. and Ronfeldt, D., Eds., Networks and Netwars: The Future of Terror, Crime, and Militancy, RAND, Santa Monica, 239-288.
[13]  Nechyporuk, M., Pavlikov, V., Filipenko, N., Spitsyna, H. and Shynkarenko, I. (2020) Cyberterrorism Attacks on Critical Infrastructure and Aviation: Criminal and Legal Policy of Countering. In: Nechyporuk, M., Pavlikov, V. and Kritskiy, D., Eds., ICTM 2020: Integrated Computer Technologies in Mechanical Engineering-2020, Springer, Cham, 206-217.
https://doi.org/10.1007/978-3-030-66717-7_17
[14]  Nweke, L.O. and Wolthusen, S. (2020) Legal Issues Related to Cyber Threat Information Sharing among Private Entities for Critical Infrastructure Protection. 2020 12th International Conference on Cyber Conflict (CyCon), Estonia, 26-29 May 2020, 63-78.
https://doi.org/10.23919/CyCon49761.2020.9131721
[15]  Yang, A., Kwon, Y.J. and Lee, S.Y.T. (2020) The Impact of Information Sharing Legislation on the Cybersecurity Industry. Industrial Management & Data Systems, 120, 1777-1794.
https://doi.org/10.1108/IMDS-10-2019-0536
[16]  Vakilinia, I., Tosh, D.K. and Sengupta, S. (2017) Privacy-Preserving Cybersecurity Information Exchange Mechanism. 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Seattle, 9-12 July 2017, 1-7.
https://doi.org/10.23919/SPECTS.2017.8046783
[17]  Korte, J. (2017) Mitigating Cyber Risks through Information Sharing. Journal of Payments Strategy & Systems, 11, 203-214.
[18]  Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C. and Katos, V. (2020) Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem. Computers, 9, Article 18.
https://doi.org/10.3390/computers9010018
[19]  Jarvis, L. and Macdonald, S. (2014) Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon. Perspectives on Terrorism, 8, 52-65.
[20]  Ramadhan, I. (2020) Cyber-Terrorism in The Context of Proselytizing, Coordination, Security, and Mobility. Journal of Islamic World and Politics, 4, 179-197.
https://doi.org/10.18196/jiwp.4252
[21]  Abbasi Kalimani, A., Mahboubi, M. and Noori, F. (2020) New Strategies to Prevent Cyber Terrorism. Crime Prevention Approach, 3, 145-172.
[22]  Wardle, C. and Derakhshan, H. (2017) Information Disorder: Toward an Interdisciplinary Framework for Research and Policy-Making. Council of Europe, Eurométropole de Strasbourg.
https://rm.coe.int/information-disorder-report-november-2017/1680764666

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413