{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:51:52Z","timestamp":1759092712835,"version":"3.41.2"},"reference-count":47,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T00:00:00Z","timestamp":1447027200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11,9]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher\u2019s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey). <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ics-09-2014-0060","type":"journal-article","created":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T03:30:17Z","timestamp":1446521417000},"page":"532-569","source":"Crossref","is-referenced-by-count":4,"title":["Towards a framework for the potential cyber-terrorist threat to critical national infrastructure"],"prefix":"10.1108","volume":"23","author":[{"given":"Abdulrahman","family":"Alqahtani","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122000175253800_b1","unstructured":"Akter, S.\n               , \n                  D\u2019Ambra, J.\n                and \n                  Ray, P.\n                (2011), \u201cAn evaluation of PLS based complex models: the roles of power analysis, predictive relevance and GOF index\u201d, Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI, 4-7 August."},{"key":"key2020122000175253800_b2","doi-asserted-by":"crossref","unstructured":"Anderson, J.C.\n                and \n                  Gerbing, D.W.\n                (1982), \u201cSome methods for respecifying measurement models to obtain unidimensional construct measurement\u201d, \n                  Journal of Marketing Research\n               , Vol. 19 No. 4, pp. 453-460.","DOI":"10.1177\/002224378201900407"},{"key":"key2020122000175253800_b3","doi-asserted-by":"crossref","unstructured":"Anderson, J.C.\n               , \n                  Gerbing, D.W.\n                and \n                  Hunter, J.E.\n                (1987), \u201cOn the assessment of unidimensional measurement: internal and external consistency, and overall consistency criteria\u201d, \n                  Journal of Marketing Research\n               , Vol. 24 No. 4, pp. 432-437.","DOI":"10.1177\/002224378702400412"},{"key":"key2020122000175253800_b4","doi-asserted-by":"crossref","unstructured":"Bagozzi, R.P.\n               , \n                  Yi, Y.\n                and \n                  Phillips, L.W.\n                (1991), \u201cAssessing construct validity in organizational research\u201d, \n                  Administrative Science Quarterly\n               , Vol. 36 No. 3, pp. 421-458.","DOI":"10.2307\/2393203"},{"key":"key2020122000175253800_b5","doi-asserted-by":"crossref","unstructured":"Bartlett, M.S.\n                (1954), \u201cA note on the multiplying factors for various X 2 approximations\u201d, \n                  Journal of the Royal Statistical Society. Series B (Methodological\n               ), Vol. 16 No. 2, pp. 296-298.","DOI":"10.1111\/j.2517-6161.1954.tb00174.x"},{"key":"key2020122000175253800_b6","doi-asserted-by":"crossref","unstructured":"Bentler, P.M.\n                and \n                  Chou, C.-P.\n                (1987), \u201cPractical issues in structural modeling\u201d, \n                  Sociological Methods & Research\n               , Vol. 16 No. 1, pp. 78-117.","DOI":"10.1177\/0049124187016001004"},{"key":"key2020122000175253800_b7","unstructured":"Bollen, K.A.\n                (1998), \n                  Structural Equation Models\n               , Wiley Online Library, Hoboken, NJ."},{"key":"key2020122000175253800_b8","unstructured":"Burke, J.C.\n               , \n                  MacKenzie, S.B.\n                and \n                  Podsakoff, P.M.\n                (2003), \u201cA critical review of construct indicators and measurement model misspecification in marketing and consumer research\u201d, \n                  Journal of Consumer Research\n               , Vol. 30 No. 3, pp. 199-218."},{"key":"key2020122000175253800_b9","unstructured":"Child, D.\n                (1990), \n                  The Essentials of Factor Analysis (2nd ed.)\n               , Cassell Educational, New York, NY."},{"key":"key2020122000175253800_b10","unstructured":"Chin, W.W.\n                (1998), \u201cThe partial least squares approach to structural equation modeling\u201d, \n                  Modern Methods for Business Research\n               , Vol. 295 No. 2, pp. 295-336."},{"key":"key2020122000175253800_b11","doi-asserted-by":"crossref","unstructured":"Chin, W.W.