Review
BibTex RIS Cite

SİBER TERÖRİZMİN PSİKOLOJİSİ ÜZERİNE KURAMSAL YAKLAŞIMLAR

Year 2024, Volume: 6 Issue: 1, 3 - 21, 31.03.2024

Abstract

Siber terörizm, günümüz toplumlarını etkileyen karmaşık ve çok boyutlu bir tehdit olarak ortaya çıkmaktadır. Bu makale, siber terörizmin sadece teknolojik bir olgu olmakla kalmayıp, aynı zamanda insan psikolojisi ve toplumsal yapıların karmaşık bir karşılığı olduğunu vurgulamaktadır. Araştırma, bireylerin toplumsal dışlanma, kimlik krizleri ve adaletsizlik algıları gibi deneyimlerinin, siber terör eylemlerine katılım üzerinde nasıl belirleyici bir etki yarattığını derinlemesine inceliyor. Bu bağlamda, siber terörizmin bireylerin radikalleşme sürecine nasıl katkıda bulunduğunun kapsamlı bir anlayışı gereklidir.
Makale, siber terörizmin psikolojik boyutlarını detaylı bir şekilde inceleyerek, bireylerin gruplara aidiyet ihtiyacı, toplumsal normlardan sapmaları ve terörizmin radikal ideolojilerine uyum süreçlerini ele almaktadır. Siber terörizmin toplum üzerindeki etkileri ve insan psikolojisi üzerindeki yansımaları, radikalleşme süreçleriyle birlikte kapsamlı bir şekilde değerlendirilmektedir. Bu analiz, siber terörizmle mücadelede teknolojik önlemlerin yanı sıra bireylerin psikolojik ihtiyaçlarını ve toplumsal bağlamını anlamanın kritik önemini ortaya koymaktadır.
Makale, siber terörizmin, psikolojik, sosyal ve teknolojik faktörlerin bir arada etkileştiği karmaşık bir fenomen olarak ele alınmasını savunmaktadır. Bu multidisipliner yaklaşım, siber terörizmin anlaşılması ve mücadele edilmesi için psikolojik ve sosyolojik teorilerin bütünleşik kullanımının önemini vurgulamaktadır. Bu yaklaşım, siber terörizmin toplum üzerindeki etkilerini daha iyi anlamak ve bu küresel tehditle etkin bir şekilde başa çıkmak için bütüncül bir çözüm önermektedir.

Thanks

Çalışma sürecinde değerli bilgi ve birikimlerini bizimle paylaşan Adalet Bakanlığı Ord. Prof. Dr. Sulhi Dönmezer Eğitim Merkezi Başkanı Hakim Bedir Fidan'a teşekkür ederiz.

