Terrorism in Cyberspace : A Critical Review of Dark Web Studies under the Terrorism Landscape
Abstract
Keywords
References
- [1] S. D. Keene, “Terrorism and the internet : a double-edged sword,” J. Money Laund. Control, vol. 14, no. 4, pp. 359–370, Oct. 2011, doi: 10.1108/13685201111173839.
- [2] J. R. C. Nurse and M. Bada, “The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations,” Jan. 2019, doi: 10.1093/oxfordhb/9780198812746.013.36.
- [3] D. Bieda and L. Halawi, “Cyberspace: A Venue for Terrorism,” 2015. Accessed: May 28, 2021. [Online]. Available: https://commons.erau.edu/publication/304.
- [4] G. Weimann, “Cyberterrorism How Real Is the Threat?,” 2004. Accessed: May 28, 2021. [Online]. Available: www.usip.org.
- [5] G. Weimann, “Going Darker ? The Challenge of Dark Net Terrorism,” 2015.
- [6] M. Chertoff and T. Simon, “The Impact of the Dark Web on Internet Governance and Cyber Security,” Glob. Comm. Internet Govrnance, no. 6, pp. 6–8, 2015, [Online]. Available: https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf.
- [7] Statista, “Internet users in the world,” 2021. https://www.statista.com/statistics/617136/digital-population-worldwide/ (accessed Dec. 22, 2020).
- [8] M. de Kunder, “The size of the World Wide Web (The Internet),” 2020. https://www.worldwidewebsize.com/ (accessed Dec. 21, 2020).
Details
Primary Language
English
Subjects
Software Testing, Verification and Validation , Software Engineering (Other)
Journal Section
Research Article
Publication Date
April 30, 2022
Submission Date
June 10, 2021
Acceptance Date
November 8, 2021
Published in Issue
Year 2022 Volume: 5 Number: 1
Cited By
Perceptual Operating Systems for the Trade Associations of Cyber Criminals to Scrutinize Hazardous Content
International Journal of Cyber Warfare and Terrorism
https://doi.org/10.4018/IJCWT.343314THE USE OF „ALTERNATIVE IDENTITY” ACCOUNTS DURING OPERATIONS PERFORMED ON THE INTERNET
Cybersecurity & Cybercrime
https://doi.org/10.5604/01.3001.0054.2856Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
Computer Modeling in Engineering & Sciences
https://doi.org/10.32604/cmes.2023.029911
