揭秘网络恐怖主义:原因、成本及其对个人心理和公众信心的影响

Syed Rameem Zahra, Tausifa Jan Saleem, Sonia
{"title":"揭秘网络恐怖主义:原因、成本及其对个人心理和公众信心的影响","authors":"Syed Rameem Zahra, Tausifa Jan Saleem, Sonia","doi":"10.1109/REEDCON57544.2023.10150766","DOIUrl":null,"url":null,"abstract":"Just like the game for Information Technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. Data breaches, loss of productivity and profitability were quite a commonplace when mobile security became an issue. Today as IoT tries to connect everything to the internet, it intensifies the problem (more privacy violations, phishing/skimming attacks, security incidents) by creating a vast attack surface for the rogue players implying that important national (ports, airports, bridges, power-pants etc.) and cyber infrastructure could now be attacked. Moreover, if the network of your company has a weak point, it can easily be compromised to set off an attack. These Cyber terrorism attacks instigate identical responses from individuals as those for conventional terrorism attacks e.g. they heighten anxiety and stress, worsen feelings of vulnerability and harden the political attitudes of people. But this dimension is often overlooked by the policy makers. However, the increase in cyber terrorism cases has increased the research interest in the domain. Researchers are focusing on improving the security of internet and IoT devices. The field is still in its infancy. A lot needs to be done to mitigate these attacks. Motivated to demystify the repercussions of the cyber terrorism, this paper analyzes the distinctive characteristics of the most significant cyberattacks, investigates the expenditures incurred by the industries as a result of these cyber events, and then examines the impact of these attacks on the psychological health of the populace and the trust in public institutions.","PeriodicalId":429116,"journal":{"name":"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Demystifying Cyber terrorism: Causes, Costs & its impact on individuals’ psyche and public confidence\",\"authors\":\"Syed Rameem Zahra, Tausifa Jan Saleem, Sonia\",\"doi\":\"10.1109/REEDCON57544.2023.10150766\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Just like the game for Information Technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. Data breaches, loss of productivity and profitability were quite a commonplace when mobile security became an issue. Today as IoT tries to connect everything to the internet, it intensifies the problem (more privacy violations, phishing/skimming attacks, security incidents) by creating a vast attack surface for the rogue players implying that important national (ports, airports, bridges, power-pants etc.) and cyber infrastructure could now be attacked. Moreover, if the network of your company has a weak point, it can easily be compromised to set off an attack. These Cyber terrorism attacks instigate identical responses from individuals as those for conventional terrorism attacks e.g. they heighten anxiety and stress, worsen feelings of vulnerability and harden the political attitudes of people. But this dimension is often overlooked by the policy makers. However, the increase in cyber terrorism cases has increased the research interest in the domain. Researchers are focusing on improving the security of internet and IoT devices. The field is still in its infancy. A lot needs to be done to mitigate these attacks. Motivated to demystify the repercussions of the cyber terrorism, this paper analyzes the distinctive characteristics of the most significant cyberattacks, investigates the expenditures incurred by the industries as a result of these cyber events, and then examines the impact of these attacks on the psychological health of the populace and the trust in public institutions.\",\"PeriodicalId\":429116,\"journal\":{\"name\":\"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/REEDCON57544.2023.10150766\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/REEDCON57544.2023.10150766","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

就像几十年前移动设备的出现颠覆了信息技术(IT)安全游戏一样,今天的物联网(IoT)正在再次彻底改变它。当移动安全成为一个问题时,数据泄露、生产力和盈利能力的损失是相当普遍的。今天,当物联网试图将一切连接到互联网时,它通过为流氓玩家创造巨大的攻击面来加剧问题(更多的隐私侵犯,网络钓鱼/浏览攻击,安全事件),这意味着重要的国家(港口,机场,桥梁,权力等)和网络基础设施现在可能受到攻击。此外,如果你公司的网络有弱点,它很容易被破坏,引发攻击。这些网络恐怖主义袭击引发了与传统恐怖主义袭击相同的个人反应,例如,它们加剧了焦虑和压力,加剧了脆弱感,并使人们的政治态度变得更加强硬。但这一点往往被政策制定者所忽视。然而,随着网络恐怖主义案件的增多,这一领域的研究兴趣日益浓厚。研究人员正致力于提高互联网和物联网设备的安全性。这一领域仍处于起步阶段。要减轻这些攻击,还有很多工作要做。为了揭开网络恐怖主义影响的神秘面纱,本文分析了最严重的网络攻击的鲜明特征,调查了这些网络事件导致的行业支出,然后研究了这些攻击对民众心理健康和公共机构信任的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Demystifying Cyber terrorism: Causes, Costs & its impact on individuals’ psyche and public confidence
Just like the game for Information Technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. Data breaches, loss of productivity and profitability were quite a commonplace when mobile security became an issue. Today as IoT tries to connect everything to the internet, it intensifies the problem (more privacy violations, phishing/skimming attacks, security incidents) by creating a vast attack surface for the rogue players implying that important national (ports, airports, bridges, power-pants etc.) and cyber infrastructure could now be attacked. Moreover, if the network of your company has a weak point, it can easily be compromised to set off an attack. These Cyber terrorism attacks instigate identical responses from individuals as those for conventional terrorism attacks e.g. they heighten anxiety and stress, worsen feelings of vulnerability and harden the political attitudes of people. But this dimension is often overlooked by the policy makers. However, the increase in cyber terrorism cases has increased the research interest in the domain. Researchers are focusing on improving the security of internet and IoT devices. The field is still in its infancy. A lot needs to be done to mitigate these attacks. Motivated to demystify the repercussions of the cyber terrorism, this paper analyzes the distinctive characteristics of the most significant cyberattacks, investigates the expenditures incurred by the industries as a result of these cyber events, and then examines the impact of these attacks on the psychological health of the populace and the trust in public institutions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Advanced ICU Patient Monitoring With Sensor Integration, IV Detection WITH Canny Edge Detection and ECG Monitoring With Live Feed Optimal DG placement for power loss reduction using GWO algorithm Estimating the Stability of Smart Grids Using Optimised Artificial Neural Network Effectiveness of Principal Component Analysis in Functional Mapping of Gene Expression Profiles A Review of the Optimal Allocation of Electric Vehicle Charging Stations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1