Cyberterrorism as a threat to the cyber security of Ukraine: A discussion of theoretical aspects
In this article, the authors analyze cyberterrorism as a threat to Ukraine's cyber security. The urgency of the issue declared in the paper is conditioned by the fact that fair number of terrorist acts intende to make harm to the interests of the state, can be committed today both in real world and in cyberspace. As such acts are committed using computer systems and are done in cyberspace, authors propose to define this type of socially dangerous acts as «cyberterrorism». The methodological basis of this study is a set of philosophical, general scientific, special scientific and other methods that are directly applied in legal researches. The authors have done the interpretation of terms making up the conceptual and categorical apparatus of the subject of research. The difference between information terrorism and cyberterrorism has been substantiated by the writers. The emphasis was placed on the necessity to create a Cyber Command that could react fast to challenges in the information security sphere of the state, including acts of cyberterrorism.
Boeckmann, R. & Turpin-Petrosino, C. (2002). Understanding the Harm of Hate Crime. Journal of Social Issues, 58(2), pp. 207-225. DOI: 10.1111/1540-4560.00257
Budhijanto, D. (2019). The Virtual Jurisdiction to Combating Cyberterrorism in Indonesia. Central European Journal of International and Security Studies. Issue 12(4), pp. 61–80. Retrieved from https://www.researchgate.net/publication/332318760_The_Virtual_Jurisdiction_to_
Burayachok, V.L., Tolubko, V.B., Khoroshko, V. O. & Tolyupa S.V. (2015). Information security and cyber security: sociotechnical aspect. Kyiv: DUT, 288 p. Retrieved from http://www.dut.edu.ua/uploads/l_1209_69915296.pdf
Cavelty, M.D. (2007). Cyber-Terror – Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics, 4(1), https://doi.org/10.1300/J516v04n01_03
Cavelty, M.D. (2018). Cybersecurity Research Meets Science and Technology Studies. Politics and Governance, 6(2), pp. 22-30. DOI: https://doi.org/10.17645/pag.v6i2.1385
Cohen-Almagor, R. (2005). Media Coverage of Acts of Terrorism: Troubling Episodes and Suggested Guidelines. Canadian Journal of Communication, 30(3), pp.383-409.
Cyber Policy Center (2021). Clubhouse in China: Is the data safe? Stanford Internet Observatory. Retrieved from https://cyber.fsi.stanford.edu/io/news/clubhouse-china (accessed February 12, 2021).
Decree of the President of Ukraine No. 230/2013. Concept of Combating Terrorism. Verkhovna Rada of Ukraine, April 25, 2013. Retrieved from https://zakon.rada.gov.ua/laws/show/230/2013#Text
Diorditsa, I.V. (2018). Cyber security policy of Ukraine: status and priority areas of implementation: monograph. Zaporizhzhya: Helvetica Publishing House, 548 p.
Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR) relevant theory? International Political Science Review, 27(3), pp. 221–244. https://doi.org/10.1177/0192512106064462
Foros, G.V., Foros, A.V. (2010). Information terrorism as a threat to the national security of Ukraine. Constitutional state, No. 12, pp. 256–261.
Furnell, S.M. and Warren, M.J. (1999). Computer hacking and cyber terrorism: The real threats in the new millennium? Computers and Security, 18(1), pp. 28-34. https://doi.org/10.1016/S0167-4048(99)80006-6
Hryzchuk, V.K. (2011). Terrorism: theoretic and applied aspects. Lviv: Lviv DUVS, 328 p.
Iatsyk, T.P. (2014). Specific features of the information terrorism as one of the methods of information war. НScientific bulletin of the National University of the State Tax Service of Ukraine (economics, jurisprudence), No. 2, pp. 55–60.
Ieroshenko, O. (2012). Explanatory Dictionary of the Modern Ukrainian language. Donetsk: Gloriya Trade, p. 282.
Kondratiev, Ia.Iu, et al. (2004). Detection and investigation of crimes committed in information technology field. Kyiv: Palyvoda A. V., 144 p.
