메뉴 건너뛰기




Volumn 31, Issue 10, 2008, Pages 883-902

Applying the notion of noise to countering online terrorism

Author keywords

[No Author keywords available]

Indexed keywords


EID: 54349105969     PISSN: 1057610X     EISSN: 15210731     Source Type: Journal    
DOI: 10.1080/10576100802342601     Document Type: Article
Times cited : (36)

References (77)
  • 1
    • 0013455064 scopus 로고
    • Los Angeles: Crescent Publication
    • Brian Jenkins, International Terrorism (Los Angeles: Crescent Publication, 1975), p. 4.
    • (1975) International Terrorism , pp. 4
    • Jenkins, B.1
  • 4
    • 14644413023 scopus 로고    scopus 로고
    • The Terrorist Calculus Behind 9-11: A Model For Future Terrorism?
    • Brigitte Nacos, "The Terrorist Calculus Behind 9-11: A Model For Future Terrorism?," Studies in Conflict & Terrorism, 26 (2003), pp. 1-16.
    • (2003) Studies in Conflict & Terrorism , vol.26 , pp. 1-16
    • Nacos, B.1
  • 5
    • 54349092562 scopus 로고    scopus 로고
    • The quotes are taken from the translations of a videotape, presumably made in mid-November 2001 in Afghanistan. Available at http://www.washingtonpost.com/wp-srv/nation/specials
    • The quotes are taken from the translations of a videotape, presumably made in mid-November 2001 in Afghanistan. Available at http://www.washingtonpost.com/wp-srv/nation/specials
  • 6
    • 17444431486 scopus 로고    scopus 로고
    • Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment
    • Bruce Hoffman, "Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment," Studies in Conflict and Terrorism 26 (2003), pp. 427-440
    • (2003) Studies in Conflict and Terrorism , vol.26 , pp. 427-440
    • Hoffman, B.1
  • 8
    • 4043091585 scopus 로고    scopus 로고
    • The Advent of Netwar (revisited)
    • John Arquilla and David Ronfeldt, eds, Santa Monica: RAND Corporation
    • John Arquilla and David Ronfeldt, "The Advent of Netwar (revisited)," in Networks and Netwars, John Arquilla and David Ronfeldt, eds. (Santa Monica: RAND Corporation, 2001)
    • (2001) Networks and Netwars
    • Arquilla, J.1    Ronfeldt, D.2
  • 9
    • 54349119509 scopus 로고    scopus 로고
    • Networks, Netwars, and the Fight for the Future
    • 25 October
    • John Arquilla and David Ronfeldt, "Networks, Netwars, and the Fight for the Future," First Monday (25 October 2003), pp. 1-25
    • (2003) First Monday , pp. 1-25
    • Arquilla, J.1    Ronfeldt, D.2
  • 10
    • 0012443107 scopus 로고    scopus 로고
    • Networks, Netwar and Information-Age Terrorism
    • Ian O. Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, Michele Zanini, eds, Santa Monica: RAND Corporation
    • John Arquilla, David Ronfeldt, and Michele Zanini, "Networks, Netwar and Information-Age Terrorism," in Countering the New Terrorism, Ian O. Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, Michele Zanini, eds. (Santa Monica: RAND Corporation).
    • Countering the New Terrorism
    • Arquilla, J.1    Ronfeldt, D.2    Zanini, M.3
  • 11
    • 3042729016 scopus 로고    scopus 로고
    • MilitantsWireWeb with Links to Jihad
    • Cited by, 10 July, available at
    • Cited by Jack Kelly, "MilitantsWireWeb with Links to Jihad," USA TODAY (10 July 2002), available at http://www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm
    • (2002) USA TODAY
    • Kelly, J.1
  • 13
    • 84948958305 scopus 로고    scopus 로고
    • The Psychology of Cyber-terrorism
    • Andrew Silke, ed, Chichester: John Wiley & Sons
    • Marc Rogers, "The Psychology of Cyber-terrorism," in Terrorist, Victims and Society, Andrew Silke, ed. (Chichester: John Wiley & Sons, 2003), pp. 77-92.
