The Use of the Internet by Terrorists and Its Impact Upon Electronic Commerce

2011 ◽  
pp. 352-361
Author(s):  
Matthew Warren ◽  
William Hutchinson

In the developed world, the influence of information systems can now be seen in most operational areas of business. A significant result of these advances is that organizations have become increasingly dependent upon the availability of systems and reliant upon the data that they hold. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first WWW applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups (Rathmell, 1997). The term terrorist or terrorism is a highly emotive term. Generally it is used to denote “revolutionaries who seek to use terror systematically to further their views or to govern a particular area” (Warren, 1998). ‘Cyber-terrorism’ is a different form of terrorism since physical systematic terror does not usually occur (although it can if it causes disruption to a critical system), but a widespread destruction of information resources can. The problem of defining the term ‘terrorist’ relates to the fact that a terrorist group could easily be perceived as a resistance group carrying out lawful or morally legitimate actions. In the context of the chapter the term cyber-terrorist/terrorism will refer to all terrorist/resistance groups in order to give a neutral perception of their activities and aims. Another new term related to the Information Society is ‘electronic commerce.’ The notion of ‘electronic commerce’ is proposed as a means of drawing together a wide range of business support services. It includes such elements as inter-organizational e-mail; on-line directories; trading support systems for commodities, products, customised products and custom-built goods and services; ordering and logistic support systems; settlement support systems; and management information and statistical reporting systems (Warren et al, 1999). Business around the world has become more of a target of cyber terrorism due to the fact that they are increasingly dependent upon information technology (Howard, 1997). Therefore there are many more high technology targets to prey upon. Increasingly in the future, businesses will use electronic commerce and on-line systems as a method of conducting trade. These on-line methods are very vulnerable to attacks. In a recent, informal survey of Australian IT managers (Hutchinson and Warren, 1999), 80% of replies said that their sites had never been attacked, 66% do not feel their competitors would attack their site, and 66% had no policy about dealing with an attack. This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: • describe the background of cyber-terrorism; • describe what cyber-terrorism is; • describe the vulnerabilities of electronic commerce to cyber-terrorism; • discuss the future of electronic commerce and cyber-terrorism.

Author(s):  
Matthew Warren ◽  
William Hutchinson

During the last ten years there has been a growth of Information Systems and related Internet technology. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first World Wide Web (WWW) applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups.This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: describe the background of cyber-terrorism; describe what cyber-terrorism is; describe the vulnerabilities of electronic commerce to cyber-terrorism; discuss the future of electronic commerce and cyber-terrorism.


Author(s):  
Taiara Maestro Calderon ◽  
Maria Elisa Wotzasek Cestari ◽  
Alyni Cristiny Dobkowski ◽  
Mariana Digieri Cavalheiro

Introduction: Pregnancy is a period of doubts and anxiety for most pregnant women. Objective: To evaluate the use of the Internet as a support tool to clarify doubts raised by women during pregnancy. Methods: An exploratory and descriptive study. Sample based on accidentalness, for 241 users who responded to the on-line form, built with Google Docs and made available in  one Blog. Results: 98% of pregnant women were between 19 and 39 years, 97% with schooling above 9 years, 99% had follow up with healthcare providers. Regarding the use of the Internet, 99% said they usually search for the pregnancy questions. The doubts consisted mostly in the search for information about the development of the baby, then how to deal with the discomforts of pregnancy, the changes in the woman’s body and feeding care. The choice of the sites, according to the interviewees, occurred mainly through the indication of social networks, friends and acquaintances. Regarding to the resolution of doubts, 97% reported that after the Internet search doubts were resolved. Conclusion: The Internet has been a tool of support for pregnant women who seek effective support on the World Wide Web to clarify their doubts. The significant standard for clarification and education reflected a customer that will search and possibly question the procedures and practices that are performed during prenatal care. However, the search for sites has been based on independent research guidance by health professionals, something which does not ensure the credibility of the sites surveyed by users.


