메뉴 건너뛰기




Volumn 4, Issue 1, 2008, Pages 19-36

Cyber-terror-looming threat or Phantom menace? The framing of the US cyber-threat debate

Author keywords

Cyber terrorism; Information infrastructure; Security studies; Threat framing

Indexed keywords


EID: 77950782070     PISSN: 19331681     EISSN: 1933169X     Source Type: Journal    
DOI: 10.1300/J516v04n01_03     Document Type: Article
Times cited : (78)

References (118)
  • 2
    • 0031232154 scopus 로고    scopus 로고
    • Seizing the middle ground: Constructivism in world politics
    • Adler, E. (1997). Seizing the middle ground: Constructivism in world politics. European Journal of International Relations, 3, 319-363.
    • (1997) European Journal of International Relations , vol.3 , pp. 319-363
    • Adler, E.1
  • 3
    • 84972279328 scopus 로고
    • Conclusion: Epistemic communities, world order, and the creation of a reflective research program
    • Adler, E., & Haas, P. M. (1992). Conclusion: Epistemic communities, world order, and the creation of a reflective research program. International Organization, 46, 367-390.
    • (1992) International Organization , vol.46 , pp. 367-390
    • Adler, E.1    Haas, P.M.2
  • 5
    • 84861145051 scopus 로고    scopus 로고
    • The technologies of the information revolution
    • D. S. Alberts & D. S. Papp (Eds.), Washington DC: National Defense University
    • Alberts, D. S., Papp, D. S., & Kemp, W. T., III. (1997). The technologies of the information revolution. In D. S. Alberts & D. S. Papp (Eds.), The information age: An anthology of its impacts and consequences (pp. 83-116). Washington DC: National Defense University.
    • (1997) The Information Age: An Anthology of Its Impacts and Consequences , pp. 83-116
    • Alberts, D.S.1    Papp, D.S.2    Kemp III., W.T.3
  • 6
    • 84925838576 scopus 로고    scopus 로고
    • Why Information Security is Hard: An Economic Perspective
    • IEEE Computer Society (Ed.), Washington, DC: IEEE Computer Society
    • Andersson, R. (2001).Why Information Security is Hard: An Economic Perspective. In IEEE Computer Society (Ed.), Proceedings of the 17th Annual Computer Security Applications Conference (pp. 358-365). Washington, DC: IEEE Computer Society.
    • (2001) Proceedings of the 17th Annual Computer Security Applications Conference , pp. 358-365
    • Andersson, R.1
  • 7
    • 84861178583 scopus 로고    scopus 로고
    • Beyond good and evil: Ethics and securitization/desecuritization techniques
    • December, Retrieved May 1, 2007 from
    • Aradau, C. (2001, December). Beyond good and evil: Ethics and securitization/desecuritization techniques. Rubikon, Retrieved May 1, 2007 from http://venus.ci.uw.edu.pl/~rubikon/forum/claudia2.htm
    • (2001) Rubikon
    • Aradau, C.1
  • 8
    • 0012753054 scopus 로고    scopus 로고
    • The great cyberwar of 2002: A WIRED scenario
    • February 6
    • Arquilla, J. (1998, February 6). The great cyberwar of 2002: A WIRED Scenario. WIRED, 122-127, 160-170.
    • (1998) WIRED , vol.122-127 , pp. 160-170
    • Arquilla, J.1
  • 12
    • 84861110780 scopus 로고    scopus 로고
    • Between violence and 'e-jihad': Middle Eastern terror organizations in the information age
    • L. Nicander &M. Ranstorp (Eds.), Stockholm: Swedish National Defence College
    • Barak, S. (2004). Between violence and 'e-jihad': Middle Eastern terror organizations in the information age. In L. Nicander &M. Ranstorp (Eds.), Terrorism in the information age-new frontiers? (pp. 83-96). Stockholm: Swedish National Defence College.
