Terorizam u sajberprostoru
Ključne reči:
terorizam, sajber-prostor, sajber-terorizam, sajber-teroristi, internetApstrakt
Cilj rada je istraživanje sve većih opasnosti sajber-terorizma gde će se razmotrati njegov koncept i pokušati dati odgovor zašto teroristi sprovode ovaj vid aktivnosti. U radu će se prezentovati okruženja koja predstavljaju najveći rizik, profilne informacije o tome ko može predstavljati pretnju i opšte klasifikacije napada i opasnosti koje isti nose sa sobom. Čini se da se među glavnim motivacijama terorista razmatra njihova upotreba interneta za različite aspekte terorističke kampanje kao što su propaganda i zapošljavanje. To će razmotriti različite taktike koje koriste i prezentovati način na koji je internet pružio novu priliku za teroriste u njihovom provođenju kampanja i kako je adaptiran za njihove potrebe. Sajber-terorizam je nova teroristička taktika u ekspanziji i koja koristi informacione sisteme ili digitalne tehnologije, posebno internet, ili kao instrument delovanja ili kao mete, gde predstavljaju bojno polje za teroriste gde oni nastoje da ga iskoriste kao sredstvo za unapređenje njihove kampanje i napada. Kako se razvijena društva sve više oslanjaju na elektronske komunikacije, sistemi za kontrolu i trgovinu stvaraju potencijal za teroriste da pogode metu postaje sve realnija mogućnost. Internet danas postaje više način života i olakšava svojim korisnicima da postanu mete sajberterorista.
Reference
Bogdanski, M., & Petreski, D. (2013). Cyber terrorism—Global security threat. International Scientific Defence, Security and Peace Journal, 59–71.
Bosch, O., Bailes, A., & Frommelt, I. (Eds.). (2004). Defending against cyber terrorism: Preserving the legitimate economy. In Business and security: Public–private sector relationships in a new security environment (pp. 187–196). SIPRI; Oxford University Press.
Estevez-Tapiador, J. M. (2004). The emergence of cyber-terrorism. IEEE Distributed Systems Online, 5(10).
Brahm, E. (2008). Propaganda. Beyond Intractability.
Brantly, A. (2014). Financing terror bit by bit. CTC Sentinel, 7(10), 1–5.
Brenner, S., & Goodman, S. (2002). Cyberterrorism: An argument for anticipating cyber attacks. Journal of Law, Technology & Policy, 2002(1).
Brett, P. (2007). Cyber terrorism and information security. East Carolina University.
Cassim, F. (2012). Addressing the spectre of cyber terrorism: A comparative perspective. Potchefstroom Electronic Law Journal, 15(2).
Charvat, P. (2014). Terrorism: A new dimension in battlespace. Centre of Excellence Defence Against Terrorism.
Cohen, A. (2010). Cyberterrorism: Are we legally ready? Journal of International Business and Law, 9(1).
Cohen-Almagor, R. (2012). Internet’s way: Radical, terrorist Islamists on the free highway. International Journal of Cyber Warfare and Terrorism, 2(3), 39–58.
Conway, M. (2005). The media and cyberterrorism: A study in the construction of reality. Paper presented at the First International Conference on the Information Revolution and the Changing Face of International Relations and Security, Lucerne, Switzerland.
Cottim, A. (2010). Cybercrime, cyber terrorism and jurisdiction: An analysis of Article 22 of the CoE Convention on Cybercrime. European Journal of Legal Studies, 2(3).
Cronin, A. K. (2003). Globalization and international terrorism: Behind the curve. International Security, 27(3), 30–58.
Australian Reinsurance Pool Corporation. (2016). Cyber terrorism and Australia’s terrorism insurance scheme. Australian Government.
Denning, D. E. (2000). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives.
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars. RAND.
Denning, D. E. (2010). Terror’s web: How the Internet is transforming terrorism. In Y. Jewkes & M. Yar (Eds.), Handbook on Internet crime. Willan Publishing.
Denning, D. E. (2007). Cyberterrorism five years later. In K. E. Himma (Ed.), Internet security: Hacking, counterhacking, and society (Chap. 7). Jones & Bartlett.
Denning, D. E. (2000). Reflections on cyberweapons controls. Georgetown University Computer Security Journal, 16(4), 43–53.
Denning, D. E. (2008). The ethics of cyber conflict. In K. E. Himma & H. T. Tavani (Eds.), Information and computer ethics. Wiley.
Denning, D. E., & Baugh, W. (1999). Hiding crimes in cyberspace. Information, Communication & Society, 2(3).
Gable, K. (2010). Cyber-apocalypse now: Securing the Internet against cyberterrorism and using universal jurisdiction as a deterrent. Vanderbilt Journal of Transnational Law, 43, 57–117.
