메뉴 건너뛰기




Volumn 24, Issue 2, 2012, Pages 337-354

Exploring the intersections of technology, crime, and terror

Author keywords

Cybercrime; Cyberterror; Hacking; Hacktivism; Malware

Indexed keywords


EID: 84859315125     PISSN: 09546553     EISSN: 15561836     Source Type: Journal    
DOI: 10.1080/09546553.2011.648350     Document Type: Article
Times cited : (58)

References (178)
  • 2
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • ed. David S. Wall (New York: Routledge
    • David S. Wall, "Cybercrimes and the Internet," in Crime and the Internet, ed. David S. Wall (New York: Routledge, 2001), 1-17.
    • (2001) Crime and The Internet , pp. 1-17
    • Wall, D.S.1
  • 3
    • 84925759832 scopus 로고    scopus 로고
    • The Electronic Cloak: Secret Sexual Deviance in Cybersociety,'
    • ed. Yvonne Jewkes (Portland, OR: Willan Publishing
    • Heather DiMarco, "The Electronic Cloak: Secret Sexual Deviance in Cybersociety," in Dot.cons: Crime, Deviance, and Identity on the Internet, ed. Yvonne Jewkes (Portland, OR: Willan Publishing), 53-67.
    • Dot.cons: Crime, Deviance, and Identity On the Internet , pp. 53-67
    • Dimarco, H.1
  • 6
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures
    • Thomas J. Holt, "Subcultural Evolution? Examining the Influence of On- and Off-line Experiences on Deviant Subcultures," Deviant Behavior 28 (2007): 171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 8
    • 0242440508 scopus 로고    scopus 로고
    • Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
    • ed. John Arquilla and David F. Ronfeldt (Santa Monica, CA: RAND
    • Dorothy E. Denning, "Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy," in Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. John Arquilla and David F. Ronfeldt (Santa Monica, CA: RAND, 2001), 239-288
    • (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy , pp. 239-288
    • Denning, D.E.1
  • 9
    • 0034561329 scopus 로고    scopus 로고
    • From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism
    • Jerrold M. Post, Keven G. Ruby, and Eric D. Shaw, "From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism," Terrorism and Political Violence 12 (2000): 97-122.
    • (2000) Terrorism and Political Violence , vol.12 , pp. 97-122
    • Post, J.M.1    Ruby, K.G.2    Shaw, E.D.3
  • 11
    • 0004095933 scopus 로고    scopus 로고
    • 2nd ed. (New York: Columbia University Press
    • Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University Press, 2006)
    • (2006) Inside Terrorism
    • Hoffman, B.1
  • 12
    • 78650508074 scopus 로고    scopus 로고
    • The Road to Media Jihad: The Propaganda Actions of Al Qaeda in the Islamic Maghreb
    • Manuel Soriano, "The Road to Media Jihad: The Propaganda Actions of Al Qaeda in the Islamic Maghreb," Terrorism and Political Violence 23 (2010): 72-88.
    • (2010) Terrorism and Political Violence , vol.23 , pp. 72-88
    • Soriano, M.1
  • 14
    • 79551697398 scopus 로고    scopus 로고
    • A View of Cyberterrorism Five Years Later
    • ed. Kenneth Himmaed (Sudbury, MA: Jones and Bartlett
    • Dorothy Denning, "A View of Cyberterrorism Five Years Later," in Internet Security: Hacking, Counterhacking, and Society, ed. Kenneth Himmaed (Sudbury, MA: Jones and Bartlett, 2006), 123-139
    • (2006) Internet Security: Hacking, Counterhacking, and Society , pp. 123-139
    • Denning, D.1
  • 15
    • 84859322573 scopus 로고    scopus 로고
    • Cyber Terrorism: Menace or Myth?
    • ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington DC: National Defense University
    • Irving Lachow, "Cyber Terrorism: Menace or Myth?," in Cyberpower and National Security, ed. Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington DC: National Defense University, 2009), 123-139.
    • (2009) Cyberpower and National Security , pp. 123-139
    • Lachow, I.1
  • 16
    • 0035381384 scopus 로고    scopus 로고
    • Virtual Criminality: Old Wine in New Bottles?
