메뉴 건너뛰기




Volumn 46, Issue 4-5, 2006, Pages 223-238

Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?

Author keywords

[No Author keywords available]

Indexed keywords


EID: 34247095107     PISSN: 09254994     EISSN: 15730751     Source Type: Journal    
DOI: 10.1007/s10611-007-9061-9     Document Type: Article
Times cited : (75)

References (43)
  • 1
    • 0000757609 scopus 로고    scopus 로고
    • The news media, the problem frame and the production of fear
    • Altheide, D. (1997). The news media, the problem frame and the production of fear. The Sociological Quarterly, 38(4), 647-668.
    • (1997) The Sociological Quarterly , vol.38 , Issue.4 , pp. 647-668
    • Altheide, D.1
  • 2
    • 84872998933 scopus 로고    scopus 로고
    • Retrieved March 1, 2006, from
    • Anti-Defamation League (1999). CyberTerrorism - Terrorism update. Retrieved March 1, 2006, from http://www.adl.org/terror/focus/16_focus_a.asp.
    • (1999) CyberTerrorism - Terrorism update
    • League, A.1
  • 3
    • 0012443107 scopus 로고    scopus 로고
    • Networks, netwar and information-age terrorism
    • Z. M. Khalilzhad & J. P. White Eds, Santa Monica, CA: Rand
    • Arquilla, J., Ronfeldt, D., & Zanini, M. (1999). Networks, netwar and information-age terrorism. In Z. M. Khalilzhad & J. P. White (Eds.), The changing role of information in warfare. Santa Monica, CA: Rand.
    • (1999) The changing role of information in warfare
    • Arquilla, J.1    Ronfeldt, D.2    Zanini, M.3
  • 5
    • 84872987917 scopus 로고    scopus 로고
    • Conway, M. (2005). Terrorist use of the internet and fighting back. Paper prepared for presentation at the conference Cybersafety: Safety and security in a networked world: Balancing cyber-rights and responsibilities. Oxford Internet Institute (Oil), Oxford University, UK, 8-10 September, 2005. Retrieved February 1, 2006, from http://www.oii.ox.ac.uk/ research/cybersafety/extensions/pdfs/papers/maura_conway.pdf.
    • Conway, M. (2005). Terrorist "use" of the internet and fighting back. Paper prepared for presentation at the conference Cybersafety: Safety and security in a networked world: Balancing cyber-rights and responsibilities. Oxford Internet Institute (Oil), Oxford University, UK, 8-10 September, 2005. Retrieved February 1, 2006, from http://www.oii.ox.ac.uk/ research/cybersafety/extensions/pdfs/papers/maura_conway.pdf.
  • 7
    • 84937339440 scopus 로고    scopus 로고
    • Cyberterror and Media-Induced fears: The production of emergency culture
    • Debrix, F. (2001). Cyberterror and Media-Induced fears: The production of emergency culture, Strategies: Journal of Theory, Culture and Politics, 14(1), 149-168.
    • (2001) Strategies: Journal of Theory, Culture and Politics , vol.14 , Issue.1 , pp. 149-168
    • Debrix, F.1
  • 8
    • 84872996137 scopus 로고    scopus 로고
    • Denning, D. E. (1999). Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy. Presented to The Internet and International Systems:Information Technology and American Foreign Policy Decision Making, The World Affairs Council, San Francisco, December 10, 1999. Retrieved February 1, 2006, from http://www.rand.org/pubs/ monograph _reports/MR1382/MR1382.ch8.pdf.
    • Denning, D. E. (1999). Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy." Presented to "The Internet and International Systems:Information Technology and American Foreign Policy Decision Making," The World Affairs Council, San Francisco, December 10, 1999. Retrieved February 1, 2006, from http://www.rand.org/pubs/ monograph _reports/MR1382/MR1382.ch8.pdf.
  • 10
    • 84873005657 scopus 로고    scopus 로고
    • Duvall, R. D., & Stohl, M. (1983). Governance by terror, chapter six. In M. Stohl (Ed.), The politics of terrorism (2nd ed., pp. 179-219). New York: Marcel Dekker.
    • Duvall, R. D., & Stohl, M. (1983). Governance by terror, chapter six. In M. Stohl (Ed.), The politics of terrorism (2nd ed., pp. 179-219). New York: Marcel Dekker.
