메뉴 건너뛰기




Volumn 45, Issue 6, 2002, Pages 989-1016+923

Technological facilitation of terrorism: Definitional, legal, and policy issues

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0038457458     PISSN: 00027642     EISSN: None     Source Type: Journal    
DOI: 10.1177/0002764202045006005     Document Type: Review
Times cited : (25)

References (106)
  • 1
    • 0038420383 scopus 로고    scopus 로고
    • Law enforcement officials cite changes in types of domestic terrorism threats
    • February 19. Atlanta, GA: Cable News Network
    • Allen, N., Meserve, J., & Arena, K. (2001, February 19). Law enforcement officials cite changes in types of domestic terrorism threats. CNN Sunday [Television broadcast]. Atlanta, GA: Cable News Network.
    • (2001) CNN Sunday [Television Broadcast]
    • Allen, N.1    Meserve, J.2    Arena, K.3
  • 3
    • 0038758278 scopus 로고    scopus 로고
    • Police urge public caution in face of rising Internet crime
    • January 22
    • Appel, A. (2001, January 22). Police urge public caution in face of rising Internet crime. The Jerusalem Post, p. 4.
    • (2001) The Jerusalem Post , pp. 4
    • Appel, A.1
  • 5
    • 25044475188 scopus 로고    scopus 로고
    • Teen is accused of making threat against school over Internet
    • Associated Press, March 27
    • Associated Press. (2001, March 27). Teen is accused of making threat against school over Internet. St. Louis Post-Dispatch, p. A9.
    • (2001) St. Louis Post-Dispatch
  • 11
    • 0038420274 scopus 로고    scopus 로고
    • Bernstein v. United States Department of State, 974 F. Supp 1288, 176 F.3d 1132 (9th Cir. 1999), rev'd 192 F.3d 1308 (9th Cir. 1999)
    • Bernstein v. United States Department of State, 974 F. Supp 1288, 176 F.3d 1132 (9th Cir. 1999), rev'd 192 F.3d 1308 (9th Cir. 1999).
  • 13
    • 0038420288 scopus 로고    scopus 로고
    • Brandenburg v. Ohio, 395 U.S. 444 (1969)
    • Brandenburg v. Ohio, 395 U.S. 444 (1969).
  • 15
    • 4243312782 scopus 로고    scopus 로고
    • NSC chief urges US tech firms to protect computer networks
    • March 23
    • Bridis, T. (2001, March 23). NSC chief urges US tech firms to protect computer networks. The Wall Street Journal, p. B2.
    • (2001) The Wall Street Journal
    • Bridis, T.1
  • 16
    • 0038081630 scopus 로고    scopus 로고
    • CSIS on alert for cyber saboteurs: Spy agency monitors threat to computer networks: Report
    • January 9
    • Bronskill, J. (2001, January 9). CSIS on alert for cyber saboteurs: Spy agency monitors threat to computer networks: Report. Ottawa Citizen, p. A3.
    • (2001) Ottawa Citizen
    • Bronskill, J.1
  • 18
    • 0038420287 scopus 로고    scopus 로고
    • Communications Assistance for Law Enforcement Act, 47 U.S.C. §§ 1001-1010 (1994)
    • Communications Assistance for Law Enforcement Act, 47 U.S.C. §§ 1001-1010 (1994).
  • 19
    • 0007033641 scopus 로고
    • Terrorism: The problem of the problem of definition
    • Cooper, H.H.A. (1978). Terrorism: The problem of the problem of definition. Chitty's Law Journal, 26, 105-108.
    • (1978) Chitty's Law Journal , vol.26 , pp. 105-108
    • Cooper, H.H.A.1
  • 22
    • 0038420285 scopus 로고    scopus 로고
    • Retrieved June 4, 2001
    • Denning, D. E. (2000). Statement of Dorothy E. Denning. Retrieved June 4, 2001, from http://www.house.gov/hasc/testimony/106thcongress/00-05-23denning.htm
    • (2000) Statement of Dorothy E. Denning
    • Denning, D.E.1
  • 24
    • 0038758396 scopus 로고    scopus 로고
    • Special FBI unit targets online fraud, gambling
    • April 27
    • DiDio, L. (1998, April 27). Special FBI unit targets online fraud, gambling. Computerworld, 47-48.
    • (1998) Computerworld , pp. 47-48
    • DiDio, L.1
  • 25
    • 4243223739 scopus 로고    scopus 로고
    • The phantom menace
    • September/October
    • Dreyfuss, R. (2000, September/October). The phantom menace. Mother Jones, 40-45, 88-91.