    • Peter N. Grabosky, "Virtual Criminality: Old Wine in New Bottles?, Social and Legal Studies 10 (2001): 243-249.
    • (2001) Social and Legal Studies , vol.10 , pp. 243-249
    • Grabosky, P.N.1
  • 17
    • 0007740589 scopus 로고    scopus 로고
    • Catching Cybercriminals: Policing the Internet
    • David S. Wall, "Catching Cybercriminals: Policing the Internet," Computers & Technology 12 (1998): 201-218.
    • (1998) Computers & Technology , vol.12 , pp. 201-218
    • Wall, D.S.1
  • 25
    • 84859353993 scopus 로고    scopus 로고
    • Computer Security Institute, Computer Crime and Security Survey
    • Computer Security Institute, Computer Crime and Security Survey, 2010, http://www.cybercrime.gov/FBI2010.pdf.
    • (2010)
  • 26
    • 84859296858 scopus 로고    scopus 로고
    • Computer Security Institute, Computer Crime and Security Survey
    • Computer Security Institute, Computer Crime and Security Survey, 2008, http://www.cybercrime.gov/FBI2008.pdf.
    • (2008)
  • 27
    • 84859296866 scopus 로고    scopus 로고
    • Internet Crime Complaint Center, IC3 2009 Internet Crime Report
    • Internet Crime Complaint Center, IC3 2009 Internet Crime Report, http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf.
  • 28
    • 84859315644 scopus 로고    scopus 로고
    • IDATE, Taking Advantage of Peer-to-Peer: What Is at Stake for the Content Industry?
    • IDATE, Taking Advantage of Peer-to-Peer: What Is at Stake for the Content Industry? (2009), http://www.idate.fr/an/_qdn/an-03/IF282/index_a.htm.
    • (2009)
  • 29
    • 57649120953 scopus 로고    scopus 로고
    • Examining the Applicability of Lifestyle- Routine Activities Theory for Cybercrime Victimization
    • Thomas J. Holt and Adam M. Bossler, "Examining the Applicability of Lifestyle- Routine Activities Theory for Cybercrime Victimization," Deviant Behavior 30 (2009): 1-25.
    • (2009) Deviant Behavior , vol.30 , pp. 1-25
    • Holt, T.J.1    Bossler, A.M.2
  • 35
    • 84859329159 scopus 로고    scopus 로고
    • Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts
    • ed. Thomas J. Holt (Raleigh, NC: Carolina Academic Press
    • Marjie T. Britz, "Terrorism and Technology: Operationalizing Cyberterrorism and Identifying Concepts," in Crime On-Line: Correlates, Causes, and Context, ed. Thomas J. Holt (Raleigh, NC: Carolina Academic Press, 2010), 193-220
    • (2010) Crime On-Line: Correlates, Causes, and Context , pp. 193-220
    • Britz, M.T.1
  • 50
    • 4944234107 scopus 로고    scopus 로고
    • Frameworks for Conceptualising Terrorism
    • Alex P. Schmid, "Frameworks for Conceptualising Terrorism," Terrorism and Political Violence 16 (2004): 197-221.
    • (2004) Terrorism and Political Violence , vol.16 , pp. 197-221
    • Schmid, A.P.1
  • 51
    • 3042691503 scopus 로고    scopus 로고
    • The Earth Liberation Front and Environmental Terrorism
    • Stefan H. Leader and Peter Probst, "The Earth Liberation Front and Environmental Terrorism," Terrorism and Political Violence 15 (2003): 37-58.
    • (2003) Terrorism and Political Violence , vol.15 , pp. 37-58
    • Leader, S.H.1    Probst, P.2
  • 56
    • 84859341068 scopus 로고    scopus 로고
    • Cyberterrorism-Fact or Fancy?
    • Mark M. Pollitt, "Cyberterrorism-Fact or Fancy?" Computer Fraud & Security 2 (1998): 8-10.
    • (1998) Computer Fraud & Security , vol.2 , pp. 8-10
    • Pollitt, M.M.1
  • 57
    • 84859341068 scopus 로고    scopus 로고
    • Cyberterrorism-Fact or Fancy?
    • Mark M. Pollitt, "Cyberterrorism-Fact or Fancy?" Computer Fraud & Security 2 (1998): 8-10.