  • 11
    • 0038172257 scopus 로고    scopus 로고
    • Cyber terrorism: Are we under siege?
    • Embar-Seddon, A. (2002). Cyber terrorism: Are we under siege? American Behavioral Scientist, 45(6), 1033-1043.
    • (2002) American Behavioral Scientist , vol.45 , Issue.6 , pp. 1033-1043
    • Embar-Seddon, A.1
  • 12
    • 34247175574 scopus 로고    scopus 로고
    • Myths and realities of cyber terrorism
    • A. P. Schmid (Ed, Vienna, Austria: ISPAC International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program
    • Flemming, P., & Stohl, M. (2001). Myths and realities of cyber terrorism. In A. P. Schmid (Ed.), Countering terrorism through international cooperation (pp. 70-105). Vienna, Austria: ISPAC (International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program.
    • (2001) Countering terrorism through international cooperation , pp. 70-105
    • Flemming, P.1    Stohl, M.2
  • 13
    • 0011016060 scopus 로고    scopus 로고
    • Cyber-attacks by Al Qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say
    • June 27:, Retrieved December 1, 2005, from
    • Gellman, B. (2002). Cyber-attacks by Al Qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say," Washington Post June 27: A01. Retrieved December 1, 2005, from http://www. washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26.
    • (2002) Washington Post
    • Gellman, B.1
  • 14
    • 0003151091 scopus 로고
    • The scary world of tv's heavy Viewer
    • April
    • Gerbner, G., & Gross, L. (1976). The scary world of tv's heavy Viewer. Psychology Today, 89-91, April.
    • (1976) Psychology Today , pp. 89-91
    • Gerbner, G.1    Gross, L.2
  • 15
    • 34247170624 scopus 로고    scopus 로고
    • Bangs for the buck: A cost-benefit analysis of cyber terrorism
    • Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyber terrorism. Studies in Conflict and Terrorism, 27, 387-408.
    • (2004) Studies in Conflict and Terrorism , vol.27 , pp. 387-408
    • Giacomello, G.1
  • 17
    • 84872991023 scopus 로고    scopus 로고
    • Grabosky, P. N., & Stohl, M. (2003). Cyberterrorism Reform 82, Autumn:8-13. Retrieved September 15, 2005 from http://www.alrc.gov.au/reform/ summaries/82.htm.
    • Grabosky, P. N., & Stohl, M. (2003). Cyberterrorism Reform 82, Autumn:8-13. Retrieved September 15, 2005 from http://www.alrc.gov.au/reform/ summaries/82.htm.
  • 18
    • 27944455431 scopus 로고    scopus 로고
    • The myth of cyber terrorism
    • November. Retrieved February 1, 2006, from
    • Green, J. (2002). The myth of cyber terrorism. Washington Monthly, November. Retrieved February 1, 2006, from http://www.washingtonmonthly.com/ features/2001/0211.green.html.
    • (2002) Washington Monthly
    • Green, J.1
  • 21
    • 84873000455 scopus 로고    scopus 로고
    • Lemos, R., Borland, J., Bowman, L., & Junnarkar, S. (2002). E terrorism-threats. Have Digital Myths Diverted Attention from True Threats? CNET News.com. Retrieved August 26, 2002, from http://news. com.com/E-terrorism+Digilal+myth+or+lrue+threat/2009-1001_3-954728.html?tag=nl.
    • Lemos, R., Borland, J., Bowman, L., & Junnarkar, S. (2002). E terrorism-threats. Have Digital Myths Diverted Attention from True Threats?" CNET News.com. Retrieved August 26, 2002, from http://news. com.com/E-terrorism+Digilal+myth+or+lrue+threat/2009-1001_3-954728.html?tag=nl.
  • 22
    • 84873011101 scopus 로고    scopus 로고
    • Cyber-nightmare
    • Retrieved September 20, 2004, from
    • Lenzner, R., & Vardi, N. (2004). Cyber-nightmare. Forbes. Retrieved September 20, 2004, from http://www.forbes.com/global/2004/0920/ 104_print.html.
    • (2004) Forbes
    • Lenzner, R.1    Vardi, N.2
  • 23
    • 0038050779 scopus 로고    scopus 로고
    • Emotion and perceived risks of terrorism: A national field experiment