Author(s):  
Robert S. Stephenson

The rise of the Internet has started a knowledge revolution whose extent can only be guessed at. The last revolution of this magnitude, brought on by the printing press, led to the proliferation of books and the rise of the modern university system. If universities are to survive the latest knowledge revolution, they must adapt with unaccustomed speed and learn how to use the Internet for more effective teaching. Most universities adopt a limited approach to building on-line courses. However, many studies have found that merely transplanting materials to the Web does not significantly improve learning (Russell, 1999). In fact, handouts, slides, and viewgraphs that have been “repurposed” for the Web are sometimes derisively referred to as “shovelware” (Fraser, 1999). So while moving existing materials to the Web may increase their accessibility, it will not necessarily improve their effectiveness. The Internet’s real value as a medium and teaching platform is that it makes possible rich, interactive content such as simulations, animations, and 3-D models. These learning objects, or rich content, can significantly enhance learning, especially in the sciences, and can be just as useful inside the classroom as outside. The difficulty is how to create this enhanced content, since the task demands a broad range of technical skills and enormous effort. Besides faculty domain experts and experienced teachers, rich content development typically requires illustrators, Web designers, programmers, instructional designers, testers, and Webmasters. The only way faculty and institutions can meet this challenge is to embrace collaboration more broadly and seriously than they have in the past. One approach is the multi-institutional consortium. Another solution is a collaboration of faculty to build rich content in their discipline. This chapter chronicles an example of the latter sort: a bottom-up, cross-institutional project. For such a grass roots collaboration to succeed, it must recruit many faculty pioneering the use of the Internet in their teaching, as well as artists and technical professionals. It must offer collaborators an incentive to participate, and it must attract not only volunteers, but also institutional and agency funding as well. Finally, as a pioneering project, it must create standards and develop paradigms as it goes. This case study describes a work-in-progress to solve these issues.


Author(s):  
Petter Gottschalk

As companies expand their use of the Internet from electronic commerce to elec-tronic business, the CIO emerges as the most important executive for performance improvements when selecting business models.


2003 ◽  
Vol 5 (2) ◽  
pp. 188-205 ◽  
Author(s):  
Stephen Ward ◽  
Rachel Gibson

The 2001 General Election generated considerable interest and also much criticism of politicians' use of the Internet. Via content analysis, search engines and database material, this article examines candidates' and local constituency parties' on-line activity in three areas: first, the extent of Internet use by candidates and local parties—who and how many candidates had live websites for the election?; second, the pattern of on-line activity at the local level—where were parties/candidates on-line?; and third, what were candidates doing on-line—did candidates experiment with interactivity, or use the new media as another top-down communication tool? The survey indicates that use of the Internet was patchy and websites often acted as little more than static on-line leaflets. Moreover, the overall impact of the Internet on electoral outcomes was minimal and use of the technology by itself is unlikely to herald the coming of e-democracy. However, we also argue that some of the criticism levelled at parties is misplaced and that there are good reasons why parties have so far behaved cautiously.


2018 ◽  
Vol 13 ◽  
pp. 3288-3300
Author(s):  
Rudy Agus Gemilang Gultom ◽  
Asep Adang Supriyadi ◽  
Tatan Kustana

Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system.  In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF). 


Author(s):  
Roy D. Johnson ◽  
Carl H. Stucke

The use of the Internet offers a unique opportunity to bring together individuals in an interactive setting for social and educational purposes. Colleges and universities have augmented their brick and mortar classes with virtual course offerings using the Internet for distance education. This paper will examine the origins of distance education and offer insights and recommendations for developing and delivering an on-line MBA course in Privacy and Information Security.