    • (2004) Terrorism in the Information Age-new Frontiers? , pp. 83-96
    • Barak, S.1
  • 13
    • 21244432672 scopus 로고    scopus 로고
    • The cyberwar debate: Perception and politics in US critical infrastructure protection
    • Bendrath, R. (2001). The cyberwar debate: Perception and politics in US critical infrastructure protection. Information&Security: An International Journal, 7, 80-103.
    • (2001) Information&Security: An International Journal , vol.7 , pp. 80-103
    • Bendrath, R.1
  • 14
  • 15
    • 80051578519 scopus 로고    scopus 로고
    • Cyberterrorism to cyberwar, back and forth: How the United States securitized cyberspace
    • J. Eriksson & G. Giacomello (Eds.), London: Routledge
    • Bendrath, R., Eriksson J., & Giacomello G. (2006). Cyberterrorism to cyberwar, back and forth: How the United States securitized cyberspace. In J. Eriksson & G. Giacomello (Eds.), International relations and security in the digital age (pp. 57-82). London: Routledge.
    • (2006) International Relations and Security in the Digital Age , pp. 57-82
    • Bendrath, R.1    Eriksson, J.2    Giacomello, G.3
  • 16
    • 84861163515 scopus 로고    scopus 로고
    • Warfare in the information age
    • J. Arquilla & D. Ronfeldt (Eds.), Santa Monica, CA: RAND
    • Berkowitz, B. D. (1997). Warfare in the information age. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp: Preparing for conflict in the information age (pp. 175-189). Santa Monica, CA: RAND.
    • (1997) Athena's Camp: Preparing For Conflict In the Information Age , pp. 175-189
    • Berkowitz, B.D.1
  • 20
    • 84861178585 scopus 로고    scopus 로고
    • (Congressional Research Service Documents, CRS RL32331). Washington, DC: Congressional Research Service
    • Cashell, B., Jackson, W. D., Jickling, M., & Webel, B. (2004). The economic impact of cyber-attacks (Congressional Research Service Documents, CRS RL32331). Washington, DC: Congressional Research Service.
    • (2004) The Economic Impact of Cyber-attacks
    • Cashell, B.1    Jackson, W.D.2    Jickling, M.3    Webel, B.4
  • 22
    • 84861124863 scopus 로고    scopus 로고
    • White House officials debating rules for cyberwarfare
    • August 22
    • Cha, A. E., & Krim, J. (2002, August 22). White House officials debating rules for cyberwarfare. The Washington Post, p. A02.
    • (2002) The Washington Post
    • Cha, A.E.1    Krim, J.2
  • 25
    • 84936823975 scopus 로고
    • Sex and death in the rational world of defense intellectuals
    • Cohn, C. (1987). Sex and death in the rational world of defense intellectuals. Signs: Journal of Women in Culture and Society, 12, 687-718.
    • (1987) Signs: Journal of Women In Culture and Society , vol.12 , pp. 687-718
    • Cohn, C.1
  • 26
    • 84859596962 scopus 로고    scopus 로고
    • The future of cyberterrorism: Where physical and virtual worlds converge
    • Collin, B. C. (1997). The future of cyberterrorism: Where physical and virtual worlds converge. Crime & Justice International, 13, 15-18.
    • (1997) Crime & Justice International , vol.13 , pp. 15-18
    • Collin, B.C.1
  • 27
    • 0012422098 scopus 로고    scopus 로고
    • Reality bytes: Cyberterrorism and terrorist 'use' of the Internet
    • November 4, Retrieved May 2, 2007 from
    • Conway, M. (2002, November 4). Reality bytes: Cyberterrorism and terrorist 'use' of the Internet. Firstmonday, 7. Retrieved May 2, 2007 from http://firstmonday.org/issues/issue7_11/Conway
    • (2002) Firstmonday , vol.7
    • Conway, M.1
  • 28
    • 0040731563 scopus 로고
    • Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of Ibn Khaldun
    • J. N. Rosenau & E. Czempiel (Eds.), Cambridge Studies in International Relations Nr. 20, Cambridge, England: Cambridge University Press
    • Cox, R. W. (1992). Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of Ibn Khaldun. In J. N. Rosenau & E. Czempiel (Eds.), Governance without government: Order and change in world politics, Cambridge Studies in International Relations Nr. 20 (pp. 132-158). Cambridge, England: Cambridge University Press.
