Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events

This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two...

Full description

Saved in:  
Bibliographic Details
Main Author: Lee, Claire Seungeun (Author)
Contributors: Choi, Kyung-Shick ; Shandler, Ryan ; Kayser, Chris
Format: Electronic Article
Language:English
Published: 2021
In: Journal of contemporary criminal justice
Year: 2021, Volume: 37, Issue: 3, Pages: 333-355
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002c 4500
001 1762462869
003 DE-627
005 20210715092045.0
007 cr uuu---uuuuu
008 210708s2021 xx |||||o 00| ||eng c
024 7 |a 10.1177/10439862211001606  |2 doi 
035 |a (DE-627)1762462869 
035 |a (DE-599)KXP1762462869 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Lee, Claire Seungeun  |e VerfasserIn  |0 (DE-588)1175642738  |0 (DE-627)1046914812  |0 (DE-576)516367633  |4 aut 
109 |a Lee, Claire Seungeun  |a Lee, Claire  |a Seungeun Lee, Claire 
245 1 0 |a Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates conflict theory with Jaishankar’s space transition theory. Through a network analysis methodology, we examine the invisible relationships and connections between the national origins and target countries of cyberterror attacks. The analysis focuses on the networks of national origins of terrorists and victims, network structures of Al-Qaeda and ISIS actors, and clustering networks of Al-Qaeda and ISIS cyberterrorists. Results indicate that terror in cyberspace is ubiquitous, more flexible than traditional terrorism, and that cyberattacks mostly occurred within the countries of origin. We conclude by discussing the complex features of cyberterror networks and identify some of the geostrategic implications of the divergent cyber strategies adopted by Al-Qaeda and ISIS. 
650 4 |a space transition theory 
650 4 |a cyber-conflict theory 
650 4 |a Social Network Analysis 
650 4 |a Isis 
650 4 |a Al-Qaeda 
650 4 |a Cyberterrorism 
700 1 |a Choi, Kyung-Shick  |e VerfasserIn  |4 aut 
700 1 |a Shandler, Ryan  |e VerfasserIn  |4 aut 
700 1 |a Kayser, Chris  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Journal of contemporary criminal justice  |d London : Sage, 1978  |g 37(2021), 3, Seite 333-355  |h Online-Ressource  |w (DE-627)324529228  |w (DE-600)2027876-7  |w (DE-576)095238050  |x 1552-5406  |7 nnas 
773 1 8 |g volume:37  |g year:2021  |g number:3  |g pages:333-355 
856 4 0 |u https://doi.org/10.1177/10439862211001606  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3946504388 
LOK |0 003 DE-627 
LOK |0 004 1762462869 
LOK |0 005 20210708061720 
LOK |0 008 210708||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2021-07-07#77AEE25D2BE9B78D6EA8236A6D7584F7C308A29E 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
ORI |a SA-MARC-krimdoka001.raw