Perception on Cyber Terrorism: A Focus Group Discussion Approach

Abstract

Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.

Share and Cite:

R. Ahmad, Z. Yunos, S. Sahib and M. Yusoff, "Perception on Cyber Terrorism: A Focus Group Discussion Approach," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 231-237. doi: 10.4236/jis.2012.33029.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] J. Matusitz, “Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo,” Information Security Journal: A Global Perspective, Vol. 20, No. 1, 2011, pp. 34-44.
[2] M. Dogrul, A. Aslan and E. Celik, “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism,” 2011 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, pp. 1-15.
[3] M. Conway, “Against Cyberterrorism,” Communications of the ACM, Vol. 54, No. 2, 2011, pp. 26-28. doi:10.1145/1897816.1897829
[4] Z. Yunos, S. H. Suid, R. Ahmad and Z. Ismail, “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) Against Cyber Terrorism: Towards Development of a Policy Framework,” IEEE Sixth International Conference on Information Assurance & Security, Atlanta, 23-25 August 2010, pp. 21-27.
[5] P. A. H. Williams, “Information Warfare: Time for a Redefinition,” Proceedings of the 11th Australian Information Warfare & Security Conference, Perth Western, 30 November-2 December, 2010, pp. 37-44.
[6] D. Ho, “The Focus Group Interview: Rising to the Challenge in Qualitative Research,” Australian Review of Applied Linguistics, Vol. 29, No. 1, 2006, pp. 1-19.
[7] J. Bray, N. Johns and D. Kilburn, “An Exploratory Study into the Factors Impeding Ethical Consumption,” Journal of Business Ethics, Vol. 98, No. 4, 2011, pp. 597-608. doi:10.1007/s10551-010-0640-9
[8] Y. Kamarulzaman, “A Focus Group Study of Consumer Motivations for e-Shopping: UK versus Malaysia,” African Journal of Business Management, Vol. 5, No. 16, 2011, pp. 6778-6784.
[9] F. Saleem, M. Hassali, A. Shafie, S. Bashir and M. Atif, “Perceptions of Disease State Management among Pakistani Hypertensive Patients: Findings from a Focus Group Discussion,” Tropical Journal of Pharmaceutical Research, Vol. 10, No. 6, 2011, pp. 833-840. doi:10.4314/tjpr.v10i6.18
[10] D. R. Cooper and P. S. Schindler, “Business Research Method,” McGraw-Hill Companies, Inc., New York, 2008.
[11] UK Cabinet Office, “The UK Cyber Security Strategy—Protecting and Promoting the UK in a Digital World,” 2011. http://www.cabinetoffice.gov.uk/sites/default/files/resources/The UK Cyber Security Strategy-web ver.pdf
[12] N. Veerasamy and J. H. P. Eloff, “Application of Non-Quantitative Modelling in the Analysis of a Network Warfare Environment,” World Academy of Science, Engineering and Technology Conference, Paris, 2008.
[13] D. E. Denning, “Cyberterrorism,” Testimony given to the House Armed Services Committee Special Oversight Panel on Terrorism, 23 May 2000.
[14] J. Rollins and C. Wilson, “Terrorist Capabilities for Cyberattack: Overview and Policy Issues,” CRS Report for Congress, 2007.
[15] M. Mohammad, “The Need to Identify Terrorists and Remove the Causes of Terrorism,” In: H. Makaruddin, Ed., Terrorism and the Real Issues, Pelanduk Publications (M) Sdn Bhd, Subang Jaya, 2003, pp. 29-40.
[16] ACT 574 Penal Code, “Chapter VIA—Offences Relating to Terrorism. Section 130B (1)-(5),” Zul Rafique & Partner Report, 1997.
[17] R. Ahmad and Z. Yunos, “A Dynamic Cyber Terrorism Framework,” International Journal of Computer Science and Information Security, Vol. 10, No. 2, 2012, pp. 149-158.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.