Cyberterrorism as a threat to the cyber security of Ukraine: A discussion of theoretical aspects

Keywords: cyber security, cyberspace, cyberterrorism, information terrorism, Cyber Command.

Abstract

In this article, the authors analyze cyberterrorism as a threat to Ukraine's cyber security. The urgency of the issue declared in the paper is conditioned by the fact that fair number of terrorist acts intende to make harm to the interests of the state, can be committed today both in real world and in cyberspace. As such acts are committed using computer systems and are done in cyberspace, authors propose to define this type of socially dangerous acts as «cyberterrorism». The methodological basis of this study is a set of philosophical, general scientific, special scientific and other methods that are directly applied in legal researches. The authors have done the interpretation of terms making up the conceptual and categorical apparatus of the subject of research. The difference between information terrorism and cyberterrorism has been substantiated by the writers. The emphasis was placed on the necessity to create a Cyber Command that could react fast to challenges in the information security sphere of the state, including acts of cyberterrorism.

Downloads

Download data is not yet available.

Author Biographies

Ihor Diorditsa, Kyiv National University of Technologies and Design, Ukraine.

Prof., DSc, Kyiv National University of Technologies and Design, Ukraine.

Kateryna Katerynchuk, Kyiv National University of Technologies and Design, Ukraine.

Prof., DSc, Kyiv National University of Technologies and Design, Ukraine.

Armenui Telestakova, Kyiv National University of Technologies and Design, Ukraine.

Associate Prof., PhD, Kyiv National University of Technologies and Design, Ukraine.

Nataliia Kulak, Kyiv National University of Technologies and Design, Ukraine.

Associate Prof., PhD, Kyiv National University of Technologies and Design, Ukraine.

Andrii Nastiuk, Academy of Labor, Social Relations and Tourism, Ukraine.

Associate Prof., PhD, Academy of Labor, Social Relations and Tourism, Ukraine.

References

Berner, S. (2003). Cyber-Terrorism: Reality or Paranoia? South African Journal of Information Management, 5(1), pp. 1-4. DOI: 10.4102/sajim.v5i1.208

Boeckmann, R. & Turpin-Petrosino, C. (2002). Understanding the Harm of Hate Crime. Journal of Social Issues, 58(2), pp. 207-225. DOI: 10.1111/1540-4560.00257

Budhijanto, D. (2019). The Virtual Jurisdiction to Combating Cyberterrorism in Indonesia. Central European Journal of International and Security Studies. Issue 12(4), pp. 61–80. Retrieved from https://www.researchgate.net/publication/332318760_The_Virtual_Jurisdiction_to_
Combating_Cyberterrorism_in_Indonesia

Burayachok, V.L., Tolubko, V.B., Khoroshko, V. O. & Tolyupa S.V. (2015). Information security and cyber security: sociotechnical aspect. Kyiv: DUT, 288 p. Retrieved from http://www.dut.edu.ua/uploads/l_1209_69915296.pdf

Cavelty, M.D. (2007). Cyber-Terror – Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics, 4(1), https://doi.org/10.1300/J516v04n01_03

Cavelty, M.D. (2018). Cybersecurity Research Meets Science and Technology Studies. Politics and Governance, 6(2), pp. 22-30. DOI: https://doi.org/10.17645/pag.v6i2.1385

Cohen-Almagor, R. (2005). Media Coverage of Acts of Terrorism: Troubling Episodes and Suggested Guidelines. Canadian Journal of Communication, 30(3), pp.383-409.

Cyber Policy Center (2021). Clubhouse in China: Is the data safe? Stanford Internet Observatory. Retrieved from https://cyber.fsi.stanford.edu/io/news/clubhouse-china (accessed February 12, 2021).

Decree of the President of Ukraine No. 230/2013. Concept of Combating Terrorism. Verkhovna Rada of Ukraine, April 25, 2013. Retrieved from https://zakon.rada.gov.ua/laws/show/230/2013#Text

Diorditsa, I.V. (2018). Cyber security policy of Ukraine: status and priority areas of implementation: monograph. Zaporizhzhya: Helvetica Publishing House, 548 p.

Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR) relevant theory? International Political Science Review, 27(3), pp. 221–244. https://doi.org/10.1177/0192512106064462

Foros, G.V., Foros, A.V. (2010). Information terrorism as a threat to the national security of Ukraine. Constitutional state, No. 12, pp. 256–261.

Furnell, S.M. and Warren, M.J. (1999). Computer hacking and cyber terrorism: The real threats in the new millennium? Computers and Security, 18(1), pp. 28-34. https://doi.org/10.1016/S0167-4048(99)80006-6

Hryzchuk, V.K. (2011). Terrorism: theoretic and applied aspects. Lviv: Lviv DUVS, 328 p.

Iatsyk, T.P. (2014). Specific features of the information terrorism as one of the methods of information war. НScientific bulletin of the National University of the State Tax Service of Ukraine (economics, jurisprudence), No. 2, pp. 55–60.

Ieroshenko, O. (2012). Explanatory Dictionary of the Modern Ukrainian language. Donetsk: Gloriya Trade, p. 282.

Kondratiev, Ia.Iu, et al. (2004). Detection and investigation of crimes committed in information technology field. Kyiv: Palyvoda A. V., 144 p.

Kubyshkin, O.V. (2002). International-legal issues of the state information security arrangements (Doctoral thesis). Moscow State Law Academy, Moscow. Retrieved from http://pravolib.pp.ua/informatsionnyiy-terrorizm-15103.html

Lux, M.Y. (2018). Defining cyberterrorism. Revista Chilena de Derecho y Tecnología, 7(2), pp. 5-25. http://dx.doi.org/10.5354/0719-2584.2018.51028

Law of Ukraine No. 638-IV. On Counter Terrorism. Verkhovna Rada of Ukraine, March 20, 2003. Retrieved from https://zakon.rada.gov.ua/laws/show/638-15#Text

Law of Ukraine No. 2163-VIII. On Basic Principles of Cyber Security of Ukraine. Verkhovna Rada of Ukraine, October 5, 2017. Retrieved from https://zakon.rada.gov.ua/laws/show/2163-19#Text

Law of Ukraine No. 2289-IV. On Amendments to the Criminal and Criminal and Procedure Codes of Ukraine. Verkhovna Rada of Ukraine, December 23, 2004. Retrieved from https://zakon.rada.gov.ua/laws/show/2289-15#Text

Lee, J. & Macdonald, S. (2015). What Is Cyberterrorism? Findings from a Survey of Researchers. Terrorism and Political Violence, 27(4). DOI: 10.1080/09546553.2013.847827

Lee, Jarvis, Macdonald, S. & Nouri, L. (2014). The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, 37(1), pp. 68-90, DOI: 10.1080/1057610X.2014.853603

Lewis, J.A (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies. Retrieved from https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf

Lipkan, V. (2008). Administrative law basis of ensuring national security of Ukraine. (Doctoral thesis). Kyiv National University of Internal Affairs, Kyiv. Retrieved from https://goal-int.org/avtoreferat-2/

Lipkan, V.A., Maksimenko Yu.E., Zhelikhovsky V.M. (2006). Information Security of Ukraine in the Conditions of European Integration. Kyiv: CST, 280 p. Retrieved from http://www.dut.edu.ua/uploads/l_1350_59375830.pdf

Lipkan, V., Baskakov V. (2011). Protection of information with limited access in the fight against organized crime. Fight against organized crime and corruption (theory and practice), Vol. 24, pp. 263-269. Retrieved from http://nbuv.gov.ua/UJRN/boz_2011_24_32

Makarenko, Ie. A. (2011). International cooperation in the field of information security: regional context. Actual problems of international relations, 24(1), pp. 51-62. Retrieved from http://journals.iir.kiev.ua/index.php/apmv/article/view/2116/1879

