메뉴 건너뛰기




Volumn 21, Issue 2, 2012, Pages 102-114

How Can We Deter Cyber Terrorism?

Author keywords

cyber deterrence; cyber terrorism; cyber terrorist; information security; legal

Indexed keywords

CYBER DETERRENCE; CYBER TERRORISM; CYBER TERRORIST; IDENTIFICATION PROBABILITY; LEGAL; TECHNICAL CHALLENGES;

EID: 84861629571     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393555.2011.647250     Document Type: Article
Times cited : (22)

References (56)
  • 1
    • 84861644529 scopus 로고    scopus 로고
    • Cyber attacks against critical U.S. networks rising at a faster rate
    • Aitoro, J. R. (2009a). Cyber attacks against critical U.S. networks rising at a faster rate. http://www.nextgov.com/nextgov/ng_20091208_4177.php.
    • (2009)
    • Aitoro, J.R.1
  • 4
    • 0000787258 scopus 로고
    • Crime and punishment: An economic approach
    • Becker, S. G. 1968. Crime and punishment: An economic approach. Journal of Politic Economy, 76(2): 167-217.
    • (1968) Journal of Politic Economy , vol.76 , Issue.2 , pp. 167-217
    • Becker, S.G.1
  • 7
    • 0024162137 scopus 로고
    • The economics of crime deterrence: A survey of theory and evidence
    • Cameron, S. 1988. The economics of crime deterrence: A survey of theory and evidence. Kyklos, 41(2): 301-323.
    • (1988) Kyklos , vol.41 , Issue.2 , pp. 301-323
    • Cameron, S.1
  • 8
    • 84937328218 scopus 로고    scopus 로고
    • Reopening the deterrence debate: Thinking about a peaceful and prosperous tomorrow
    • Carns, M. P. C. 2001. Reopening the deterrence debate: Thinking about a peaceful and prosperous tomorrow. Small Wars & Insurgencies, 11(2): 7-16.
    • (2001) Small Wars & Insurgencies , vol.11 , Issue.2 , pp. 7-16
    • Carns, M.P.C.1
  • 9
    • 70449589193 scopus 로고    scopus 로고
    • Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears
    • Chu, H., Deng, D., Chao, H. and Huang, Y. 2009. Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears. Journal of Universal Computer Science, 15(12): 2373-2386.
    • (2009) Journal of Universal Computer Science , vol.15 , Issue.12 , pp. 2373-2386
    • Chu, H.1    Deng, D.2    Chao, H.3    Huang, Y.4
  • 10
    • 0037401061 scopus 로고    scopus 로고
    • Semiotic emergent framework to address the reality of cyber terrorism
    • Desouza, K. C. and Hensgen, T. 2003. Semiotic emergent framework to address the reality of cyber terrorism. Technological Forecasting and Social Change, 70(4): 385-396.
    • (2003) Technological Forecasting and Social Change , vol.70 , Issue.4 , pp. 385-396
    • Desouza, K.C.1    Hensgen, T.2
  • 12
    • 3943076566 scopus 로고    scopus 로고
    • Cyber terrorism, computer crime, and reality
    • Foltz, C. B. 2004. Cyber terrorism, computer crime, and reality. Information Management & Computer Security, 12(2/3): 154-166.
    • (2004) Information Management & Computer Security , vol.12 , Issue.2-3 , pp. 154-166
    • Foltz, C.B.1
  • 15
    • 3943054719 scopus 로고    scopus 로고
    • Politicians speak out on cyber terrorism
    • Gengler, B. 1999. Politicians speak out on cyber terrorism. Network Security, 1999(10): 6
    • (1999) Network Security , vol.1999 , Issue.10 , pp. 6
    • Gengler, B.1
  • 16
    • 0031315435 scopus 로고    scopus 로고
    • Deterring the terrorist: A psychological evaluation of different strategies for deterring terrorism
    • Ginges, J. 1997. Deterring the terrorist: A psychological evaluation of different strategies for deterring terrorism. Terrorism and Political Violence, 9(1): 170-185.
    • (1997) Terrorism and Political Violence , vol.9 , Issue.1 , pp. 170-185
    • Ginges, J.1
  • 17
    • 0036429285 scopus 로고    scopus 로고
    • Cyberterrorism?
    • Gordon, S. and Ford, R. 2002a. Cyberterrorism?. Computer & Security, 21(7): 636-647.
    • (2002) Computer & Security , vol.21 , Issue.7 , pp. 636-647
    • Gordon, S.1    Ford, R.2
