메뉴 건너뛰기




Volumn 11, Issue 2, 2008, Pages 183-199

Similarities between terrorist networks in antiquity and present-day cyberterrorist networks

Author keywords

Antiquity; Communication; Cyberterrorism; Internet; Networks; Terrorism; Zealots

Indexed keywords


EID: 70549090163     PISSN: 10844791     EISSN: 19364830     Source Type: Journal    
DOI: 10.1007/s12117-008-9034-0     Document Type: Article
Times cited : (9)

References (79)
  • 1
    • 4043091585 scopus 로고    scopus 로고
    • The advent of netwar (revisited): the future of terror, crime, and militancy
    • J. Arquilla and D. Ronfeldt (Eds.), Santa Monica: RAND
    • Arquilla J, Ronfeldt D (2001) The advent of netwar (revisited): the future of terror, crime, and militancy. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, pp 1-28.
    • (2001) Networks and Netwars , pp. 1-28
    • Arquilla, J.1    Ronfeldt, D.2
  • 2
    • 84873544569 scopus 로고    scopus 로고
    • Captured al Qaeda documents detail shift in support
    • Baker FW III (2008) Captured al Qaeda documents detail shift in support. Am Forces Press Serv 1: 10-15.
    • (2008) Am Forces Press Serv , vol.1 , pp. 10-15
    • Baker III, F.W.1
  • 3
    • 84923618755 scopus 로고
    • The social organization of conspiracy: illegal networks in the heavy electrical equipment industry
    • Baker WE, Faulkner RR (1993) The social organization of conspiracy: illegal networks in the heavy electrical equipment industry. Am Sociol Rev 58: 837-860.
    • (1993) Am Sociol Rev , vol.58 , pp. 837-860
    • Baker, W.E.1    Faulkner, R.R.2
  • 5
    • 84926486486 scopus 로고
    • Communication patterns in task-oriented groups
    • Bavelas A (1950) Communication patterns in task-oriented groups. J Acoust Soc Am 22: 725-730.
    • (1950) J Acoust Soc Am , vol.22 , pp. 725-730
    • Bavelas, A.1
  • 6
    • 84873559546 scopus 로고    scopus 로고
    • Where Masada's defenders fell
    • Ben-Yehuda N (1998) Where Masada's defenders fell. Biblic Archaeol Rev 24(6): 32-39.
    • (1998) Biblic Archaeol Rev , vol.24 , Issue.6 , pp. 32-39
    • Ben-Yehuda, N.1
  • 9
    • 0000269776 scopus 로고
    • Information systems and the organization of modern enterprise
    • Brynjolfsson E, Mendelson H (1993) Information systems and the organization of modern enterprise. J Organ Comput 3: 4.
    • (1993) J Organ Comput , vol.3 , pp. 4
    • Brynjolfsson, E.1    Mendelson, H.2
  • 11
    • 3042825349 scopus 로고    scopus 로고
    • Health implications of cyber-terrorism
    • Clem A, Galwankar S, Buck G (2003) Health implications of cyber-terrorism. Prehosp Disaster Med 18(3): 272-275.
    • (2003) Prehosp Disaster Med , vol.18 , Issue.3 , pp. 272-275
    • Clem, A.1    Galwankar, S.2    Buck, G.3
  • 15
    • 0242440508 scopus 로고    scopus 로고
    • Activism, hacktivism, and cyberterrorism. The internet as a tool for influencing foreign policy
    • J. Arquilla and D. Ronfeldt (Eds.), Santa Monica, CA: RAND
    • Denning DE (2001) Activism, hacktivism, and cyberterrorism. The internet as a tool for influencing foreign policy. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, CA, pp 239-288.
    • (2001) Networks and Netwars , pp. 239-288
    • Denning, D.E.1
  • 16
    • 0002603702 scopus 로고    scopus 로고
    • Identity and deception in the virtual community
    • M. A. Smith and P. Kollock (Eds.), New York: Routledge
    • Donath JS (1999) Identity and deception in the virtual community. In: Smith MA, Kollock P (eds) Communities in cyberspace. Routledge, New York, pp 29-59.
    • (1999) Communities in Cyberspace , pp. 29-59
    • Donath, J.S.1
  • 18
    • 28044443073 scopus 로고
    • Towards a semiological guerrilla warfare
    • U. Eco (Ed.), San Diego: Harcourt
    • Eco U (1986) Towards a semiological guerrilla warfare. In: Eco U (ed) Travels in hyperreality. Harcourt, San Diego, pp 135-144.
    • (1986) Travels in Hyperreality , pp. 135-144
    • Eco, U.1
  • 20