References

  • Andik Matulessy, Nabilla H. Humaira. (2017). Hacker personality profiles reviewed in terms of the big five personality traits. Psychology and Behavior, 5(6), 137-142. https://doi.org/10.11648/j.pbs.20160506.12
  • Asch, S. E. (1956). Studies in independence and conformity: I. A minority of one against a unanimous majority. Psychological Monographs: General and Applied, 70(9), p.1
  • Bandura, A. (1990) ‘Moral Disengagement Mechanisms’, in W. Reich (ed.), The Origins of Terrorism: Psychologies, Ideologies, Theologies, Theologies, States of Mind (New York: Cambridge University Press, pp. 161-191.
  • Battal, F. Yıldız, Ş., Kılıçaslan, Ş., & Çınar, E. (2018). The relationship between the Solomon ash compatibility experiment and individuals’ decision-making styles (the case of Turkey).
  • Beck AT. (1976). Cognitive therapy and the emotional disorders. International Universities Press, New York.
  • Bishop,C.(2013).Psychosocial stages of development. pp.1055-1061. https://doi.org/10.1002/9781118339893.WBECCP441
  • Blass, T. (2009). From New Haven to Santa Clara: A historical perspective on the Milgram obedience experiments. The American Psychologist, 64 1, pp. 37-45. https://doi.org/10.1037/a0014434.
  • Broadhurst, Roderic, (2021). Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace Broadhurst Roderic, ‘Cybercrime: thieves, swindlers, bandits and privateers in cyberspace’, in Cornish, Paul, ed. Handbook of Cybersecurity, Oxford University Press, forthcoming 2021., Available at SSRN: https://ssrn.com/abstract=3009574 or http://dx.doi.org/10.2139/ssrn.3009574).
  • Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B., & Alazab, M. (2017). Cyberterrorism: A research review: Australian National University Cybercrime Observatory research report for the Korean Institute of Criminology. . https://doi.org/10.2139/SSRN.2984101.)
  • Cialdini, R. (2006). The Psychology of Persuasion. Harper Collins e-books.
  • Drury, S., Hutchens, S., Shuttlesworth, D., & White, C. (2012). Philip G. Zimbardo on his career and the 40th anniversary of the Stanford Prison Experiment. History of Psychology, 15, pp.161-170. https://doi.org/10.1037/A0025884.
  • Enrique B. Arranz-Freijo & Florencia Barreto-Zarza (2021) The contributions of Alfred Adler (1870-1937) to the understanding of early childhood development, Early Child Development and Care, 191:p.7-8, 1133-1143, DOI: 10.1080/03004430.2020.1851215
  • Erich Fromm (2017), Escape from Freedom, Say Publications. Felipe Vilanova, Francielle Machado Beria, Ângelo Brandelli Costa & Silvia Helena Koller | Justin Hackett (Reviewing Editor) (2017) Deindividuation: From Le Bon to the social identity model of deindividuation effects, Cogent Psychology, 4:1, DOI: 10.1080/23311908.2017.1308104
  • Festinger, L. (1957). A theory of cognitive dissonance. Stanford, California: Stanford University Press
  • Giddens, A. (1999). The Construction of Society: The Main Lines of the Theory of Structuring. (Translated by H. Özel). Ankara: Bilim ve Sanat Yayınları.
  • Gross, M., Canetti, D., & Vashdi, D. (2016). The psychological impact of cyberterrorism. Bulletin of the Atomic Scientists, 72, pp.284 - 291. https://doi.org/10.1080/00963402.2016.1216502.
  • Hogg, M., Hohman, Z., & Rivera, J. (2008). Why do people join groups? Three motivational accounts from social psychology. Social and Personality Psychology Compass, 2, pp.1269-1280. https://doi.org/10.1111/J.1751-9004.2008.00099.X.
  • Kohlberg, Lawrence (1963). “Moral Development and Identification,” Child Psychology, The Sixty-second Yearbook of the National Society for the Study of Education (ed. H.W. Stevenson), Chicago, pp. 277-330.
  • Manuel Castells (2013) “The Rise of the Network Society”, (3rd edition), Istanbul Bilgi University Publications, Istanbul, p.26.
  • Marks, S. (1974). Durkheim’s theory of anomie. American Journal of Sociology, 80, pp.329 - 363. https://doi.org/10.1086/225803,
  • McNally, R. & Wheale, P. (2020). Biopatenting and Innovation: Contemporary Nomads and a New Global Order. Nature, Risk and Responsibility. https://doi.org/10.1007/978-1-349-27241-9_11.
  • Navajas, J., Heduan, F., Garrido, J., González, P., Garbulsky, G., Ariely, D., & Sigman, M. (2019). Reaching consensus in polarized moral debates. Current Biology, p. 29, 4124- 4129.e6. https://doi.org/10.1016/j.cub.2019.10.018.
  • Polyakov, V. & Starodubtseva, M. (2019). Factors influencing motivation for terrorist activities being implemented with the use of information technologies in transboundary regions. Proceedings of the International Conference on Sustainable Development of Cross-Border Regions: Economic, Social and Security Challenges (ICSDCBR 2019). https://doi.org/10.2991/icsdcbr-19.2019.40.
  • Sabillon, Regner & Cano M., Jeimy & Serra-Ruiz, Jordi & Cavaller, Víctor. (2016). Cybercrime and Cybercriminals: A Comprehensive Study. International Journal of Computer Networks and Communications Security. 4. 165-176..
  • Shadach, E., Geller, S., Barak, M., Hill, I., & Azani, E. (2021). A psychological typology of terror organizations. Aggression and Violent Behavior, 58, 101562. https://doi.org/10.1016/J.AVB.2021.101562.
  • Sykes, Gresham M. - Matza, David (1957), “Techniques of Neutralization: A Theory of Delinquency”, American Sociological Review, Vol.22, No: 6, pp. 664-670.
  • Ş.Sağıroğlu and B.Arslan (2019), “Fighting with Cyber Terror and Terrorism: Threats and Precautions,” in Fighting with Cyber Terror and Terrorism: Threats and Precautions,” 4th International Conference on Computer Science and Engineering, UBMK 2019,Samsun, Turkey, pp.239-244)
  • Tajfel H. and Turner, J. C. (1979). An Integrative Theory of Intergroup Conflict. In The Social Psychology of Intergroup Relations, pp.33-47. Brooks-Cole: California.
  • Venue, C.. (2012) A guide to computer hacking including vulnerabilities, hacking tools, cybercrime, hacker ethics such as White Hat, Black Hat, Grey Hat, and more. [United States]: [Webster’s Digital Services].
  • Vilic Vida (2017). Dark Web, Cyber Terrorism And Cyber Warfare: Dark Side Of The Cyberspace.
  • Weber, M. (2005). Bureaucracy and Authority. (trans. H. B. Akın). Ankara: AddressPublications.
  • Yalom Irvin D. (2018) Group Psychotherapy Theory and Practice. Pegasus Publications. Translator: Prof. Dr. Ataman Tangör, Uzm. Dr. Özgür Karaçam.
  • Yüceer, Y. E. (2018). Erving Goffman & Dramaturgy in the context of cinema and social interaction (Master’s thesis, Pamukkale University Institute of Social Sciences).
  • Zimbardo, Philip G. (1969). “The Human Choice: Individuation, Reason, and Order Versus Deindividuation, Impulse, and Chaos”, Nebraska Symposium on Motivation, 17, p. 237-307.
  • Zimbardo, Philip G. (2004). “A Situationist Perspective on the Psychology of Evil: Understanding How Good People Are Transformed into Perpetrators”,The Social Psychology of Good and Evil, Ed. Arthur G. Miller, New York, London, , pp.21-50.

