Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism.
Reference:
Veerasamy, N, Grobler, M and Von Solms, B. Building an ontology for cyberterrorism. Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012, pp 286-295
Veerasamy, N., Grobler, M., & Von Solms, B. (2012). Building an ontology for cyberterrorism. Academic Publishing International. http://hdl.handle.net/10204/6030
Veerasamy, Namosha, M Grobler, and B Von Solms. "Building an ontology for cyberterrorism." (2012): http://hdl.handle.net/10204/6030
Veerasamy N, Grobler M, Von Solms B, Building an ontology for cyberterrorism; Academic Publishing International; 2012. http://hdl.handle.net/10204/6030 .