Kubyshkin, O.V. (2002). International-legal issues of the state information security arrangements (Doctoral thesis). Moscow State Law Academy, Moscow. Retrieved from http://pravolib.pp.ua/informatsionnyiy-terrorizm-15103.html
Lux, M.Y. (2018). Defining cyberterrorism. Revista Chilena de Derecho y Tecnología, 7(2), pp. 5-25. http://dx.doi.org/10.5354/0719-2584.2018.51028
Law of Ukraine No. 638-IV. On Counter Terrorism. Verkhovna Rada of Ukraine, March 20, 2003. Retrieved from https://zakon.rada.gov.ua/laws/show/638-15#Text
Law of Ukraine No. 2163-VIII. On Basic Principles of Cyber Security of Ukraine. Verkhovna Rada of Ukraine, October 5, 2017. Retrieved from https://zakon.rada.gov.ua/laws/show/2163-19#Text
Law of Ukraine No. 2289-IV. On Amendments to the Criminal and Criminal and Procedure Codes of Ukraine. Verkhovna Rada of Ukraine, December 23, 2004. Retrieved from https://zakon.rada.gov.ua/laws/show/2289-15#Text
Lee, J. & Macdonald, S. (2015). What Is Cyberterrorism? Findings from a Survey of Researchers. Terrorism and Political Violence, 27(4). DOI: 10.1080/09546553.2013.847827
Lee, Jarvis, Macdonald, S. & Nouri, L. (2014). The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, 37(1), pp. 68-90, DOI: 10.1080/1057610X.2014.853603
Lewis, J.A (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies. Retrieved from https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
Lipkan, V. (2008). Administrative law basis of ensuring national security of Ukraine. (Doctoral thesis). Kyiv National University of Internal Affairs, Kyiv. Retrieved from https://goal-int.org/avtoreferat-2/
Lipkan, V.A., Maksimenko Yu.E., Zhelikhovsky V.M. (2006). Information Security of Ukraine in the Conditions of European Integration. Kyiv: CST, 280 p. Retrieved from http://www.dut.edu.ua/uploads/l_1350_59375830.pdf
Lipkan, V., Baskakov V. (2011). Protection of information with limited access in the fight against organized crime. Fight against organized crime and corruption (theory and practice), Vol. 24, pp. 263-269. Retrieved from http://nbuv.gov.ua/UJRN/boz_2011_24_32
Makarenko, Ie. A. (2011). International cooperation in the field of information security: regional context. Actual problems of international relations, 24(1), pp. 51-62. Retrieved from http://journals.iir.kiev.ua/index.php/apmv/article/view/2116/1879
Mason, O.J., Stevenson, C., & Freedman, F. (2014). Ever-present threats from information technology: The Cyber-Paranoia and Fear Scale. Frontiers in Psychology. https://doi.org/10.3389/fpsyg.2014.01298
Ministry of Foreign Affairs of Japan (2000). Okinawa Charter on Global Information Society. G8 Kyushu-Okinawa Summit Meeting 2000, Kyushu-Okinawa Japan. Retrieved from https://www.mofa.go.jp/policy/economy/summit/2000/documents/charter.html
Pašagić, A. (2020). Failed States and Terrorism: Justifiability of Transnational Interventions from a Counterterrorism Perspective. Perspectives on Terrorism, 14(3), pp. 19-28. Retrieved from https://www.jstor.org/stable/26918297
Poteriakhina, I.S. (March, 2012). Role of cyberterrorism in the current international relations. In K. Balabanov of the President of the Conference, Trends in the development of the modern system of international relations and the world political process. Conference led by Mariupol State University, Mariupol, Ukraine. pp. 37-40. Retrieved from http://repository.mdu.in.ua/jspui/bitstream/123456789/119/1/Tend_rozv_such_
Shelomentsev, V.P. (2012). The essence of organizational support of the cyber security system of Ukraine and the ways to improve it. Fight against organized crime and corruption (theory and practice), No. 2(28), pp. 299–309.
Shyrokova-Murarash, O. G., & Akchurin, Yu. R. (2011). Cybercrime and cyberterrorism as the threats to the global information security: international and legal aspect. Information and law, No. 1, pp. 76–81.
Sokur, S. (2010). Forming common EU security and defense policy in the context of fighting against modern cyberterrorism. Viche. No. 10, pp. 24-27. Retrieved from http://nbuv.gov.ua/UJRN/viche_2010_10_10
Tafoya, W. L. (2011). Cyber Terror. FBI Law Enforcement Bulletin. Retrieved from https://leb.fbi.gov/articles/featured-articles/cyber-terror
Topchiy, V.V. (2015). Cyber terrorism in Ukraine: concept and prevention by criminal and legal and criminological means. Scientific bulletin of Kherson State University. Series: Legal science, Issue 6, pp. 65-68. Retrieved from http://nbuv.gov.ua/UJRN/Nvkhdu_jur_2015_6%283%29__16
Vilić, V.M. (2017). Dark web, cyber terrorisam and cyber warfare: dark side of the cyberspace. Balkan Social Science Review, Vol. 10, pp. 7-25. Retrieved from https://js.ugd.edu.mk/index.php/BSSR/article/view/1939/1708
Weimann, G. (2004). Cyberterrorism: How Real is the Threat? United States Institute of Peace. Retrieved from https://www.usip.org/sites/default/files/sr119.pdf (accessed 02 March 2021), p. 6.
Zelenkov, M.Y., Ponomarev, V.G., Gusev, V.V., Andreev, A.N., & Makarov, O.N. (2020). Identification of Advertising Trends in the Mass Media and On the Internet Used by Modern Terrorism. Cuestiones Políticas, 37(65), pp. 382-398. DOI: https://doi.org/10.46398/cuestpol.3865.26
Zulhuda, S. (2020). The threat of cyberterrorism and the applicability of the convention of cybercrime. At Tahalof (Terrorism in International Law), 3, pp. 20-23. Retrieved from http://irep.iium.edu.my/80983/1/At-Tahalof%20Issue%203%20%28May%202020%29%20English.pdf