{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T22:41:41Z","timestamp":1651876901761},"reference-count":71,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1,1]]},"abstract":"<p>Discussions regarding terrorism are more relevant today than ever before. Terror threats can take on many forms from physical violence against military forces, individual companies, and ordinary citizens, to actions against infrastructure, to cyber terrorism. These forms of terror and others, in a number of ways, threaten the physical and financial safety of people around the world. The purpose of this qualitative research study is to evaluate the effects of terrorism\u2014particularly the attacks on September 11, 2001\u2014on U.S. enterprises in the period since the attacks. Utilizing interviews with representatives from various industries, the authors found that employees with long company histories believe their companies have implemented changes regarding their security measures as a safeguard against possible future terrorist attacks. The research findings revealed that while businesses have made changes in their use of technology to change their (1) cybersecurity, (2) training methods, and (3) hiring processes, there remains a gap in understanding the efficacy and efficiency of these changes. Though the September 11 attacks raised the concerns regarding terrorism overall and formed the genesis for thinking about the effects of terrorism, the authors found that interviewees had limited knowledge of how terrorist activities truly affected their business, and identified a strong need to empirically study the technology changes implemented in the past two decades as a response to terrorism, and a need for a thorough sharing of knowledge within the cybersecurity industry to other businesses.<\/p>","DOI":"10.4018\/ijcwt.2020010102","type":"journal-article","created":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T18:40:31Z","timestamp":1579286431000},"page":"15-33","source":"Crossref","is-referenced-by-count":0,"title":["Terrorism Effects on Businesses Post 9\/11"],"prefix":"10.4018","volume":"10","author":[{"given":"Mariah Talia","family":"Solis","sequence":"first","affiliation":[{"name":"University of Tampa, USA"}]},{"given":"Jessica","family":"Pearson","sequence":"additional","affiliation":[{"name":"University of Tampa, USA"}]},{"given":"Deirdre P","family":"Dixon","sequence":"additional","affiliation":[{"name":"University of Tampa, USA"}]},{"given":"Abigail","family":"Blanco","sequence":"additional","affiliation":[{"name":"University of Tampa, USA"}]},{"given":"Raymond","family":"Papp","sequence":"additional","affiliation":[{"name":"University of Tampa, USA"}]}],"member":"2432","reference":[{"key":"IJCWT.2020010102-0","doi-asserted-by":"crossref","unstructured":"Adlakha, R., Sharma, S., Rawat, A., & Sharma, K. (2019). Cyber security goals, issues, categorization & data breaches. Paper presented at the2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon) (pp. 397-402). Academic Press.","DOI":"10.1109\/COMITCon.2019.8862245"},{"key":"IJCWT.2020010102-1","author":"K. E.Ahmed","year":"2019"},{"key":"IJCWT.2020010102-2","doi-asserted-by":"publisher","DOI":"10.5897\/JIIS2015.0089"},{"key":"IJCWT.2020010102-3","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9864-0"},{"key":"IJCWT.2020010102-4","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-019-04239-z"},{"key":"IJCWT.2020010102-5","doi-asserted-by":"publisher","DOI":"10.3390\/admsci6010001"},{"key":"IJCWT.2020010102-6","unstructured":"Belasco, A., Eaglen, M., Hartig, L., Jonas, T., McCord, M., & Mueller, J. (2018). Counterterrorism spending: Protecting America while promoting efficiencies and accountability: The Stimson Center. Retrieved from https:\/\/www.stimson.org\/sites\/default\/files\/file-attachments\/CT_Spending_Report_0.pdf"},{"key":"IJCWT.2020010102-7","doi-asserted-by":"publisher","DOI":"10.1108\/QMR-06-2016-0053"},{"key":"IJCWT.2020010102-8","author":"R. E.Boyatzis","year":"1998","journal-title":"Transforming