THE INFLUENCE OF THE DIGITAL ENVIRONMENT ON THE SPREAD OF CYBER TERRORISM
Abstract
The development of information and communication technologies has led to the accelerated development of society, but with the facilitation of communication, business and entertainment, there have been a number of problems regarding the security of users in cyberspace, but also the states themselves. Cybercrime has become a frequent occurrence that causes material and non-material damage to social media users who are often insufficiently informed about the methods of such cybercriminals. On the other hand, the virtual environment has enabled cyber terrorists to transfer their motives and activities from physical to digital space. Unfortunately, the consequences of such cyber-terrorist activities are no less devastating than in traditional terrorist activities. Hidden in the digital space, terrorists propagate their political or religious ideology, recruit new members and organize attacks, using, often with great success, identical terrorist strategies that were used before cyberspace. The lack of international cooperation, harmonization of legislation, but also the neglect of security systems of new devices by experts in this field, which function with the help of information and communication technologies, will create even more fertile ground for the continuation and development of such criminal activities. Unfortunately, not all countries are motivated or see their interests in terms of cooperation in this area, but the destructive potential of cybercrime and cyber terrorism at the global level must be a strong enough factor to make full international cooperation in this area imperative.
References
Akhgar- Staniforth- Bosco 2014: Akhgar Babak, Staniforth Andrew, Bosco Francesca. „Cyber Crime and Cyber Terrorism Investigator's Handbook”. Syngress
Averill-Luiijf 2010: Bruce Averill, Eric A.M Luiijf. “Canvassing the cyber security landscape: why energy companies need to pay attention.” J. Energy Security, May.
Baltezarević- Baltezarević 2021: Ivana Baltezarević & Radoslav Baltezarević. „Sajber bezbednost: izgradnja digitalnog poverenja.” Megatrend Revija, Vol. 18 (4). pp. 269-280 UDK 343.533::004 DOI: 10.5937/MegRev2104269B
Baltezarević- Baltezarević 2019: Ivana Baltezarević & Radoslav Baltezarević. „Prikriveno oglašavanje u novim medijima.” Baština, sv. 48, pp. 171-179. UDK 659.1 doi: 10.5937/bastina1948171B
Baltezarević- Baltezarević 2021: Radoslav Baltezarevic & Ivana Baltezarevic. “The Dangers and Threats that Digital Users Face in Cyberspace”. IPSI Transactions on Internet Research, Vol. 17, No. 1, January 2021, pp. 46-52.
Bijlsma-de Kievit- van de Sluis- van Nunen- Passchier- Luiijf 2013: Tjerk Bijlsma, Sander de Kievit, Jacco van de Sluis, Ellen van Nunen, Igor Passchier, Eric Luiijf. „Security challenges for cooperative and interconnected mobility systems”. In: Luiijf, E., Hartel, P. (Eds.), Critical Information Infrastructures Security, 8th International Workshop, CRITIS 2013, Amsterdam, Lecture Notes in Computer Science, vol. 8328. Springer, Heidelberg, pp. 1–15.
Bjorgo 2005: Tore Bjorgo. „Root causes of terrorism”. Routledge
Clarke 2009: Richard Clarke. "War from cyberspace." The National Interest 104: 31-36
Denning 2000: Dorothy Denning. “Cyber terrorism: The Logic Bomb versus the Truck Bomb.” Global Dialogue, 2(4), 29-37.
Grosscup 2006: Beau Grosscup. „Strategic Terror: The Politics and Ethics of Aerial Bombardment.“ London: Zed Books.
Holt 2012: Thomas Holt. “Exploring the Intersections of Technology, Crime, and Terror.” Terrorism and Political Violence, 24(2), 337-354. doi:10.1080/09546553.2011.648350
Jaishankar 2007: Jaishankar, K. “Cyber criminology: Evolving a novel discipline with a new journal.” International Journal of Cyber Criminology, 1(1), 1−6.
Jewkes 2007: Yvonne Jewkes. “Crime online.” Cullompton, United Kingdom: Willan.
KrebsOnSecurity 2012: KrebsOnSecurity. “FBI: Smart Meter Hacks Likely to Spread.” https://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/ (Pristupljeno:01.01.2022).
Laqueur 1977: Walter Laqueur. „Terrorism” London: Weidenfeld and Nicholson
Nhan-Bachmann 2010: Johnny Nhan & Michael Bachmann. “Developments in cyber criminology.” In M. Maguire & D. Okada (Eds.), Critical issues in crime and justice: Thought, policy, and practice (pp. 164–183). Thousand Oaks, CA: Sage Publications.
Rummel 1994: Rudolph Joseph Rummel. “Death by Government.” New Brunswick, NJ: Transaction Books.
Sageman 2008: Marc Sageman. “Leaderless Jihad,” University of Pennsylvania Press, Philadelphia, Pennsylvania
Tafoya 2011: William L. Tafoya. “Cyber Terror.” FBI Law Enforcement Bulletin (FBI.gov), November 2011 attributes the coining of the term to Barry C. Collin.
Weimann 2006: Gabriel Weimann. “Terror on the Internet: The New Arena, the New Challenges,” US Institute of Peace Press, Washington, DC
Wilkinson 1992: Paul Wilkinson. “International Terrorism: New Risks to World Order”. In John Baylis and Nick Rengger (eds) Dilemmas of World Politics: International Issues in a Changing World, London: Clarenden Press: 228–57.
Yar 2005: Majid Yar. “The novelty of ‘cyber crime’: An assessment in light of routine activity theory.” European Journal of Criminology, 2(4), 407–427.