    • (1992) Governance Without Government: Order and Change In World Politics , pp. 132-158
    • Cox, R.W.1
  • 29
    • 84861120178 scopus 로고
    • DCI Center for Security Evaluation Standards Group, September 15, 7th annual edition. Retrieved May 2, 2007 from
    • DCI Center for Security Evaluation Standards Group. (1995, September 15). An inventory of standards affecting security, 7th annual edition. Retrieved May 2, 2007 from http://www.fas.org/sgp/othergov/inventory.html
    • (1995) An Inventory of Standards Affecting Security
  • 34
    • 0242440508 scopus 로고    scopus 로고
    • Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
    • J. Arquilla & D. Ronfeldt (Eds.), Santa Monica, CA: RAND
    • Denning, D. E. (2001b). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 239-288). Santa Monica, CA: RAND.
    • (2001) Networks and Netwars: The Future of Terror, Crime and Militancy , pp. 239-288
    • Denning, D.E.1
  • 35
    • 81455158615 scopus 로고    scopus 로고
    • Department of Homeland Security (DHS)., September 12, Washington, DC. Retrieved May 3, 2007 from
    • Department of Homeland Security (DHS). (2006, September 12). Cyber storm: Exercise report. Washington, DC. Retrieved May 3, 2007 from http://www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf
    • (2006) Cyber Storm: Exercise Report
  • 37
    • 0040655217 scopus 로고
    • Unpublished master's thesis, University of Vermont, Burlington. Retrieved May 7, 2007 from
    • Devost, M. G. (1995). National security in the information age. Unpublished master's thesis, University of Vermont, Burlington. Retrieved May 7, 2007 from http://www.devost.net/papers/national_security_in_the_information_age.html
    • (1995) National Security In the Information Age
    • Devost, M.G.1
  • 40
    • 84911212445 scopus 로고    scopus 로고
    • Concluding remarks: The role of the state in securing the information age-challenges and prospects
    • in press, M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.), Aldershot, England: Ashgate
    • Dunn Cavelty, M. & Mauer, V. (in press). Concluding remarks: The role of the state in securing the information age-challenges and prospects. In M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.). Power and security in the information age: Investigating the role of the state in cyberspace. Aldershot, England: Ashgate.
    • Power and Security In the Information Age: Investigating the Role of the State In Cyberspace
    • Dunn, C.M.1    Mauer, V.2
  • 44
    • 0003449736 scopus 로고    scopus 로고
    • November, Technical Report. CMU/SEI-97-TR-013. ESC-TR-97-013). Pittsburgh, PA: Carnegie Mellon University, Software Engineering Institute. Retrieved May 2, 2007 from
    • Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff T & Mead, N. R. (1997, November). Survivable network systems: An emerging discipline. (Technical Report. CMU/SEI-97-TR-013. ESC-TR-97-013). Pittsburgh, PA: Carnegie Mellon University, Software Engineering Institute. Retrieved May 2, 2007 from http://www.cert.org/research/97tr013.pdf
    • (1997) Survivable Network Systems: An Emerging Discipline
    • Ellison, R.J.1    Fisher, D.A.2    Linger, R.C.3    Lipson, H.F.4    Longstaff, T.5    Mead, N.R.6
  • 45
    • 84888859417 scopus 로고    scopus 로고
    • Information warfare: Hype or reality?
    • Eriksson, A. E. (1999). Information warfare: Hype or reality? The Non-Proliferation Review, 6, 57-64.
