Uses of The Internet to Counter Electronic Terrorist Activity
The study aimed at determining the nature of electronic terrorism, its forms and means, as well as clarifying the increasing role played by the Internet in disseminating the ideas and principles of terrorist organizations. The study followed the extrapolation method that formed this study. Targeting the general three different categories, the first category are supporters or current and potential followers, the second category is the international public opinion, or the third category is the enemy masses, the use of terrorists to the means of technology such as the Internet and Intelligence and other devices, for the purposes of promoting their beliefs, directing threat and intimidation messages, for recruitment, mobilization, planning, coordination, financing, information gathering and account penetration, etc., contributing to the implementation of their serious terrorist acts.
2. Adetayo, J. O., S.A. Sanni, and M.O. Ilori (1999). The Impact of Information Technology on Product Marketing: A Case Study of Multinational Company in Nigeria, Technovation, Elsevier Science Ltd.
3. Aldhafferi, Nahier, Charles Watson and A.S.M Sajeev (2013). Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices
4. Aly, A., Macdonald, S., Jarvis, L. & Chen, T. M. (2016) Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization. Studies in Terrorism and Conflict. 2016, VOL. 0, NO. 0, 1–9.
5. Aly, Anne (2010). The Internet as Ideological Battleground, Edith Cowan University Research Online, As of 28/5/2019: http://ro.ecu.edu.au/act/9.
6. Atran, Scott (2004). "Mishandling Suicide Terrorism". The Washington Quarterly. 27 (3).
7. Bist, Ankur Singh (2014). Detection of Logic Bombs, INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCHTECHNOLOGY, 3(2).
8. Cleanitproject, About the Project, The Cleanit Project: Reducing The Impact of Terrorist Use of Internet, http://www.cleanitproject.eu/about-the-project/ (last visited 28/5/2019).
9. Comments of President Bush (2001), Delivered at the Department of Treasury, 7 Nov 2001. Available on-line at http://www.whitehouse.gov/news/releases/2001/11/20011107-4.html as of 28/5/2019.
10. Council of Europe Convention on Cybercrime (2001). Nov. 11, ETS No. 185.
11. Counter-Terrorism Implementation Task Force (CTITF) (2009). Report of the Working Group on Countering the Use of the Internet for Terrorist Purposes.
12. DCSINT (2006) Critical Infrastructure Threats and Terrorism: Handbook Kansas, Deputy Chief of Staff for Intelligence.
13. Denning, D. E. (2000) Cyber terrorism, Testimony before the Special Oversight Panel on Terrorism. IN SERVICES, C. O. A. (Ed.) US, U.S. House of Representatives.
14. Elleithy, Khaled M. (N.D.). Denial of Service Attack Techniques: Analysis, Implementation and Comparison, SYSTEMICS, CYBERNETICS AND INFORMATICS Vol. 3 – No. 1 .
15. Enders, Walter, Gary A. Hoover, Todd Sandler (2014). “The Changing Nonlinear Relationship between Income and Terrorism.” Journal of Conflict Resolution.
16. Gill, Paul; Horgan, John; Deckert, Paige (2014). "Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists". Journal of Forensic Sciences. 59 (2).
17. Gupta, Dipak K. and Yiannis P. Venieris (1981). “Introducing New Dimentions in Macro Models: The Sociopolitical and Institutional Environment.” Economic Development and Cultural Change. 29.
18. Harran, Martin , Nigel McKelvey, Kevin Curran, Nadarajah Subaginy (2015). Software Piracy, Category: Cyber and Network Security Software Piracy.
19. Hazelwood, Steven D. & Sarah Koon-Magnin (2013). Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis, International Journal of Cyber Criminology, Vol. 7, Issue 2.
20. Hoffman, Bruce (2006), Inside Terrorism, 2 ed., Columbia University Press.
21. Holt, Tom, Joshua D. Freilich, Steven Chermak, and Clark McCauley (2015). Political radicalization on the Internet: Extremist content, government control, and the power of victim and jihad videos. Dynamics of Asymmetric Conflict, 8: 107–120.
24. Internet Jihad: A World Wide Web of Terror, ECONOMIST, July 12, 2007 [hereinafter Internet Jihad] available at http://www.economist.com/node/9472498.
