Intellectual Security: Countering Cyberterrorism
Abstract
Researchers develop the conception of intellectual security by relating the introductory understanding of cyberterrorism, the difference between cyberterror attacks, and activities supporting. This study uses an inductive approach to formulate a general framework. The data collection technique used is a secondary data that is obtained through literature review from libraries and internet. The result of this study attempts to clarify the distinction between cyberterror attacks and support by examining them in terms of the generalities of confidentiality, integrity, and vacuity. A breach of confidentiality occurs if an unauthorized stoner earnings access to information. A breach of confidentiality is an act of cyberterror support. There are three introductory generalities of intellectual security; As the moderation of human understanding of religious and political issues, understanding deviation and human civilizations; As the harmony between the state and society to save individuals and groups from doctrinal or intellectual that may be the cause of deviations in behavior and thoughts from the right path; As safety of human thought from deviation which leads to maintaining public order. Our study differs from former exploration by offering the conception of intellectual security to fight cyberterrorism. Researchers believe that this conception can be developed further through subsequent study.
Keywords
Full Text:
PDFReferences
Al-dajah, H. A. (2019). Contemporary Theory of Intellectual Security. ResearchGate, 15(July), 10–22. https://doi.org/10.3968/10733.
Al Osaimi, B. J., & Al Sufyani, D. B. (2018). The Intellectual Security Concepts In The English Textbooks Of The Intermediate Stage In Saudi Arabia:, An Analytical Study. International Interdisciplinary Journal of Education, 7(1), 129. https://doi.org/10.36752/1764-007-001-011.
Almahaireh, A., Alzaben, M., Aladwan, F., & Aljahani, M. (2021). The level of intellectual security and its relationship with life satisfaction among mutah university students. Journal of Social Studies Education Research, 12(3), 28–46.
Ayeni, O. B. (2021). Branding and Marketing Nigerian Churches on Social Media (Issue September 2021). Springer International Publishing. https://doi.org/10.1007/978-3-030-77204-8_6.
Badey, T. J. (1998). Defining international terrorism: A pragmatic approach. Terrorism and Political Violence, 10(1), 90–107. https://doi.org/10.1080/09546559808427445.
Chen, T. M., Jarvis, L., & Macdonald, S. (Eds.). (2014). Cyberterrorism: Understanding, Assessment, and Response. Springer. https://doi.org/10.1007/978-1-4939-0962-9.
Committee, C. D. (2008). Cyber securities and Cyberterrorism. Vardhaman Mahaveer Open University.
Denning, D. E. (1999). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Nautilus Institute for Security and Sustainability. https://doi.org/10.1300/J104v24n01_12.
English, R. (Ed.). (2021). The Cambridge History of Terrorism. Cambridge University Press. https://doi.org/10.1017/9781139540902.
Havlíček, J. (2012). Threat of Cyberterrosim. Association for International Affairs Prague NATO Summit. https://www.amo.cz/wp-content/uploads/2016/01/PSS-Threat-of-Cyberterrorism-NATO.pdf.
Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49–60. https://doi.org/10.5038/1944-0472.4.2.3.
Holt, T. J., Lee, J. R., Freilich, J. D., Chermak, S. M., Bauer, J. M., Shillair, R., & Ross, A. (2020). An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks. Terrorism and Political Violence, 34(7), 1305–1320. https://doi.org/10.1080/09546553.2020.1777987.
Hua, J., & Bapna, S. (2013). The Economic Impact of Cyberterrorism. Journal of Strategic Information Systems, 22(2), 175–186. https://doi.org/10.1016/j.jsis.2012.10.004.
Johnson, D. (2005). Maintaining Intellectual Freedom in a Filtered World. Learning & Leading with Technology, 32(8), 39–41.
Kostadinov, D. (2012). Cyberterrorism Defined (as distinct from “Cybercrime”). InfoSec Institute. https://resources.infosecinstitute.com/topic/cyberterrorism-distinct-from-cybercrime/.
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G. (1999). Cyberterror: Prospects and Implications.
Oprea, D., & Mesnita, G. (2005). The Information System and The Global Terrorism. Collaborative Support Systems in Business and Education, International Workshop, October. ssrn: https://ssrn.com/abstract=906289.
Ottis, R. (2008). Analysis of the (2007) Cyber Attacks Against Estonia from the Information Warfare Perspective. 7th European Conference on Information Warfare and Security 2008, ECIW 2008, April, 163–168.
Piazza, J. A., & Guler, A. (2019). The Online Caliphate: Internet Usage and ISIS Support in the Arab World. Terrorism and Political Violence, 33(6), 1256–1275. https://doi.org/10.1080/ 09546553.2019.1606801.
Tomlinson, J. (2006). Values: The curriculum of moral education. Children and Society, 11(4), 242–251. https://doi.org/10.1111/j.1099-0860.1997.tb00033.x.
Tucker, D. (2000). The Future of Armed Resistance: Cyberterror? Mass Destruction?.
Waswas, D., & Gasaymeh, A.-M. M. (2016). The Role of School Principals in the Governorate of Ma’an in Promoting Intellectual Security among Students. Journal of Education and Learning, 6(1), 193. https://doi.org/10.5539/jel.v6n1p193.
Weimann, G. (2004). Cyberterrorism: How Real is the Threat? https://doi.org/10.1080/ 01296612.2002.11726680.
Wilson, P. H. (2009). Europe ’ s Tragedy: A New History of The Thirty Years War. Penguin Books Limited.
DOI: http://dx.doi.org/10.18415/ijmmu.v9i12.4167
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 International Journal of Multicultural and Multireligious Understanding
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
https://ijmmu.com
editor@ijmmu.com
facebook.com/ijmmu
Copyright © 2014-2018 IJMMU. All rights reserved.