Author(s):  
Napaporn Kripanont

Information Technology has long been a well-known research area, but this changed considerably when the Internet became prominent just over a decade ago. Many researchers have studied and proposed theories and models of Technology Acceptance in order to predict and explain user behaviour with technology to account for rapid change in both technologies themselves and their environments. Each theory or model has been proposed with different sets of determinants and moderators. More importantly, most of the research has been conducted in the U.S. Therefore, it is questioned whether the technology acceptance models and theories that have been developed, modified, and extended in the U.S. can be used in other regions such as South East Asia and more specifically in Thailand. It is questioned whether there might be other determinants and moderators that also play important roles in this specific environment. This research study has seven objectives, of which five have already been achieved. From the findings, despite the fact that academics hardly used the Internet (used a few times a month) for teaching in class and providing a personal Web-Base for facilitating teaching, they intended to use it more (a few times a week) in the future. On the contrary, at the time of the survey, they used the Internet rather often (five to six times a week) for enhancing teaching knowledge, searching information for their research, personal tasks, enhancing personal knowledge, and using email for personal contact. Significantly, no matter how often they currently used the Internet, they all intended to use the Internet more often in all type of tasks in the future. With respect to motivation to make full use of the Internet in their work, they not only ‘quite agree’ that if good facilities were available to support usage (e.g. good computer hardware and software, good communication network etc.) this would motivate them, but they also thought that their strong intentions for providing student contacts, the university’ policy to be Research Oriented and become an e-University in the future, also play an important role in motivating them to make full use of the Internet in their work. On the contrary, the availability of technicians and Internet training motivated them less. They also thought that using the Internet helped improve their professional practice (such as teaching in class, preparing teaching materials, research, and administrative tasks), and helped improve personal developments (such as improving their academic and personal knowledge) and helped improve their quality of working life (such as saving their expense e.g. searching Information from e-Journal and Websites and using email in communication with others). Nevertheless, in respect of improving quality of working life and helping them have more time for leisure and creative thinking, they simply ‘slightly agreed’. With these findings, it is interesting to investigate deeply about academics ’behaviour and intention. Five core constructs (determinants) were examined including perceived usefulness, perceived ease of use, social influence, self-efficacy, and facilitating conditions together with moderators such as gender, age, experience, and some cultural aspects of whether these constructs influenced academic’s behaviour. Survey research methodology (questionnaire and semi-structured interviews) were used to collect primary data from Business Schools in Thailand, and the survey yielded 455 usable questionnaires. Structural Equation Modelling with AMOS is also being used to analyse data and is expected to provide evidence to generate the Technology Acceptance Model that is both substantively meaningful and statistically well-fitting(Byrne 2001, 2006) . By generating the Technology Acceptance Model in accordance with the main research objectives, it is expected that the generated research model will have the power to explain/predict Internet acceptance and usage behaviour. A thorough understanding of the model may help practitioners to analyse the reasons for resistance toward the technology and would also help to take efficient measures to improve user acceptance and usage of the technology (Davis, 1989).


2006 ◽  
Vol 3 (7) ◽  
Author(s):  
Gary Saunders

Use of the Internet continues to increase and new technology provides more and better communication options.  A questionnaire was distributed to chairpersons of accounting departments to obtain their views on requiring some of these newer physical enhancements on a student’s computers when they register for an E course.  Respondents strongly favored requiring students to provide a digital photo ID and audio capabilities when registering for an E course but rejected the idea of requiring them to provide a web cam that might be used for verifying their identity.  They also tended to believe, even though they did not endorse requiring one, students should use a web cam when completing examinations on-line and that faculty should compare the photo ID with the web cam image.  However, they do not believe that students should be required to use a web cam when completing homework assignments or that faculty should compare the photo ID with the web cam image.  Overall accounting chairs endorse requiring the student who enrolls in an E course to obtain some existing technology and they expect the student to be prepared to spend more than $100 to obtain the technology 


Author(s):  
R. Todd Stephens

In this chapter, the author takes a look at how organizations can integrate Web 2.0 technology into their current electronic commerce environment. The success of the Internet can be seen within any organization, but customers are asking for more interaction with the enterprises they do business with. In a few years, having a standard electronic commerce site will be as passé as having an information only site today. Organizations must progress to the next level in order to have a viable business model in the future. Web 2.0 provides the basic technology for creating a network of customers who are passionate about the company’s product offering. This chapter reviews several different examples where organizations have added Web 2.0 to their environment and are succeeding in transforming themselves.


Sign in / Sign up

Export Citation Format

Share Document