  • 18
    • 0347869861 scopus 로고    scopus 로고
    • Organizing to minimize a cyber-terrorist threat?
    • Griffith, D. A. 1999. Organizing to minimize a cyber-terrorist threat?. Marketing Management, 8(2): 9-15.
    • (1999) Marketing Management , vol.8 , Issue.2 , pp. 9-15
    • Griffith, D.A.1
  • 19
    • 34547798962 scopus 로고    scopus 로고
    • Genetic programming for prevention of cyber terrorism through dynamic and evolving intrusion detection
    • Hansen, J. V., Lowry, P. B., Meservy, R. and McDonald, D. 2005. Genetic programming for prevention of cyber terrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4): 1362-1374.
    • (2005) Decision Support Systems , vol.43 , Issue.4 , pp. 1362-1374
    • Hansen, J.V.1    Lowry, P.B.2    Meservy, R.3    McDonald, D.4
  • 20
    • 0002019023 scopus 로고    scopus 로고
    • An arsenal of believers: Talking to the human bombs
    • Hassan, N. 2001. An arsenal of believers: Talking to the human bombs. The New Yorker, 77(36)
    • (2001) The New Yorker , vol.77 , Issue.36
    • Hassan, N.1
  • 21
    • 84861602747 scopus 로고    scopus 로고
    • The impact of cyber terrorism on investment for information system security
    • New Orleans, LA: Proceedings of the 40th Annual Meeting of Decision Science Institute
    • Hua, J. and Bapna, S. 2009. "The impact of cyber terrorism on investment for information system security". New Orleans, LA: Proceedings of the 40th Annual Meeting of Decision Science Institute.
    • (2009)
    • Hua, J.1    Bapna, S.2
  • 22
  • 25
    • 2442602908 scopus 로고    scopus 로고
    • Education, poverty, political violence, and terrorism: Is there a connection?
    • Krueger, A. and Maleckova, J. 2003. Education, poverty, political violence, and terrorism: Is there a connection?. Journal of Economic Perspectives, 17(4): 119-144.
    • (2003) Journal of Economic Perspectives , vol.17 , Issue.4 , pp. 119-144
    • Krueger, A.1    Maleckova, J.2
  • 27
    • 85042402319 scopus 로고    scopus 로고
    • The origins of new terrorism
    • Morgan, M. J. 2004. The origins of new terrorism. Parameters, 34: 9-42.
    • (2004) Parameters , vol.34 , pp. 9-42
    • Morgan, M.J.1
  • 28
    • 84861639980 scopus 로고    scopus 로고
    • Morris, D. A. (2001). Tracking a computer hacker. http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/Web%20Papers/tracking_a_computer_hacker.doc.
    • (2001) Tracking a computer hacker
    • Morris, D.A.1
  • 30
    • 38049165610 scopus 로고    scopus 로고
    • Theory of deterrence and individual behavior. Can lawsuits control file sharing on the Internet?
    • Oksanen, V. and Valimaki, M. 2007. Theory of deterrence and individual behavior. Can lawsuits control file sharing on the Internet?. Review of Law and Economics, 3(3): 693-714.
    • (2007) Review of Law and Economics , vol.3 , Issue.3 , pp. 693-714
    • Oksanen, V.1    Valimaki, M.2
  • 32
    • 84861616753 scopus 로고    scopus 로고
    • Principle of cyber-warfare
    • West Point, NY: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
    • Parks, R. C. and Duggan, D. P. June 2001. "Principle of cyber-warfare". June, West Point, NY: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security.
    • (2001)
    • Parks, R.C.1    Duggan, D.P.2
  • 35
    • 0009124330 scopus 로고
    • How optimal penalties change with the amount of harm
    • Rasmusen, E. 1995. How optimal penalties change with the amount of harm. International Review of Law and Economics, 15(1): 101-108.
    • (1995) International Review of Law and Economics , vol.15 , Issue.1 , pp. 101-108
    • Rasmusen, E.1
  • 36
    • 28444443053 scopus 로고    scopus 로고
    • Do "bad boys" really get the girls? Delinquency as a cause and consequence of dating behavior among adolescents
    • Rebellon, C. and Manasse, M. 2004. Do "bad boys" really get the girls? Delinquency as a cause and consequence of dating behavior among adolescents. Justice Quarterly, 21(2): 355-390.
