Veerasamy, NamoshaGrobler, MVon Solms, B2012-08-022012-08-022012-07Veerasamy, N, Grobler, M and Von Solms, B. Building an ontology for cyberterrorism. Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012, pp 286-295978-1-908272-55-3978-1-908272-56-02048-9870http://hdl.handle.net/10204/6030Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism.enInformation warfareInformation securityCyberterrorismCyberterrorism ontologyBuilding an ontology for cyberterrorismConference PresentationVeerasamy, N., Grobler, M., & Von Solms, B. (2012). Building an ontology for cyberterrorism. Academic Publishing International. http://hdl.handle.net/10204/6030Veerasamy, Namosha, M Grobler, and B Von Solms. "Building an ontology for cyberterrorism." (2012): http://hdl.handle.net/10204/6030Veerasamy N, Grobler M, Von Solms B, Building an ontology for cyberterrorism; Academic Publishing International; 2012. http://hdl.handle.net/10204/6030 .TY - Conference Presentation AU - Veerasamy, Namosha AU - Grobler, M AU - Von Solms, B AB - Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism. DA - 2012-07 DB - ResearchSpace DP - CSIR KW - Information warfare KW - Information security KW - Cyberterrorism KW - Cyberterrorism ontology LK - https://researchspace.csir.co.za PY - 2012 SM - 978-1-908272-55-3 SM - 978-1-908272-56-0 SM - 2048-9870 T1 - Building an ontology for cyberterrorism TI - Building an ontology for cyberterrorism UR - http://hdl.handle.net/10204/6030 ER -