Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies
Ali Al Mazari,
Ahmed H. Anjariny,
Shakeel A. Habib and
Additional contact information
Ali Al Mazari: Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia
Ahmed H. Anjariny: Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia
Shakeel A. Habib: Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia
Emmanuel Nyakwende: Alfaisal University, PSCJ Campus, Jeddah, Saudi Arabia
International Journal of Cyber Warfare and Terrorism (IJCWT), 2016, vol. 6, issue 1, 1-12
The aim of this paper is to identify common features in: the definition of cyber terrorism, cyber terrorism targets, cyber terrorism crimes and then develop effective mitigation strategies and countermeasures to tackle this phenomenon. Through rigorous analysis of literature covering academic articles and official reports, we develop cyber terrorism definition taxonomy which includes five elements: target, motive, means, effect and intention; cyber terrorism targets taxonomy identified from the following target areas: military forces, government cyber and physical infrastructures, critical national infrastructures, social and national identity, and private industry and entities. The cyber terrorism risk factors are classified into main five categories: national security, financial, social and cultural, operational disruption and physical destructions risks. The following identified patterns constituted the cyber terrorism targets taxonomy: incursion, destruction, service interruption, disinformation and web sites defacement. The authors categorized effective strategic approaches to tackle cyber terrorism as: administrative, technological, national and local alliances, international alliances, and education, training and psychological approach. They developed cyber terrorism taxonomies which represent a systematic organization and classification of knowledge that improves scientific awareness of cyber terrorism definition, boundaries, potential targets, crime patterns and effective mitigation strategies.
References: Add references at CitEc
Citations: Track citations by RSS feed
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJCWT.2016010101 (application/pdf)
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
Persistent link: https://EconPapers.repec.org/RePEc:igg:jcwt00:v:6:y:2016:i:1:p:1-12
Access Statistics for this article
More articles in International Journal of Cyber Warfare and Terrorism (IJCWT) from IGI Global
Bibliographic data for series maintained by Journal Editor ().