qualitative information: Thematic analysis and code development"},{"key":"IJCWT.2020010102-9","unstructured":"Brumfield, C. (2019, May 1). Why local governments are a hot target for cyberattacks. CSO from IDG Communications, Inc. Retrieved from https:\/\/www.csoonline.com\/article\/3391589\/why-local-governments-are-a-hot-target-for-cyberattacks.html"},{"key":"IJCWT.2020010102-10","unstructured":"California Emergency Medical Services Authority. (2019). Hospital incident command system. State of California, CA.gov. Retrieved from https:\/\/emsa.ca.gov\/disaster-medical-services-division-hospital-incident-command-system-resources\/"},{"key":"IJCWT.2020010102-11","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2014.975646"},{"key":"IJCWT.2020010102-12","unstructured":"Coleman, M. (2014, April 27). Mission creep: Homeland Security a \u2018runaway train\u2019. Albuquerque Journal. Retrieved from https:\/\/www.abqjournal.com\/390438\/homeland-security-a-runaway-train.html"},{"key":"IJCWT.2020010102-13","doi-asserted-by":"publisher","DOI":"10.4135\/9781452230153"},{"key":"IJCWT.2020010102-14","author":"J. W.Creswell","year":"2013","journal-title":"Qualitative inquiry and research design: Choosing among five approaches"},{"issue":"1","key":"IJCWT.2020010102-15","first-page":"31","article-title":"The economic determinants of terrorism.","volume":"9","author":"J.Cruz Lugovskyy","year":"2015","journal-title":"International Journal of the Academic Business World"},{"key":"IJCWT.2020010102-16","author":"D.D\u2019Souza","year":"2018","journal-title":"Death of a nation: Plantation politics and the making of the democratic party"},{"key":"IJCWT.2020010102-17","unstructured":"Duggan, W. (2019, September 11). This day in market history: US markets close following 9\/11 attack. Yahoo! Finance. Retrieved from https:\/\/finance.yahoo.com\/news\/day-market-history-us-markets-110000493.html"},{"issue":"4","key":"IJCWT.2020010102-18","first-page":"137","article-title":"The effect of training on employee performance.","volume":"5","author":"A.Elnaga","year":"2013","journal-title":"European Journal of Business and Management"},{"key":"IJCWT.2020010102-19","unstructured":"Engel, P., & Ioanes, E. (2019, September 10). What happened on 9\/11, 18 years ago. Business Insider. Retrieved from https:\/\/www.businessinsider.com\/what-happened-on-911-why-2016-9"},{"key":"IJCWT.2020010102-20","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-016-3233-4"},{"key":"IJCWT.2020010102-21","doi-asserted-by":"publisher","DOI":"10.1002\/joec.12074"},{"key":"IJCWT.2020010102-22","unstructured":"Farkas, B., & Papp, R. (2019). Developing IT Governance at the Virginia Department of Transportation. Journal of Business Cases and Applications. Volume 26."},{"key":"IJCWT.2020010102-23","first-page":"93","article-title":"The U.S. response to today\u2019s global order and tomorrow\u2019s threats.","author":"R.Fontaine","year":"2017","journal-title":"Journal of International Affairs"},{"key":"IJCWT.2020010102-24","doi-asserted-by":"publisher","DOI":"10.1111\/ssqu.12259"},{"key":"IJCWT.2020010102-25","author":"B.Forst","year":"2009","journal-title":"Terrorism, crime, and public policy"},{"issue":"1","key":"IJCWT.2020010102-26","first-page":"19","article-title":"Internal audit\u2019s evolving cybersecurity role: Auditors need to become involved in helping their organizations address cyber risks.","volume":"76","author":"L.Fountain","year":"2019","journal-title":"Internal Auditor"},{"key":"IJCWT.2020010102-27","unstructured":"Fruhlinger, J. (2019, October 14). Equifax data breach FAQ: What happened, who was affected, what was the impact? CSO from IDG Communications, Inc. Retrieved from https:\/\/www.csoonline.com\/article\/3444488\/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html"},{"key":"IJCWT.2020010102-28","unstructured":"Gallup. (2019). Terrorism. Retrieved from https:\/\/news.gallup.com\/poll\/4909\/terrorism-united-states.aspx"},{"key":"IJCWT.2020010102-29","unstructured":"Glaser, B., & Strauss, A. (1967). The discovery of grounded theory. New York, NY: de Gruyter."