    • (1998) Computer Fraud & Security , vol.2 , pp. 8-10
    • Pollitt, M.M.1
  • 59
    • 84859315641 scopus 로고    scopus 로고
    • see note 3 above
    • Denning, "Cyberconflict" (see note 3 above), p. 178
    • Cyberconflict" , pp. 178
    • Denning1
  • 65
    • 77956038407 scopus 로고    scopus 로고
    • Transferring Subcultural Knowledge Online: Practices and Beliefs of Persistent Digital Pirates
    • Thomas J. Holt and Heith Copes, "Transferring Subcultural Knowledge Online: Practices and Beliefs of Persistent Digital Pirates," Deviant Behavior 31 (2010): 625-654.
    • (2010) Deviant Behavior , vol.31 , pp. 625-654
    • Holt, T.J.1    Copes, H.2
  • 73
    • 84859371119 scopus 로고    scopus 로고
    • The Women of Stormfront: An Examination of White Nationalist Discussion Threads on the Internet
    • Tammy Castle, "The Women of Stormfront: An Examination of White Nationalist Discussion Threads on the Internet," Internet Journal of Criminology (2011), http://www.internetjournalofcriminology.com/Castle_Chevalier_The_Women_of_Stormfront_An_Examination_of_White_Nationalist_Discussion_Threads.pdf
    • (2011) Internet Journal of Criminology
    • Castle, T.1
  • 74
    • 84859353976 scopus 로고    scopus 로고
    • Stormfront website. www.stormfront.org
  • 77
    • 84859315632 scopus 로고    scopus 로고
    • See the website http://www.newsaxon.comfordetails.
  • 78
    • 54349105969 scopus 로고    scopus 로고
    • Applying the Notion of Noise to Countering Online Terrorism
    • Gabriel Weimann and Katharina Von Knop, "Applying the Notion of Noise to Countering Online Terrorism," Studies in Conflict and Terrorism 23 (2009): 883-902.
    • (2009) Studies In Conflict and Terrorism , vol.23 , pp. 883-902
    • Weimann, G.1    von Knop, K.2
  • 82
    • 84859296851 scopus 로고    scopus 로고
    • Newsweek, 19 December 2007
    • Vivian Salma, "Ask a Terrorist," Newsweek, 19 December 2007, http://www.newsweek.com/2007/12/19/as-a-terrorist.html.
    • Ask a Terrorist,"
    • Salma, V.1
  • 83
    • 84859353973 scopus 로고    scopus 로고
    • See http://www.resistancerecords.com
  • 85
    • 84859353971 scopus 로고    scopus 로고
    • For a description of this and several other terrorist-created video games
    • For a description of this and several other terrorist-created video games.
  • 86
    • 76149110142 scopus 로고    scopus 로고
    • Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip Hop, and the World Wide Web
    • ed. James J.F. Forest (Westport, CT: Praeger
    • Madeline Gruen, "Innovative Recruitment and Indoctrination Tactics by Extremists: Video Games, Hip Hop, and the World Wide Web," in The Making of a Terrorist, ed. James J.F. Forest (Westport, CT: Praeger, 2005).
    • (2005) The Making of a Terrorist
    • Gruen, M.1
  • 92
    • 84859369066 scopus 로고    scopus 로고
    • Social Dynamics and the Future of Technology-Driven Crime
    • ed.Thomas J. Holt and Bernadette Schell (Hershey PA: IGI-Global
    • Max Kilger, "Social Dynamics and the Future of Technology-Driven Crime," in Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications, ed.Thomas J. Holt and Bernadette Schell (Hershey PA: IGI-Global, 2010), 205-227.
    • (2010) Corporate Hacking and Technology Driven Crime: Social Dynamics and Implications , pp. 205-227
    • Kilger, M.1
  • 97
    • 84859360433 scopus 로고    scopus 로고
    • see note 60 above
    • Taylor, Hackers (see note 60 above).
    • Hackers
    • Taylor1
  • 98
    • 84859360433 scopus 로고    scopus 로고
    • see note 60 above
    • Taylor, Hackers (see note 60 above).
    • Hackers
    • Taylor1
  • 103
    • 84859353967 scopus 로고    scopus 로고
    • Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008
    • Thomas J. Holt, "Examining the Origins of Malware," Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008.
