Triangle of Cyber, Terrorism and Radicalization
Keywords:Cyberspace, Cyber Radicalization, Terrorism, ISIS
Cyberspace, called the new field of terrorism, is a transition zone from traditional terrorism to cyber-terrorism. The concept of cyber terrorism created by the combination of the words cyber and terrorism that generates a great risk environment in a world that is increasingly dependent on technology. Terrorist groups that take advantage of the opportunities for unlimited, anonymous and low-cost cyberspace are easily adapted to cyberspace and try to achieve their goals of radicalization through methods such as propaganda and recruitment. In a digitized world, it is possible that terrorist organizations will gain strength and endanger the national security of states by carrying out major cyber attacks.
Akyeşilmen, N. (2018). Disiplinlerarası Bir Yaklaşımla Siber Politika ve Güvenlik. Ankara: Orion Kitabevi.
Alkhouri, L., Kassirer, A., & Nixon, A. (2016). Hacking for ISIS: The emergent cyber threat landscape. Flashpoint, 3-18.
BBC. (2015). US Centcom Twitter account hacked by pro-IS group. Retrieved January 23, 2021 from: https://www.bbc.com/news/world-us-canada-30785232.
Bozkurt, A. (2016). Cephet-ul Nusra ve Daeş Çatışması:Radikal bir Karşılaşma. In N. Akyeşilmen & Ö. Afşar (Eds.), Suriye’de Barışın İmkanları (pp. 81-104). Ankara:Orion Kitabevi.
Collin, B.C. (1997) The future of cyberterrorism: Where the physical and virtual worlds converge. Crime and Justice International, 13(2), 15-18.
Conway, M. (2002). What is cyberterrorism?. Current History, 101(659), 436.
Crenshaw, M. (2011). The debate over ‘old’vs.‘new’terrorism. Jihadi Terrorism and the Radicalisation Challenge. European and American Experiences, 57-68.
EFSAS. (2018). Cyber-radicalization:Combating terrorism in the digital era, 1-7. Retrieved January 15, 2021 from https://www.efsas.org/publications/study-papers/cyber-radicalization-combating-terrorism-in-the-digital-era/.
Çokbildik, A. C. (2019). Siber Terörizm: Radikal/Dini Örgütler. Unpublished Master’s Thesis, Konya: Selçuk Üniversitesi Sosyal Bilimler Enstitüsü.
Darıcılı, A. B. (2020). Küresel Terörün Teknolojik Yönü: Siber Terörizm,. In Hasan A. (Edt). Küresel Terör ve Güvenlik Politikalar (pp. 93-106). Nobel Yayınevi.
Denning, D. (1999). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239-288.
Findlay, V. (2014). Cyber-Threats, Terrorism and the Counter-Terror Model. University of St. Andrew’s, The Handa Centre for the Study of Terrorism and Political Violence,
Giantas, D., & Stergiou, D. (2018). From terrorism to cyber-terrorism: The case of ISIS. Available at SSRN 3135927.
Griffin, A. (2015). Charlie Hebdo: France hit by 19,000 cyberattacks since Paris shootings in unprecented hacking onsalught. Independent, Retrieved January 23, 2021 from: https://www.independent.co.uk/life-style/gadgets-and-tech/news/charlie-hebdo-france-hit-19-000-cyberattacks-paris-shootings-unprecedented-hacking-onslaught-9980634.html.
Gürkaynak, M., & İren, A. A. (2011). Reel dünyada sanal açmaz: Siber alanda uluslararasi ilişkiler. Süleyman Demirel Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi, 16(2), 263-279.
Iqbal, Z. (2020). Terrorism in Cyberspace: A Case Study of Terrorist Organizations Operating in Pakistan. Cyberpolitik Journal, 5(10), 240-259.
Kohlmann, E. F. (2006). The real online terrorist threat. Foreign Affairs, 115-124.
Laqueur, W. (1999). The new terrorism: Fanaticism and the arms of mass destruction. Oxford University Press on Demand.
Lillington, K. (2016). How real is the threat of Cyberterrorism?. The Irish Times, Retrieved January 27, 2021 from: https://www.irishtimes.com/business/technology/how-real-is-the-threat-of-cyberterrorism-1.2608935.
Madhava, S. S. P., & Jaishankar, K. (2008). Cyber Terrorism: Problems, Perspectives and Prescription. In Schmallager F., & Pittaro, M., (Eds.), Crimes of the Internet, 593-611.
Minei, E., & Matusitz, J. (2011). Cyberterrorist messages and their effects on targets: A qualitative analysis. Journal of human behavior in the social environment, 21(8), 995-1019.
Nance, M., & Sampson, C. (2017). Hacking ISIS: the war to kill the cyber Jihad. Skyhorse Publishing Company, Incorporated.
Nye Jr, J. S. (2010). Cyber power. Harvard Univ Cambridge MA Belfer Center for Science and International Affairs, 1-31.
Oz, A. (2001). Fanatizme Karşı Mücadele. (çev. Mehmet Küçük). İstanbul: Yapı Kredi Yayınları.
Skeat, W. W. (2005). A Conscise Etymological Dictionary of the English Language. New York: Cosimo.
Smith, M. (2020). Uluslararası Güvenlik. (çev. Ramazan Gözen). Ankara: TED Matbaacılık.
Sundaram, P. M. S., & Jaishankar, K. (2008). Cyber Terrorism: Problems, Perspectives, and Prescription. Crimes of the Internet; Schmallager, 593-611.
Terörle Mücadele Kanunu, (12.4.1991). Retrieved January 20, 2021 from https://www.mevzuat.gov.tr/MevzuatMetin/1.5.3713.pdf.
Weimann, G. (2005). Cyberterrorism: The sum of all fears?. Studies in Conflict & Terrorism, 28(2), 129-149.
Yılmaz, B. A. (2020). Siber terörizm ve değişen istihbarat anlayışı. Anadolu Strateji Dergisi, 2(1), 65-82.
How to Cite
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.