\n                (2010), \u201cHow to write up and report PLS analyses\u201d, \n                  Handbook of Partial Least Squares\n               , Springer, Berlin, Heidelberg, pp. 655-690.","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"key2020122000175253800_b12","doi-asserted-by":"crossref","unstructured":"Churchill, G.A.Jr\n                (1979), \u201cA paradigm for developing better measures of marketing constructs\u201d, \n                  Journal of Marketing Research\n               , Vol. 16 No. 1, pp. 64-73.","DOI":"10.1177\/002224377901600110"},{"key":"key2020122000175253800_b48","unstructured":"Collin, B.\n                (2013), \u201cThe future of cyberterrorism: where the physical and virtual worlds converge\u201d, 11th Annual International Symposium on Criminal Justice Issue, Institute for Security and Intelligence, available at: http:\/\/afgen.com\/terrorism1.html (accessed 16 June 2013)."},{"key":"key2020122000175253800_b13","doi-asserted-by":"crossref","unstructured":"Cronbach, L.J.\n                (1951), \u201cCoefficient alpha and the internal structure of tests\u201d, \n                  Psychometrika\n               , Vol. 16 No. 3, pp. 297-334.","DOI":"10.1007\/BF02310555"},{"key":"key2020122000175253800_b14","doi-asserted-by":"crossref","unstructured":"Diamantopoulos, A.\n                and \n                  Winklhofer, H.M.\n                (2001), \u201cIndex construction with formative indicators: an alternative to scale development\u201d, \n                  Journal of Marketing Research\n               , Vol. 38 No. 2, pp. 269-277.","DOI":"10.1509\/jmkr.38.2.269.18845"},{"key":"key2020122000175253800_b15","doi-asserted-by":"crossref","unstructured":"Edwards, J.R.\n                (2001), \u201cMultidimensional constructs in organizational behavior research: an integrative analytical framework\u201d, \n                  Organizational Research Methods\n               , Vol. 4 No. 2, pp. 144-192.","DOI":"10.1177\/109442810142004"},{"key":"key2020122000175253800_b16","doi-asserted-by":"crossref","unstructured":"Edwards, J.R.\n                and \n                  Bagozzi, R.P.\n                (2000), \u201cOn the nature and direction of relationships between constructs and measures\u201d, \n                  Psychological Methods\n               , Vol. 5 No. 2, pp. 155-174.","DOI":"10.1037\/1082-989X.5.2.155"},{"key":"key2020122000175253800_b17","unstructured":"Field, A.\n                (2013), \n                  Discovering Statistics Using IBM SPSS Statistics\n               , Sage, London."},{"key":"key2020122000175253800_b18","doi-asserted-by":"crossref","unstructured":"Fornell, C.\n                and \n                  Larcker, D.F.\n                (1981), \u201cStructural equation models with unobservable variables and measurement error: algebra and statistics\u201d, \n                  Journal of Marketing Research\n               , Vol. 18 No. 3, pp. 328-388.","DOI":"10.1177\/002224378101800313"},{"key":"key2020122000175253800_b19","doi-asserted-by":"crossref","unstructured":"Gerbing, D.W.\n                and \n                  Anderson, J.C.\n                (1988), \u201cAn updated paradigm for scale development incorporating unidimensionality and its assessment\u201d, \n                  Journal of Marketing Research\n               , Vol. 25 No. 2, pp. 186-192.","DOI":"10.1177\/002224378802500207"},{"key":"key2020122000175253800_b20","doi-asserted-by":"crossref","unstructured":"G\u00f6tz, O.\n               , \n                  Liehr-Gobbers, K.\n                and \n                  Krafft, M.\n                (2010), \u201cEvaluation of structural equation models using the partial least squares (PLS) approach\u201d, \n                  Handbook of Partial Least Squares\n               , Springer, Berlin, Heidelberg, pp. 691-711.","DOI":"10.1007\/978-3-540-32827-8_30"},{"key":"key2020122000175253800_b22","unstructured":"Hair, J.F.\n                (2010), \n                  Multivariate Data Analysis\n               , 7th ed., Prentice Hall, Upper Saddle River, NJ."},{"key":"key2020122000175253800_b21","unstructured":"Hair, J.F.\n                (2014), \n                  A Primer on Partial Least Squares Structural Equations Modeling (PLS-SEM\n               ), SAGE, Los Angeles, CA."},{"key":"key2020122000175253800_b23","unstructured":"Hair, J.F.\n               , \n                  Tatham, R.L.\n               , \n                  Anderson, R.E.\n                and \n                  Black, W.\n                (2006), \n                  Multivariate Data Analysis\n               , 5th ed., Pearson, Prentice Hall Upper Saddle River, NJ."