    • (2000) Mother Jones , vol.40-45 , pp. 88-91
    • Dreyfuss, R.1
  • 26
    • 0038758288 scopus 로고    scopus 로고
    • 18 U.S.C. § 2518(1)(c) (1994)
    • 18 U.S.C. § 2518(1)(c) (1994).
  • 27
    • 0038081634 scopus 로고    scopus 로고
    • Export Administration Regulations, 15 C.F.R. §§ 730-740 (1999)
    • Export Administration Regulations, 15 C.F.R. §§ 730-740 (1999).
  • 29
    • 0038081631 scopus 로고    scopus 로고
    • Officials consider threat of cyberattack
    • April 27. Atlanta, GA: Cable News Network
    • Frazier, S. (2001a, April 27). Officials consider threat of cyberattack. Daybreak [Television broadcast]. Atlanta, GA: Cable News Network.
    • (2001) Daybreak [Television Broadcast]
    • Frazier, S.1
  • 30
    • 0037744156 scopus 로고    scopus 로고
    • What can be done to prevent cyber terrorism
    • April 29. Atlanta, GA: Cable News Network
    • Frazier, S. (2001b, April 29). What can be done to prevent cyber terrorism. CNN Sunday [Television broadcast]. Atlanta, GA: Cable News Network.
    • (2001) CNN Sunday [Television Broadcast]
    • Frazier, S.1
  • 33
    • 0038420289 scopus 로고    scopus 로고
    • A terrorist version of NATO?
    • February 16
    • Grier, P. (2001, February 16). A terrorist version of NATO? The Christian Science Monitor, p. 1.
    • (2001) The Christian Science Monitor , pp. 1
    • Grier, P.1
  • 34
    • 0038758290 scopus 로고    scopus 로고
    • Cyber terrorism
    • February 15. Retrieved May 30, 2001
    • Grossman, M. (1999, February 15). Cyber terrorism. Computer Law Tip of the Week. Retrieved May 30, 2001, from http://www.mgrossmanlaw.com/articles/1999/cyberterrorism.htm
    • (1999) Computer Law Tip of the Week
    • Grossman, M.1
  • 35
    • 0038420296 scopus 로고    scopus 로고
    • Ben Venzke of iDefense discusses cyber terrorism
    • February 7. Atlanta, GA: Cable News Network
    • Harris, L. (2001, February 7). Ben Venzke of iDefense discusses cyber terrorism. Morning News [Television broadcast]. Atlanta, GA: Cable News Network.
    • (2001) Morning News [Television Broadcast]
    • Harris, L.1
  • 37
    • 0004095933 scopus 로고    scopus 로고
    • New York: Columbia University Press
    • Hoffman, B. (1998). Inside terrorism. New York: Columbia University Press.
    • (1998) Inside Terrorism
    • Hoffman, B.1
  • 40
    • 0038081640 scopus 로고    scopus 로고
    • Jeffrey Hunker on cyberterrorists: The head of critical infrastructure at the National Security Council says the threat is real
    • May 5. Retrieved May 19, 2001
    • Hunker, J. (2000, May 5). Jeffrey Hunker on cyberterrorists: The head of critical infrastructure at the National Security Council says the threat is real. TechTV. Retrieved May 19, 2001, from http://www.techtv.com/print/story/0,23102,2559742.00.html
    • (2000) TechTV
    • Hunker, J.1
  • 45
    • 0038758399 scopus 로고    scopus 로고
    • Junger v. Daly, 8 F. Supp 2d 708 (N.D. Ohio 1998), rev'd 209 F.3d 481 (2000)
    • Junger v. Daly, 8 F. Supp 2d 708 (N.D. Ohio 1998), rev'd 209 F.3d 481 (2000).
  • 47
    • 0038758349 scopus 로고    scopus 로고
    • Karn v. United States Department of State, 925 F. Supp 1 (D.D.C. 1996)
    • Karn v. United States Department of State, 925 F. Supp 1 (D.D.C. 1996).
  • 48
    • 0037744204 scopus 로고    scopus 로고
    • Katz v. United States, 389 U.S. 347 (1967)
    • Katz v. United States, 389 U.S. 347 (1967).
  • 50
    • 0039430385 scopus 로고    scopus 로고
    • Terror groups hide behind Web encryption: Officials say sites disguise activities
    • February 6
    • Kelley, J. (2001a, February 6). Terror groups hide behind Web encryption: Officials say sites disguise activities. USA Today, p. A7.
    • (2001) USA Today
    • Kelley, J.1
  • 51
    • 4243339429 scopus 로고    scopus 로고
    • Terrorists use Web to mount attacks
    • February 6
    • Kelley, J. (2001b, February 6). Terrorists use Web to mount attacks. USA Today, p. A9.
