cyber terrorism
Recently Published Documents


TOTAL DOCUMENTS

337
(FIVE YEARS 93)

H-INDEX

10
(FIVE YEARS 2)

Author(s):  
K. V. Kasparyan ◽  
M. V. Rutkovskaya

The article is devoted to the analysis of features of functioning of the digital government in the Chinese State in the first decades of the 21-st century and the perspectives of its further development. In this work the authors give a brief description of the essence of phenomenon of digital government in general. The article explores the specific features of this process in the People’s Republic of China in the third millennium (taking into account the background of this issue). This research examines the influence of functioning of e-government bodies in Сhina on the internal political situation in the country – taking into account such aspects as building a dialogue between authorities and society, perfection of the public service system providing the Chinese citizens with essential public goods, the merits and the demerits of China’s online government are taken into account. This article examines such significant factors in the development of e-government in China as the impact of the global situation at the present stage on international politics and the country’s information security system. This article analyzes the features of the relationship between the Chinese authorities and media corporations operating on the Internet market of the Middle Kingdom (such as, for example, Google), and studies the reasons for the contradictions between them. The study also comprehended strategy of the authorities of the People’s Republic of China in matters of information security of the state, including the active use of Chinese hackers in network conflicts with Western countries, and the actions of special units of the Chinese armed forces created to counter foreign cyber terrorism.


Author(s):  
Divya Tiwari ◽  
Surbhi Thorat

Fake news dissemination is a critical issue in today’s fast-changing network environment. The issues of online fake news have attained an increasing eminence in the diffusion of shaping news stories online. This paper deals with the categorical cyber terrorism threats on social media and preventive approach to minimize their issues. Misleading or unreliable information in form of videos, posts, articles, URLs are extensively disseminated through popular social media platforms such as Facebook, Twitter, etc. As a result, editors and journalists are in need of new tools that can help them to pace up the verification process for the content that has been originated from social media. existing classification models for fake news detection have not completely stopped the spread because of their inability to accurately classify news, thus leading to a high false alarm rate. This study proposed a model that can accurately identify and classify deceptive news articles content infused on social media by malicious users. The news content, social-context features and the respective classification of reported news was extracted from the PHEME dataset using entropy-based feature selection. The selected features were normalized using Min-Max Normalization techniques. The model was simulated and its performance was evaluated by benchmarking with an existing model using detection accuracy, sensitivity, and precision as metrics. The result of the evaluation showed a higher 17.25% detection accuracy, 15.78% sensitivity, but lesser 0.2% precision than the existing model, Thus, the proposed model detects more fake news instances accurately based on news content and social content perspectives. This indicates that the proposed classification model has a better detection rate, reduces the false alarm rate of news instances and thus detects fake news more accurately.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Victoria Jangada Correia

AbstractTerrorism, crime, and war are all familiar notions; however, the way in which these have been altered through cyberspace is not yet fully, nor unanimously, understood through definitions, theories, and approaches. Although the threat level of terrorism in the UK has lowered to moderate, the threat posed by cyber terrorism has nonetheless heightened throughout the COVID pandemic due to the greater necessity and presence of technology in our lives. This research aimed to highlight the necessity for a unanimous cyber terrorism definition and framework and further aimed to determine what perceptions are held by the general public regarding cyber terrorism through a mixed methods approach. The literature review confirms that there is an absence of a unanimously agreed upon definition of cyber terrorism, and furthermore that the existing academic definitions are not compatible with UK legislation. In addition, the literature review highlights an absence of a cyber terrorism framework that classifies what kind of terrorist activity is cyber enabled or cyber dependent. Quantitative data from the online survey find a couple of significant effects implying the necessity for greater diversity amongst stakeholders which could potentially enhance the detection and prevention of terrorism in the UK. The qualitative data find that although there is some agreement amongst the sample population in views held towards cyber terrorism, some misconceptions are nonetheless present which could have implications on the general public’s ability to identify and report cyber terrorist activity. Overall, the findings from the literature review and the primary data collection aid in developing a cyber terrorism definition that is compatible with UK legislative definitions, and further aids in developing a terrorist activity framework that succinctly highlights the inextricable links between traditional, cyber enabled, and cyber-dependent terrorism.