25. Jacobson, Michael (2010). Terrorist Financing and the Internet, Journal Studies in Conflict & Terrorism Vol. 33, Issue 4.
26. Jain, Neelesh, Vibhash Shrivastava (2014). "CYBER CRIME CHANGING EVERYTHING – AN EMPIRICAL STUDY", International Journal of Computer Application Issue 4, Vol. 1.
27. Janeczko, Matthew (2014). "'Faced with death, even a mouse bites': Social and religious motivations behind terrorism in Chechnya".
28. Jensen, Bill and Josh Klein (2010). HACKING WORK, Breaking Stupid rules FOR SMART RESULTS, Printed in the United States of America.
29. Kaur, Daljit, Parminder Kaur (2017). Cross-Site-Scripting Attacks and Their Prevention during Development, IJEDR, Vol. 5, Issue 3.
30. Khan, M. S. (2005). Martyrdom Video [Motion picture]. Retrieved from http://www. liveleak.com/view?i¼af8_1181469330.
31. Kiser, Steve (2005). Financing Terror An Analysis and Simulation for Affecting Al Qaeda's Financial Infrastructure, Published by the RAND Corporation.
32. Labi, N. (2006). Jihad 2.0: With the loss of training camps in Afghanistan, terrorists have turned to the Internet to find and train recruits. The story of one pioneer of this effort—the enigmatic “Irhabi 007”—shows how. The Atlantic.
33. Lewis, J. (2002) Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. United State, Center for Strategic and International Studies.
34. Lieberman, Ariel Victoria (2016). Terrorism, the Internet, and Propaganda: A Deadly Combination, Journal of National Security Law & Policy, Vol. 9:95.
35. Macdonald, S., Jarvis, L. & Chen, T. (2013) A Multidisciplinary Conference on Cyberterrorism: Final Report, Cyberterrorism Project Research Report. A Multidisciplinary Conference on Cyberterrorism. Swansea University.
36. Macluhan, Marshall (1978). Interview of Marshall Macluhan with the Italian newspaper Il Tempo, February 19, 1978.
37. Madigan, Michael L. (2017). Handbook of Emergency Management Concepts: A Step-by-Step Approach. CRC Press.
38. Merari, Ariel (2006). "Psychological Aspects of Suicide Terrorism," in Bruce Bongar et al., Psychology of Terrorism. New York: Oxford University Press.
39. Ministry of Security and Justice (2013). Reducing terrorist use of the Internet, The result of a structured public-private dialogue between government representatives, academics, Internet industry, Internet users and non-governmental organizations in the European Union. http://www.rijksoverheid.nl/venj.
40. Mousseau, Michael (2002). "Market Civilization and its Clash with Terror". International Security. 27 (3).
41. Nagamalai, Dhinaharan (2007). Novel Mechanism to Defend DDoS Attacks Caused by Spam, International Journal of Smart Home Vol. 1, No. 2.
42. National Money Laundering Strategy (2003). Departments of the Treasury and Justice. July 2003. Available on-line at www.ustreas.gov/offices/eotffc/publications/ml2003.pdf as of 28/5/2019.
43. Nelson, Anthony (2016). Sandnet++ - A framework for analysing and visualising network traffic from malware, Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX United Kingdom.
44. Norman, Don A. (1988). The Design of Everyday Things. New York: Basic Books.
45. Onlamoon, Nattawat, Jaydip Das Gupta, Prachi Sharma, Kenneth Rogers, Suganthi Suppiah, Jeanne Rhea, Ross J. Molinaro, Christina Gaughan, Beihua Dong, Eric A. Klein, Xiaoxing Qiu, Sushil Devare, Gerald Schochetman, John Hackett, Jr., Robert H. Silverman, and Franc¸ois Villinger (2011). Infection, Viral Dissemination, and Antibody Responses of Rhesus Macaques Exposed to the Human Gammaretrovirus XMRV, JOURNAL OF VIROLOGY, Vol. 85, No. 9.
46. Parker, Tom, and Nick Sitter (2016). “The Four Horsemen of Terrorism: It’s Not Waves, It’s Strains.” Terrorism and Political Violence, vol. 28, issue 2.