},{"key":"IJCWT.2020010102-30","unstructured":"Global Terrorism Database. (2019). University of Maryland, National Consortium for the Study of Terrorism and Responses to Terrorism, An Emeritus Center of Excellence of the U.S. Department of Homeland Security. Retrieved from https:\/\/www.start.umd.edu\/gtd\/search\/Results.aspx?start_yearonly=1970&end_yearonly=2018&start_year=&start_month=&start_day=&end_year=&end_month=&end_day=&country=217&asmSelect1=&criterion1=yes&criterion2=yes&criterion3=yes&dtp2=some&success=yes&casualties_type=b&casualties_max="},{"issue":"4","key":"IJCWT.2020010102-31","first-page":"597","article-title":"Understanding reliability and validity in qualitative research.","volume":"8","author":"N.Golafshani","year":"2003","journal-title":"Qualitative Report"},{"key":"IJCWT.2020010102-32","unstructured":"Harris, P. (2011, September 5). How private firms have cashed in on the climate of fear since 9\/11. The Guardian. Retrieved from https:\/\/www.theguardian.com\/world\/2011\/sep\/05\/private-firms-fear-9-11"},{"key":"IJCWT.2020010102-33","doi-asserted-by":"publisher","DOI":"10.3844\/ajebasp.2011.377.389"},{"issue":"5","key":"IJCWT.2020010102-34","first-page":"35","article-title":"The threat within: HR\u2019s responsibility in preventing cybersecurity issues.","volume":"7","author":"K.Jones","year":"2016","journal-title":"Workforce Solutions Review"},{"key":"IJCWT.2020010102-35","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.265105441"},{"issue":"1","key":"IJCWT.2020010102-36","first-page":"70","article-title":"Hedging against terrorism: Are US businesses prepared?","volume":"9","author":"J. H.Kahan","year":"2015","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"IJCWT.2020010102-37","doi-asserted-by":"publisher","DOI":"10.1093\/ser\/mwx030"},{"issue":"11","key":"IJCWT.2020010102-38","first-page":"16","article-title":"Corporate solutions to minimize expenses from cyber security attacks in the United States.","volume":"21","author":"R.Krishan","year":"2018","journal-title":"Journal of Internet Law"},{"key":"IJCWT.2020010102-39","doi-asserted-by":"publisher","DOI":"10.1007\/s12115-018-0246-x"},{"key":"IJCWT.2020010102-40","author":"S. J.Lukasik","year":"2003","journal-title":"Protecting critical infrastructures against cyber-attack"},{"issue":"5","key":"IJCWT.2020010102-41","first-page":"97","article-title":"Defending a new domain-the Pentagon\u2019s cyberstrategy.","volume":"89","author":"W. F.Lynn","year":"2010","journal-title":"Foreign Affairs"},{"key":"IJCWT.2020010102-42","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985826"},{"key":"IJCWT.2020010102-43","unstructured":"Matthews, K. (2019, October 31). Spookier than ghosts: 5 of the biggest cyberattacks we saw in 2019. VXCHNGE. Retrieved from https:\/\/www.vxchnge.com\/blog\/biggest-cyberattacks-2019"},{"key":"IJCWT.2020010102-44","author":"M. B.Miles","year":"1994","journal-title":"Qualitative data analysis: An expanded sourcebook"},{"key":"IJCWT.2020010102-45","doi-asserted-by":"publisher","DOI":"10.1177\/160940690200100202"},{"key":"IJCWT.2020010102-46","author":"J.Mueller","year":"2006","journal-title":"Overblown: How politicians and the terrorism industry inflate national security threats, and why we believe them"},{"key":"IJCWT.2020010102-47","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:osobl\/9780199795758.001.0001"},{"key":"IJCWT.2020010102-48","unstructured":"Nelson, B. (2011, September 8). 16 ways 9\/11 changed the way we do business. Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/brettnelson\/2011\/09\/08\/16-ways-911-changed-the-way-we-do-business\/#1510ae43acbb"},{"key":"IJCWT.2020010102-49","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-016-3397-y"},{"key":"IJCWT.2020010102-50","doi-asserted-by":"publisher","DOI":"10.1177\/1468794112446106"},{"issue":"6","key":"IJCWT.2020010102-51","first-page":"3054","article-title":"Minimize phishing attacks: Securing spear attacks.","volume":"6","author":"C.Parulekar","year":"2019","journal-title":"International Research Journal of Engineering and Technology"},{"key":"IJCWT.2020010102-52","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2019-0022"},{"key":"IJCWT.2020010102-53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69891-5_250-1"},{"key":"IJCWT.2020010102-54","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2015.1054927"},{"key":"IJCWT.2020010102-55","first-page":"1","article-title":"Interpretive social science: A second look","author":"P.Rabinow","year":"1987","journal-title":"Interpretive social science: A second look"},{"issue":"2","key":"IJCWT.2020010102-56","first-page":"87","article-title":"Terrorism and its impact on global economy.","volume":"68","author":"I. G.R\u0103dulescu","year":"2016","journal-title":"Economic Insights - Trends and Challenges"},{"key":"IJCWT.2020010102-57","first-page":"133","article-title":"The evolution of homeland security and the war on terror","author":"N.Reedy","year":"2016","journal-title":"America\u2019s war on terror"},{"key":"IJCWT.2020010102-58","doi-asserted-by":"crossref","unstructured":"Roberts, B. W. (2009). The macroeconomic impacts of the 9\/11 attack: Evidence from real-time forecasting. Homeland Security, Office of Immigration Statistics. Retrieved from https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Macroeconomic%20impact%209_11%202009.pdf","DOI":"10.2202\/1554-8597.1166"},{"key":"IJCWT.2020010102-59","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12727"},{"key":"IJCWT.2020010102-60","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-016-0251-1"},{"key":"IJCWT.2020010102-61","author":"J.Salda\u00f1a","year":"2015","journal-title":"The coding manual for qualitative researchers"},{"issue":"3","key":"IJCWT.2020010102-62","first-page":"11","article-title":"Terrorism and geopolitical risk.","volume":"74","author":"D.Salierno","year":"2017","journal-title":"Internal Auditor"},{"key":"IJCWT.2020010102-63","doi-asserted-by":"publisher","DOI":"10.1002\/ev.223"},{"key":"IJCWT.2020010102-64","doi-asserted-by":"publisher","DOI":"10.1093\/geroni\/igz038.3334"},{"key":"IJCWT.2020010102-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.jairtraman.2015.06.007"},{"key":"IJCWT.2020010102-66","author":"R. W.Taylor","year":"2019","journal-title":"Cyber crime and cyber terrorism"},{"key":"IJCWT.2020010102-67","doi-asserted-by":"publisher","DOI":"10.4324\/9781315205021-5"},{"key":"IJCWT.2020010102-68","unstructured":"United States Congress. (2002). Budget of the United States Government Analytical Perspectives and Historical Tables Fiscal Year 2003."},{"key":"IJCWT.2020010102-69","unstructured":"United States Department of Homeland Security. (2019). FY 2020 budget in brief. Retrieved from Wang, J. (2018, September 11). New York City subway station destroyed in 9\/11 finally reopens. Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/jennawang\/2018\/09\/11\/nyc-subway-station-destroyed-in-911-finally-reopens\/#7d9c0ae316d8"},{"issue":"1","key":"IJCWT.2020010102-70","first-page":"5","article-title":"Risk is changing, you need to change with it.","volume":"31","author":"C.Westfall","year":"2015","journal-title":"Financial Executive"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=247089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T22:12:57Z","timestamp":1651875177000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCWT.2020010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":71,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2020010102","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}