    • (2003) Terrorist, Victims and Society , pp. 77-92
    • Rogers, M.1
  • 14
    • 54349084257 scopus 로고    scopus 로고
    • Gabriel Weimann, How Modern Terrorism Uses the Internet (Washington, DC: United States Institute of Peace, Special Report 116, 2004), available at http://www.usip.org/pubs/specialreports/sr116.pdf
    • Gabriel Weimann, How Modern Terrorism Uses the Internet (Washington, DC: United States Institute of Peace, Special Report 116, 2004), available at http://www.usip.org/pubs/specialreports/sr116.pdf
  • 15
    • 33644597220 scopus 로고    scopus 로고
    • Washington, DC: United States Institute of Peace Press
    • Gabriel Weimann, Terror on the Internet (Washington, DC: United States Institute of Peace Press, 2006)
    • (2006) Terror on the Internet
    • Weimann, G.1
  • 16
    • 54349118861 scopus 로고    scopus 로고
    • Bruce Hoffman, The Use of the Internet by Islamic Extremists, Testimony before the House Permanent Select Committee on Intelligence (Rand Corporation, CT-262-1, 4May 2006), available at http://www.au.af.mil/au/awc/awcgate/congress/hoffmantestimony4may06.pdf
    • Bruce Hoffman, "The Use of the Internet by Islamic Extremists," Testimony before the House Permanent Select Committee on Intelligence (Rand Corporation, CT-262-1, 4May 2006), available at http://www.au.af.mil/au/awc/awcgate/congress/hoffmantestimony4may06.pdf
  • 17
    • 33750320271 scopus 로고    scopus 로고
    • Terrorists Turn to the Web as Base of Operations,
    • 7 August, available at
    • Stephen Coll and Susan B. Glasser, "Terrorists Turn to the Web as Base of Operations," The Washington Post (7 August 2005),p. A01, available at http://www.washingtonpost.com/wp-dyn/content/article/ 2005/08/05/AR2005080501138.html
    • (2005) The Washington Post
    • Coll, S.1    Glasser, S.B.2
  • 18
    • 0012422098 scopus 로고    scopus 로고
    • Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
    • November 2002, available at
    • Maura Conway, "Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet," First Monday (November 2002), available at http://www.firstmonday.org/issues/issue7_11/conway/
    • First Monday
    • Conway, M.1
  • 20
    • 85055358368 scopus 로고    scopus 로고
    • Cyber-Mobilization: The New Levee en Masse
    • Summer, available at at
    • Audrey Kurth Cronin, "Cyber-Mobilization: The New Levee en Masse " Parameters (Summer 2006), pp. 77-87, available at at: http://www.carlisle.army.mil/usawc/Parameters/06summer/cronin.htm
    • (2006) Parameters , pp. 77-87
    • Kurth Cronin, A.1
  • 21
    • 84870703652 scopus 로고    scopus 로고
    • The Web as a Weapon,
    • 9 August, available at
    • Susan B. Glasser and Stephen Coll, "The Web as a Weapon," The Washington Post (9 August 2005), p. A01, available at http://www.washingtonpost.com/wp-dyn/content/article/2005/08/08/ AR2005080801018.html
    • (2005) The Washington Post
    • Glasser, S.B.1    Coll, S.2
  • 22
    • 84924009025 scopus 로고    scopus 로고
    • Jihad 2.0
    • July/August 2006, available at onlinejihad
    • Nadya Labi, "Jihad 2.0," The Atlantic Monthly (July/August 2006), available at http://www.theatlantic.com/doc/prem/ 200607/onlinejihad
    • The Atlantic Monthly
    • Labi, N.1
  • 23
    • 83055199947 scopus 로고    scopus 로고
    • Al-Qaeda's Media Strategies
    • Spring
    • Marc Lynch, "Al-Qaeda's Media Strategies," The National Interest (Spring 2006)
    • (2006) The National Interest
    • Lynch, M.1
  • 24
    • 54349110052 scopus 로고    scopus 로고
    • Hanna Rogan, Jihadism Online: A Study of how al-Qaida and Radical Islamist Groups use the Internet for Terrorist Purposes (Norwegian Defense Research Establishment, FFI/RAPPORT-2006/00915, 2006), available at http://rapporter.ffi.no/rapporter/2006/00915.pdf
    • Hanna Rogan, "Jihadism Online: A Study of how al-Qaida and Radical Islamist Groups use the Internet for Terrorist Purposes" (Norwegian Defense Research Establishment, FFI/RAPPORT-2006/00915, 2006), available at http://rapporter.ffi.no/rapporter/2006/00915.pdf
  • 25
    • 84902751420 scopus 로고    scopus 로고
    • Terrorists' use of Internet Spreads
    • 20 February 2005, available at
