dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Grobler, M
|
|
dc.contributor.author |
Von Solms, B
|
|
dc.date.accessioned |
2012-08-02T06:59:43Z |
|
dc.date.available |
2012-08-02T06:59:43Z |
|
dc.date.issued |
2012-07 |
|
dc.identifier.citation |
Veerasamy, N, Grobler, M and Von Solms, B. Building an ontology for cyberterrorism. Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012, pp 286-295 |
en_US |
dc.identifier.isbn |
978-1-908272-55-3 |
|
dc.identifier.isbn |
978-1-908272-56-0 |
|
dc.identifier.issn |
2048-9870 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/6030
|
|
dc.description |
Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012 |
en_US |
dc.description.abstract |
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Publishing International |
en_US |
dc.relation.ispartofseries |
Workflow;9331 |
|
dc.subject |
Information warfare |
en_US |
dc.subject |
Information security |
en_US |
dc.subject |
Cyberterrorism |
en_US |
dc.subject |
Cyberterrorism ontology |
en_US |
dc.title |
Building an ontology for cyberterrorism |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Veerasamy, N., Grobler, M., & Von Solms, B. (2012). Building an ontology for cyberterrorism. Academic Publishing International. http://hdl.handle.net/10204/6030 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, M Grobler, and B Von Solms. "Building an ontology for cyberterrorism." (2012): http://hdl.handle.net/10204/6030 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Grobler M, Von Solms B, Building an ontology for cyberterrorism; Academic Publishing International; 2012. http://hdl.handle.net/10204/6030 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Veerasamy, Namosha
AU - Grobler, M
AU - Von Solms, B
AB - Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism.
DA - 2012-07
DB - ResearchSpace
DP - CSIR
KW - Information warfare
KW - Information security
KW - Cyberterrorism
KW - Cyberterrorism ontology
LK - https://researchspace.csir.co.za
PY - 2012
SM - 978-1-908272-55-3
SM - 978-1-908272-56-0
SM - 2048-9870
T1 - Building an ontology for cyberterrorism
TI - Building an ontology for cyberterrorism
UR - http://hdl.handle.net/10204/6030
ER -
|
en_ZA |