Javascript must be enabled to continue!
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.
View through CrossRef
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism. The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
Title: Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.
Description:
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers.
Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community.
However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats.
In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem.
Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural.
Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level.
"Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions.
Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P).
Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of terrorism.
The matrix for international cooperation and vulnerability assessment is expected to be used as a model for global response to cyberterrorism and cybercrime.
Related Results
A systematic literature review on cybercrime legislation
A systematic literature review on cybercrime legislation
Background: Cybercrime is a fast-growing digital crime and legislation falling behind with the fast-moving advancement of technology. One important factor projected by literature i...
International legal regulation of transnational cybercrime in cyberspace
International legal regulation of transnational cybercrime in cyberspace
The article considers the international legal regulation of combating cybercrime, which is considered as a transnational phenomenon. In the group of transnational crimes, along wit...
Ancaman Cybercrime di Indonesia: Tinjauan Sistematis dan Peran Cybersecurity pada E-Commerce dalam Hukum Pidana
Ancaman Cybercrime di Indonesia: Tinjauan Sistematis dan Peran Cybersecurity pada E-Commerce dalam Hukum Pidana
The rapid development of information and communication technology in Indonesia brings serious challenges in the form of increasing cybercrime threats, especially in the e-commerce ...
Understanding Cybercrime Offending and Victimization Patterns from a Global Perspective
Understanding Cybercrime Offending and Victimization Patterns from a Global Perspective
Cybercrime research within criminology and criminal justice sciences has increased over the past few decades, improving the knowledge and evidence-base around cybercrime offending ...
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence
The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Approach to Cyber Intelligence
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that i...
The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity
The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity
Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and ...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...