    • Lerner, J. S., Gonzalez, R. M., Small, D. A., & Fischhoff, B. (2003). Emotion and perceived risks of terrorism: A national field experiment. Psychological Science, 14, 144-150.
    • (2003) Psychological Science , vol.14 , pp. 144-150
    • Lerner, J.S.1    Gonzalez, R.M.2    Small, D.A.3    Fischhoff, B.4
  • 24
    • 84873014519 scopus 로고    scopus 로고
    • The war on hype: The deadly terror lurking around the corner may not be such a big, ominous threat after all
    • February 19, Retrieved March 1, 2006, from
    • Lewis, J. A. (2006). The war on hype: The deadly terror lurking around the corner may not be such a big, ominous threat after all. San Francisco Chronicle, February 19, 2006. Retrieved March 1, 2006, from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2006/02/19/ INGDDH8E2V1.DTL
    • (2006) San Francisco Chronicle
    • Lewis, J.A.1
  • 25
    • 0036763542 scopus 로고    scopus 로고
    • Anger, fear, uncertainty, and attitudes: A test of the Cognitive-Functional Model
    • Nabi, R. L. (2002). Anger, fear, uncertainty, and attitudes: A test of the Cognitive-Functional Model. Communication Monographs, 69(3), 204-216.
    • (2002) Communication Monographs , vol.69 , Issue.3 , pp. 204-216
    • Nabi, R.L.1
  • 26
    • 84872999794 scopus 로고    scopus 로고
    • Countering the Changing Threat of International Terrorism
    • National Commission on Terrorism
    • National Commission on Terrorism. (1998). Countering the Changing Threat of International Terrorism. Report of the National Commission on Terrorism, http://www.fas.org/irp/threat/commission.html.
    • (1998) Report of the National Commission on Terrorism
  • 27
    • 85016006634 scopus 로고    scopus 로고
    • Cyber-terrorism: The shape of future conflict
    • October, Retrieved March 1, 2006, from
    • Rathmell, A. (1997). Cyber-terrorism: The shape of future conflict. Royal United Service Institute Journal October, 40-46. Retrieved March 1, 2006, from http://www.kcl.ac.uk/orgs/icsa/old/rusi.html.
    • (1997) Royal United Service Institute Journal , pp. 40-46
    • Rathmell, A.1
  • 30
    • 84872997303 scopus 로고    scopus 로고
    • Savas, A. (2006). IBM launches internal network protection. Computer weekly. Com, Monday, 27 February 2006. Retrieved March 1, 2006, from http://www.computerweekly.com/Articles/2006/02/27/214429/ IBMlaunchesinternalnetworkprotection.htm.
    • Savas, A. (2006). IBM launches internal network protection. Computer weekly. Com, Monday, 27 February 2006. Retrieved March 1, 2006, from http://www.computerweekly.com/Articles/2006/02/27/214429/ IBMlaunchesinternalnetworkprotection.htm.
  • 31
    • 84873005621 scopus 로고    scopus 로고
    • Decoding computer intruders
    • April 24, Retrieved March 1, 2006, from
    • Schwartz, J. (2003). Decoding computer intruders. The New York Times, April 24, 2003. Retrieved March 1, 2006, from http://tech2.nytimes. com/mem/technology/techreview.html?res=9C02E3D71F3A F937A15757C0A9659C8B63.
    • (2003) The New York Times
    • Schwartz, J.1
  • 32
    • 84872997590 scopus 로고    scopus 로고
    • Simpson, P. (2005). Don't fear e-terror hype Computer Weekly March 7. Retrieved February 1, 2006, from http://www.computerweekly.com/Articles/2005/04/ 26/209612/Don'tfeare-terrorhype.htm.
    • Simpson, P. (2005). Don't fear e-terror hype Computer Weekly March 7. Retrieved February 1, 2006, from http://www.computerweekly.com/Articles/2005/04/ 26/209612/Don'tfeare-terrorhype.htm.
  • 33
    • 84872993996 scopus 로고    scopus 로고
    • USA Today, May 5, Retrieved February 1, 2006, from
    • Squitieri, T. (2002). Cyberspace full of terror targets, USA Today, May 5, 2002. Retrieved February 1, 2006, from http://www.usatoday.com/tech/news/ 2002/05/06/cyber-terror.htm.
    • (2002) Cyberspace full of terror targets
    • Squitieri, T.1
  • 34
    • 0037497016 scopus 로고    scopus 로고
    • Terror in Cyberspace terrorists will exploit and widen the gap between governing structures and the public