2021 ◽  
pp. 9-13
Author(s):  
V.A. Mazurov ◽  
M.A. Starodubtseva

After the pandemic of the new coronavirus infection, marked by the «lockdowns’ of 2020, the crimesituation both in Russia and in the world has reached a qualitatively new level. We can say that the thresholdof population tolerance predicted at the 12th UN Congress on Crime Prevention and Criminal Justice byV.V. Luneev. Once again, the dialectical law on the transition of quantitative changes to qualitative ones wasconfirmed. It should be noted that this process continues to increase its pace in 2021: all large branches ofcrime are going into cyberspace. On this basis, the strengthening of the interaction of civil society institutionsand law enforcement agencies, especially among the youth, is becoming increasingly important. It is youngpeople who are a potential «risk group» in terrorist and cyber-terrorist crime, primarily as an object ofrecruitment. But it is young people who are the most active users of information and telecommunicationnetworks, including the Internet. In this regard, it seems that the priority lies precisely in the environment ofcivil society institutions that directly work with young people. And one of the main institutions is secondaryand higher education, and it is the network of universities that can become the flagship of the formation ofanti-terrorist ideology and skills in countering cyber terrorism.


2021 ◽  
pp. 28-25
Author(s):  
M.A. Starodubtseva

Simultaneously with the beginning of the coronavirus pandemic and the introduction of a distancelearning format throughout Russia, the process of working with teachers and students to adapt them in thedigital environment is continuously ongoing. This process fully affected the Altai Territory, where the roleof the flagship of higher education was given to the Altai State University. Since the beginning of the 2020pandemic, the university has actively engaged in the field of distance learning and began to apply digitalmethods of communication with students. Dozens of scientific and practical conferences were held in anonline format, which made it possible to significantly smooth the process of adaptation to the new digitalsphere for both teachers and students.Accordingly, the increase in knowledge about the digital world has prompted interest in digitaltechnologies and their adaptation for the needs of criminology, which is directly involved in the analysisand forecasting of countering cyber terrorism. It is expected that the increased involvement of teachers inthe digital environment will lead to an increase in legal education and the youth they teach.Young people who are an active user of the Internet and, in this regard, are the object of onlinerecruitment into terrorist and extremist organizations, are interested in gaining knowledge about counteringsuch actions.To confirm the theses put forward, we carried out a criminological study of the degree of involvementof students and teachers of the Altai Territory in counter-propaganda activities in the context of partiallyremote interaction. In this article, we reflect the main results of our work.


2021 ◽  
pp. 200-220
Author(s):  
Caitríona Heinl

This chapter considers factors that may afford non-state actors like terrorists or extremists in the cyber field an opportunity to access offensive cyber means and how this threat might be best managed. It acknowledges that other terrorism-related areas identify a risk in focusing too narrowly on the technology, rather than dealing with motivations and intentions effectively. Similarly, recommendations from law enforcement authorities include preventing criminals from becoming involved in the first place. The main thrust of this chapter is on solutions and minimizing opportunities for violence from occurring rather than countering extremism itself. The concept of so-called ‘cyber terrorism’ is examined, including current perceptions on the degree of terrorist access to offensive cyber means. Several factors that could affect, to varying degrees, such proliferation of tools and techniques include the following: 1. Rising complexity and vulnerabilities in the cyber domain; 2. Maturing skills; 3. The nexus with criminal groups and hacktivists; 4. Levels of resilience; 5. Media exposure; and 6. International negotiations on state behaviour vis-à-vis cyber weapon proliferation.


2021 ◽  
Author(s):  
Naveen Kunnathuvalappil Hariharan

Cyber-attacks on critical infrastructure, as well as the possibility of cyber-terrorism and even cyberwarfare, pose a threat to societies on a larger scale. Stakeholders are vulnerable to information theft,service disruptions, privacy and identity theft, fraud, espionage and sabotage. This article provides abrief overview of risk management, with a particular emphasis on cyber security and cyber-riskassessment. This article provides an overview of risk management, with a particular emphasis oncyber security detection, prevention, and mitigation techniques. We showed how organizations couldmitigate their cyber risk with careful management.


2021 ◽  
Author(s):  
Denisa-Atena Costovici (Mema) ◽  

Rapid technology development and easy access to virtual space was directly proportional to the proliferation of multiple categories of network users and consumers. This contemporary reality has contributed to the emergence of the illusion of unrestricted accessibility of the online environment and the permissiveness of expression “no matter what”. The cyberspace draws a thin line between freedom of expression and violation of behavioural norms toward others. In order to mitigate the behaviours that transcend ethical boundaries, a series of basic conditions of use and restrictions have been legislated (mainly crimes related to threats and illegal content shared in the virtual world) which do not include all the situations encountered in practice. Given the cyberspace dimension, prevalent in most civilized areas of the planet, as a means and method of intercultural communication, ethical standards should be standardized and applied uniformly. This research paper is an attempt to objectively address the issues of standards and ethical values on the Web, with reference to cyber terrorism, groups of organized crime, hacktivism and states’ implication and responsibility. The main hypothesis of the research emphasizes that the information society requires the creation and enforcement of new laws, because it coexists in a completely new environment - the Network. Referring to the Network links, it is a fact that it cannot be kept safer against unauthorized access, without the application of adequate security measures and techniques. This research paper aims to shed the light on the dangers and threats that challenges the information society thought cyberspace.