    • (1999) The Non-Proliferation Review , vol.6 , pp. 57-64
    • Eriksson, A.E.1
  • 47
    • 0035193419 scopus 로고    scopus 로고
    • Cyberplagues, IT, and security: Threat politics in the information age
    • Eriksson, J. (2001b). Cyberplagues, IT, and security: Threat politics in the information age. Journal of Contingencies and Crisis Management, 9, 211-222.
    • (2001) Journal of Contingencies and Crisis Management , vol.9 , pp. 211-222
    • Eriksson, J.1
  • 48
    • 33746787614 scopus 로고    scopus 로고
    • The information revolution, security, and international relations: (IR)relevant theory?
    • Eriksson, J. & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27, 221-244.
    • (2006) International Political Science Review , vol.27 , pp. 221-244
    • Eriksson, J.1    Giacomello, G.2
  • 49
    • 60449096384 scopus 로고    scopus 로고
    • (Uppsala Peace Research Papers, 6). Uppsala, Sweden: Uppsala Universitet. Retrieved May 2, 2007 from
    • Eriksson, J., & Noreen, E. (2002). Setting the agenda of threats: An explanatory model (Uppsala Peace Research Papers, 6). Uppsala, Sweden: Uppsala Universitet. Retrieved May 2, 2007 from http://www.pcr.uu.se/publications/UPRP_pdf/uprp_no_6.pdf
    • (2002) Setting the Agenda of Threats: An Explanatory Model
    • Eriksson, J.1    Noreen, E.2
  • 50
    • 84861178588 scopus 로고    scopus 로고
    • Exec. Order No. 13,228, 3 C.F.R. 796
    • Exec. Order No. 13,228, 3 C.F.R. 796 (2001).
    • (2001)
  • 51
    • 84861120179 scopus 로고    scopus 로고
    • Exec. Order No. 13,231, 66 Fed. Reg. 53,063
    • Exec. Order No. 13,231, 66 Fed. Reg. 53,063 (2001).
    • (2001)
  • 52
    • 84861251379 scopus 로고    scopus 로고
    • Information age state security: New threats to old boundaries
    • November, Retrieved May 2, 2007 from
    • Fisher, U. (2001, November). Information age state security: New threats to old boundaries. Journal for Homeland Security. Retrieved May 2, 2007 from http://www.homelandsecurity.org/journal/articles/fisher.htm
    • (2001) Journal For Homeland Security
    • Fisher, U.1
  • 54
    • 84861178591 scopus 로고    scopus 로고
    • Shunning the frumious bandersnatch: Current literature on information warfare and deterrence
    • Retrieved May 2, 2007 from
    • French, G. S. (2000). Shunning the frumious bandersnatch: Current literature on information warfare and deterrence. The Terrorism Research Center, Inc. Retrieved May 2, 2007 from http://www.terrorism.com
    • (2000) The Terrorism Research Center, Inc
    • French, G.S.1
  • 55
    • 0004218798 scopus 로고
    • Cambridge, England: Cambridge University Press
    • Gamson, W. A. (1992). Talking politics. Cambridge, England: Cambridge University Press.
    • (1992) Talking Politics
    • Gamson, W.A.1
  • 57
    • 84861108106 scopus 로고    scopus 로고
    • September, Leeds, UK: Cyber-Rights & Cyber-Liberties (UK). Retrieved May 2, 2007 from
    • Gladman, B. (1998, September). Wassenaar controls, cyber-crime and information terrorism. Leeds, UK: Cyber-Rights & Cyber-Liberties (UK). Retrieved May 2, 2007 from http://www.cyber-rights.org/crypto/wassenaar.htm
    • (1998) Wassenaar Controls, Cyber-crime and Information Terrorism
    • Gladman, B.1
  • 58
    • 84861178590 scopus 로고    scopus 로고
    • U.S. cybersecurity chief resigns: Amit Yoran, said to be frustrated with progress, gives one-day notice
    • October 1, Retrieved May 2, 2007 from
    • Gross, G. (2004, October 1). U.S. cybersecurity chief resigns: Amit Yoran, said to be frustrated with progress, gives one-day notice. IDG News Service. Retrieved May 2, 2007 from http://www.infoworld.com/article/04/10/01/HNchiefresigns_1.html?DISASTER%20RECOVERY
    • (2004) IDG News Service
    • Gross, G.1
  • 59
    • 0003428657 scopus 로고    scopus 로고
    • Buckingham, England: Open University Press
    • Howarth, D. (2000). Discourse. Buckingham, England: Open University Press.