    • Stanton, J. J. (2002). Terror in Cyberspace terrorists will exploit and widen the gap between governing structures and the public. American Behavioral Scientist, 45(6), 1017-1032.
    • (2002) American Behavioral Scientist , vol.45 , Issue.6 , pp. 1017-1032
    • Stanton, J.J.1
  • 35
    • 21444451808 scopus 로고
    • The superpowers and international terrorism
    • M. Stohl & G. Lopez Eds, Greenwood Press
    • Stohl, M. (1986). The superpowers and international terrorism. In M. Stohl & G. Lopez (Eds.), Government violence and repression: An agenda for research. Greenwood Press, 207-228.
    • (1986) Government violence and repression: An agenda for research , pp. 207-228
    • Stohl, M.1
  • 36
    • 33845615774 scopus 로고
    • Demystifying terrorism: The myths and realities of contemporary political terrorism
    • M. Stohl Ed, 3rd ed, New York: Marcel Decker
    • Stohl, M. (1988a). Demystifying terrorism: The myths and realities of contemporary political terrorism. In M. Stohl (Ed.), The politics of terrorism (3rd ed.). New York: Marcel Decker.
    • (1988) The politics of terrorism
    • Stohl, M.1
  • 37
    • 84872996038 scopus 로고    scopus 로고
    • Stohl, M. (2006). Knowledge claims and the study of terrorism. In S. Melnick & J. Victoroff (Eds.), Psychology and terrorism. Amsterdam, the Netherlands: los Press (forthcoming).
    • Stohl, M. (2006). Knowledge claims and the study of terrorism. In S. Melnick & J. Victoroff (Eds.), Psychology and terrorism. Amsterdam, the Netherlands: los Press (forthcoming).
  • 38
    • 34247133250 scopus 로고    scopus 로고
    • Networks of terror: Theoretical assumptions and pragmatic consequences
    • forthcoming
    • Stohl, C., & Stohl, M. (2007). Networks of terror: Theoretical assumptions and pragmatic consequences, Communication Theory, (forthcoming).
    • (2007) Communication Theory
    • Stohl, C.1    Stohl, M.2
  • 39
    • 85048941387 scopus 로고    scopus 로고
    • Al Qaeda and the internet: The danger of cyberplanning
    • Retrieved February 1, 2006, from Carlisle
    • Thomas, T. L. (2003). Al Qaeda and the internet: The danger of "cyberplanning." Parameters, 33(1), 112-23. Retrieved February 1, 2006, from Carlisle http://www.army.mil/usawc/Parameters/03spring/thomas.pdf.
    • (2003) Parameters , vol.33 , Issue.1 , pp. 112-123
    • Thomas, T.L.1
  • 40
    • 84873008024 scopus 로고    scopus 로고
    • Intelligence experts comb web for terror clues
    • November 12. Retrieved March 1, 2006, from
    • Warner, B. (2003). Intelligence experts comb web for terror clues. Reuters News Service, November 12. Retrieved March 1, 2006, from http://www.chron.com/disp/story.mp1/special/iraq/2218091.html.
    • (2003) Reuters News Service
    • Warner, B.1
  • 41
    • 84873007102 scopus 로고    scopus 로고
    • US News and World Report. (1998). Terrorists on the web: Electronic 'safe haven' guerrillas use guns, bombs and home pages. 124(24), 46, June 22.
    • US News and World Report. (1998). Terrorists on the web: Electronic 'safe haven' guerrillas use guns, bombs and home pages. 124(24), 46, June 22.
  • 42
    • 27944454740 scopus 로고    scopus 로고
    • Cyber terrorism: The sum of all fears'?
    • Weimann, G. (2005). Cyber terrorism: The sum of all fears'? Studies in Conflict and Terrorism, 28, 129-149.
    • (2005) Studies in Conflict and Terrorism , vol.28 , pp. 129-149
    • Weimann, G.1
  • 43
    • 84872988638 scopus 로고    scopus 로고
    • White, C., K., C. (1998). Cyber-terrorism: Modem mayhem. Carlisle Barracks, Pennsylvania: U.S. Army War College. Retrieved March 1, 2006, from http://stinet.dtic.mil/dticrev/a345705.pdf.
    • White, C., K., C. (1998). Cyber-terrorism: Modem mayhem. Carlisle Barracks, Pennsylvania: U.S. Army War College. Retrieved March 1, 2006, from http://stinet.dtic.mil/dticrev/a345705.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.