Hackers in duty of cyberterrorism
Vol 9, Issue 2, 2025
Abstract
Keywords
Full Text:
PDFReferences
Allahrakha, Naeem (2024): Global Perspectives on Cybercrime Legislation. Journal of Infrastructure, Policy and Development Vol. 8. Issue 10., 1-20.
Atkinson, Sean (2015): Psychology and the hacker – Psychological Incident Handling. SANS Whitepaper, 2015 4–9.
Barber, Richard (2001): Hackers Profiled – Who are they and what are their motivations? Computer Fraud&Security, Vol. 2 15.
Bartkó, Róbert – SÁNTHA, Ferenc (2023): A kibertér műveletek büntetőjogi értelmezésének lehetőségei. Military and Intelligence Cyber Security Research Paper Vol. 2. 1-30.
Brenner, Susan, W. (2006): Cybercrime, Cyberterrorism and Cyberwarfare. Revue internationale de droit pénal Vol. 3. 453-471.
Brenner, Susan, W. (2007): Re-thinking crime control strategies. In. Jewkes, Yvonne (ed.) Crime Online. Willan Publishing: Cullompton, UK 12-28.
Chang, Samuel – HAN YU, Lu – AYUSH, Kumar – DAVID, Yau (2022): Hacker types, motivations, and strategies: A comprehensive framework. Computers in Human Behavior Reports, Vol. 5., 3.
Chiesa, Raoul – DUCCI, Stefania – CIAPPI, Silvio (2009): Profiling Hackers - The Science of Criminal Profiling as Applied to the World of Hacking. Boca Raton, Taylor & Francis Group: London EN
Choi, Kyung-schick; LEE, Claire Seungeun (2018): The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity. International Journal of Cybersecurity Intelligence and Cybercrime Vol. 1. Issue 1., 1-4.CSÍKSZENTMIHÁLYI, Mihály (2008): Flow: The Psychology of Optimal Experience. Harper Perennial: New York, London, USA-EN
CSIS Significant Cyber Incidents since 2006 (https://csis-website-prod.s3.amazonaws.com/s3fs-public/2024-12/241210_Significant_Cyber_Events.pdf?VersionId=6M4z53qCe64xZ4cFQd7nkkTFPrQmeLPB)
Director General Ken McCallum gives latest threat update (2024) Available online: https://www.mi5.gov.uk/director-general-ken-mccallum-gives-latest-threat-update (accessed on 28 December 2024),
Esmailzadeh, Yaser – MOTAGHI, Ebrahim (2024): International Terrorism and Social Threats of Artificial Intelligence. Journal of Globalization Studies Vol. 15. Issue 1. 168-179.
Farkas, Ádám (2018): Gondolatok a 21. századi biztonságról, államról, védelemről. Hadtudomány, Special Issue, 241-256.
Federa Bureau of Investigation Internet Crime Report 2021. Internet Crime Complaint Center Available online: https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf (accessed on 28 December 2024),
Federa Bureau of Investigation Internet Crime Report 2023. Internet Crime Complaint Center Available online: https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf (accessed on 28 December 2024),
Gillespie, Alisdair A. (2016): Cybercrime – Key Issues and Debates. Routledge 107-111. New York NY US
Gordon, Sarah – FORD, Richard (2006): On the Definition and Classification of Cybercrime. Journal of Computer Virology, 2(1) 13-20.
Hutchings, Alice (2013): A Qualitative Analysis of Online Offending and Victimisation, In. Karuppannan Jaishankar – Natti Ronel (ed.): Global Criminology: Crime and Victimization in a Globalized Era, CRC Press: London EN 95.
Kazári, Csaba (2003): Hacker, cracker, warez. A számítógépes alvilág titkai. Panorama: Budapest, HU, 18.
Kelemen, Roland (2023): Hacker – Az egyén mint a kibertér aktív szereplője. In: FARKAS, Ádám & KELEMEN, Roland: Nemzeti biztonság és kibertér. Médiatudományi Intézet. pp. 59-69.
Kelemen, Roland (2023): The Impact of the Russian-Ukrainian Hybrid War on the European Union’s Cybersecurity Policies and Regulations. Connections: The Quarterly Journal Vol. 22. Issue 2., 75-90.