Gercke, M. (2010). Challenges in developing a legal response to terrorist use of the Internet. Defence Against Terrorism Review, 3(2).
Gordon, S., & Ford, R. (2006). Cyberterrorism? Computers & Security.
Gregory, T., & Kheng, L. (2003). Cyberterrorism with cyber deception. Naval Postgraduate School.
Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2), 49–60.
Hinnen, T. (2004). The cyber-front in the war on terrorism: Curbing terrorist use of the Internet. Columbia Science and Technology Law Review.
Prichard, J. J., & MacDonald, L. E. (2004). Cyber terrorism: A study of the extent of coverage in computer security textbooks. Journal of Information Technology Education, 3.
Imran, A. (2014). Debating the term cyberterrorism: Issues and problems. Internet Journal of Criminology.
United Nations. (2012). The use of the Internet for terrorist purposes. Counter-Terrorism Implementation Task Force.
U.S. House of Representatives. (2011). Jihadist use of social media: How to prevent terrorism and preserve innovation (Hearing No. 112–62).
Kaplan, E. (2009). Terrorists and the Internet. Council on Foreign Relations.
Keith, S. (2005). Fear-mongering or fact: The construction of ‘cyber-terrorism’ in U.S., U.K., and Canadian news media. Paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Oxford Internet Institute.
Kostopoulos, G. (2008). Cyberterrorism: The next arena of confrontation. Communications of the IBIMA, 6, 165–169.
Kurmnik, B., & Ribnikar, D. (2003). Asimetrični ratovi. Evro Đunti.
Lewis, J. (2002). Assessing the risks of cyber terrorism, cyber war, and other cyber threats. Center for Strategic and International Studies.
Lipshultz, J. (2007). Framing terror: Violence, social conflict and the “war on terror”. Electronic News, 1, 21–35.
Lumbaca, S., & Gray, D. (2011). The media as an enabler for acts of terrorism. Global Security Studies, 2(1), 45–54.
Moslemzadeh, T. P., & Manap, N. A. (2013). Cyber terrorism challenges. In Proceedings (pp. 207–213).
NATO. (n.d.). Threat of cyberterrorism. Prague Student Summit XVIII, Model NATO III background reports.
Nelson, B., Choi, R., Labbouchi, R., Michel, M., & Gagnon, G. (1999). Cyberterror: Prospects and implications. Center for the Study of Terrorism and Irregular Warfare.
Pope, L. (2014). Cyberterrorism and China (Master’s thesis). Internet Journal of Criminology.
Raghavan, T. (2000). Cyberwarfare and cyberterrorism: In brief.
Rajeev, P. (2003). Beyond conventional terrorism: The cyber assault. SANS Institute InfoSec Reading Room.
Siraj, A. (2009). Cyberterrorism: The threat of virtual warfare. The Journal of Defense Software Engineering, 16–18.
Starrs, S. (2012). Fight for the spoils: The future role of Syria’s armed groups. CTC Sentinel, 5(8).
Terrorism and the media. (2008). Deliverable 6, Workpackage 4.
Theohary, C., & Rollins, J. (2015). Cyberwarfare and cyberterrorism: In brief. Congressional Research Service.
Thomas, T. (2003). Al Qaeda and the Internet: The danger of cyber-planning. Parameters: U.S. Army War College Quarterly, 33(1), 112–123.
United States Institute of Peace. (2004). Cyberterrorism: What is cyberterrorism?
Mliyanarachchi, F., Wijesinghe, W. S., & Jayarathne, H. (n.d.). Cyberterrorism: Is Sri Lanka ready? General Sir John Kotelawala Defence University.
Weimann, G. (2014). New terrorism and new media. Wilson Center.
Weimann, G. (1983). The theater of terror: The effects of press coverage. Journal of Communication, 33, 38–45.
Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict & Terrorism.
Wilkinson, P. (2002). Terrorism versus liberal democracy: The problems of response. In Terrorism versus liberal democracy (pp. 1–19). Centre for Security and Conflict Studies.
Wilson, G. (2005). Computer attack and cyberterrorism: Vulnerabilities and policy issues for Congress. Congressional Research Service.
##submission.downloads##
Objavljeno
Kako citirati
Broj časopisa
Sekcija
Licenca

Ovaj rad je pod Creative Commons Autorstvo 4.0 Internacionalna licenca.
Autori zadržavaju autorska prava nad objavljenim radovima i daju izdavaču neeskluzivno pravo da objavi članak, da bude naveden kao njegov prvi izdavač u slučaju ponovne upotrebe i da ga distribuira u svim oblicima i medijima. Članci će biti distribuirani pod licencom Creative Commons Attribution International (CC BY 4.0), osim ako nije drugačije naznačeno.

