메뉴 건너뛰기




Volumn , Issue , 2010, Pages 51-78

Terrorism and the internet: New threats posed by cyberterrorism and terrorist use of the internet

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84885704170     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-89291-7_3     Document Type: Chapter
Times cited : (22)

References (68)
  • 1
    • 84885798705 scopus 로고    scopus 로고
    • AFP News Agency [Electronic Version] 12.12.2005. Retrieved April 2008
    • AFP News Agency. (2005). Hacker Attacks in US Linked to Chinese Military [Electronic Version]. Breitbart.com, 12.12.2005. Retrieved April 2008 from http://www.breitbart.com/article.php?id=051212224756.jwmkvntb&show-article= 1.
    • (2005) Hacker Attacks in US Linked to Chinese Military
  • 3
    • 77958463086 scopus 로고    scopus 로고
    • Cybersecurity-The truth about cyberterrorism [Electronic version]
    • Retrieved April 2008
    • Berinato, S. (2002). Cybersecurity-The Truth About Cyberterrorism [Electronic Version]. CIO Magazine. Retrieved April 2008 from http://www.cio.com/article/30933/CYBERSECURITY-The-Truth-About-Cyberterrorism.
    • (2002) CIO Magazine
    • Berinato, S.1
  • 5
    • 80052007349 scopus 로고    scopus 로고
    • Use of the internet by terrorists-A threat analysis
    • Centre of Excellence-Defence Against Terrorism (Ed.) Amsterdam: IOS Press
    • Brunst, P. W. (2008). Use of the Internet by Terrorists-A Threat Analysis. In Centre of Excellence-Defence Against Terrorism (Ed.), Responses to Cyber Terrorism (pp. 34-60). Amsterdam: IOS Press.
    • (2008) Responses to Cyber Terrorism , pp. 34-60
    • Brunst, P.W.1
  • 7
    • 84885760549 scopus 로고    scopus 로고
    • Retrieved April 2008
    • Buettner, R. (2001). Web of Terror Thrivin on Net. Retrieved April 2008 from http://www.nydai-lynews.com/archives/news/2001/09/18/2001-09-18-web-of- terror-thriving-on
    • (2001) Web of Terror Thrivin on Net
    • Buettner, R.1
  • 8
    • 51149084879 scopus 로고    scopus 로고
    • Centers for Disease Control and Prevention. (2007). Bioterrorism Overview. From http://www.bt.cdc.gov/bioterrorism/overview.asp
    • (2007) Bioterrorism Overview
  • 11
    • 33750320271 scopus 로고    scopus 로고
    • Terrorists turn to the web as base of operations
    • 7 August
    • Coll, S., & Glassner, S. (2005, 7 August). Terrorists Turn to the Web as Base of Operations. The Washington Post, p. A01.
    • (2005) The Washington Post
    • Coll, S.1    Glassner, S.2
  • 12
    • 84859596962 scopus 로고    scopus 로고
    • The future of cyberterrorism
    • Collin, B. C. (1997). The Future of Cyberterrorism. Crime and Justice International, 13(2), 15-18.
    • (1997) Crime and Justice International , vol.13 , Issue.2 , pp. 15-18
    • Collin, B.C.1
  • 13
    • 56149123275 scopus 로고    scopus 로고
    • Committee on Water Systems Security Research Washington, DC: The National Academies Press
    • Committee on Water Systems Security Research. (2007). Improving the Nation's Water Security. Washington, DC: The National Academies Press.
    • (2007) Improving the Nation's Water Security
  • 15
    • 62849125514 scopus 로고    scopus 로고
    • Hackers take down the most wired country in europe [Electronic version]
    • Retrieved April 2008
    • Davis, J. (2007). Hackers Take Down the Most Wired Country in Europe [Electronic Version]. Wired Magazine. Retrieved April 2008 from http://www.wired.com/politics/security/maga-zine/15-09/ff-estonia.
    • (2007) Wired Magazine
    • Davis, J.1
  • 16
    • 0242440508 scopus 로고    scopus 로고
    • Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy
    • Arquilla, J. & Ronfeldt, D. (Eds.) Santa Monica, CA: Rand Corp.
    • Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and Netwars (pp. 239-288). Santa Monica, CA: Rand Corp.
    • (2001) Networks and Netwars , pp. 239-288
    • Denning, D.E.1
  • 17
    • 0037401061 scopus 로고    scopus 로고
    • Semiotic emergent framework to address the reality of cyberterrorism
    • Desouza, K. C., & Hensgen, T. (2003). Semiotic Emergent Framework to Address the Reality of Cyberterrorism. Technological Forecasting & Social Change, 70, 385-396.