Author(s):  
А.И. Епихин ◽  
М.А. Модина

В статье проведено статистическое исследование, посвященное анализу аварийных ситуаций с судами мирового флота валовой вместимостью более 100 брутто-регистровых тонн на море на основе ряда информационных источников, таких как отчеты регистра Ллойда и статистика страхового общества Ллойда, национальных статистических данных, статистики международных морских организаций, статистики природоохранных организаций и прочих источников. Были рассмотрены: распределение аварий по годам, отражены причины потери судов, отдельно выделена статистика по аварийности в полярных широтах. Полученные результаты показывают, что если безэкипажные суда будут введены в эксплуатацию в соответствии с уровнем автономности 5 (с развитием технологий искусственного интеллекта), мы сможем ожидать меньшего количества типичных морских аварий, связанных с «человеческим фактором», однако, нет никаких предпосылок ожидать, что последствия потенциальной аварии будут ниже наблюдаемых. В настоящее время оценка безопасности не учитывает такие немаловажные факторы, которые не возникали в судоходной отрасли в прошлом - такие как киберпиратство или кибертерроризм. А он может быть источником более разрушительных последствий, которые существенно повлияют на безопасность мореплавания автономных судов и восприятие их общественностью. Опираясь на результаты анализа статистических данных, и оперируя к научным изысканиям в этой области, перспектива замены грузовых судов торгового флота с экипажами на борту на полностью автономные суда достаточно проблематична на данном этапе технологий, но с каждым годом научные изыскания развивают эту отрасль, стараясь учитывать все недостатки и возможные риски. The article presents a statistical study devoted to the analysis of emergencies with ships of the world fleet with a gross tonnage of more than 100 gross register tons at sea based on a number of information sources, such as Lloyd's Register reports and Lloyd's Insurance Society statistics, national statistics, statistics of international maritime organizations, statistics of environmental organizations and other sources. The following were considered: the distribution of accidents by year, the reasons for the loss of ships were reflected, statistics on accidents in polar latitudes were separately highlighted. The results obtained show that if unmanned vessels are put into operation in accordance with autonomy level 5 (with the development of artificial intelligence technologies), we can expect fewer typical maritime accidents associated with the "human factor", however, there is no reason to expect that the consequences of a potential accident will be lower than those observed. Currently, the safety assessment does not take into account such important factors that did not arise in the shipping industry in the past, such as cyber piracy or cyber terrorism. And it can be a source of more devastating consequences that will significantly affect the safety of navigation of autonomous vessels and their public perception. Based on the results of the analysis of statistical data, and operating on scientific research in this area, the prospect of replacing cargo ships of the merchant fleet with crews on board with fully autonomous vessels is quite problematic at this stage of technology, but every year scientific research develops this industry, trying to take into account all disadvantages and possible risks.


Author(s):  
Jeeseon Hwang ◽  
Kyung-Shick Choi

Study conducts a qualitative analysis of the objectives, forms, current trends, and characteristics of North Korean cyber terror attacks and suggests a way to ensure further progress towards a successful international policy response. Despite the capricious changes that have recently occurred within the international political atmosphere, North Korea continues to constitute a threat to international stability through its ongoing advancement of nuclear weapons and long-range ballistic missiles. The difficulty of attribution and the relatively low costs associated with launching cyber offensives make cyber terrorism an attractive option for North Korea. In an effort to direct attention to these circumstances, this study aims to share explicit experts’ perspectives in the field of cyberterrorism in South Korea. Consequently, the study purports to contribute to existing academic discussion and practices on cyber terror and cybercrime. Furthermore, this study adopts perspectives from criminological theoretical frameworks and the network theory of world politics to substantiate a more comprehensive view of North Korea’s cyberterrorism which considers the multifaceted and asymmetrical nature of cyberterrorism within the context of postmodern international politicsfections.


Sign in / Sign up

Export Citation Format

Share Document