메뉴 건너뛰기




Volumn 45, Issue 6, 2002, Pages 1033-1043+923

Cyberterrorism: Are we under siege?

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0038172257     PISSN: 00027642     EISSN: None     Source Type: Journal    
DOI: 10.1177/0002764202045006007     Document Type: Review
Times cited : (43)

References (20)
  • 1
    • 0038700604 scopus 로고    scopus 로고
    • The new face of war: America's dependence on technology exposes our infrastructure to cyberterrorism
    • November 2. Retreived May 30, 2001
    • Angelica, A. (1998, November 2). The new face of war: America's dependence on technology exposes our infrastructure to cyberterrorism. TechWeek. Retreived May 30, 2001, from http://www.techweek.com/articles/11-2-98/cyber.htm
    • (1998) TechWeek
    • Angelica, A.1
  • 2
    • 0038024133 scopus 로고    scopus 로고
    • Analyzing the threat of cyberterrorism
    • September 23. Retrieved May 31, 2001
    • Borland, J. (1998, September 23). Analyzing the threat of cyberterrorism. TechWeb: The Business Technology Network. Retrieved May 31, 2001, from http://content.techweb.com/wire/story/TWB19980923S0016
    • (1998) TechWeb: The Business Technology Network
    • Borland, J.1
  • 4
    • 0038362276 scopus 로고    scopus 로고
    • February 1. Statement to the United States Senate Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary. Retrieved June 6, 2001
    • Cilluffo, F. J. (2001, February 1). Cyber attack: The national protection plan and its privacy implications (Statement to the United States Senate Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary). Retrieved June 6, 2001, from http://www.csis.org/goc/test02012000.htm
    • (2001) Cyber Attack: The National Protection Plan and its Privacy Implications
    • Cilluffo, F.J.1
  • 5
    • 0038024132 scopus 로고    scopus 로고
    • Retrieved July 20, 2001
    • Computer Emergency Response Team Coordination Center. (2001). CERT/CC statistics 1998-2001. Retrieved July 20, 2001, from http://www.cert.org/stats/cert_stats.html
    • (2001) CERT/CC Statistics 1998-2001
  • 6
    • 0037686232 scopus 로고    scopus 로고
    • February 23. Retrieved August 2, 2001
    • Cross, S. E. (2000, February 23). Cyber threats and the US economy. Retrieved August 2, 2001, from http://www.cert.org/congressional_testimony/Cross_testimony_Feb2000.html
    • (2000) Cyber Threats and the US Economy
    • Cross, S.E.1
  • 8
    • 0038700607 scopus 로고    scopus 로고
    • Special report: The Internet's absolute worst threat
    • March 20. Retrieved June 3, 2001
    • Gebler, D., & Brady, M. (2001, March 20). Special report: The Internet's absolute worst threat. NewsFactor Network. Retrieved June 3, 2001, from http://www.newsfactor.com/perl/printer/8222
    • (2001) NewsFactor Network
    • Gebler, D.1    Brady, M.2
  • 11
    • 0037686229 scopus 로고    scopus 로고
    • Pentagon and hackers in "cyberwar"
    • March 5. Retrieved June 1, 2001
    • Miklaszewski, J., & Windrem, R. (1999, March 5). Pentagon and hackers in "cyberwar." ZDNet News. Retrieved June 1, 2001, from http://www.zdnet.com/zdnn/stories/news/0,4586,2220773,00.html
    • (1999) ZDNet News
    • Miklaszewski, J.1    Windrem, R.2
  • 12
    • 0037686223 scopus 로고    scopus 로고
    • The back door into cyber-terrorism: Report says security flaws give hackers easy access
    • June 2. Retrieved May 30, 2001
    • Noack, D. (2000, June 2). The back door into cyber-terrorism: Report says security flaws give hackers easy access. APBnews.com. Retrieved May 30, 2001, from http://www.apbnews.com/newscenter/internetcrime/2000/06/02/computerholes0602_01. html
    • (2000) APBnews.com
    • Noack, D.1
  • 14
  • 16
    • 0038024135 scopus 로고    scopus 로고
    • Are hacker break-ins ethical?
    • M. D. Ermann, M. B. Williams, & M. S. Shauf (Eds.), New York: Oxford University Press
    • Spafford, E. H. (1997). Are hacker break-ins ethical? In M. D. Ermann, M. B. Williams, & M. S. Shauf (Eds.), Computers, ethics, and society (pp. 77-88). New York: Oxford University Press.
    • (1997) Computers, Ethics, and Society , pp. 77-88
    • Spafford, E.H.1
  • 17
    • 0038362280 scopus 로고
    • Terrorism: A definitional problem
    • P. Wilkinson & A. M. Stewart (Eds.), Aberdeen, UK: Aberdeen University Press
    • Thackrah, R. (1987). Terrorism: A definitional problem. In P. Wilkinson & A. M. Stewart (Eds.), Contemporary research on terrorism. Aberdeen, UK: Aberdeen University Press.
    • (1987) Contemporary Research on Terrorism
    • Thackrah, R.1
  • 18
    • 0038700609 scopus 로고    scopus 로고
    • Think tank warns of cyberterrorist plots: Research suggests that America needs to prepare for Net warfare
    • December 18. Retrieved May 30, 2001
    • Weil, N. (1998, December 18). Think tank warns of cyberterrorist plots: Research suggests that America needs to prepare for Net warfare. CNN.com. Retrieved May 30, 2001, from http://www.cnn.com/TECH/computing/9812/18/terrorism.idg/
    • (1998) CNN.com
    • Weil, N.1
  • 20
    • 0037686230 scopus 로고    scopus 로고
    • Heavyweights rally against Net hackers
    • January 29. Retrieved June 2001
    • Yasin, R. (1999, January 29). Heavyweights rally against Net hackers. InternetWeek. Retrieved June 2001, from http://www.internetwk.com/news0199/news012999-3.htm
    • (1999) InternetWeek
    • Yasin, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.