    • 80051967995 scopus 로고    scopus 로고
    • Workshops of villains: was there much organised crime in classical Athens?
    • K. Hopwood (Ed.), London: Duckworth
    • Fisher N (1998) Workshops of villains: was there much organised crime in classical Athens? In: Hopwood K (ed) Organised crime in Antiquity. Duckworth, London, pp 53-96.
    • (1998) Organised Crime in Antiquity , pp. 53-96
    • Fisher, N.1
  • 21
    • 75649118378 scopus 로고
    • Social networks: a beginner's bookshelf
    • Freeman LC (1981) Social networks: a beginner's bookshelf. Soc Netw 4(2): 6-10.
    • (1981) Soc Netw , vol.4 , Issue.2 , pp. 6-10
    • Freeman, L.C.1
  • 24
    • 84970633453 scopus 로고
    • New organizational forms
    • Heydebrand WV (1989) New organizational forms. Work Occup 16(3): 323-357.
    • (1989) Work Occup , vol.16 , Issue.3 , pp. 323-357
    • Heydebrand, W.V.1
  • 26
    • 84886459283 scopus 로고    scopus 로고
    • Bandits between grandees and the state: the structure of order in Roman Rough Cilicia
    • K. Hopwood (Ed.), London: Duckworth
    • Hopwood K (1998) Bandits between grandees and the state: the structure of order in Roman Rough Cilicia. In: Hopwood K (ed) Organised crime in Antiquity. Duckworth, London, pp 177-206.
    • (1998) Organised Crime in Antiquity , pp. 177-206
    • Hopwood, K.1
  • 28
    • 27744588121 scopus 로고    scopus 로고
    • First cells, then species, now the web
    • December 26
    • Johnson G (2000) First cells, then species, now the web. New York Times, p. M1, December 26.
    • (2000) New York Times
    • Johnson, G.1
  • 31
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • Klein H, Myers M (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Q 23(1): 67-93.
    • (1999) MIS Q , vol.23 , Issue.1 , pp. 67-93
    • Klein, H.1    Myers, M.2
  • 34
    • 0001915412 scopus 로고
    • Some effects of certain communication patterns on group performance
    • Leavitt HJ (1951) Some effects of certain communication patterns on group performance. J Abnorm Soc Psychol 46: 38-50.
    • (1951) J Abnorm Soc Psychol , vol.46 , pp. 38-50
    • Leavitt, H.J.1
  • 35
    • 70449664299 scopus 로고    scopus 로고
    • The next threat
    • Lenzner R, Vardi N (2007) The next threat. Forbes 174(5): 15-21.
    • (2007) Forbes , vol.174 , Issue.5 , pp. 15-21
    • Lenzner, R.1    Vardi, N.2
  • 41
    • 40749110964 scopus 로고    scopus 로고
    • Deception in the virtual world: a semiotic analysis of identity
    • Matusitz J (2005) Deception in the virtual world: a semiotic analysis of identity. J New Media Culture 3(1): 54-63.
    • (2005) J New Media Culture , vol.3 , Issue.1 , pp. 54-63
    • Matusitz, J.1
  • 42
    • 40749151155 scopus 로고    scopus 로고
    • Postmodernism and networks of cyberterrorists
    • Matusitz J (2008) Postmodernism and networks of cyberterrorists. J Digital Forensic Practice 2: 1-10.
    • (2008) J Digital Forensic Practice , vol.2 , pp. 1-10
    • Matusitz, J.1
  • 43
    • 85014267211 scopus 로고    scopus 로고
    • The role of the Internet in terrorism
    • D. O'Hair, R. Heath, K. Ayotte, and G. R. Ledlow (Eds.), Cresskill, NJ: Hampton
    • Matusitz J, O'Hair D (2007) The role of the Internet in terrorism. In: O'Hair D, Heath R, Ayotte K, Ledlow GR (eds) Terrorism: communication and rhetorical perspectives. Hampton, Cresskill, NJ.
    • (2007) Terrorism: Communication and Rhetorical Perspectives
    • Matusitz, J.1    O'Hair, D.2
  • 45
    • 84873546634 scopus 로고    scopus 로고
    • Native rebellion in the Pisidian Taurus
    • K. Hopwood (Ed.), London: Duckworth
    • Mitchell S (1998) Native rebellion in the Pisidian Taurus. In: Hopwood K (ed) Organised crime in Antiquity. Duckworth, London, pp 155-175.
    • (1998) Organised Crime in Antiquity , pp. 155-175
    • Mitchell, S.1
  • 49
    • 0007039712 scopus 로고    scopus 로고
    • Communication technology for global network organizations
    • G. Desanctis and J. Fulk (Eds.), Thousand Oaks, CA: Sage