},{"key":"key2020122000175253800_b24","doi-asserted-by":"crossref","unstructured":"Henseler, J.\n               , \n                  Ringle, C.M.\n                and \n                  Sinkovics, R.R.\n                (2009), \u201cThe use of partial least squares path modeling in international marketing\u201d, \n                  Advances in International Marketing\n               , Vol. 20 No. 1, pp. 277-319.","DOI":"10.1108\/S1474-7979(2009)0000020014"},{"key":"key2020122000175253800_b45","unstructured":"Inoguchi, T.\n                (1996) \n                  Our Planet and Human Security\n               , United Nations University, Kobe, available at: www.unu.edu\/unupress\/planet.html#Preface (accessed 8 June 2013)."},{"key":"key2020122000175253800_b25","unstructured":"J\u00f6reskog, K.G.\n                (1993), in \n                  Bollen, K.A.\n                and \n                  Long, J.S.\n                (Eds), \n                  Testing Structural Equation Models\n               , SAGE Publications, Newbury Park, CA, Vol. 154, pp. 294-316."},{"key":"key2020122000175253800_b26","doi-asserted-by":"crossref","unstructured":"Kaiser, H.F.\n                and \n                  Rice, J.\n                (1974), \u201cLittle Jiffy, Mark Iv\u201d, \n                  Educational and Psychological Measurement\n               , Vol. 34 No. 1, pp. 111-117.","DOI":"10.1177\/001316447403400115"},{"key":"key2020122000175253800_b27","unstructured":"Kleinbaum, D.\n               , \n                  Kupper, L.\n               , \n                  Nizam, A.\n                and \n                  Rosenberg, E.\n                (2013), \n                  Applied Regression Analysis and Other Multivariable Methods\n               , Cengage Learning, Boston, MA."},{"key":"key2020122000175253800_b28","doi-asserted-by":"crossref","unstructured":"Law, K.S.\n               , \n                  Wong, C.-S.\n                and \n                  Mobley, W.M.\n                (1998), \u201cToward a taxonomy of multidimensional constructs\u201d, \n                  Academy of Management Review\n               , Vol. 23 No. 4, pp. 741-755.","DOI":"10.5465\/amr.1998.1255636"},{"key":"key2020122000175253800_b29","unstructured":"Leech, L.N.\n               , \n                  Barrett, C.K.\n                and \n                  Morgan, A.G.\n                (2008), \n                  Spss for Intermediate Statistics: Use and Interpretation\n               , 3rd ed., Taylor \n\t\t\t\t\t&\n\t\t\t\t Francis Group, LLC, Mahwah, New Jersey."},{"key":"key2020122000175253800_b30","doi-asserted-by":"crossref","unstructured":"MacKenzie, S.B.\n               , \n                  Podsakoff, P.M.\n                and \n                  Jarvis, C.B.\n                (2005), \u201cThe problem of measurement model misspecification in behavioral and organizational research and some recommended solutions\u201d, \n                  Journal of Applied Psychology\n               , Vol. 90 No. 4, pp. 710-730.","DOI":"10.1037\/0021-9010.90.4.710"},{"key":"key2020122000175253800_b47","doi-asserted-by":"crossref","unstructured":"Mythen, G.\n                and \n                  Walklate, S.\n                (2006), \u201cCriminology and terrorism: which thesis? Risk society or governmentality?\u201d, \n                  The British Journal of Criminology\n               , Vol. 46, pp. 379-398, available at: http:\/\/bjc.oxfordjournals.org\/content\/46\/3\/379.abstract (accessed 7 June 2014).","DOI":"10.1093\/bjc\/azi074"},{"key":"key2020122000175253800_b31","doi-asserted-by":"crossref","unstructured":"Netemeyer, R.G.\n               , \n                  Bearden, W.O.\n                and \n                  Sharma, S.\n                (2003), \n                  Scaling Procedures: Issues and Applications\n               , Sage, London, New Delhi.","DOI":"10.4135\/9781412985772"},{"key":"key2020122000175253800_b33","unstructured":"Nunnally, J.\n                (1978), \n                  Psychometric Theory\n               , McGraw-Hill, New York, NY."},{"key":"key2020122000175253800_b32","unstructured":"Nunnally, J.C.\n                and \n                  Bernstein, I.H.\n                (1994), \n                  Psychometric Theory\n               , 3rd ed., McGraw-Hill, New York, NY."},{"key":"key2020122000175253800_b34","unstructured":"Pallant, J.\n                (2010), \n                  Spss Survival Manual: A Step by Step Guide to Data Analysis Using Spss\n               , McGraw-Hill International, New York, NY."