Cyberterrorism: A postmodern view of networks of terror and how computer security experts and law enforcement officials fight them.

dc.contributor.advisorKramer, Eric M.,en_US
dc.contributor.authorMatusitz, Jonathan A.en_US
dc.date.accessioned2013-08-16T12:20:04Z
dc.date.available2013-08-16T12:20:04Z
dc.date.issued2006en_US
dc.description.abstractThe purpose of this study is to investigate how cyberterrorists create networks in order to engage in malicious activities against the Internet and computers. The purpose of the study is also to understand how computer security labs (i.e., in universities) and various agencies (that is, law enforcement agencies such as police departments and the FBI) create joint networks in their fight against cyberterrorists. This idea of analyzing the social networks of two opposing sides rests on the premise that it takes networks to fight networks. The ultimate goal is to show that, because of the postmodern nature of the Internet, the fight between networks of cyberterrorists and networks of computer security experts (and law enforcement officials) is a postmodern fight. Two theories are used in this study: social network theory and game theory.en_US
dc.description.abstractThis study employed qualitative methodology and data were collected via in-depth conversational (face-to-face) interviewing. Twenty-seven computer security experts and law enforcement officials were interviewed. Overall, this study found that cyberterrorists tend not to work alone. Rather, they team up with others through social networks. It was also found that it takes networks to fight networks. As such, it is necessary for experts and officials to combine efforts, through networking, in order to combat, let alone understand, cyberterrorist networks. Of equal relevance is the fact that law enforcement agents and computer security experts do not always engage in battle with cyberterrorists. They sometimes try to interact with them in order to obtain more information about their networks (and vice versa). Finally, four themes were identified from the participants' accounts: (1) postmodern state of chaos, (2) social engineering, (3) know thy enemy, and (4) the enemy of my enemy is my friend.en_US
dc.format.extentx, 483 leaves :en_US
dc.identifier.urihttp://hdl.handle.net/11244/1000
dc.noteAdviser: Eric M. Kramer.en_US
dc.noteSource: Dissertation Abstracts International, Volume: 67-02, Section: A, page: 0383.en_US
dc.subjectCyberterrorism.en_US
dc.subjectComputer hackers Social conditions.en_US
dc.subjectCyberterrorism Prevention.en_US
dc.subjectTerrorists Social conditions.en_US
dc.subjectMass Communications.en_US
dc.subjectPolitical Science, International Law and Relations.en_US
dc.subjectSociology, Criminology and Penology.en_US
dc.thesis.degreePh.D.en_US
dc.thesis.degreeDisciplineDepartment of Communicationen_US
dc.titleCyberterrorism: A postmodern view of networks of terror and how computer security experts and law enforcement officials fight them.en_US
dc.typeThesisen_US
ou.groupCollege of Arts and Sciences::Department of Communication
ou.identifier(UMI)AAI3207541en_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3207541.PDF
Size:
4.03 MB
Format:
Adobe Portable Document Format