    • (2003) Technological Forecasting & Social Change , vol.70 , pp. 385-396
    • Desouza, K.C.1    Hensgen, T.2
  • 18
    • 84885745701 scopus 로고    scopus 로고
    • Russians seem to be hacking into pentagon [Electronic version]
    • 07.10.1999. Retrieved April 2008
    • Drogin, B. (1999). Russians seem to be Hacking into Pentagon [Electronic Version]. San Francisco Chronicle Online, 07.10.1999. Retrieved April 2008 from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/ MN58558.DTL.
    • (1999) San Francisco Chronicle Online
    • Drogin, B.1
  • 19
    • 0038172257 scopus 로고    scopus 로고
    • Cyberterrorism-Are we under siege?
    • Embar-Seddon, A. (2002). Cyberterrorism-Are We Under Siege? American Behavioral Scientist, 45(6), 1033-1043.
    • (2002) American Behavioral Scientist , vol.45 , Issue.6 , pp. 1033-1043
    • Embar-Seddon, A.1
  • 20
    • 84885711312 scopus 로고    scopus 로고
    • Security experts lift lid on Chinese hack attacks [Electronic version]
    • 23.11.2005. Retrieved April 2008
    • Espiner, T. (2005). Security Experts Lift Lid on Chinese Hack Attacks [Electronic Version]. ZDNet News, 23.11.2005. Retrieved April 2008 from http://news.zdnet.com/2100-1009-22-5969516.html.
    • (2005) ZDNet News
    • Espiner, T.1
  • 21
    • 84885794457 scopus 로고    scopus 로고
    • Russia hacking stories refuted [Electronic version]
    • 27.09.1999. Retrieved April 2008
    • FCW Staff. (1999). Russia Hacking Stories Refuted [Electronic Version]. Federal Computer Week, 27.09.1999. Retrieved April 2008 from http://www.fcw.com/print/5-188/news/68553-1.html.
    • (1999) Federal Computer Week
  • 22
    • 3943076566 scopus 로고    scopus 로고
    • Cyberterrorism, computer crime, and reality
    • Foltz, B. (2004). Cyberterrorism, Computer Crime, and Reality. Information Management & Computer Security, 12(2), 270-295.
    • (2004) Information Management & Computer Security , vol.12 , Issue.2 , pp. 270-295
    • Foltz, B.1
  • 23
    • 84885769175 scopus 로고    scopus 로고
    • Retrieved April 2008
    • Force10 Networks. (2007). Customer Profile: DE-CIX. Retrieved April 2008 from https://www.force10networks.com/company/customer-profiles/profiles-de-cix. asp
    • (2007) Customer Profile: DE-CIX
  • 24
    • 0011016060 scopus 로고    scopus 로고
    • Cyber-attacks by al qaeda feared
    • 27 June
    • Gellman, B. (2002, 27 June). Cyber-Attacks by Al Qaeda Feared. The Washington Post, p. A01.
    • (2002) The Washington Post
    • Gellman, B.1
  • 25
    • 34247170624 scopus 로고    scopus 로고
    • Bangs for the buck: A cost-benefit analysis of cyberterrorism
    • Giacomello, G. (2004). Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism. Studies in Conflict & Terrorism, 27(5), 387-408.
    • (2004) Studies in Conflict & Terrorism , vol.27 , Issue.5 , pp. 387-408
    • Giacomello, G.1
  • 26
    • 33845764672 scopus 로고    scopus 로고
    • Water and terrorism
    • Gleick, P. H. (2006). Water and Terrorism. Water Policy, 8, 481-503.
    • (2006) Water Policy , vol.8 , pp. 481-503
    • Gleick, P.H.1
  • 27
    • 70549098211 scopus 로고    scopus 로고
    • Hackers attack via Chinese web sites [Electronic version]
    • 25.08.2005 Retrieved April 2008
    • Graham, B. (2005). Hackers Attack Via Chinese Web Sites [Electronic Version]. The Washington Post Online, 25.08.2005, A01. Retrieved April 2008 from http://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/ AR2005082402318.html.
    • (2005) The Washington Post Online
    • Graham, B.1
  • 28
    • 27944455431 scopus 로고    scopus 로고
    • The myth of cyberterrorism [Electronic version]
    • Retrieved April 2008
    • Green, J. (2002). The Myth of Cyberterrorism [Electronic Version]. Washington Monthly. Retrieved April 2008 from http://www.washingtonmonthly.com/ features/2001/0211.green.html.
    • (2002) Washington Monthly
    • Green, J.1
  • 29
    • 84885790110 scopus 로고    scopus 로고
    • Terrorists 'Use google maps to hit UK troops' [Electronic version]
    • Harding, T. (2007). Terrorists 'Use Google Maps to Hit UK Troops' [Electronic Version]. The Telegraph Online. From http://www.telegraph.co.uk/ news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml.