    • Jon Swartz, "Terrorists' use of Internet Spreads," USA Today (20 February 2005), available at http://www.usatoday.com/money/ industries/technology/2005-02-20-cyber-terror-usat_x.htm
    • USA Today
    • Swartz, J.1
  • 26
    • 33745266657 scopus 로고    scopus 로고
    • Terror's Server
    • Massachusetts Institute of Technology, February
    • David Talbot, "Terror's Server," Technology Review (Massachusetts Institute of Technology, February 2005), pp. 46-52
    • (2005) Technology Review , pp. 46-52
    • Talbot, D.1
  • 27
    • 85048941387 scopus 로고    scopus 로고
    • Al Qaeda and the Internet: The Danger of 'Cyberplanning'
    • Spring, available at
    • Timothy L. Thomas, "Al Qaeda and the Internet: The Danger of 'Cyberplanning'," Parameters (Spring 2003), pp. 112-123, available at http://carlisle-www.army.mil/usawc/Parameters/03spring/ thomas.htm
    • (2003) Parameters , pp. 112-123
    • Thomas, T.L.1
  • 30
    • 0008783791 scopus 로고    scopus 로고
    • Institute for Security Technology Studies, Dartmouth College, 22 September 2001, available at
    • Michael Vatis, Cyber Attacks During The War on Terrorism: A Predictive Analysis (Institute for Security Technology Studies, Dartmouth College, 22 September 2001), available at http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf
    • Cyber Attacks During The War on Terrorism: A Predictive Analysis
    • Vatis, M.1
  • 31
    • 54349088705 scopus 로고    scopus 로고
    • Terrorist Activities On the Net,
    • available at
    • Cited in ADL report "Terrorist Activities On the Net," available at http://www.adl.org/terror/focus/16_focus_a.asp
    • Cited in ADL report
  • 35
    • 54349087302 scopus 로고    scopus 로고
    • Jody R. Westby, Countering Terrorism with Cyber Security, paper for the 36th Session of World Federation of Scientists, International Seminars on Planetary Emergencies (18-26 August 2006, Erice, Italy).
    • Jody R. Westby, "Countering Terrorism with Cyber Security," paper for the 36th Session of World Federation of Scientists, International Seminars on Planetary Emergencies (18-26 August 2006, Erice, Italy).
  • 36
    • 38049076478 scopus 로고    scopus 로고
    • Online, available at, accessed 12 October 2007
    • Tor Anonymity Online, available at http://www.torproject.org/ index.html.en (accessed 12 October 2007).
    • Tor Anonymity
  • 37
    • 54349092547 scopus 로고    scopus 로고
    • Bruce Hoffman, cited in Les Blumenthal, U.S. Seeks to Counter Terrorists' use of the Internet , available at
    • Bruce Hoffman, cited in Les Blumenthal, "U.S. Seeks to Counter Terrorists' use of the Internet" (2007), available at http://www.kansascity.com/news/world/story/287013.html
    • (2007)
  • 39
    • 54349113998 scopus 로고    scopus 로고
    • Boaz Ganor, Katharina von Knop, and Carlos Duarte, Hypermedia Seduction for Terrorist Recruiting, B. Ganor, K. Von Knop, C. Duarte, eds. (Washington, DC: NATO Science for Peace and Security Series, 2007)
    • Boaz Ganor, Katharina von Knop, and Carlos Duarte, Hypermedia Seduction for Terrorist Recruiting, B. Ganor, K. Von Knop, C. Duarte, eds. (Washington, DC: NATO Science for Peace and Security Series, 2007)
  • 41
    • 54349094724 scopus 로고    scopus 로고
    • Gabriel Weimann, Using the Internet for Terrorist Recruitment and Mobilization, in Hypermedia Seduction for Terrorist Recruiting (Washington, DC: NATO Science for Peace and Security Series, 2007), pp. 47-58.
    • Gabriel Weimann, "Using the Internet for Terrorist Recruitment and Mobilization," in Hypermedia Seduction for Terrorist Recruiting (Washington, DC: NATO Science for Peace and Security Series, 2007), pp. 47-58.
  • 43
    • 31144446140 scopus 로고    scopus 로고
    • Militant Recruitment in Pakistan: Implications for Al Qaeda and Other Organizations
    • Christine Fair, "Militant Recruitment in Pakistan: Implications for Al Qaeda and Other Organizations," Studies in Conflict & Terrorism, 27(6) (2007), pp. 489-504
    • (2007) Studies in Conflict & Terrorism , vol.27 , Issue.6 , pp. 489-504
    • Fair, C.1
  • 47
    • 85055361827 scopus 로고    scopus 로고
    • Strategic Communication
    • Autumn
    • Richard Halloran, "Strategic Communication," Parameters (Autumn 2007), pp. 4-14.
