Journal of Information Security

Volume 3, Issue 3 (July 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

Perception on Cyber Terrorism: A Focus Group Discussion Approach

HTML  Download Download as PDF (Size: 103KB)  PP. 231-237  
DOI: 10.4236/jis.2012.33029    8,582 Downloads   15,028 Views  Citations

ABSTRACT

Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual framework which was obtained during the qualitative study by the authors has been used as a basis for discussion in the focus group discussion. Thirty (30) participants took part in the focus group discussion. The overall results suggest that the proposed cyber terrorism framework is acceptable by the participants. The present study supports our initial research that the cyber terrorism conceptual framework constitutes the following components: target, motivation, tools of attack, domain, methods of attack and impact.

Share and Cite:

R. Ahmad, Z. Yunos, S. Sahib and M. Yusoff, "Perception on Cyber Terrorism: A Focus Group Discussion Approach," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 231-237. doi: 10.4236/jis.2012.33029.

Cited by

[1] Financial innovations in terrorism financing: a case study of Malaysian terror financing
Journal of Criminological …, 2024
[2] Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions
Digital Threats: Research and Practice, 2023
[3] ADAPTING TO CYBERSECURITY CHALLENGES: ASSESSING THE EFFECTIVENESS OF INTERNATIONAL LAW AGAINST CYBER TERRORISM
Journal of Social Research …, 2023
[4] DDoS Capability and Readiness-Evidence from Australian Organisations
2023
[5] Terrorismo cibernetico e sicurezza nazionale: potenziale metamorfosi della minaccia eversiva
2023
[6] Students' Perception towards New Face of Education during This Unprecedented Phase of COVID-19 Outbreak: An Empirical Study of Higher Educational Institutions …
European Journal of Investigation in Health …, 2022
[7] Cyber threats: taxonomy, impact, policies, and way forward.
KSII Transactions on …, 2022
[8] Prospectiva de ciberseguridad nacional para Colombia a 2030
Martínez - Revista Científica General José María …, 2022
[9] FMEA Approach to Risk Factors as a Factor in Implementing Green Supply Chain Management (Study in PT. Gresik Cipta Sejahtera)
2021
[10] CYBERTERRORISM AND CYBERWAR AS NEW THREATS TO THE SECURITY OF THE STATE
2020
[11] On combating online radicalisation: a framework for cybercrime investigations
2019
[12] Cybersecurity: A Nonexperimental Correlational Study of Organizational Employees' Security Perceptions and Vulnerabilities in Information Technology Infrastructure
2019
[13] A Quantitative Evaluation of Digital Natives' and Digital Immigrants' Information Security Compliance in the Context of Protection Motivation Theory
2019
[14] Fighting with Cyber Terror and Terrorism: Threats and Precautions
2019
[15] A Review of Research Studies on Cyber Terror
2019
[16] Media Persuasion in the Islamic State
2019
[17] Estudos prospectivos sobre o ciber terrorismo na Paraíba
2018
[18] CYBERSECURITY PERCEPTIONS OF UNIVERSITY STUDENTS IN TURKEY
Karadeniz Teknik üniversitesi ?leti?im Ara?t?rmalar? Dergisi, 2018
[19] Cyber Dogfighting: A Case Study Evaluation of the Dynamic Decision-Making Used by Hackers in a Turbulent Environment of Cyberspace at a Regional Hacking …
2018
[20] Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse
Computer and Cyber Security, 2018
[21] FOCUS GROUP DISCUSSION (FGD) UNTUK MENGURANGI PROKRASTINASI AKADEMIK PADA SISWA SEKOLAH MENENGAH PERTAMA (SMP)
2018
[22] Understanding Cyber Terrorism from Motivational Perspectives
2017
[23] Google Maps Security Concerns
2017
[24] Cyberterrorism: Using the internet as a weapon of destruction
National Security: Breakthroughs in Research and Practice, 2016
[25] Addressing the Threat of Cyber Terrorism
2016
[26] Cyberterrorism: Using the Internet as
2016
[27] The perception of cyber threats and its associative relationship to the protection motivation theory and generational age groups: A quantitative study
2015
[28] Improving Collaboration of Bali Cattle Supply Chain and Its Impact on Cattle Farmer Income in South Sulawesi, Indonesia
Arabian Journal of Business and Management Review, 2015
[29] A qualitative analysis for evaluating a cyber terrorism framework in Malaysia
Fiber & Integrated Optics, 2015
[30] Strategy Matrix for Containing Cyber-Attacks: A Generic Approach
2015
[31] Adoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats
International Journal of Computer and Information Technology, 2014
[32] Grounding the component of cyber terrorism framework using the grounded theory
Science and Information Conference (SAI), 2014. IEEE, 2014
[33] The Application of Qualitative Method in Developing a Cyber Terrorism Framework
RECENT ADVANCES in ECONOMICS, MANAGEMENT and DEVELOPMENT, 2014
[34] An Overview of Contemporary Cyberspace Activities and the Challenging Cyberspace Crimes/Threats
International Journal of Computer Science and Information Security, 2014
[35] Addressing Cyber Terrorism Threats {By Zahri Bin Yunos, Cybersecurity Malaisia} Written by

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.