    • (2001) USA Today
    • Kelley, J.1
  • 52
    • 66149093944 scopus 로고    scopus 로고
    • U.S. finds Bin Laden an elusive target
    • March 1
    • Kelley, J. (2001c, March 1). U.S. finds bin Laden an elusive target. USA Today, p. A1.
    • (2001) USA Today
    • Kelley, J.1
  • 53
    • 66149093944 scopus 로고    scopus 로고
    • Web hosts terror traffic: Bin Laden linked to hidden messages
    • February 6
    • Kelley, J. (2001d, February 6). Web hosts terror traffic: Bin Laden linked to hidden messages. USA Today, p. 1A.
    • (2001) USA Today
    • Kelley, J.1
  • 55
    • 0038758356 scopus 로고    scopus 로고
    • End hackers' war, urges China paper
    • May 7
    • Kwang, M. (2001, May 7). End hackers' war, urges China paper. The Straits Times, p. 4.
    • (2001) The Straits Times , pp. 4
    • Kwang, M.1
  • 58
    • 0038758364 scopus 로고    scopus 로고
    • Protecting critical infrastructures
    • September
    • Lesce, T. (1999, September). Protecting critical infrastructures. Law and Order, 95-98.
    • (1999) Law and Order , pp. 95-98
    • Lesce, T.1
  • 62
    • 0037744205 scopus 로고    scopus 로고
    • Note: First Amendment freedoms and the encryption battle: Deciphering the importance of Bernstein v. United States Department of Justice
    • 176 F.3d 1132 (9th Cir. 1999)
    • McClure, D. (2000). Note: First Amendment freedoms and the encryption battle: Deciphering the importance of Bernstein v. United States Department of Justice, 176 F.3d 1132 (9th Cir. 1999). Nebraska Law Review, 79(2), 465, 473.
    • (2000) Nebraska Law Review , vol.79 , Issue.2 , pp. 465
    • McClure, D.1
  • 63
    • 0037744199 scopus 로고    scopus 로고
    • Cyber enemy: America's newest threat is lurking behind computer screens
    • March 21
    • McFeatters, A. (2001, March 21). Cyber enemy: America's newest threat is lurking behind computer screens. Pittsburgh Post-Gazette, p. E-3.
    • (2001) Pittsburgh Post-Gazette
    • McFeatters, A.1
  • 64
    • 0038758366 scopus 로고    scopus 로고
    • Legislating terrorism: Justice issues and the public forum
    • March, Las Vegas, NV
    • Mullendore, K., & White, J. R. (1996, March). Legislating terrorism: Justice issues and the public forum. Paper presented at the Academy of Criminal Justice Sciences, Las Vegas, NV.
    • (1996) Academy of Criminal Justice Sciences
    • Mullendore, K.1    White, J.R.2
  • 65
    • 0038420346 scopus 로고    scopus 로고
    • Computer information systems and the high technology offender: The need for an interdisciplinary approach in higher education curricula
    • Myers, L. J., & Beatty, P. T. (2001). Computer information systems and the high technology offender: The need for an interdisciplinary approach in higher education curricula. ACJS Today, 23(1), 1, 4-6.
    • (2001) ACJS Today , vol.23 , Issue.1 , pp. 1
    • Myers, L.J.1    Beatty, P.T.2
  • 67
    • 0037744241 scopus 로고    scopus 로고
    • Omnibus Crime Control and Safe Streets Act, Title III, 42 U.S.C. § 3789(d) (1968)
    • Omnibus Crime Control and Safe Streets Act, Title III, 42 U.S.C. § 3789(d) (1968).
  • 69
    • 0004198635 scopus 로고
    • Upper Saddle River, NJ: Prentice Hall
    • Pfleeger, C. (1989). Security in computing. Upper Saddle River, NJ: Prentice Hall.
    • (1989) Security in Computing
    • Pfleeger, C.1
  • 70
    • 4243599831 scopus 로고    scopus 로고
    • Terrorists taking up Cyberspace: Web sites have become inexpensive, easily accessible tools for giving instructions to operatives and raising funds
    • February 8
    • Piller, C. (2001, February 8). Terrorists taking up Cyberspace: Web sites have become inexpensive, easily accessible tools for giving instructions to operatives and raising funds. Los Angeles Times, p. A1.
    • (2001) Los Angeles Times
    • Piller, C.1
  • 71
    • 0012418538 scopus 로고    scopus 로고
    • Retrieved May 30, 2001
    • Pollitt, M. M. (2001). Cyber terrorism - Fact or fancy? Retrieved May 30, 2001, from http://www.cosc.georgetown.edu/̃denning/infosec/pollitt.html
    • (2001) Cyber Terrorism - Fact or Fancy?
    • Pollitt, M.M.1
  • 72
    • 0038420368 scopus 로고    scopus 로고
    • The RIAA's low watermark
    • July
    • The RIAA's low watermark. (2001, July). Wired, 61-63.