    • (2007) Parameters , pp. 4-14
    • Halloran, R.1
  • 49
    • 6344239117 scopus 로고    scopus 로고
    • Soft Power and American Foreign Policy
    • Joseph S. Nye, "Soft Power and American Foreign Policy," Political Science Quarterly, 119(2) (2004), p. 256.
    • (2004) Political Science Quarterly , vol.119 , Issue.2 , pp. 256
    • Nye, J.S.1
  • 50
    • 33748117348 scopus 로고    scopus 로고
    • The Power of Persuasion, Dual Components of US Leadership
    • Joseph S. Nye, "The Power of Persuasion, Dual Components of US Leadership," Harvard International Review, 24(4) (2003), p. 46.
    • (2003) Harvard International Review , vol.24 , Issue.4 , pp. 46
    • Nye, J.S.1
  • 51
    • 33747686518 scopus 로고    scopus 로고
    • Virtual Disputes: The Use of the Internet for Terrorist Debates
    • Gabriel Weimann, "Virtual Disputes: The Use of the Internet for Terrorist Debates," Studies in Conflict and Terrorism, 29(7) (2006), pp. 623-639
    • (2006) Studies in Conflict and Terrorism , vol.29 , Issue.7 , pp. 623-639
    • Weimann, G.1
  • 53
    • 84918937782 scopus 로고    scopus 로고
    • Spy Agencies Iraq War Hurting U.S. Terror Fight,
    • Cited by, 24 September, available at
    • Cited by Karen deYoung, "Spy Agencies Iraq War Hurting U.S. Terror Fight," Washington Post (24 September 2006), available at http://www.washingtonpost.com/wp-dyn/content/article/2006/09/23/ AR2006092301130.html
    • (2006) Washington Post
    • deYoung, K.1
  • 54
    • 84945310839 scopus 로고    scopus 로고
    • available at, accessed 1 January 2008
    • Roger Needham and Butler Lampson, "Network Attack and Defense," available at http://www.cl.cam.ac.uk/~rja14/Papers/SE-18.pdf (accessed 1 January 2008).
    • Network Attack and Defense
    • Needham, R.1    Lampson, B.2
  • 55
    • 54349121262 scopus 로고    scopus 로고
    • From Terrorist Groups Relying on Identity Theft for Funding andOperations, About.Com, available at http://idtheft.about.com/od/useofstolenidentity/p/IDTheftTerror.htm
    • From "Terrorist Groups Relying on Identity Theft for Funding andOperations," About.Com, available at http://idtheft.about.com/od/useofstolenidentity/p/IDTheftTerror.htm
  • 56
    • 54349115133 scopus 로고    scopus 로고
    • Information Warfare
    • Österreichische Militärzeitschrift
    • Arnulf Kopeinig, "Information Warfare" (Österreichische Militärzeitschrift, vol. 1, 1999), p. 23.
    • (1999) , vol.1 , pp. 23
    • Kopeinig, A.1
  • 57
    • 0347127284 scopus 로고
    • Information Warfare
    • Spring
    • George S. Stein, "Information Warfare," Airpower Journal (Spring 1995), p. 32.
    • (1995) Airpower Journal , pp. 32
    • Stein, G.S.1
  • 58
    • 54349090057 scopus 로고    scopus 로고
    • Joint Chiefs of Staff, Joint Psychological Operations, Joint Pub 3-53 (Washington, DC: GPO, 10 July 1996), p. I-1.
    • Joint Chiefs of Staff, Joint Psychological Operations, Joint Pub 3-53 (Washington, DC: GPO, 10 July 1996), p. I-1.
  • 60
    • 84937187529 scopus 로고    scopus 로고
    • Army PSYOP in Bosnia: Capabilities and Constraints
    • Steven Collins, "Army PSYOP in Bosnia: Capabilities and Constraints," Parameters, 29 (1999), p. 57.
    • (1999) Parameters , vol.29 , pp. 57
    • Collins, S.1
  • 61
    • 54349103727 scopus 로고    scopus 로고
    • Information Operations in Bosnia
    • November-December
    • Timothy LaBahn, "Information Operations in Bosnia," FA Journal (November-December 2001), p. 32.
