Evolution of Cyberterrorism: Challenges and Solutions
Öz
Anahtar Kelimeler
Cyberterrorism, actors, motives, intentions, targets, methods, effects, international security
Kaynakça
- References
- Aday, S., Andžāns, M., Bērziņa-Čerenkova, U., Granelli, F., Gravelines, J., Hills, M., Holmstrom, M., Klus, A., Martinez-Sanchez,
- I., Mattiisen, M., Molder, H., Morakabati, Y., Pamment, J., Sari, A., Sazonov, V., Simons, G., & Terra, J. (2019). Hybrid threats: A strategic communications perspective. NATO Strategic Communications Centre of Excellence.
- Awan, I. (2017). Cyber-extremism: ISIS and the power of social media. Society, 54(2), 138-149. https://doi.org/10.1007/s12115-017-0106-6
- Ayad, C., & Zerrouky, M. (2023, March 20). Jordanian pilot burned alive by IS in 2015: The story of a failed release. Le Monde. https://www.lemonde.fr/en/international/article/2023/03/20/jordanian-pilot-burned-alive-by-is-in-2015-the-story-of-afailed-release_6027456_4.html
- Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In K. Al-Begain, M. Zak, W. Alosaimi, & C. Turyagyenda (Eds.),
- Cyber security and threats: Concepts, methodologies, tools, and applications (pp. 608-621). IGI Global.
- Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter (The Brookings Project on U.S. Relations with the Islamic World Analysis Paper, No. 20). Center for Middle East Policy at Brookings.
- Cadwalladr, C. (2012, September 8). Anonymous: Behind the masks of the cyber insurgents. The Guardian. https://www.theguardian.com/technology/2012/sep/08/anonymous-behind-masks-cyber-insurgents
- Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso Books.