책 이미지
책 정보
· 분류 : 국내도서 > 대학교재/전문서적 > 사회과학계열 > 행정학
· ISBN : 9788973669615
· 쪽수 : 302쪽
· 출판일 : 2012-12-01
목차
Chapter 1. Introduction(Yoon, Hae Sung) 19
I. Research Purpose 21
II. Research Scope and Content 22
III. Research Method 29
Chapter 2. General Issues of Cyberterrorism(Yoon, Hae Sung·Robert G. Morris) 31
I. Definition of Cyberterrorism 33
1. Introduction 33
2. What is Cyberterrorism? 34
3. Definition of Terrorism, Cybercrime and Cyberterrorism 36
4. Typology and Threats of Cyberterrorism 41
5. Case Studies of Cyberterrorist Attacks 50
6. Typology of Cyberterrorism 54
7. Conceptual Overview from an Overall Perspective 58
II. International Cooperation System in Cyberterrorism Response 65
1. International Characteristics of Cyberterrorism 65
2. Rules, Conventions and Laws regarding InternationalCooperation 68
3. International Conventions 75
4. Conclusion 77
III. Analysis of Cyberterrorism Response System of Major Countries 80
1. Cyberterrorism Response System of the United Statesof America 80
2. Cyberterrorism Response System of the United Kingdoms 112
3. Cyberterrorism Response System of the Federal Republic of Germany 114
4. Cyberterrorism Response System of the French Republic 116
5. Cyberterrorism Response System of Japan 118
6. Cyberterrorism Response System of India 122
7. Implications 128
8. Conclusion 132
Chapter 3. Terrorist Use of the Internet and Counterterrorism Measures(Yun, Min Woo) 135
I. Introduction 137
II. Theoretical Discussions 139
1. Terrorist Use of the Internet and Cyberterrorism 139
2. Physics and Strategic Advantage of Cyberspace 141
3. Threats from Cyberspace and Existential Crisis ofNation-State 145
III. Terrorist Threats though Cyberspace: Terrorist Use of theInternet 147
1. Terrorist Use of the Internet 147
2. Types of Terrorist Use of the Internet 149
3. Terrorist Use of the Internet 156
IV. Transformation of Mode of Warfare: Marriage betweenTerrorism and Cyberspace 158
1. Overview 158
2. Marriage between Terrorism and Cyberspace 160
3. Qualitive Changes on Mode of Warfare 161
4. The Fifth Generational Warfare 163
V. Counterterrorism Measures: C&C(Communication & Cooperation)and Infiltration 168
1. Overview 168
2. Counterterrorism Measures against Terrorist Use of theInternet 169
VI. OSINT(Open Source Intelligence) as a Counterterrorism Measure 172
1. Overview 172
2. The Concept of OSINT 173
3. OSINT practices 174
4. Things to Consider for the Use of OSINT 176
VII. Conclusion 179
Chapter 4. Terrorist Use of the Internet: an Analysis of Strategies, Objectives and Law Responses(Joshua Freilich·Steven Chermak) 181
I. Introduction 183
II. The Strategies Used to Harness the Power of the Internet 187
III. Understanding the Rationale for Using the Internet 196
1. Propaganda 196
2. Recruitment and Radicalization 200
3. Strategic Tactics 204
IV. Law Enforcement Response to Terrorism on the Internet 209
V. Conclusion 216
Chapter 5. Current Status and Legal System of Cyberterrorismin the Republic of Korea(Yoon, Hae Sung) 221
I. An Overview of the Republic of Korea's Penal Measure andCases pertaining to Cyberterrorism 223
1. Overview 223
2. Case Study of Cyberterrorism in Korea 224
3. Analysis on Cyberterrorism Penal Measures in Criminal Law 228
4. Analysis on Cyberterrorism Penal Measures in Special Law 232
II. Response System and Conditions on Cyberterrorism in theRepublic of Korea 244
1. Cyberterrorism Cases 244
2. Overview of Response System on Cyberterrorism 249
3. Problems Confronted by Response System on Cyberterrorism 253
III. Countermeasures for Cyberterrorism 257
1. Intelligence 257
2. Expert System and Founding National Digital EvidenceResearch Institute 258
3. Improvement on Cyberterrorism Legislation 258
4. Examination on Cybercrime Investigation Cooperation System 262
Chapter 6. Conclusion(Yoon, Hae Sung·Robert G. Morris) 267
Reference 283
Abstract 301



