},{"key":"key2020122000175253800_b36","doi-asserted-by":"crossref","unstructured":"Petter, S.\n               , \n                  Straub, D.\n                and \n                  Rai, A.\n                (2007), \u201cSpecifying formative constructs in information systems research\u201d, \n                  MIS Quarterly\n               , Vol. 31 No. 4, pp. 623-656.","DOI":"10.2307\/25148814"},{"key":"key2020122000175253800_b37","unstructured":"Rowe, A.J.\n               , \n                  Davis, S.A.\n                and \n                  Vij, S.\n                (1996), \n                  Intelligent Information Systems: Meeting the Challenge of the Knowledge Era\n               , Quorum, Westport, CT, London."},{"key":"key2020122000175253800_b38","doi-asserted-by":"crossref","unstructured":"Sarstedt, M.\n                and \n                  Ringle, C.M.\n                (2010), \u201cTreating unobserved heterogeneity in PLS path modeling: a comparison of fimix-PLS with different data analysis strategies\u201d, \n                  Journal of Applied Statistics\n               , Vol. 37 No. 8, pp. 1299-1318.","DOI":"10.1080\/02664760903030213"},{"key":"key2020122000175253800_b39","doi-asserted-by":"crossref","unstructured":"Schmid, A.P.\n                (2011), \n                  The Routledge Handbook of Terrorism Research\n               , Routledge, London.","DOI":"10.4324\/9780203828731"},{"key":"key2020122000175253800_b40","unstructured":"Tabachnick, B.G.\n                and \n                  Fidell, L.S.\n                (2007), \u201cMultivariate analysis of variance and covariance\u201d, \n                  Using Multivariate Statistics\n               , Vol. 3, pp. 402-407."},{"key":"key2020122000175253800_b46","doi-asserted-by":"crossref","unstructured":"Tadjbakhsh, S.\n                and \n                  Chenoy, A.\n                (2007), \n                  Human Security, Concepts and Implications\n               , Routledge, London, p. 1.","DOI":"10.4324\/9780203965955"},{"key":"key2020122000175253800_b41","doi-asserted-by":"crossref","unstructured":"Tenenhaus, M.\n               , \n                  Vinzi, V.E.\n               , \n                  Chatelin, Y.-M.\n                and \n                  Lauro, C.\n                (2005), \u201cPLS path modeling\u201d, \n                  Computational Statistics & Data Analysis\n               , Vol. 48 No. 1, pp. 159-205.","DOI":"10.1016\/j.csda.2004.03.005"},{"key":"key2020122000175253800_b42","doi-asserted-by":"crossref","unstructured":"Vinzi, V.E.\n               , \n                  Trinchera, L.\n                and \n                  Amato, S.\n                (2010), \u201cPLS path modeling: from foundations to recent developments and open issues for model assessment and improvement\u201d, \n                  Handbook of Partial Least Squares\n               , Springer, Berlin, Heidelberg, pp. 47-82.","DOI":"10.1007\/978-3-540-32827-8_3"},{"key":"key2020122000175253800_b43","doi-asserted-by":"crossref","unstructured":"Werts, C.E.\n               , \n                  Linn, R.L.\n                and \n                  J\u00f6reskog, K.G.\n                (1974), \u201cIntraclass reliability estimates: testing structural assumptions\u201d, \n                  Educational and Psychological Measurement\n               , Vol. 34 No. 1, pp. 25-33.","DOI":"10.1177\/001316447403400104"},{"key":"key2020122000175253800_b44","unstructured":"Wetzels, M.\n               , \n                  Odekerken-Schroder, G.\n                and \n                  van Oppen, C.\n                (2009), \u201cUsing PLS path modeling for assessing hierarchical construct models: guidelines and empirical illustration\u201d, \n                  Management Information Systems Quarterly\n               , Vol. 33 No. 1, p. 11."}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-09-2014-0060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-09-2014-0060\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-09-2014-0060\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:10Z","timestamp":1753406590000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/23\/5\/532-569\/110974"}},"subtitle":["A quantitative study"],"short-title":[],"issued":{"date-parts":[[2015,11,9]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,11,9]]}},"alternative-id":["10.1108\/ICS-09-2014-0060"],"URL":"https:\/\/doi.org\/10.1108\/ics-09-2014-0060","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2015,11,9]]}}}