    • (2004) Justice Quarterly , vol.21 , Issue.2 , pp. 355-390
    • Rebellon, C.1    Manasse, M.2
  • 39
    • 84903667395 scopus 로고    scopus 로고
    • Philadelphia, PA: University of Pennsylvania Press
    • Sageman, M. 2004. Understanding terror networks, Philadelphia, PA: University of Pennsylvania Press.
    • (2004) Understanding terror networks
    • Sageman, M.1
  • 40
    • 29444436912 scopus 로고
    • Can computer crime be deterred?
    • Sherizen, S. 1995. Can computer crime be deterred?. Security Journal, 6: 177-181.
    • (1995) Security Journal , vol.6 , pp. 177-181
    • Sherizen, S.1
  • 41
    • 33847372060 scopus 로고    scopus 로고
    • Cybercrime & misdemeanors: A reevaluation of the computer fraud and abuse act
    • Skibell, R. 2003. Cybercrime & misdemeanors: A reevaluation of the computer fraud and abuse act. Berkeley Technology Law Journal, 18: 909-944.
    • (2003) Berkeley Technology Law Journal , vol.18 , pp. 909-944
    • Skibell, R.1
  • 43
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W. and Welke, R. J. 1998. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4): 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 46
    • 84861639981 scopus 로고    scopus 로고
    • U.S. Government. (2009). 2009 report to Congress of the U.S.-China economic and security review commission
    • U.S. Government. (2009). 2009 report to Congress of the U.S.-China economic and security review commission. http://www.uscc.gov/annual_report/2009/annual_report_full_09.pdf
  • 47
    • 84861618786 scopus 로고    scopus 로고
    • US-CERT. (2005). Vulnerabilities in TCP
    • US-CERT. (2005). Vulnerabilities in TCP. http://www.us-cert.gov/cas/techalerts/TA04-111A.html
  • 48
    • 54049133723 scopus 로고    scopus 로고
    • Harbin, China: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing
    • Velasco, E., Chen, W., Ji, P. and Hsieh, R. August 2008. Challenges of location tracking techniques in wireless forensics, August, Harbin, China: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
    • (2008) Challenges of location tracking techniques in wireless forensics
    • Velasco, E.1    Chen, W.2    Ji, P.3    Hsieh, R.4
  • 50
    • 12944300212 scopus 로고    scopus 로고
    • The mind of terrorist: A review and critique of psychological approach
    • Victoroff, J. 2005. The mind of terrorist: A review and critique of psychological approach. The Journal of Conflict Resolution, 49(1): 3-41.
    • (2005) The Journal of Conflict Resolution , vol.49 , Issue.1 , pp. 3-41
    • Victoroff, J.1
  • 51
    • 77955740556 scopus 로고    scopus 로고
    • Cyber terrorism: Legal principle and the law in the United Kingdom
    • Walker, C. 2006. Cyber terrorism: Legal principle and the law in the United Kingdom. Penn State Law Review, 110: 625-665.
    • (2006) Penn State Law Review , vol.110 , pp. 625-665
    • Walker, C.1
  • 52
    • 84861620399 scopus 로고    scopus 로고
    • U.S. vulnerable to cyber terrorism
    • Wehde, E. 1998. U.S. vulnerable to cyber terrorism. Computer Fraud & Security, 1: 6-7.
    • (1998) Computer Fraud & Security , vol.1 , pp. 6-7
    • Wehde, E.1
  • 53
    • 22744443906 scopus 로고    scopus 로고
    • A site where hackers are welcome: Using hack-in contests to shape preferences and deter computer crime
    • Wible, B. 2003. A site where hackers are welcome: Using hack-in contests to shape preferences and deter computer crime. The Yale Law Journal, 112(6): 1577-1623.
    • (2003) The Yale Law Journal , vol.112 , Issue.6 , pp. 1577-1623
    • Wible, B.1
  • 56
    • 0004221332 scopus 로고
    • Chicago, IL: University of Chicago Press
    • Zimring, F. and Hawkins, G. 1973. Deterrence, Chicago, IL: University of Chicago Press.
    • (1973) Deterrence
    • Zimring, F.1    Hawkins, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.