    • (2007) The Telegraph Online
    • Harding, T.1
  • 30
    • 84885775520 scopus 로고    scopus 로고
    • 6 February 2007. Retrieved April 2008
    • ICANN. (2007). Factsheet: Root Server Attack on 6 February 2007. Retrieved April 2008 from http://icann.org/announcements/factsheet-dns-attack- 08mar07.pdf
    • (2007) Factsheet: Root Server Attack
  • 32
    • 84885760032 scopus 로고    scopus 로고
    • Nato says cyber warfare poses as great a threat as a missile attack [Electronic version]
    • Retrieved April 2008
    • Johnson, B. (2008). Nato Says Cyber Warfare Poses as Great a Threat as a Missile Attack [Electronic Version]. The Guardian Online. Retrieved April 2008 from http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity.
    • (2008) The Guardian Online
    • Johnson, B.1
  • 33
    • 84885802257 scopus 로고    scopus 로고
    • Terrorists in cyberspace
    • 20 December 2005
    • Kristof, N. D. (2005, 20 December 2005). Terrorists in Cyberspace. The New York Times, p. 31.
    • (2005) The New York Times , pp. 31
    • Kristof, N.D.1
  • 34
    • 84885712640 scopus 로고    scopus 로고
    • Al-qa'eda launches voice of the caliphate internet news bulletins [Electronic version]
    • Retrieved April 2008
    • La Guardia, A. (2005). Al-Qa'eda Launches Voice of the Caliphate Internet News Bulletins [Electronic Version]. The Telegraph Online. Retrieved April 2008 from http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/09/28/wirq128. xml&sSheet=/news/2005/09/28/ixnewstop.html.
    • (2005) The Telegraph Online
    • La Guardia, A.1
  • 36
    • 84885705243 scopus 로고    scopus 로고
    • The next threat [Electronic version]
    • Lenzner, R., & Vardi, N. (2004). The Next Threat [Electronic Version]. Forbes Magazine. From http://www.forbes.com/forbes/2004/0920/070- print.html.
    • (2004) Forbes Magazine
    • Lenzner, R.1    Vardi, N.2
  • 37
    • 84885753559 scopus 로고    scopus 로고
    • Al-qaeda plot to bring down UK internet [Electronic version]
    • Leppard, D. (2007). Al-Qaeda Plot to Bring Down UK Internet [Electronic Version]. The Times Online. From http://www.timesonline.co.uk/tol/news/uk/crime/ article1496831.ece.
    • (2007) The Times Online
    • Leppard, D.1
  • 38
    • 84885738548 scopus 로고    scopus 로고
    • Mass hack takes out govt sites [Electronic version]
    • Retrieved April 2008
    • Leyden, J. (2001). Mass Hack Takes Out Govt Sites [Electronic Version]. The Register. Retrieved April 2008 from http://www.theregister.co.uk/2001/01/22/ mass-hack-takes-out-govt/.
    • (2001) The Register
    • Leyden, J.1
  • 39
    • 51849163501 scopus 로고    scopus 로고
    • Miniwatts Marketing Group Retrieved April 2008
    • Miniwatts Marketing Group. (2007). Internet Usage Statistics. Retrieved April 2008 from http://www.internetworldstats.com/
    • (2007) Internet Usage Statistics
  • 40
    • 84885747691 scopus 로고    scopus 로고
    • US-firmen-website für qaida-botschaft gehackt
    • 17.06.2004
    • Musharbash, Y. (2004). US-Firmen-Website für Qaida-Botschaft gehackt. Spiegel Online, 17.06.2004.
    • (2004) Spiegel Online
    • Musharbash, Y.1
  • 42
    • 84885731370 scopus 로고    scopus 로고
    • Retrieved April 2008
    • National Conference of State Legislatures. (2002). Cyberterrorism. Retrieved April 2008 from http://www.ncsl.org/programs/lis/cip/cyberterrorism. htm.
    • (2002) Cyberterrorism
  • 44
  • 45
    • 84885726169 scopus 로고    scopus 로고
    • Rückfall ins telefonzeitalter
    • Retrieved April 2008
    • Persson, C. (2006). "Rückfall ins Telefonzeitalter," Nach Erdbeben. Retrieved April 2008 from http://www.heise.de/newsticker/Rueckfall- ins-Telefonzeitalter-nach-Erdbeben-/meldung/83007
    • (2006) Nach Erdbeben
    • Persson, C.1
  • 46
    • 84861099598 scopus 로고    scopus 로고
    • 27.04.2005 Retrieved April 2008
    • Pike, J. (2005, 27.04.2005). Eligible Receiver. Retrieved April 2008 from http://www.globalsecu-rity.org/military/ops/eligible-receiver.htm
    • (2005) Eligible Receiver
    • Pike, J.1
  • 47
    • 84859341068 scopus 로고    scopus 로고
    • Cyberterrorism-Fact or fancy?
