THE INFLUENCE OF THE DIGITAL ENVIRONMENT ON THE SPREAD OF CYBER TERRORISM

  • Ивана Ж. БАЛТЕЗАРЕВИЋ Мегатренд универзитет, Правни факултет, Београд, Република Србија
  • Драган Љ. Танчић
Keywords: Information and communication technology, Cyberspace, Cyber crime, Cyber terrorism

Abstract


The development of information and communication technologies has led to the accelerated development of society, but with the facilitation of communication, business and entertainment, there have been a number of problems regarding the security of users in cyberspace, but also the states themselves. Cybercrime has become a frequent occurrence that causes material and non-material damage to social media users who are often insufficiently informed about the methods of such cybercriminals. On the other hand, the virtual environment has enabled cyber terrorists to transfer their motives and activities from physical to digital space. Unfortunately, the consequences of such cyber-terrorist activities are no less devastating than in traditional terrorist activities. Hidden in the digital space, terrorists propagate their political or religious ideology, recruit new members and organize attacks, using, often with great success, identical terrorist strategies that were used before cyberspace. The lack of international cooperation, harmonization of legislation, but also the neglect of security systems of new devices by experts in this field, which function with the help of information and communication technologies, will create even more fertile ground for the continuation and development of such criminal activities. Unfortunately, not all countries are motivated or see their interests in terms of cooperation in this area, but the destructive potential of cybercrime and cyber terrorism at the global level must be a strong enough factor to make full international cooperation in this area imperative.

References

Akhgar- Staniforth- Bosco 2014: Akhgar Babak, Staniforth Andrew, Bosco Francesca. „Cyber Crime and Cyber Terrorism Investigator's Handbook”. Syngress


Averill-Luiijf 2010: Bruce Averill, Eric A.M Luiijf. “Canvassing the cyber security landscape: why energy companies need to pay attention.” J. Energy Security, May.


Baltezarević- Baltezarević 2021: Ivana Baltezarević & Radoslav Baltezarević. „Sajber bezbednost: izgradnja digitalnog poverenja.” Megatrend Revija, Vol. 18 (4). pp. 269-280 UDK 343.533::004 DOI: 10.5937/MegRev2104269B


Baltezarević- Baltezarević 2019: Ivana Baltezarević & Radoslav Baltezarević. „Prikriveno oglašavanje u novim medijima.” Baština, sv. 48, pp. 171-179.  UDK 659.1 doi: 10.5937/bastina1948171B


Baltezarević- Baltezarević 2021: Radoslav Baltezarevic & Ivana Baltezarevic. “The Dangers and Threats that Digital Users Face in Cyberspace”. IPSI Transactions on Internet Research, Vol. 17, No. 1, January 2021, pp. 46-52.


Bijlsma-de Kievit- van de Sluis- van Nunen- Passchier- Luiijf 2013: Tjerk Bijlsma, Sander de Kievit, Jacco van de Sluis, Ellen van Nunen, Igor Passchier, Eric Luiijf. „Security challenges for cooperative and interconnected mobility systems”. In: Luiijf, E., Hartel, P. (Eds.), Critical Information Infrastructures Security, 8th International Workshop, CRITIS 2013, Amsterdam, Lecture Notes in Computer Science, vol. 8328. Springer, Heidelberg, pp. 1–15.


Bjorgo 2005: Tore Bjorgo. „Root causes of terrorism”. Routledge


Clarke 2009: Richard Clarke. "War from cyberspace." The National Interest 104: 31-36 


Denning 2000: Dorothy Denning. “Cyber terrorism: The Logic Bomb versus the Truck Bomb.” Global Dialogue, 2(4), 29-37.


Grosscup 2006: Beau Grosscup. „Strategic Terror: The Politics and Ethics of Aerial Bombardment.“ London: Zed Books.


 


Holt 2012: Thomas Holt. “Exploring the Intersections of Technology, Crime, and Terror.” Terrorism and Political Violence, 24(2), 337-354. doi:10.1080/09546553.2011.648350


Jaishankar 2007: Jaishankar, K. “Cyber criminology: Evolving a novel discipline with a new journal.” International Journal of Cyber Criminology, 1(1), 1−6.


Jewkes 2007: Yvonne Jewkes. “Crime online.” Cullompton, United Kingdom: Willan.


KrebsOnSecurity 2012: KrebsOnSecurity. “FBI: Smart Meter Hacks Likely to Spread.” https://krebsonsecurity.com/2012/04/fbi-smart-meter-hacks-likely-to-spread/ (Pristupljeno:01.01.2022).


Laqueur 1977: Walter Laqueur. „Terrorism” London: Weidenfeld and Nicholson


Nhan-Bachmann 2010: Johnny Nhan & Michael Bachmann. “Developments in cyber criminology.” In M. Maguire & D. Okada (Eds.), Critical issues in crime and justice: Thought, policy, and practice (pp. 164–183). Thousand Oaks, CA: Sage Publications.


Rummel 1994: Rudolph Joseph Rummel. “Death by Government.” New Brunswick, NJ: Transaction Books.


 


Sageman 2008: Marc Sageman. “Leaderless Jihad,” University of Pennsylvania Press, Philadelphia, Pennsylvania


Tafoya 2011: William L. Tafoya. “Cyber Terror.” FBI Law Enforcement Bulletin (FBI.gov), November 2011 attributes the coining  of the term to Barry C. Collin.


Weimann 2006: Gabriel Weimann. “Terror on the Internet: The New Arena, the New Challenges,” US Institute of Peace Press, Washington, DC


Wilkinson 1992: Paul Wilkinson. “International Terrorism: New Risks to World Order”. In John Baylis and Nick Rengger (eds) Dilemmas of World Politics: International Issues in a Changing World, London: Clarenden Press: 228–57.


Yar 2005: Majid Yar. “The novelty of ‘cyber crime’: An assessment in light of routine activity theory.” European Journal of Criminology, 2(4), 407–427.

Published
2022/07/18
Section
Članci