Mason, O.J., Stevenson, C., & Freedman, F. (2014). Ever-present threats from information technology: The Cyber-Paranoia and Fear Scale. Frontiers in Psychology. https://doi.org/10.3389/fpsyg.2014.01298

Ministry of Foreign Affairs of Japan (2000). Okinawa Charter on Global Information Society. G8 Kyushu-Okinawa Summit Meeting 2000, Kyushu-Okinawa Japan. Retrieved from https://www.mofa.go.jp/policy/economy/summit/2000/documents/charter.html

Pašagić, A. (2020). Failed States and Terrorism: Justifiability of Transnational Interventions from a Counterterrorism Perspective. Perspectives on Terrorism, 14(3), pp. 19-28. Retrieved from https://www.jstor.org/stable/26918297

Poteriakhina, I.S. (March, 2012). Role of cyberterrorism in the current international relations. In K. Balabanov of the President of the Conference, Trends in the development of the modern system of international relations and the world political process. Conference led by Mariupol State University, Mariupol, Ukraine. pp. 37-40. Retrieved from http://repository.mdu.in.ua/jspui/bitstream/123456789/119/1/Tend_rozv_such_
systemy_MV_2012.pdf

Shelomentsev, V.P. (2012). The essence of organizational support of the cyber security system of Ukraine and the ways to improve it. Fight against organized crime and corruption (theory and practice), No. 2(28), pp. 299–309.

Shyrokova-Murarash, O. G., & Akchurin, Yu. R. (2011). Cybercrime and cyberterrorism as the threats to the global information security: international and legal aspect. Information and law, No. 1, pp. 76–81.

Sokur, S. (2010). Forming common EU security and defense policy in the context of fighting against modern cyberterrorism. Viche. No. 10, pp. 24-27. Retrieved from http://nbuv.gov.ua/UJRN/viche_2010_10_10

Tafoya, W. L. (2011). Cyber Terror. FBI Law Enforcement Bulletin. Retrieved from https://leb.fbi.gov/articles/featured-articles/cyber-terror

Topchiy, V.V. (2015). Cyber terrorism in Ukraine: concept and prevention by criminal and legal and criminological means. Scientific bulletin of Kherson State University. Series: Legal science, Issue 6, pp. 65-68. Retrieved from http://nbuv.gov.ua/UJRN/Nvkhdu_jur_2015_6%283%29__16

Vilić, V.M. (2017). Dark web, cyber terrorisam and cyber warfare: dark side of the cyberspace. Balkan Social Science Review, Vol. 10, pp. 7-25. Retrieved from https://js.ugd.edu.mk/index.php/BSSR/article/view/1939/1708

Weimann, G. (2004). Cyberterrorism: How Real is the Threat? United States Institute of Peace. Retrieved from https://www.usip.org/sites/default/files/sr119.pdf (accessed 02 March 2021), p. 6.

Zelenkov, M.Y., Ponomarev, V.G., Gusev, V.V., Andreev, A.N., & Makarov, O.N. (2020). Identification of Advertising Trends in the Mass Media and On the Internet Used by Modern Terrorism. Cuestiones Políticas, 37(65), pp. 382-398. DOI: https://doi.org/10.46398/cuestpol.3865.26

Zulhuda, S. (2020). The threat of cyberterrorism and the applicability of the convention of cybercrime. At Tahalof (Terrorism in International Law), 3, pp. 20-23. Retrieved from http://irep.iium.edu.my/80983/1/At-Tahalof%20Issue%203%20%28May%202020%29%20English.pdf
Published
2021-05-31
How to Cite
Diorditsa, I., Katerynchuk, K., Telestakova, A., Kulak, N., & Nastiuk, A. (2021). Cyberterrorism as a threat to the cyber security of Ukraine: A discussion of theoretical aspects. Amazonia Investiga, 10(40), 73-83. https://doi.org/10.34069/AI/2021.40.04.8
Section
Articles