    • February 1998
    • Pollitt, M. M. (1998). Cyberterrorism-Fact or Fancy? Computer Fraud & Security (February 1998), 8-10.
    • (1998) Computer Fraud & Security , pp. 8-10
    • Pollitt, M.M.1
  • 49
    • 84885768453 scopus 로고    scopus 로고
    • Reuters Retrieved April 2008
    • Reuters. (2001). This Jihad WEb Site Brought to You by⋯ Visa? Retrieved April 2008 from http://www.usatoday.com/tech/news/2001/09/19/jihad- sites.htm
    • (2001) This Jihad WEb Site Brought to You By⋯ Visa?
  • 52
    • 84885698227 scopus 로고    scopus 로고
    • The threat of cybercrime
    • Council of Europe (Ed.) Strasbourg: Council of Europe
    • Sieber, U. (2004). The Threat of Cybercrime. In Council of Europe (Ed.), Organized Crime in Europe: The Threat of Cybercrime (pp. 81-217). Strasbourg: Council of Europe.
    • (2004) Organized Crime in Europe: The Threat of Cybercrime , pp. 81-217
    • Sieber, U.1
  • 53
    • 84877778410 scopus 로고    scopus 로고
    • Cyberterrorism and other use of the internet for terrorist purposes-Threat analysis and evaluation of international conventions
    • Council of Europe (Ed.) Strasbourg: Council of Europe Publishing
    • Sieber, U., & Brunst, P. W. (2008). Cyberterrorism and Other Use of the Internet for Terrorist Purposes-Threat Analysis and Evaluation of International Conventions. In Council of Europe (Ed.), Cyberterrorism-The Use of the Internet for Terrorist Purposes (pp. 9-105). Strasbourg: Council of Europe Publishing.
    • (2008) Cyberterrorism-The use of the Internet for Terrorist Purposes , pp. 9-105
    • Sieber, U.1    Brunst, P.W.2
  • 54
    • 84885698467 scopus 로고    scopus 로고
    • Estonia's defense minister says kremlin involvement possible in cyberattacks [Electronic version]
    • Retrieved April 2008
    • Sliva, J., & Ritter, K. (2006). Estonia's Defense Minister Says Kremlin Involvement Possible in Cyberattacks [Electronic Version]. The Sydney Morning Herald Online. Retrieved April 2008 from http://www.smh.com.au/news/ Technology/Estonia39s-defense-minister-says-Kremlin-involvement-possible-in- cyberattacks/2007/05/18/1178995335698.html.
    • (2006) The Sydney Morning Herald Online
    • Sliva, J.1    Ritter, K.2
  • 56
    • 84885707028 scopus 로고    scopus 로고
    • Infrastructure Defense, Inc., United States Senate, Committee on Governmental Affairs
    • Testimony of James Adams, Chief Executive Officer, Infrastructure Defense, Inc., United States Senate, Committee on Governmental Affairs (2000).
    • (2000) Testimony of James Adams, Chief Executive Officer
  • 59
    • 84885782046 scopus 로고    scopus 로고
    • Russia accused of unleashing cyberwar to disable Estonia [Electronic version]
    • 17.05.2007
    • Traynor, I. (2007). Russia Accused of Unleashing Cyberwar to Disable Estonia [Electronic Version]. The Guardian Online, 17.05.2007 from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia.
    • (2007) The Guardian Online
    • Traynor, I.1
  • 61
    • 84885749980 scopus 로고    scopus 로고
    • Way radical, dude [Electronic version]
    • Vargas, J. A. (2006). Way Radical, Dude [Electronic Version]. The Washington Post Online. From http://www.washingtonpost.com/wp-dyn/content/ article/2006/10/08/AR2006100800931.html.
    • (2006) The Washington Post Online
    • Vargas, J.A.1
  • 64
  • 65
    • 27944454740 scopus 로고    scopus 로고
    • Cyberterrorism: The sum of all fears?
    • Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28, 129-149.
    • (2005) Studies in Conflict & Terrorism , vol.28 , pp. 129-149
    • Weimann, G.1
  • 67
    • 0037686228 scopus 로고
    • Pacific Grove, CA: Brooks/Cole Publishing Co.
    • White, J. R. (1990). Terrorism-an Introduction. Pacific Grove, CA: Brooks/Cole Publishing Co.
    • (1990) Terrorism-An Introduction
    • White, J.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.