{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T05:11:11Z","timestamp":1712207471172},"reference-count":69,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist goals. Among the countless cyber-terrorist cases and scenarios of only this last decade, the paper discusses four cyber-terrorism cases that represent the most recent severe cyber-terrorist attacks on infrastructure and network systems\u2014Internet Black Tigers, MafiaBoy, Solo, and Irhabi 007. Regardless of the nature of actors and their motivations, cyber-terrorists hit very aggressively causing serious damages. Cyber-terrorists are rational actors who use the most advanced technology; hence, the critical need for the use of counter-threat swords by actors on the other side. Given that terrorist goals are mostly dependent on the media\u2019s reactions, journalistic practices are significant and need to be most effective. A major tool that can help journalists in their anti- and counter-terrorist strategies with cyber-terrorists is rationalism, merged with the expected socially responsible conduct. Rational behaviour, founded in game theory, along with major journalistic ethical principles are fundamental components of effective media decision-making during times of terrorism.<\/p>","DOI":"10.4018\/jte.2010100101","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:59:51Z","timestamp":1297803591000},"page":"1-19","source":"Crossref","is-referenced-by-count":4,"title":["Cyber-Terrorism and Ethical Journalism"],"prefix":"10.4018","volume":"1","author":[{"given":"Mahmoud","family":"Eid","sequence":"first","affiliation":[{"name":"University of Ottawa, Canada"}]}],"member":"2432","reference":[{"key":"jte.2010100101-0","first-page":"1","article-title":"Montreal youth is charged over web attacks.","author":"E.Alden","year":"2000","journal-title":"Financial Times (North American Edition)"},{"key":"jte.2010100101-1","author":"Y.Alexander","year":"1990","journal-title":"Terrorism and the media: Dilemmas for government, journalists and the public"},{"key":"jte.2010100101-2","unstructured":"Alleged \u201cMafiaBoy\u201d faces new charges in Canada. (2000, August 7). Wall Street Journal, 1."},{"key":"jte.2010100101-3","doi-asserted-by":"publisher","DOI":"10.1080\/13600830902727822"},{"issue":"1","key":"jte.2010100101-4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4102\/sajim.v5i1.208","article-title":"Cyber-terrorism: Reality or paranoia?","volume":"5","author":"S.Berner","year":"2003","journal-title":"South African Journal of Information Management"},{"key":"jte.2010100101-5","first-page":"2","article-title":"Men remanded on charges brought under Terrorism Act Security.","author":"R.Blitz","year":"2005","journal-title":"Financial Times (North American Edition)"},{"key":"jte.2010100101-6","unstructured":"Block, R., & Solomon, J. (2006, June 6). Politics & economics: London case led terror arrests in Canada; Multinational investigation yielded suspects\u2019 roundup; Morphing threat via web. Wall Street Journal, 8."},{"key":"jte.2010100101-7","doi-asserted-by":"publisher","DOI":"10.1080\/19361610802135888"},{"key":"jte.2010100101-8","unstructured":"Bridis, T., & Chipello, C. J. (2000, April 20). How Mounties got their man in hacker case. Wall Street Journal, B1."},{"key":"jte.2010100101-9","first-page":"430","article-title":"North America","author":"W.Briggs","year":"2004","journal-title":"Global journalism: Topical issues and media systems"},{"key":"jte.2010100101-10","unstructured":"Britain: Trial of an alien; Britain, America and extradition. (2009, August 8). The Economist, 392(8643), 51."},{"key":"jte.2010100101-11","unstructured":"Chipello, C. (2001, January 19). MafiaBoy admits to charges linked to web-site attacks. Wall Street Journal, B2."},{"key":"jte.2010100101-12","unstructured":"Cornish, P., Hughes, R., & Livingstone, D. (2009, March). Cyberspace and the national security of the United Kingdom: Threats and responses (A Chatham House Report). London: Royal Institute of International Affairs."},{"key":"jte.2010100101-13","unstructured":"Corzine, J. S., & Ca\u00f1as, R. L. (2008, April 10). The cyber-terror threat. Washington, DC: Office of Homeland Security & Preparedness, Intelligence Assessment."},{"issue":"3","key":"jte.2010100101-14","first-page":"15","article-title":"Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy.","volume":"16","author":"D. E.Denning","year":"2000","journal-title":"Computer Security Journal"},{"issue":"2","key":"jte.2010100101-15","first-page":"70","article-title":"Cyberwarriors: Activists and terrorists turn to cyberspace.","volume":"23","author":"D. E.Denning","year":"2001","journal-title":"Harvard International Review"},{"key":"jte.2010100101-16","author":"E. E.Dennis","year":"1981","journal-title":"Reporting processes and practices: Newswriting for today\u2019s readers"},{"key":"jte.2010100101-17","first-page":"2","article-title":"Hacker fails in US extradition battle.","author":"D.Dombey","year":"2009","journal-title":"Financial