    • Monge PR, Fulk J (1999) Communication technology for global network organizations. In: Desanctis G, Fulk J (eds) Shaping organizational form: communication, connection, and community. Sage, Thousand Oaks, CA, pp 70-101.
    • (1999) Shaping Organizational Form: Communication, Connection, and Community , pp. 70-101
    • Monge, P.R.1    Fulk, J.2
  • 51
    • 0000820455 scopus 로고
    • Neither market nor hierarchy: network forms of organization
    • Powell WW (1990) Neither market nor hierarchy: network forms of organization. Res Organ Behav 12: 295-336.
    • (1990) Res Organ Behav , vol.12 , pp. 295-336
    • Powell, W.W.1
  • 54
    • 27944435957 scopus 로고
    • Hizbollah's command leadership: Its structure, decision-making and relationship with Iranian clergy and institutions
    • Ranstorp M (1994) Hizbollah's command leadership: Its structure, decision-making and relationship with Iranian clergy and institutions. Terrorism Polit Violence 6(3): 300-318.
    • (1994) Terrorism Polit Violence , vol.6 , Issue.3 , pp. 300-318
    • Ranstorp, M.1
  • 55
    • 84873529962 scopus 로고    scopus 로고
    • Balkans war reaches our corner of the Web
    • Regan T (1999) Balkans war reaches our corner of the Web. Christ Sci Monit 91(97): 15.
    • (1999) Christ Sci Monit , vol.91 , Issue.97 , pp. 15
    • Regan, T.1
  • 56
    • 84938620811 scopus 로고    scopus 로고
    • Report of the Defense Science Board Task Force on Information Warfare Defense, Washington, November
    • Report of the Defense Science Board Task Force on Information Warfare Defense (1996) Department of Defense, Washington, p. A3, November.
    • (1996) Department of Defense
  • 60
    • 25044433900 scopus 로고    scopus 로고
    • Used to be, the internet was a safe place to play
    • June 15
    • Schwartz J (1999) Used to be, the internet was a safe place to play. Washington Post, p. C01, June 15.
    • (1999) Washington Post
    • Schwartz, J.1
  • 64
    • 43349137416 scopus 로고
    • Bandit highlands and lowland peace: the mountains of Isauria-Cilicia
    • Shaw B (1990) Bandit highlands and lowland peace: the mountains of Isauria-Cilicia. J Econ Soc Hist Orient 33: 199-233.
    • (1990) J Econ Soc Hist Orient , vol.33 , pp. 199-233
    • Shaw, B.1
  • 66
    • 0015728810 scopus 로고
    • The structure of ill-structured problems
    • Simon H (1973) The structure of ill-structured problems. Artif Intell 4: 181-201.
    • (1973) Artif Intell , vol.4 , pp. 181-201
    • Simon, H.1
  • 67
    • 84974291953 scopus 로고
    • Zealots and Sicarii: their origins and relation
    • Smith M (1971) Zealots and Sicarii: their origins and relation. Harv Theol Rev 64: 1-19.
    • (1971) Harv Theol Rev , vol.64 , pp. 1-19
    • Smith, M.1
  • 70
    • 84873548728 scopus 로고    scopus 로고
    • The invasion of the Chinese cyberspies (and the man who tried to stop them)
    • Thornburgh N, Forney M, Bennett B, Burger TJ, Shannon E (2005) The invasion of the Chinese cyberspies (and the man who tried to stop them). Time 166(10): 34-39.
    • (2005) Time , vol.166 , Issue.10 , pp. 34-39
    • Thornburgh, N.1    Forney, M.2    Bennett, B.3    Burger, T.J.4    Shannon, E.5
  • 76
    • 27944454740 scopus 로고    scopus 로고
    • Cyberterrorism: the sum of all fears?
    • Weimann G (2005) Cyberterrorism: the sum of all fears? Stud Confl Terror 48(2): 129-149.
    • (2005) Stud Confl Terror , vol.48 , Issue.2 , pp. 129-149
    • Weimann, G.1
  • 79
    • 0242524121 scopus 로고    scopus 로고
    • The networking of terror in the information age
    • J. Arquilla and D. Ronfeldt (Eds.), Santa Monica: RAND
    • Zanini N, Edwards SJA (2001) The networking of terror in the information age. In: Arquilla J, Ronfeldt D (eds) Networks and netwars. RAND, Santa Monica, pp 29-60.
    • (2001) Networks and Netwars , pp. 29-60
    • Zanini, N.1    Edwards, S.J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.