Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region

  • Zahri Yunos
  • Rabiah Ahmad
  • Syahrir Mat Ali
  • Solahuddin Shamsuddin
Conference paper

DOI: 10.1007/978-3-642-30428-6_2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7299)
Cite this paper as:
Yunos Z., Ahmad R., Mat Ali S., Shamsuddin S. (2012) Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region. In: Chau M., Wang G.A., Yue W.T., Chen H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg

Abstract

Cyberspace is an attractive medium for computer-savvy generation of terrorists due to its anonymity, psychological impact and also it’s potential to inflict massive damage. There have been numerous studies by researchers in Europe, the Middle East and North America in analyzing the illicit activities and terrorism in cyberspace. However, there are limited studies on similar cases in the Southeast Asian region. This paper presents an exploratory research on illicit activities and terrorism in cyberspace, focusing in the Southeast Asian region. We examined the Web 2.0 media by using an automated collection and analysis tool. Our findings indicate that the Web 2.0 media hosted in the Southeast Asian region supports illicit activities and terrorism in cyberspace such as the spreading of propaganda, recruitment, as well as planning and coordination. Although our findings are still at the preliminary stage, there is a great possibility that the virtual world evolves and plays a critical role in promoting illicit activities and terrorism in cyberspace. Future studies in this area can be conducted, which may lead to the development of better strategy and policy framework to counter cyber terrorism.

Keywords

blogs crawler cyberspace cyber terrorism illicit activities terrorism websites 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Zahri Yunos
    • 1
  • Rabiah Ahmad
    • 2
  • Syahrir Mat Ali
    • 1
  • Solahuddin Shamsuddin
    • 1
  1. 1.CyberSecurity MalaysiaSeri KembanganMalaysia
  2. 2.Department of Computer System and Communication, Faculty of Information Technology and CommunicationUniversiti Teknikal Malaysia Melaka (UTeM)Malaysia

Personalised recommendations