    • (2000) Discourse
    • Howarth, D.1
  • 60
    • 0007836321 scopus 로고    scopus 로고
    • Emerging challenge: Security and safety in cyberspace
    • J. Arquilla & D. Ronfeldt (Eds.), Santa Monica, CA: RAND
    • Hundley, R. O. & Anderson, R. H. (1997). Emerging challenge: Security and safety in cyberspace. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp: Preparing for conflict in the information age (pp. 231-252). Santa Monica, CA: RAND.
    • (1997) Athena's Camp: Preparing For Conflict In the Information Age , pp. 231-252
    • Hundley, R.O.1    Anderson, R.H.2
  • 61
    • 84861178589 scopus 로고    scopus 로고
    • Cyberterrorism hype
    • October 21, Retrieved May 3, 2007 from
    • Ingles-le Nobel, J. J. (1999, October 21). Cyberterrorism hype. Jane's Intelligence Review. Retrieved May 3, 2007 from http://212.111.49.124/cyberterror/resources/janes/jir0525.htm
    • (1999) Jane's Intelligence Review
    • Ingles-Lenobel, J.J.1
  • 64
    • 84937338220 scopus 로고    scopus 로고
    • Asymmetric threats to the United States
    • Kolet, K. S. (2001). Asymmetric threats to the United States. Comparative Strategy, 20, 277-292.
    • (2001) Comparative Strategy , vol.20 , pp. 277-292
    • Kolet, K.S.1
  • 65
    • 79961041598 scopus 로고    scopus 로고
    • 'The absolute protection of our citizens': Critical infrastructure protection and the practice of Security
    • in press, M. Dunn Cavelty & K. S. Kristensen (Eds.), London: Routledge
    • Kristensen, K. S. (in press). 'The absolute protection of our citizens': Critical infrastructure protection and the practice of Security. In M. Dunn Cavelty & K. S. Kristensen (Eds.), The politics of securing the homeland: Critical infrastructure, risk and securitisation. London: Routledge.
    • The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation
    • Kristensen, K.S.1
  • 66
    • 84911047943 scopus 로고    scopus 로고
    • Clinton gives a final foreign policy speech
    • December 9
    • Lacey, M. (2000, December 9). Clinton gives a final foreign policy speech. The New York Times.
    • (2000) The New York Times
    • Lacey, M.1
  • 68
    • 14844325969 scopus 로고    scopus 로고
    • December, Washington, DC: Center for Strategic and International Studies. Retrieved May 3, 2007 from
    • Lewis, J. A. (2002, December). Assessing the risks of cyber-terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic and International Studies. Retrieved May 3, 2007 from http://www.csis.org/media/csis/pubs/021101_risks_of_cyberterror.pdf
    • (2002) Assessing the Risks of Cyber-terrorism, Cyber War and Other Cyber Threats
    • Lewis, J.A.1
  • 69
    • 0002353043 scopus 로고    scopus 로고
    • The governance of cyberspace: Politics, technology, and global restructuring
    • B. D. Loader (Ed.), London and New York: Routledge
    • Loader, B. D. (1997). The governance of cyberspace: Politics, technology, and global restructuring. In B. D. Loader (Ed.), The governance of cyberspace (pp. 1-19). London and New York: Routledge.