    • Examining the Origins of Malware,
    • Holt, T.J.1
  • 104
    • 84859371128 scopus 로고    scopus 로고
    • Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008
    • Thomas J. Holt, "Examining the Origins of Malware," Paper presented at the Department of Defense Cyber Crime Conference, Saint Louis, MO, January 2008.
    • Examining the Origins of Malware,
    • Holt, T.J.1
  • 105
    • 77958467314 scopus 로고    scopus 로고
    • Paper presented at the International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska Omaha, April 2008
    • Thomas J. Holt, Joshua B. Soles, and Ludmilla Leslie, "Characterizing Malware Writers and Computer Attackers in Their Own Words," Paper presented at the International Conference on Information Warfare and Security, Peter Kiewit Institute, University of Nebraska Omaha, April 2008.
    • Characterizing Malware Writers and Computer Attackers In their Own Words,
    • Holt, T.J.1    Soles, J.B.2    Leslie, L.3
  • 106
    • 84859351151 scopus 로고    scopus 로고
    • The Attack Dynamics of Political and Religiously Motivated Hackers
    • ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute
    • Thomas J. Holt, "The Attack Dynamics of Political and Religiously Motivated Hackers," in Cyber Infrastructure Protection, ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute, 2009), 161-182.
    • (2009) Cyber Infrastructure Protection , pp. 161-182
    • Holt, T.J.1
  • 107
    • 84859351151 scopus 로고    scopus 로고
    • The Attack Dynamics of Political and Religiously Motivated Hackers
    • ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute
    • Thomas J. Holt, "The Attack Dynamics of Political and Religiously Motivated Hackers," in Cyber Infrastructure Protection, ed. Tarek Saadawi and Louis Jordan (New York: Strategic Studies Institute, 2009), 161-182.
    • (2009) Cyber Infrastructure Protection , pp. 161-182
    • Holt, T.J.1
  • 110
    • 84859360433 scopus 로고    scopus 로고
    • see note 60 above
    • Taylor, Hackers (see note 60 above).
    • Hackers
    • Taylor1
  • 111
    • 84859360433 scopus 로고    scopus 로고
    • see note 60 above
    • Taylor, Hackers (see note 60 above).
    • Hackers
    • Taylor1
  • 113
    • 84859371123 scopus 로고    scopus 로고
    • An Interview with Anonymous
    • 29 September, 2010
    • Sean Paul Correll, "An Interview with Anonymous," PandaLabs Blog, 29 September, 2010, http://pandalabs.pandasecurity.com/an-interview-with-anonymous/.
    • PandaLabs Blog
    • Correll, S.P.1
  • 120
    • 46449106851 scopus 로고    scopus 로고
    • BBC News, 8 February 8, 2006
    • Michael Ward, "Anti-Cartoon Protests Go Online," BBC News, 8 February 8, 2006, http://news.bbc.co.uk/2/hi/technology/4691518.stm.
    • Anti-Cartoon Protests Go Online,"
    • Ward, M.1
  • 121
    • 46449106851 scopus 로고    scopus 로고
    • BBC News, 8 February 8, 2006
    • Michael Ward, "Anti-Cartoon Protests Go Online," BBC News, 8 February 8, 2006, http://news.bbc.co.uk/2/hi/technology/4691518.stm.
    • Anti-Cartoon Protests Go Online,"
    • Ward, M.1
  • 124
    • 84859338497 scopus 로고    scopus 로고
    • Zero Day: Coordinated Russia vs Georgia cyber attack in progress
    • 11 August 2008
    • Ryan Naraine and Dancho Danchev, "Zero Day: Coordinated Russia vs Georgia cyber attack in progress," ZDNet, 11 August 2008, http://www.zdnet.com/blog/security/coordinated-russia-vs-georgia-cyber-attack-in-progress/1670.
    • ZDNet
    • Naraine, R.1    Danchev, D.2
  • 132
    • 79251638534 scopus 로고    scopus 로고
    • Stuxnet Malware is 'Weapon' out to Destroy... Iran's Bushehr Nuclear Plant
    • 21 September, 2010
    • Mark Clayton, "Stuxnet Malware is 'Weapon' out to Destroy... Iran's Bushehr Nuclear Plant," Christian Science Monitor, 21 September, 2010, http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant.