Khalaf, Tahat, MOHAMMED, Habes, AHMED, Mansoori, NOURA, Naqbi, NAIJA, Al Ketbi, IHSAN, Maysari, DINA, Tahat, ABDULAZIZ Altawil (2024): Social media algorithms in countering cyber extremism: A systematic review. Journal of Infrastructure, Policy, and Development 8(8) 1-12 KILGER, Max (2015): Integrating Human Behavior into the Development of Future Cyberterrorism Scenarios, In. 10th International Conference on Availability, Reliability and Security
Kunos, Imre (1999): A számítógépes bűnözés. Belügyi Szemle, Vol. 11. 28-42.LOBACH, Dmitriy (2022): Cyberterrorism as an Atypical Manifestation (form) of Terrorism in the Modern World. Advances in Law Studies Vol 10. No. 3., 36-40.
Kwaku, Thimothy (2022): Securing Critical National Infrastructure Against Hacktivist. Advances in Multidisciplinary and scientific Research Journal Publication Vol. 10. Issue 4., 33-42.
Long, Larissa April: (2012): Profiling Hackers, Sans Institute Reading Room, 26th January 2012, 4–6.
Okpa, J. T., Ugwuoke, C. U., Ajah, B. O., et al. (2022). Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Sage Open: Nigeria, 12(3). https://doi.org/10.1177/21582440221122739.PHILLIPS, Kirsty – DAVIDSON, Julia, C. – FARR, Ruby, R. – BURKHARDT, Christine – CANEPPELE, Stefano – AIKEN, Mary, P. (2022): Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences, 2(2) 379-398.
Panda mediacenter. 14 Types of Hackers to Watch Out For. Panda/mediacenter, 2021 (https://www.pandasecurity.com/en/mediacenter/security/14-types-of-hackers-to-watch-out-for/)
Sarre, Rick – LAU, Yiu-Chung – CHANG, Lennon, Y. C. (2018): Responding to cybercrime: Current trends. Police Practice and Research, 19(6), 515–518.
Shea, Sharon: Types of hackers: Black hat, white hat, red hat and more, TechTarget, SearchSecurity (https://www.techtarget.com/searchsecurity/answer/What-is-red-and-white-hat-hacking)
Taken Smith, Katherine – SMITH, Lawrence Murphy – BURGER, Marcus – BOYLE, Erik S. (2023): Cyber Terrorism Cases and Stock Market Valuation Effects. Information and Computer Security Vol. 31. Issue 4., 385-403.
Terrorism Financing in Australia – National Risk Assessment. Available (2024) online: https://www.austrac.gov.au/sites/default/files/2024-07/2024%20AUSTRAC%20Terrorism%20Financing%20NRA.pdf (accessed on 28 December 2024),
Terrorism Situation and Trend Report 2024 -EUROPOL (https://www.europol.europa.eu/cms/sites/default/files/documents/TE-SAT%202024.pdf)
Turovszkij, Danyil (2020): Orosz hekkerek – Így lettek lázadókból Putyin katonái. Athenaeum: Budapest, HU
Van Beveren, John (2001): A conceptual model of hacker development and motivations. Journal of E-Business, Vol. 2.
Wall, David, S. (2001): Introduction: Cybercrime and the Internet. In. Wall, David, S. (ed.) Crime and the Internet. Routledge: New York, NY, USA, 2.
Xiong, Zhang – ALEX, Tsang – T. WEI, Yue – MICHAEL, Chau (2015): The classification of hackers by knowledge exchange behaviours, Information Systems Frontiers, Vol. 6, 1245.
Xu, Joy – AARON, Lio – HARSHDEEP, Dhaliwal – SORINA, Andrei – SHAKTHIKA, Balakrishnan – UZHMA, Nagani – SUDIPTA, Samadder (2021): Psychological interventions of virtual gamification within academic intrinsic motivation: A systematic review. Journal of Affective Disorders, 21(10)., 444–465.
DOI: https://doi.org/10.24294/jipd10979
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Author(s)
License URL: https://creativecommons.org/licenses/by/4.0/
This site is licensed under a Creative Commons Attribution 4.0 International License.