ResearchSpace

Building an ontology for cyberterrorism

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.contributor.author Grobler, M
dc.contributor.author Von Solms, B
dc.date.accessioned 2012-08-02T06:59:43Z
dc.date.available 2012-08-02T06:59:43Z
dc.date.issued 2012-07
dc.identifier.citation Veerasamy, N, Grobler, M and Von Solms, B. Building an ontology for cyberterrorism. Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012, pp 286-295 en_US
dc.identifier.isbn 978-1-908272-55-3
dc.identifier.isbn 978-1-908272-56-0
dc.identifier.issn 2048-9870
dc.identifier.uri http://hdl.handle.net/10204/6030
dc.description Proceedings of the 11th European Conference on Information Warfare and Security, Laval, France, 5-6 July 2012 en_US
dc.description.abstract Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism. en_US
dc.language.iso en en_US
dc.publisher Academic Publishing International en_US
dc.relation.ispartofseries Workflow;9331
dc.subject Information warfare en_US
dc.subject Information security en_US
dc.subject Cyberterrorism en_US
dc.subject Cyberterrorism ontology en_US
dc.title Building an ontology for cyberterrorism en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Veerasamy, N., Grobler, M., & Von Solms, B. (2012). Building an ontology for cyberterrorism. Academic Publishing International. http://hdl.handle.net/10204/6030 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha, M Grobler, and B Von Solms. "Building an ontology for cyberterrorism." (2012): http://hdl.handle.net/10204/6030 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Grobler M, Von Solms B, Building an ontology for cyberterrorism; Academic Publishing International; 2012. http://hdl.handle.net/10204/6030 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Veerasamy, Namosha AU - Grobler, M AU - Von Solms, B AB - Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack or a support activity. The role of the cyberterrorism ontological model will be to provide a better structure and depiction of relationships, interactions and influencing factors by capturing the content and boundaries in the field of cyberterrorism. DA - 2012-07 DB - ResearchSpace DP - CSIR KW - Information warfare KW - Information security KW - Cyberterrorism KW - Cyberterrorism ontology LK - https://researchspace.csir.co.za PY - 2012 SM - 978-1-908272-55-3 SM - 978-1-908272-56-0 SM - 2048-9870 T1 - Building an ontology for cyberterrorism TI - Building an ontology for cyberterrorism UR - http://hdl.handle.net/10204/6030 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record