    • (1997) The Governance of Cyberspace , pp. 1-19
    • Loader, B.D.1
  • 70
    • 84861124865 scopus 로고    scopus 로고
    • U.S. cybersecurity chief resigns
    • October 1, Retrieved May 3, 2007 from
    • Mark, R. (2004, October 1). U.S. cybersecurity chief resigns. eSecurity Planet. Retrieved May 3, 2007 from http://www.esecurityplanet.com/trends/article.php/3416161
    • (2004) ESecurity Planet
    • Mark, R.1
  • 72
    • 84861124866 scopus 로고    scopus 로고
    • September 14, (CRS Report for Congress, RL33648). Washington, DC: Congressional Research Service
    • Moteff, J. (2006, September 14). Critical infrastructure: The national asset database. (CRS Report for Congress, RL33648). Washington, DC: Congressional Research Service.
    • (2006) Critical Infrastructure: The National Asset Database
    • Moteff, J.1
  • 73
    • 84861170650 scopus 로고    scopus 로고
    • March 13), (Congressional Research Report for Congress, RL30153). Washington, DC: Congressional Research Service
    • Moteff, J. (2007, March 13). Critical infrastructures: Background, policy, and implementation (Congressional Research Report for Congress, RL30153). Washington, DC: Congressional Research Service.
    • (2007) Critical Infrastructures: Background, Policy and Implementation
    • Moteff, J.1
  • 75
    • 0004184890 scopus 로고
    • National Academy of Sciences (NAS), Computer Science and Telecommunications Board, Washington, DC: National Academy Press
    • National Academy of Sciences (NAS), Computer Science and Telecommunications Board (1991). Computers at risk: Safe computing in the information age. Washington, DC: National Academy Press.
    • (1991) Computers At Risk: Safe Computing In the Information Age
  • 76
    • 84917168540 scopus 로고    scopus 로고
    • Terrorist interest in water supply and SCADA systems
    • National Infrastructure Protection Center (NIPC), 30 January
    • National Infrastructure Protection Center (NIPC). (2002, 30 January). Terrorist interest in water supply and SCADA systems. Information Bulletin 02-001.
    • (2002) Information Bulletin 02-001
  • 77
    • 84861176909 scopus 로고    scopus 로고
    • White Paper prepared for the Defense Intelligence Agency Office for Counterterrorism Analysis. Monterey, CA: Center for the Study of Terrorism and Irregular Warfare (CSTIW)
    • Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G. (1999). Cyberterror: Prospects and implications. White Paper prepared for the Defense Intelligence Agency Office for Counterterrorism Analysis. Monterey, CA: Center for the Study of Terrorism and Irregular Warfare (CSTIW).
    • (1999) Cyberterror: Prospects and Implications
    • Nelson, B.1    Choi, R.2    Iacobucci, M.3    Mitchell, M.4    Gagnon, G.5
  • 79
    • 84876196984 scopus 로고    scopus 로고
    • What a good idea: Frames and ideologies in social movements research
    • Oliver, P. E. & Johnston, H. (2000). What a good idea: Frames and ideologies in social movements research. Mobilization, 5, 37-54.
    • (2000) Mobilization , vol.5 , pp. 37-54
    • Oliver, P.E.1    Johnston, H.2
  • 81
    • 84861124878 scopus 로고    scopus 로고
    • Info war or electronic sabre rattling?
    • September 8, Retrieved May 3, 2007 from
    • Poulsen, K. (1999, September 8). Info war or electronic sabre rattling? ZDNet. Retrieved May 3, 2007 from http://news.zdnet.com/2100-9595_22-515631.html?legacy=zdnn
    • (1999) ZDNet
    • Poulsen, K.1
  • 82
    • 0003994024 scopus 로고    scopus 로고
    • President's Commission on Critical Infrastructure Protection (PCCIP), Washington, DC: Government Printing Office
    • President's Commission on Critical Infrastructure Protection (PCCIP). (1997). Critical foundations: Protecting America's infrastructures. Washington, DC: Government Printing Office.