Times (North American Edition)"},{"key":"jte.2010100101-18","unstructured":"Eid, M. (2006, October 30). Telling the truth in the media; Mathematically approved. Journalism Ethics for the Global Citizen. Retrieved on September 29, 2009, from http:\/\/www.journalismethics.info\/feature_articles\/telling-the-truth.htm"},{"key":"jte.2010100101-19","first-page":"39","article-title":"Cyber-terrorism in the information age: Actors, communications, tactics, targets, and influences. In","volume":"06","author":"M.Eid","year":"2006","journal-title":"Proceedings of Information-MFCSIT"},{"issue":"1","key":"jte.2010100101-20","first-page":"83","article-title":"Mass media and the puzzle of information in the course of playing crises.","volume":"9","author":"M.Eid","year":"2006","journal-title":"INFORMATION: An International Interdisciplinary Journal"},{"key":"jte.2010100101-21","author":"M.Eid","year":"2008","journal-title":"Interweavement: International media ethics and rational decision-making"},{"key":"jte.2010100101-22","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1163\/9789401206747_005","article-title":"On the way to the Cyber-Arab-Culture: International communication, telecommunications policies, and democracy","author":"M.Eid","year":"2009","journal-title":"Cyberculture and new media"},{"issue":"2","key":"jte.2010100101-23","first-page":"16","article-title":"Balance and context: Maintaining media ethics.","volume":"83","author":"D.Elliott","year":"2003","journal-title":"Phi Kappa Phi Forum"},{"key":"jte.2010100101-24","unstructured":"Experts say West can\u2019t stop web radicalization; From behind a computer keyboard at his London home, student Younes Tsouli used the Internet to spread al Qaeda propaganda, recruit suicide bombers and promote web sites that encouraged the killing of non-Muslims. (2007, November). CIO Insight, 87."},{"key":"jte.2010100101-25","author":"T.Flanagan","year":"1998","journal-title":"Game theory and Canadian politics"},{"key":"jte.2010100101-26","first-page":"73","article-title":"Truth precludes any need for further ethical concerns in journalism and public relations","author":"A. D.Gordon","year":"1999","journal-title":"Controversies in media ethics"},{"key":"jte.2010100101-27","unstructured":"Gordon, S., & Ford, R. (2003). Cyberterrorism? Symantec Security Response. Retrieved September 29, 2009, from http:\/\/www.symantec.com\/avcenter\/reference\/cyberterrorism.pdf"},{"key":"jte.2010100101-28","unstructured":"Hacker Gary McKinnon loses extradition appeal. (2009, July 31). Informationweek \u2013 Online."},{"key":"jte.2010100101-29","author":"G.Harris","year":"1997","journal-title":"Practical newspaper reporting"},{"issue":"17","key":"jte.2010100101-30","first-page":"6","article-title":"Analysts: MafiaBoy only amateur copycat.","volume":"34","author":"A.Harrison","year":"2000","journal-title":"Computerworld"},{"key":"jte.2010100101-31","doi-asserted-by":"publisher","DOI":"10.4324\/9780203199275"},{"issue":"2","key":"jte.2010100101-32","doi-asserted-by":"crossref","first-page":"51","DOI":"10.3233\/HSM-2003-22201","article-title":"Playing the \u201ccyber terrorism game\u201d towards a semiotic definition.","volume":"22","author":"T.Hensgen","year":"2003","journal-title":"Human Systems Management"},{"key":"jte.2010100101-33","doi-asserted-by":"crossref","DOI":"10.5040\/9798216188049","author":"E. B.Hindman","year":"1997","journal-title":"Rights vs. responsibilities: The Supreme Court and the media"},{"key":"jte.2010100101-34","author":"M.Ignatieff","year":"2004","journal-title":"The lesser evil: Political ethics in an age of terror"},{"key":"jte.2010100101-35","doi-asserted-by":"publisher","DOI":"10.1080\/10576109608435994"},{"key":"jte.2010100101-36","first-page":"80","article-title":"The social value of journalism and public relations requires high-quality practices reflecting ethical considerations that go beyond truth and objectivity to accuracy and fairness","author":"J. M.Kittross","year":"1999","journal-title":"Controversies in media ethics"},{"key":"jte.2010100101-37","author":"B.Kovach","year":"2001","journal-title":"The elements of journalism: What newspeople should know and the public should expect"},{"key":"jte.2010100101-38","author":"W.Lee","year":"1971","journal-title":"Decision theory and human behavior"},{"key":"jte.2010100101-39","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"jte.2010100101-40","doi-asserted-by":"publisher","DOI":"10.1080\/03064220701740590"},{"issue":"2","key":"jte.2010100101-41","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1080\/10803920590935376","article-title":"Cyberterrorism: How can American foreign policy be strengthened in the information age?","volume":"27","author":"J.Matusitz","year":"2005","journal-title":"American Foreign Policy Interests"},{"key":"jte.2010100101-42","doi-asserted-by":"crossref","unstructured":"Matusitz, J. (2008). Cyberterrorism: Postmodern state of chaos. Information Security Journal: A Global Perspective, 17(4), 179-187.","DOI":"10.1080\/19393550802397033"},{"key":"jte.2010100101-43","doi-asserted-by":"crossref","unstructured":"Matusitz, J. (2009). A postmodern theory of cyberterrorism: Game theory. Information Security Journal: A Global Perspective, 18(6), 273-281.","DOI":"10.1080\/19393550903200474"},{"key":"jte.2010100101-44","doi-asserted-by":"publisher","DOI":"10.1080\/15567280802678657"},{"key":"jte.2010100101-45","doi-asserted-by":"publisher","DOI":"10.1080\/09700160308450099"},{"key":"jte.2010100101-46","unstructured":"Mitliaga, V. (2001). Cyber-terrorism: A call for governmental action? 