    • Christian Science Monitor
    • Clayton, M.1
  • 140
    • 84859371116 scopus 로고    scopus 로고
    • DHS Fears a Modified Stuxnet Could Attack US Infrastructure
    • 20 July, 2011
    • Kim Zetter, "DHS Fears a Modified Stuxnet Could Attack US Infrastructure," Wired Threat Level, 20 July, 2011, http://www.wired.com/threatlevel/2011/07/dhs-fearsstuxnet-attacks/.
    • Wired Threat Level
    • Zetter, K.1
  • 156
    • 84879145204 scopus 로고    scopus 로고
    • In 'Anonymous' Raids, Feds Work From List of Top 1,000 Protesters
    • 26 July, 2011
    • Kevin Poulsen, "In 'Anonymous' Raids, Feds Work From List of Top 1,000 Protesters," Wired, 26 July, 2011, http://www.wired.com/threatlevel/2011/07/op_payback/.
    • Wired
    • Poulsen, K.1
  • 159
    • 84859304771 scopus 로고    scopus 로고
    • Department of Defense, Washington DC: Department of Defense
    • Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf.
    • (2011) Department of Defense Strategy For Operating In Cyberspace
  • 160
    • 84859304771 scopus 로고    scopus 로고
    • Department of Defense, Washington DC: Department of Defense
    • Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf.
    • (2011) Department of Defense Strategy For Operating In Cyberspace
  • 161
    • 84859304771 scopus 로고    scopus 로고
    • Department of Defense, Washington DC: Department of Defense
    • Department of Defense. Department of Defense Strategy for Operating in Cyberspace, (Washington DC: Department of Defense, 2011), http://www.defense.gov/news/d20110714cyber.pdf.
    • (2011) Department of Defense Strategy For Operating In Cyberspace
  • 166
    • 80052980820 scopus 로고    scopus 로고
    • On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory
    • Adam M. Bossler and Thomas J. Holt, "On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory," International Journal of Cyber Criminology 3 (2010): 400-420
    • (2010) International Journal of Cyber Criminology , vol.3 , pp. 400-420
    • Bossler, A.M.1    Holt, T.J.2
  • 173
    • 84859338457 scopus 로고    scopus 로고
    • Using the Internet to Uncover Terrorism's Root Causes
    • ed. James J. F. Forest (Westport, CT: Praeger
    • Joshua Sinai, "Using the Internet to Uncover Terrorism's Root Causes," in Influence Warfare, ed. James J. F. Forest (Westport, CT: Praeger, 2009).
    • (2009) Influence Warfare
    • Sinai, J.1
  • 174
    • 77958509140 scopus 로고    scopus 로고
    • Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using Online Data
    • Thomas J. Holt, "Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using Online Data," Journal of Criminal Justice Education, 21 (2010): 300-321.
    • (2010) Journal of Criminal Justice Education , vol.21 , pp. 300-321
    • Holt, T.J.1
  • 176
    • 77949555353 scopus 로고    scopus 로고
    • Exploring Stolen Data Markets On-line: Products and Market Forces
    • Thomas J. Holt and Eric Lampke, "Exploring Stolen Data Markets On-line: Products and Market Forces," Criminal Justice Studies 23 (2010): 33-50.
    • (2010) Criminal Justice Studies , vol.23 , pp. 33-50
    • Holt, T.J.1    Lampke, E.2
  • 177
    • 84859319388 scopus 로고    scopus 로고
    • Terror Webmaster Sentenced in Britain
    • 5 July 2007
    • Brian Krebs, "Terror Webmaster Sentenced in Britain," Washington Post, 5 July 2007
    • Washington Post
    • Krebs, B.1
  • 178
    • 78149334726 scopus 로고    scopus 로고
    • Data Breaches: What the Underground World of "Carding" Reveals
    • Kimberly Kiefer Peretti, "Data Breaches: What the Underground World of "Carding" Reveals," Santa Clara Computer and High Technology Law Journal 25 (2009): 375-413.
    • (2009) Santa Clara Computer and High Technology Law Journal , vol.25 , pp. 375-413
    • Peretti, K.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.