Yıl: 2021 Cilt: 9 Sayı: ICONAT Special Issue Sayfa Aralığı: 113 - 128 Metin Dili: İngilizce DOI: 10.20290/estubtdb.1021324 İndeks Tarihi: 15-06-2022

TERRORIST USE OF CYBER TECHNOLOGY

Öz:
The risk posed by terrorist use of cyber technology and cyber terrorism have been of great concern to politicians, decision makers, security officials. This article studies terrorist use of cyber technology and cyber terrorism along with history of cyber-terrorism. Moreover some concepts such as between cyber-crime, cyber-terrorism, cyber-warfare and hactivism will be analysed. Furthermore, the challenges faced by international organisations in tackling cyber terrorism will be discussed; measures introduced in some countries to address cyber terrorism treats are presented as well as discussions on the present and the future treat posed by cyber terrorism and terrorist use of cyber technology.
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • 1] Öğün MN. Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes. Journal of Applied Security Research, 2012;7(2), 203-217.
  • [2] Garrison A Terrorism: The nature of its history. Criminal Justice Studies, 2003; 16(1), 39-52.
  • [3] Hudson R. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why? Federal Research Devision. Library of Congress. Retrieved from http://www.loc.gov/rr/frd/pdf- files/Soc_Psych_of_Terrorism.pdf., 1999.
  • [4] Collin B Future of Cyberterrorism: The Physical and Virtual Worlds Converge. Crime and Justice International, 1997; 13(2), 15-18.
  • [5] Conway M. Reality Check: Assessing the (Un)Likelihood of Cyberterrorism. In J. L. Chen T. (Ed.), Cyberterrorism; pp. 103-121. New York, NY: Springer, 2014.
  • [6] Denning D. Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Retrieved from http://bit.ly/2Er9ZLt.; 2000
  • [7] Ambos K. Responsabilidad penal internacional en el ciberespacio. Retrieved from https://bit.ly/2QNF1D5.; 2015.
  • [8] Yannakogeorgos P. Rethinking the Threat of Cyberterrorism. In T. J. En Chen (Ed.), Cyberterrorism; pp. 43-62. New York: Springer, 2014.
  • [9] Melzer N. Cyberwarfare and International Law. Unidir Resources. Retrieved from https://bit.ly/2UxGmwV., 2011.
  • [10] UNODC. The use of the Internet for Terrorist Purposes. New York: United Nations. Retrieved from https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.; 2012.
  • [11] Öğün MN, Kaya A. Siber Güvenliğin Milli Güvenlik Açısından Önemi ve Alınabilecek Tedbirle, Güvenlik Stratejileri Dergisi, 2013; Volume 9, Issue 18, ss.145-181.
  • [12] Weimann G. Cyberterrorism: The Sum of All Fears. Studies in Conflict and Terrorism, 2005; 28(2), 129-1. doi:/abs/10.1080/10576100590905110.
  • [13] Jarvis G. Comprehensive Survey of Cyber-Terrorism. Retrieved from https://www.cse.wustl.edu/~jain/cse571-11/ftp/terror/index.html.; 2011.
  • [14] Terrorism C. o. (Ed.). Responses to Cyber Terrorism (1 ed., Vol. 34). Ankara, Turkey: IOS Press., 2008.
  • [15] Goodman S, Kirk J, Kirk M Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 2007; 74(2), 193-210. Retrieved from 10.1016/j.techfore.2006.07.007.
  • [16] Villegas DM. Contribuciones para un concepto de terrorismo en el derecho penal chileno. Política Criminal, 2016; 11(21). Retrieved from 10.4067/S0718-33992016000100006.
  • [17] Cancio MM. El delito de pertenencia a una organización terrorista en el código penal español. Revista de Estudios de la Justicia, 2010; (12), 147-164. Retrieved from 10.5354/0718- 4735.2011.15233.
  • 18] Mañalich J. El terrorismo ante el derecho penal: la propuesta legislativa del gobierno como retroceso. Anuario de Derecho Público UDP, 2015; 154-171.
  • [19] Gillespie A. Cybercrime: Key Issues and Debates. London : Routledge 2016. [20] Jones A. Cyber Terrorism: Fact or Fiction. Computer Fraud and Security(6), 4-7. Retrieved from 10.1016/S1361-3723(05)70220-7. 2005.
  • [21] Laura ML. Retrieved September 22, 2019, from google: https://scielo.conicyt.cl/scielo.php?script=sci_arttext&pid=S0719-25842018000200005#aff1.
  • [22] Crenshaw M.. The Causes of Terrorism. Comparative Politics, 1981; 13(4), 379-399.
  • [23] González CE. Los estudios sobre terrorismo: Balance de los últimos 25 años. Espacio Abierto, Cuaderno Venezolano de Sociología, 2016; 25(4), 61-76. Retrieved from http://bit.ly/2ErZnvH.
  • [24] Carnevali R. El derecho penal frente al terrorismo: Hacia un modelo punitivo particular y sobre el tratamiento de la tortura. Revista de Derecho, 2010; 109-145.
  • [25] Gibbs J. Conceptualization of Terrorism. American Sociological Review, 1989; 54(3), 329-340.