16th BILETA Annual Conference. Retrieved October 9, 2009, from http:\/\/www.bileta.ac.uk\/01papers\/mitliaga.html."},{"key":"jte.2010100101-47","unstructured":"Mohay, G., Panichprecha, S., & Tickle, A. (2009). Sub-project 1: Probabilistic packet processing to mitigate high-rate flooding attacks. Review of Techniques for Mitigating Network Flooding Attacks. Retrieved March 1, 2010, from http:\/\/iaw2009.iitm.ernet.in\/files\/sp1.pdf."},{"key":"jte.2010100101-48","author":"J. D.Morrow","year":"1994","journal-title":"Game theory for political scientists"},{"key":"jte.2010100101-49","first-page":"4","article-title":"Hacker wins right to legal review.","author":"M.Murphy","year":"2009","journal-title":"Financial Times (North American Edition)"},{"key":"jte.2010100101-50","author":"B. L.Nacos","year":"2006","journal-title":"Terrorism and counterterrorism: Understanding threats and responses in the post-9\/11 world"},{"key":"jte.2010100101-51","doi-asserted-by":"publisher","DOI":"10.1080\/0143659042000322928"},{"issue":"2","key":"jte.2010100101-52","first-page":"1","article-title":"Info-terrorism in the age of the Internet: Challenges and initiatives.","volume":"1","author":"P.Nakra","year":"2003","journal-title":"Journal of Competitive Intelligence and Management"},{"key":"jte.2010100101-53","author":"M.Nicholson","year":"1970","journal-title":"Conflict analysis"},{"key":"jte.2010100101-54","author":"M.Nicholson","year":"1996","journal-title":"Causes and consequences in international relations: A conceptual study"},{"key":"jte.2010100101-55","author":"J. S.Nye","year":"2005","journal-title":"Understanding international conflicts: An introduction to theory and history"},{"key":"jte.2010100101-56","unstructured":"Ryan, R. (2003). When journalism becomes \u201cterrorism\u201d: Perle goes on offensive against investigative reporting. Extra! May\/June. Retrieved March 1, 2010, from http:\/\/www.fair.org\/index.php?page=1143."},{"key":"jte.2010100101-57","author":"J. A.Schellenberg","year":"1996","journal-title":"Conflict resolution: Theory, research, and practice"},{"key":"jte.2010100101-58","doi-asserted-by":"publisher","DOI":"10.1080\/09546558908427042"},{"issue":"18","key":"jte.2010100101-59","first-page":"37","article-title":"Inside the world of \u201cMafiaBoy\u201d.","volume":"113","author":"R.Scott","year":"2000","journal-title":"Maclean's"},{"key":"jte.2010100101-60","first-page":"1","article-title":"Introduction to the nature of game theory","author":"M.Shubik","year":"1954","journal-title":"Readings in Game theory and political behavior"},{"key":"jte.2010100101-61","unstructured":"Solomon, J., & Patrick, A. O. (2006, June 8). Terror probe widens with two arrests in Britain. Wall Street Journal, p. A2."},{"issue":"2","key":"jte.2010100101-62","first-page":"58","article-title":"Peace journalism: Negotiating global media ethics.","volume":"7","author":"M.Tehranian","year":"2002","journal-title":"The Harvard International Journal of Press\/Politics"},{"key":"jte.2010100101-63","unstructured":"Thomas, J. L. C. (2001, January 12). Ethics of hactivism. SANS-GIAC Practical Repository. Retrieved October 5, 2009, from http:\/\/www.dvara.net\/HK\/Julie_Thomas_GSEC.pdf."},{"key":"jte.2010100101-64","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-22162-2","author":"N.Thomassen","year":"1992","journal-title":"Communicative ethics in theory and practice"},{"key":"jte.2010100101-65","doi-asserted-by":"publisher","DOI":"10.1080\/10576100290101214"},{"key":"jte.2010100101-66","doi-asserted-by":"publisher","DOI":"10.1080\/15614260500121195"},{"key":"jte.2010100101-67","doi-asserted-by":"publisher","DOI":"10.1080\/10576100590905110"},{"key":"jte.2010100101-68","first-page":"519","article-title":"Communication ethics","author":"D. K.Wright","year":"1996","journal-title":"An integrated approach to communication theory and research"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=48520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T04:54:34Z","timestamp":1712206474000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jte.2010100101"}},"subtitle":["A Need for Rationalism"],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":69,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jte.2010100101","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"value":"1947-3451","type":"print"},{"value":"1947-346X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}