    • (2001) FA Journal , pp. 32
    • LaBahn, T.1
  • 62
    • 54349085544 scopus 로고    scopus 로고
    • DOS spokesman James Rubin, quoted in Jon Swartz, "Administration Drops Idea of Blocking Serb Net Sites,"
    • 15 May
    • DOS spokesman James Rubin, quoted in Jon Swartz, "Administration Drops Idea of Blocking Serb Net Sites," The San Francisco Chronicle (15 May 1999).
    • (1999) The San Francisco Chronicle
  • 63
    • 54349101216 scopus 로고    scopus 로고
    • Information in Support of Psychological Operations, quoted by Lungu
    • Defense Science Board
    • Defense Science Board, Information in Support of Psychological Operations, quoted by Lungu, "War.com: The Internet and Psychological Operations."
    • War.com: The Internet and Psychological Operations
  • 67
    • 54349122215 scopus 로고    scopus 로고
    • Montague Kern, Web and Mass Media Campaigns by Political Candidates: MoveOn.org and the Democratic Party in 2003-2004 Presidential Primaries, in Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK (London: The British Library, 2004), available at http://sherpa.bl.uk/2/01/PMKern.pdf, Paper presented at the conference 'Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK,' 15 March 2004, The British Library, London.
    • Montague Kern, "Web and Mass Media Campaigns by Political Candidates: MoveOn.org and the Democratic Party in 2003-2004 Presidential Primaries," in Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK (London: The British Library, 2004), available at http://sherpa.bl.uk/2/01/PMKern.pdf, Paper presented at the conference 'Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK,' 15 March 2004, The British Library, London.
  • 70
    • 54349115355 scopus 로고    scopus 로고
    • Council of the European Union, doc. 14781/1/05, subject: The European Union Strategy for Combating Radicalization and Recruitment to Terrorism, 24 November 2005, p. 3.
    • Council of the European Union, doc. 14781/1/05, subject: The European Union Strategy for Combating Radicalization and Recruitment to Terrorism, 24 November 2005, p. 3.
  • 71
    • 54349098429 scopus 로고    scopus 로고
    • Council of the European Union, subject: Presidency Conclusions, doc. 10633/06, p. 5.
    • Council of the European Union, subject: Presidency Conclusions, doc. 10633/06, p. 5.
  • 72
    • 54349096067 scopus 로고    scopus 로고
    • Council of the European Union, subject: Council Conclusions on Cooperation to Combat Terrorist use of the Internet, doc. 8457/2/07, p. 3.
    • Council of the European Union, subject: Council Conclusions on Cooperation to Combat Terrorist use of the Internet, doc. 8457/2/07, p. 3.
  • 73
    • 3843051401 scopus 로고    scopus 로고
    • Management and Virtual Decentralized Networks: The Linux Project
    • available at
    • George Dafermos, "Management and Virtual Decentralized Networks: The Linux Project," First Monday 6 (11), available at http://www.firstmonday.org/issues/issue6_11/dafermos/
    • First Monday , vol.6 , Issue.11
    • Dafermos, G.1
  • 74
    • 54349106371 scopus 로고    scopus 로고
    • Google also provided its hardware and software system, which includes proprietary algorithms that intelligence IT managers praise highly, to the Army, the Energy Department, and other agencies in the intelligence world
    • Google also provided its hardware and software system, which includes proprietary algorithms that intelligence IT managers praise highly, to the Army, the Energy Department, and other agencies in the intelligence world.
  • 75
    • 54349086051 scopus 로고    scopus 로고
    • Stew Magnuson, Wikipedia for Intel Officers Proves Useful, National Defense Magazine, National Defense (November 2006), available at http://www.nationaldefensemagazine.org/issues/ 2006/November/SecurityBeat.htm#
    • Stew Magnuson, "Wikipedia for Intel Officers Proves Useful, National Defense Magazine," National Defense (November 2006), available at http://www.nationaldefensemagazine.org/issues/ 2006/November/SecurityBeat.htm#
  • 77
    • 84942542258 scopus 로고    scopus 로고
    • Institutionalization of a Web-focused, Multinational Counter-Terrorism Campaign: Building a Collective Open Source Intelligence System
    • On the use of virtual and physical open source intelligence counterterrorism system, see, Washington, DC: NATO IOS Press
    • On the use of virtual and physical open source intelligence counterterrorism system, see Katharina von Knop, "Institutionalization of a Web-focused, Multinational Counter-Terrorism Campaign: Building a Collective Open Source Intelligence System," in Response to Cyber-Terrorism (Washington, DC: NATO IOS Press, 2008).
    • (2008) Response to Cyber-Terrorism
    • Katharina von Knop1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.