The role of computer forensics in the fight against terrorism

Author:

Stevanović Miroslav,Đurđević Dragan

Abstract

In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy is evaluated from the point of view of functionality. In this sense, it is an attempt to present elements that influence the effectiveness of counter-terrorism in the information age. Related to this is the specification of the role that digital forensics can play in this area. The conclusion is that an effective counter-terrorism strategy must necessarily encompass the institutional incorporation of digital forensics since it alone can contribute to the timely detection or assertion of responsibility for terrorism in a networked computing environment.

Publisher

Centre for Evaluation in Education and Science (CEON/CEES)

Subject

General Medicine

Reference20 articles.

1. Alperen Martin, (2017): Foundations of Homeland Security: Law and Policy, 2nd edition, John Wiley & Sons, New Jersey;

2. Bockstette Carsten, (2010): Tehnike strateškog upravljanja komunikacijama koje koriste džihadistički teroristi, Vojno delo, proleće 2010, 331;

3. Cronin Audrey Kurth, (2010): How al-Qaida Ends: The Decline and Demise of Terrorist Groups, in: Micheal Brown, Owen Cote Jr., Sean Lynn-Jones; Steven Miller (eds.): Contending with Terrorism: Roots, Strateges, and Responses, MIT Press, Cambridge, 403;

4. Dimitrijević Vojin, (1985): Strahovlada, Radnička štampa, Beograd, 8;

5. Dragišić Zoran, Milošević Mladen, (2016): Ugrožavanje nacionalne bezbednosti Republike Srbije terorizmom u sajber prostoru, Politika nacionalne bezbednosti, 7:2/2016, 157-176;

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3