    • (2001) Wired , pp. 61-63
  • 73
    • 0038081697 scopus 로고    scopus 로고
    • Rice v. Paladin Enterprises, 128 F.3d 233 (4th Cir. 1997), cert. denied 523 U.S. 1074 (1998)
    • Rice v. Paladin Enterprises, 128 F.3d 233 (4th Cir. 1997), cert. denied 523 U.S. 1074 (1998).
  • 75
    • 0038081694 scopus 로고    scopus 로고
    • Letters to the editor
    • February 22
    • Roy, R. (2001, February 22). Letters to the editor. The Statesman.
    • (2001) The Statesman
    • Roy, R.1
  • 76
    • 0038081685 scopus 로고    scopus 로고
    • Judgment on "Nuremberg": An analysis of free speech and antiabortion threats made on the Internet
    • Winter
    • Schlosberg, J. (2001, Winter). Judgment on "Nuremberg": An analysis of free speech and antiabortion threats made on the Internet. Journal of Science & Technology Law, 52-78.
    • (2001) Journal of Science & Technology Law , pp. 52-78
    • Schlosberg, J.1
  • 81
    • 0004056227 scopus 로고
    • San Francisco: Albion
    • Shea, V. (1994). Netiquette. San Francisco: Albion.
    • (1994) Netiquette
    • Shea, V.1
  • 82
    • 0038420372 scopus 로고    scopus 로고
    • Getting the message across: Hidden writing is a sensation
    • February 9
    • Sloan, W. (2001, February 9). Getting the message across: Hidden writing is a sensation. Bangkok Post.
    • (2001) Bangkok Post
    • Sloan, W.1
  • 83
  • 84
    • 0038758362 scopus 로고    scopus 로고
    • Terrorists plan havoc using Internet
    • March 21
    • Spiegel, P. (2001, March 21). Terrorists plan havoc using Internet. The Financial Times, p. 11.
    • (2001) The Financial Times , pp. 11
    • Spiegel, P.1
  • 85
    • 0038758369 scopus 로고    scopus 로고
    • Steganography thumbprinting
    • January 26
    • Steganography thumbprinting. (1998, January 26). Phrack Magazine, 23-26.
    • (1998) Phrack Magazine , pp. 23-26
  • 89
    • 0038758379 scopus 로고    scopus 로고
    • United States v. Barnett, 667 F.2d 835 (9th Cir. 1982)
    • United States v. Barnett, 667 F.2d 835 (9th Cir. 1982).
  • 90
    • 0038758378 scopus 로고    scopus 로고
    • United States v. Giordano, 416 U.S. 505 (1974)
    • United States v. Giordano, 416 U.S. 505 (1974).
  • 91
    • 0038081698 scopus 로고    scopus 로고
    • United States v. Mendelsohn, 896 F.2d 1183 (9th Cir. 1990)
    • United States v. Mendelsohn, 896 F.2d 1183 (9th Cir. 1990).
  • 92
    • 0038420373 scopus 로고    scopus 로고
    • United States v. O'Brien, 391 U.S. 367 (1968)
    • United States v. O'Brien, 391 U.S. 367 (1968).
  • 93
    • 84908977670 scopus 로고
    • Washington, DC: United States Department of Justice, Terrorism Research and Analytical Center, National Security Division
    • U.S. Department of Justice. (1995). Terrorism in the United States. Washington, DC: United States Department of Justice, Terrorism Research and Analytical Center, National Security Division.
    • (1995) Terrorism in the United States
  • 94
    • 0008675458 scopus 로고    scopus 로고
    • Washington, DC: U.S. Department of Justice Counterterrorism Threat and Assessment and Warning Unit, National Security Division
    • U.S. Department of Justice. (1998). Terrorism in the United States. Washington, DC: U.S. Department of Justice Counterterrorism Threat and Assessment and Warning Unit, National Security Division.
    • (1998) Terrorism in the United States
  • 95
    • 0003891710 scopus 로고    scopus 로고
    • Washington, DC: Author
    • U.S. Department of State. (1996). Patterns of global terrorism. Washington, DC: Author.
    • (1996) Patterns of Global Terrorism
  • 96
    • 0003891710 scopus 로고    scopus 로고
    • Washington, DC: Author
    • U.S. Department of State. (2000). Patterns of global terrorism. Washington, DC: Author.
    • (2000) Patterns of Global Terrorism
  • 105
    • 0038081705 scopus 로고    scopus 로고
    • Retrieved June 10, 2001
    • Yahoo! Inc. (2001). Terms of service. Retrieved June 10, 2001, from http://docs/yahoo.com/info/terms
    • (2001) Terms of Service
  • 106


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.