  • [26] Ganor B. Defining Terrorism: Is One Man’s Terrorist another Man’s Freedom Fighter? Police Practice and Research, 2002; 3(4), 287-304.
  • [27] Boeckmann R. Turpin-Petrosino C. Understanding the Harm of Hate Crime. Journal of Social Issues, 2002; 58(2), 207-225.
  • [28] Poveda Criado, M. Torrente Barredo, Opción B. Redes sociales y ciberterrorismo: Las TIC como herramienta terrorista, 2016; 32(8), 509-518.
  • [29] Clough J. Principles of Cybercrime. New York: Cambridge University Press, 2010.
  • [30] D’Aiuto, G. En Levita, L. I reati informatici. Milan: Giuffrè, 2012.
  • [31] Alexander DC. Cyber Threats Against the North Atlantic Treaty Organization (NATO) and Selected Responses, 2014. Retrieved 10 31, 2019, from https://dergipark.org.tr/tr/download/article-file/89251.
  • [32] Brenner SW. Cybercrime, cyberterrorism and cyberwarfare. Revue internationale de droit pénal, 2006; 77, 453-471.
  • [33] littl3field. Cyber Terrorism: understanding and preventing acts of terror within our cyber space, 2011. Retrieved from littlefield.co: https://littlefield.co/cyber-terrorism-understanding-and- preventing-acts-of-terror-within-our-cyber-space-26ae6d53cfbb.
  • [34] Öğün MN. et all Information Technologies and Reaching to Information Society. Revista Electrónica de Investigación en Ciencias Económicas, 2020; Vol. 8, No. 16, pp:412-448.
APA OGUN M, YURTSEVER S, ASLAN M, ELBURASI M (2021). TERRORIST USE OF CYBER TECHNOLOGY. , 113 - 128. 10.20290/estubtdb.1021324
Chicago OGUN Mehmet Nesip,YURTSEVER Serdar,ASLAN MURAT,ELBURASI Mohamed TERRORIST USE OF CYBER TECHNOLOGY. (2021): 113 - 128. 10.20290/estubtdb.1021324
MLA OGUN Mehmet Nesip,YURTSEVER Serdar,ASLAN MURAT,ELBURASI Mohamed TERRORIST USE OF CYBER TECHNOLOGY. , 2021, ss.113 - 128. 10.20290/estubtdb.1021324
AMA OGUN M,YURTSEVER S,ASLAN M,ELBURASI M TERRORIST USE OF CYBER TECHNOLOGY. . 2021; 113 - 128. 10.20290/estubtdb.1021324
Vancouver OGUN M,YURTSEVER S,ASLAN M,ELBURASI M TERRORIST USE OF CYBER TECHNOLOGY. . 2021; 113 - 128. 10.20290/estubtdb.1021324
IEEE OGUN M,YURTSEVER S,ASLAN M,ELBURASI M "TERRORIST USE OF CYBER TECHNOLOGY." , ss.113 - 128, 2021. 10.20290/estubtdb.1021324
ISNAD OGUN, Mehmet Nesip vd. "TERRORIST USE OF CYBER TECHNOLOGY". (2021), 113-128. https://doi.org/10.20290/estubtdb.1021324
APA OGUN M, YURTSEVER S, ASLAN M, ELBURASI M (2021). TERRORIST USE OF CYBER TECHNOLOGY. Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler, 9(ICONAT Special Issue), 113 - 128. 10.20290/estubtdb.1021324
Chicago OGUN Mehmet Nesip,YURTSEVER Serdar,ASLAN MURAT,ELBURASI Mohamed TERRORIST USE OF CYBER TECHNOLOGY. Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler 9, no.ICONAT Special Issue (2021): 113 - 128. 10.20290/estubtdb.1021324
MLA OGUN Mehmet Nesip,YURTSEVER Serdar,ASLAN MURAT,ELBURASI Mohamed TERRORIST USE OF CYBER TECHNOLOGY. Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler, vol.9, no.ICONAT Special Issue, 2021, ss.113 - 128. 10.20290/estubtdb.1021324
AMA OGUN M,YURTSEVER S,ASLAN M,ELBURASI M TERRORIST USE OF CYBER TECHNOLOGY. Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler. 2021; 9(ICONAT Special Issue): 113 - 128. 10.20290/estubtdb.1021324
Vancouver OGUN M,YURTSEVER S,ASLAN M,ELBURASI M TERRORIST USE OF CYBER TECHNOLOGY. Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler. 2021; 9(ICONAT Special Issue): 113 - 128. 10.20290/estubtdb.1021324
IEEE OGUN M,YURTSEVER S,ASLAN M,ELBURASI M "TERRORIST USE OF CYBER TECHNOLOGY." Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler, 9, ss.113 - 128, 2021. 10.20290/estubtdb.1021324
ISNAD OGUN, Mehmet Nesip vd. "TERRORIST USE OF CYBER TECHNOLOGY". Eskişehir Teknik Üniversitesi Bilim ve Teknoloji Dergisi b- Teorik Bilimler 9/ICONAT Special Issue (2021), 113-128. https://doi.org/10.20290/estubtdb.1021324