THEORETICAL APPROACHES TO THE PSYCHOLOGY OF CYBERTERRORISM

Year 2024, Volume: 6 Issue: 1, 3 - 21, 31.03.2024

Abstract

Cyberterrorism is emerging as a complex and multidimensional threat to contemporary societies. This paper emphasizes that cyberterrorism is not only a technological phenomenon, but also a complex response to human psychology and social structures. It explores how individuals' experiences of social exclusion, identity crises, and perceptions of injustice have a critical impact on their participation in cyberterrorism. In this context, a comprehensive understanding of how cyberterrorism contributes to the radicalization process of individuals is necessary.
The article examines in detail the psychological dimensions of cyberterrorism, focusing on individuals' need for group affiliation, their deviation from social norms, and their adaptation to the radical ideologies of terrorism. The impact of cyberterrorism on society and its effects on human psychology are comprehensively assessed, as are the processes of radicalization. This analysis reveals the critical importance of understanding the psychological needs and social context of individuals, in addition to technological measures, in combating cyberterrorism.
The article argues that cyberterrorism should be treated as a complex phenomenon in which psychological, social, and technological factors interact. This multidisciplinary approach emphasizes the importance of the integrated use of psychological and sociological theories to understand and combat cyberterrorism. This approach proposes a holistic solution to better understand the impact of cyberterrorism on society and to effectively deal with this global threat.

Thanks

We would like to thank Judge Bedir Fidan, President of the Ministry of Justice Ord. Prof. Dr. Sulhi Dönmezer Training Center, who shared his valuable knowledge and experience with us during the study process.