    • (1997) Critical Foundations: Protecting America's Infrastructures
  • 83
    • 84861170657 scopus 로고    scopus 로고
    • June, Paper presented at the Third International Symposium on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, Washington, DC. Retrieved May 8, 2007 from
    • Rathmell, A., Overill, R., Valeri, L., & Gearson, J. (1997, June). The IW threat from sub-state groups: An interdisciplinary approach. Paper presented at the Third International Symposium on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, Washington, DC. Retrieved May 8, 2007 from http://www.kcl.ac.uk/orgs/icsa/Old/terrori.html
    • (1997) The IW Threat From Sub-state Groups: An Interdisciplinary Approach
    • Rathmell, A.1    Overill, R.2    Valeri, L.3    Gearson, J.4
  • 88
    • 0032148572 scopus 로고    scopus 로고
    • An electronic Pearl Harbor? Not likely
    • Fall, Retrieved May 3, 2007 from
    • Smith, G. (1998, Fall). An electronic Pearl Harbor? Not likely. Issues in Science and Technology, 15. Retrieved May 3, 2007 from http://www.issues.org/15.1/smith.htm
    • (1998) Issues In Science and Technology , vol.15
    • Smith, G.1
  • 89
    • 84861116751 scopus 로고    scopus 로고
    • How vulnerable is our interlinked infrastructure?
    • D. S. Alberts & D. S. Papp (Eds.), Washington DC: National Defense University Press
    • Smith, G. (2000). How vulnerable is our interlinked infrastructure? In D. S. Alberts & D. S. Papp (Eds.), The information age: An anthology of its impacts and consequences (Vol. II, pp. 507-523). Washington DC: National Defense University Press.
    • (2000) The Information Age: An Anthology of Its Impacts and Consequences , vol.2 , pp. 507-523
    • Smith, G.1
  • 90
    • 0002266033 scopus 로고
    • Master Frames and Cycles of Protest
    • Morris, A. D. & Mueller, C. M. (Eds.), New Haven, CT: Yale University Press
    • Snow, D. A. & Benford, R. D. (1992). Master Frames and Cycles of Protest. In Morris, A. D. & Mueller, C. M. (Eds.), Frontiers in social movement theory (pp. 133-155). New Haven, CT: Yale University Press.
    • (1992) Frontiers In Social Movement Theory , pp. 133-155
    • Snow, D.A.1    Benford, R.D.2
  • 93
    • 60449116450 scopus 로고    scopus 로고
    • Improving information security in companies: How to meet the need for threat information
    • in press, M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.), Aldershot, England: Ashgate
    • Suter, M. (in press). Improving information security in companies: How to meet the need for threat information. In M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.), Power and security in the information age: Investigating the role of the state in cyberspace. Aldershot, England: Ashgate.
    • Power and Security In the Information Age: Investigating the Role of the State In Cyberspace
    • Suter, M.1
  • 94
    • 34547283925 scopus 로고    scopus 로고
    • Technical Analysis Group (TAG), Institute for Security Technology Studies, Dartmouth College, November, Hanover, NH: Dartmouth College. Retrieved May 3, 2007 from
    • Technical Analysis Group (TAG), Institute for Security Technology Studies, Dartmouth College (2003, November). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Dartmouth College. Retrieved May 3, 2007 from https://www.ists.dartmouth.edu/TAG/ITB/ITB_032004.pdf
    • (2003) Examining the Cyber Capabilities of Islamic Terrorist Groups
  • 101
    • 84861123557 scopus 로고    scopus 로고
    • The White House, Office of the Press Secretary, May 22, Washington, DC: President of the United States. Retrieved May 3, 2007 from
    • The White House, Office of the Press Secretary (1998a, May 22). Fact Sheet. Combating Terrorism: Presidential Decision Directive 62. Washington, DC: President of the United States. Retrieved May 3, 2007 from http://www.fas.org/irp/offdocs/pdd-62.htm
    • (1998) Fact Sheet. Combating Terrorism: Presidential Decision Directive 62
  • 104
    • 85048941387 scopus 로고    scopus 로고
    • Al Qaeda and the internet: The danger of cyberplanning
    • Spring., (Spring)
    • Thomas, T. L. (2003, Spring). Al Qaeda and the Internet: The danger of cyberplanning. Parameters (Spring), 112-123.