47. Purkait, Swapan (2012). Phishing counter measures and their effectiveness – literature review, Information Management & Computer Security, Vol. 20, No. 5.
48. Qaisi, Isser Mohammed Attia (2014). Modern Mechanisms for Reducing Recent Crimes "Electronic Terrorism and the Methods of Confrontation", Scientific Forum "Crimes Emerged in the Light of Regional and International Changes and Changes During the period from 2-4 / 9/2014, Amman, Jordan.
49. Qaisi, Isser Mohammed Attia (2014). Modern Mechanisms for Reducing Recent Crimes "Electronic Terrorism and the Methods of Confrontation", Scientific Forum Crimes that were created in light of regional and international changes and changes during the period from 2-4 / 9/2014, College of Strategic Sciences, Amman, Jordan
50. Razzo, Muzaffar Hassan (2006). Information security, preliminary legal treatment, Journal of Law and Security, Academy of Dubai, No. 1.
51. Rotella, Sebastien (2013). Syria’s Jihadi Migration Emerges as Top Terror Threat in Europe, Beyond, PROPUBLICA, (July 24, 2013, 11:56 AM), http://www.propublica.org/article/ syrias-jihadi-migration-emerges-as-top-terror-threat-in-europe-beyond.
52. Rubidha Devi.D , R.Venkatesan, Raghuraman.K (2016). A STUDY ON SQL INJECTION TECHNIQUES, International Journal of Pharmacy & Technology, Vol. 8, No.4.
53. Samuel, K. O., Osman, W. R. S., Al-Khasawneh, Y. & Duhaim, S. (2014) Cyber Terrorism Attack of the Contemporary Information Technology Age: Issues, Consequences and Panacea. International Journal of Computer Science and Mobile Computing (IJCSMC), 3.
54. See, Also, Quann Li (2005). “Dies Democracy Promote or Reduce Terrorist Incidents?” Journal of Conflict Resolution. 49.
55. Sharma, Bobby (2017). A Pragmatic Way of Logic Bomb Attack Detection Methodology, Indian Journal of Science and Technology, Vol 10(20).
56. Soriano, Manuel R. Torres (2008). Terrorism and the Mass Media after Al Qaeda: A Change of Course?, Athena Intelligence Journal Vol. 3, No 1, pp. 1-20.
57. SRIKANTH T N, AISHWARYA J S, IRSHAD JABEEN, SHRUTHI B, BHOOMIKA G Y (2017). EXPLICIT STUDY ON CYBER CRIMES USING INTERNET, International Journal of Management and Applied Science, Vol.-3, Issue-9.
58. The Clarion Project. (2014). The Islamic State's (ISIS, ISIL) Magazine: All of the issues of the Islamic State's glossy propaganda magazine 'Dabiq,' named after a key site in Muslim apocalypse mythology can be found here.
59. Tyson, Laura (2001). “It’s Time to Set Up the Global War on Poverty.” Business Week.
60. UNITED NATIONS (2018). Introduction to International Terrorism, Counter-Terrorism 1, University Module Series.
61. Vadza, Kejal Chintan (2013). Cyber Crime & its Categories, INDIAN JOURNAL OF APPLIED RESEARCH, Vol. 3, Issue 5.
62. Venieris, Yiannis P. and Dipak K. Gupta (1986). "Income Distribution and Sociopolitical Instability as Determinants of Savings: A Cross-sectional Model," Journal of Political Economy. 94.
63. Walzer, Michael (1977). Just and Unjust Wars: A Moral Argument with Historical Illustrations. Basic Books.
64. Warren, A. C. (2002) Security Against Cyber Terrorism.
65. Willis, H.H., A.R. Morral, T.K. Kellyand J. Medby (2005). Estimating Terrorism Risk. MG-388-RC. Santa Monica, CA, RAND Corporation.
66. Wilson, Samuel F., Teresa M. Lao and Ernesto Escobedo (2016). Terrorist Experts’ Perceptions of How the Internet Has Shaped International Terrorism, Journal of Information Assurance & Cyber security, Vol. 2016.
الحقوق الفكرية (c) 2021 Dr. Nibras Salim Khudhair
هذا العمل مرخص حسب الرخصة Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.