{"title":"Evaluating cyber terrorism components in Malaysia","authors":"Zahri Yunos, R. Ahmad","doi":"10.1109/ICT4M.2014.7020582","DOIUrl":null,"url":null,"abstract":"In this digital age, the use of cyberspace to carry out terrorist activities has emerged. To date, there is no universally accepted definition of cyber terrorism, which seems to be the fundamental issue and challenge in countering cyber terrorism threats. Some argued that the concept should be parallel with domestic political, cultural and social context. The purpose of this paper is to develop components of cyber terrorism using qualitative method analysis. In this paper, a semi-structured interview with purposive sampling for data collection has been carried out. The analysis indicated that the framework describing cyber terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact. The analysis has also shown that there were some similarities and differences in views regarding the proposed cyber terrorism conceptual framework.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICT4M.2014.7020582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this digital age, the use of cyberspace to carry out terrorist activities has emerged. To date, there is no universally accepted definition of cyber terrorism, which seems to be the fundamental issue and challenge in countering cyber terrorism threats. Some argued that the concept should be parallel with domestic political, cultural and social context. The purpose of this paper is to develop components of cyber terrorism using qualitative method analysis. In this paper, a semi-structured interview with purposive sampling for data collection has been carried out. The analysis indicated that the framework describing cyber terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact. The analysis has also shown that there were some similarities and differences in views regarding the proposed cyber terrorism conceptual framework.