References

  • Andik Matulessy, Nabilla H. Humaira. (2017). Hacker personality profiles reviewed in terms of the big five personality traits. Psychology and Behavior, 5(6), 137-142. https://doi.org/10.11648/j.pbs.20160506.12
  • Asch, S. E. (1956). Studies in independence and conformity: I. A minority of one against a unanimous majority. Psychological Monographs: General and Applied, 70(9), p.1
  • Bandura, A. (1990) ‘Moral Disengagement Mechanisms’, in W. Reich (ed.), The Origins of Terrorism: Psychologies, Ideologies, Theologies, Theologies, States of Mind (New York: Cambridge University Press, pp. 161-191.
  • Battal, F. Yıldız, Ş., Kılıçaslan, Ş., & Çınar, E. (2018). The relationship between the Solomon ash compatibility experiment and individuals’ decision-making styles (the case of Turkey).
  • Beck AT. (1976). Cognitive therapy and the emotional disorders. International Universities Press, New York.
  • Bishop,C.(2013).Psychosocial stages of development. pp.1055-1061. https://doi.org/10.1002/9781118339893.WBECCP441
  • Blass, T. (2009). From New Haven to Santa Clara: A historical perspective on the Milgram obedience experiments. The American Psychologist, 64 1, pp. 37-45. https://doi.org/10.1037/a0014434.
  • Broadhurst, Roderic, (2021). Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace Broadhurst Roderic, ‘Cybercrime: thieves, swindlers, bandits and privateers in cyberspace’, in Cornish, Paul, ed. Handbook of Cybersecurity, Oxford University Press, forthcoming 2021., Available at SSRN: https://ssrn.com/abstract=3009574 or http://dx.doi.org/10.2139/ssrn.3009574).
  • Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B., & Alazab, M. (2017). Cyberterrorism: A research review: Australian National University Cybercrime Observatory research report for the Korean Institute of Criminology. . https://doi.org/10.2139/SSRN.2984101.)
  • Cialdini, R. (2006). The Psychology of Persuasion. Harper Collins e-books.
  • Drury, S., Hutchens, S., Shuttlesworth, D., & White, C. (2012). Philip G. Zimbardo on his career and the 40th anniversary of the Stanford Prison Experiment. History of Psychology, 15, pp.161-170. https://doi.org/10.1037/A0025884.
  • Enrique B. Arranz-Freijo & Florencia Barreto-Zarza (2021) The contributions of Alfred Adler (1870-1937) to the understanding of early childhood development, Early Child Development and Care, 191:p.7-8, 1133-1143, DOI: 10.1080/03004430.2020.1851215
  • Erich Fromm (2017), Escape from Freedom, Say Publications. Felipe Vilanova, Francielle Machado Beria, Ângelo Brandelli Costa & Silvia Helena Koller | Justin Hackett (Reviewing Editor) (2017) Deindividuation: From Le Bon to the social identity model of deindividuation effects, Cogent Psychology, 4:1, DOI: 10.1080/23311908.2017.1308104
  • Festinger, L. (1957). A theory of cognitive dissonance. Stanford, California: Stanford University Press
  • Giddens, A. (1999). The Construction of Society: The Main Lines of the Theory of Structuring. (Translated by H. Özel). Ankara: Bilim ve Sanat Yayınları.
  • Gross, M., Canetti, D., & Vashdi, D. (2016). The psychological impact of cyberterrorism. Bulletin of the Atomic Scientists, 72, pp.284 - 291. https://doi.org/10.1080/00963402.2016.1216502.
  • Hogg, M., Hohman, Z., & Rivera, J. (2008). Why do people join groups? Three motivational accounts from social psychology. Social and Personality Psychology Compass, 2, pp.1269-1280. https://doi.org/10.1111/J.1751-9004.2008.00099.X.
  • Kohlberg, Lawrence (1963). “Moral Development and Identification,” Child Psychology, The Sixty-second Yearbook of the National Society for the Study of Education (ed. H.W. Stevenson), Chicago, pp. 277-330.