    • (2003) Parameters , pp. 112-123
    • Thomas, T.L.1
  • 105
    • 34247227158 scopus 로고    scopus 로고
    • Does the Internet create democracy?
    • Thornton, A. (2001). Does the Internet create democracy? Ecquid Novi, 22, 126-147.
    • (2001) Ecquid Novi , vol.22 , pp. 126-147
    • Thornton, A.1
  • 108
    • 0008783791 scopus 로고    scopus 로고
    • (Working Paper). Hanover: Institute for Security Technology Studies at Dartmouth College. Retrieved May 3, 2007 from
    • Vatis, M. A. (2001). Cyber attacks during the war on terrorism: A predictive analysis. (Working Paper). Hanover: Institute for Security Technology Studies at Dartmouth College. Retrieved May 3, 2007 from http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf
    • (2001) Cyber Attacks During the War On Terrorism: A Predictive Analysis
    • Vatis, M.A.1
  • 109
    • 84911084727 scopus 로고    scopus 로고
    • Nation's cybersecurity chief abruptly quits DHS post: 'I'm not a long-term government kind of guy,' says Amit Yoran
    • October 1, Retrieved May 3, 2007 from
    • Verton, D. (2004, October 1). Nation's cybersecurity chief abruptly quits DHS post: 'I'm not a long-term government kind of guy,' says Amit Yoran. Computerworld. Retrieved May 3, 2007 from http://www.computerworld.com/managementtopics/management/story/0,10801,96369,00.html
    • (2004) Computerworld
    • Verton, D.1
  • 110
    • 0001491868 scopus 로고
    • Securitization and desecuritization
    • R. Lipschutz (Ed.), New York: Columbia University Press
    • Wæver, O. (1995). Securitization and desecuritization. In R. Lipschutz (Ed.), On security (pp. 46-86). New York: Columbia University Press.
    • (1995) On Security , pp. 46-86
    • Wæver, O.1
  • 111
    • 84861108117 scopus 로고    scopus 로고
    • Will next terror attack be electronic? Experts fear terrorists may attack through cyberspace
    • September 16, Retrieved May 3, 2007 from
    • Wallace, C. (2002, September 16). Will next terror attack be electronic? Experts fear terrorists may attack through cyberspace. ABC News.com. Retrieved May 3, 2007 from http://abcnews.go.com/WNT/story?id=130108&page=1
    • (2002) ABC News.com
    • Wallace, C.1
  • 112
    • 0001475720 scopus 로고
    • The renaissance of security studies
    • Walt, S. (1991). The renaissance of security studies. International Studies Quarterly, 35, 211-239.
    • (1991) International Studies Quarterly , vol.35 , pp. 211-239
    • Walt, S.1
  • 114
    • 33745594976 scopus 로고    scopus 로고
    • March, (United States Institute of Peace, Special Report 116).Washington, DC: United States Institute of Peace
    • Weimann, G. (2004a, March). www.terror.net. How modern terrorism uses the Internet. (United States Institute of Peace, Special Report 116).Washington, DC: United States Institute of Peace.
    • (2004) Www.terror.net. How Modern Terrorism Uses the Internet
    • Weimann, G.1
  • 115
    • 68249109477 scopus 로고    scopus 로고
    • United States Institute of Peace, Special Report 119. Washington, DC: United States Institute of Peace
    • Weimann, G. (2004b). Cyberterrorism-How real is the threat? (United States Institute of Peace, Special Report 119). Washington, DC: United States Institute of Peace.
    • (2004) Cyberterrorism-How Real is The Threat?
    • Weimann, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.