  • Manuel Castells (2013) “The Rise of the Network Society”, (3rd edition), Istanbul Bilgi University Publications, Istanbul, p.26.
  • Marks, S. (1974). Durkheim’s theory of anomie. American Journal of Sociology, 80, pp.329 - 363. https://doi.org/10.1086/225803,
  • McNally, R. & Wheale, P. (2020). Biopatenting and Innovation: Contemporary Nomads and a New Global Order. Nature, Risk and Responsibility. https://doi.org/10.1007/978-1-349-27241-9_11.
  • Navajas, J., Heduan, F., Garrido, J., González, P., Garbulsky, G., Ariely, D., & Sigman, M. (2019). Reaching consensus in polarized moral debates. Current Biology, p. 29, 4124- 4129.e6. https://doi.org/10.1016/j.cub.2019.10.018.
  • Polyakov, V. & Starodubtseva, M. (2019). Factors influencing motivation for terrorist activities being implemented with the use of information technologies in transboundary regions. Proceedings of the International Conference on Sustainable Development of Cross-Border Regions: Economic, Social and Security Challenges (ICSDCBR 2019). https://doi.org/10.2991/icsdcbr-19.2019.40.
  • Sabillon, Regner & Cano M., Jeimy & Serra-Ruiz, Jordi & Cavaller, Víctor. (2016). Cybercrime and Cybercriminals: A Comprehensive Study. International Journal of Computer Networks and Communications Security. 4. 165-176..
  • Shadach, E., Geller, S., Barak, M., Hill, I., & Azani, E. (2021). A psychological typology of terror organizations. Aggression and Violent Behavior, 58, 101562. https://doi.org/10.1016/J.AVB.2021.101562.
  • Sykes, Gresham M. - Matza, David (1957), “Techniques of Neutralization: A Theory of Delinquency”, American Sociological Review, Vol.22, No: 6, pp. 664-670.
  • Ş.Sağıroğlu and B.Arslan (2019), “Fighting with Cyber Terror and Terrorism: Threats and Precautions,” in Fighting with Cyber Terror and Terrorism: Threats and Precautions,” 4th International Conference on Computer Science and Engineering, UBMK 2019,Samsun, Turkey, pp.239-244)
  • Tajfel H. and Turner, J. C. (1979). An Integrative Theory of Intergroup Conflict. In The Social Psychology of Intergroup Relations, pp.33-47. Brooks-Cole: California.
  • Venue, C.. (2012) A guide to computer hacking including vulnerabilities, hacking tools, cybercrime, hacker ethics such as White Hat, Black Hat, Grey Hat, and more. [United States]: [Webster’s Digital Services].
  • Vilic Vida (2017). Dark Web, Cyber Terrorism And Cyber Warfare: Dark Side Of The Cyberspace.
  • Weber, M. (2005). Bureaucracy and Authority. (trans. H. B. Akın). Ankara: AddressPublications.
  • Yalom Irvin D. (2018) Group Psychotherapy Theory and Practice. Pegasus Publications. Translator: Prof. Dr. Ataman Tangör, Uzm. Dr. Özgür Karaçam.
  • Yüceer, Y. E. (2018). Erving Goffman & Dramaturgy in the context of cinema and social interaction (Master’s thesis, Pamukkale University Institute of Social Sciences).
  • Zimbardo, Philip G. (1969). “The Human Choice: Individuation, Reason, and Order Versus Deindividuation, Impulse, and Chaos”, Nebraska Symposium on Motivation, 17, p. 237-307.
  • Zimbardo, Philip G. (2004). “A Situationist Perspective on the Psychology of Evil: Understanding How Good People Are Transformed into Perpetrators”,The Social Psychology of Good and Evil, Ed. Arthur G. Miller, New York, London, , pp.21-50.
There are 35 citations in total.

Details

Primary Language English
Subjects Cybercrime, Terrorism
Journal Section Reviews
Authors

Nedim Havle 0000-0003-2841-8460

Sudiye Aksoy This is me 0009-0002-1638-6887

Publication Date March 31, 2024
Submission Date February 24, 2024
Acceptance Date March 27, 2024
Published in Issue Year 2024 Volume: 6 Issue: 1

Cite

APA Havle, N., & Aksoy, S. (2024). THEORETICAL APPROACHES TO THE PSYCHOLOGY OF CYBERTERRORISM. Adli Bilimler Ve Suç Araştırmaları, 6(1), 3-21.