<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cyber Terrorism as an Object of Modeling</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Milov</string-name>
          <email>Oleksandr.Milov@hneu.net</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevgen Melenti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stanislav Milevskyi</string-name>
          <email>Stanislav.Milevskiy@hneu.net</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Pohasii</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Yevseiev</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Juridical Personnel Training Institute for the Security Service of Ukraine Yaroslav Mudryi National Law University</institution>
          ,
          <addr-line>Myronosytska str., 71, Kharkiv, 61002</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article examines issues related to the characteristics of cyber terrorism, as well as related concepts of terrorism and cyberspace. The definitions of these concepts are given. The types of cyber threats directly related to cyber terrorism are identified. The differences and similarities of the mentioned cyber threats are described. A structure that reflects the main features of cyber terrorism, which should be included in the model of cyber terrorism is presented.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Cyber terrorism</kwd>
        <kwd>cyber threats</kwd>
        <kwd>hacktivism</kwd>
        <kwd>cyber espionage</kwd>
        <kwd>cyber war</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Advances in computer technology, coupled
with the widespread availability of inexpensive,
effective development tools and the availability of
free knowledge on the Internet, have allowed
cyber terrorists to improve their methods and
conduct attacks remotely, damaging their
intended targets. This opens up new opportunities
for individuals and groups willing to engage in
illegal activities to advance their shared goals,
beliefs and agendas, invisible and often
undetected through cyberspace, thereby creating
new varieties of criminal threats. Generation of
cyber terrorism; use of cyberspace to carry out
activities classified as “terrorist”. Cyber terrorists
can launch attacks through cyberspace and the
virtual world, uniting the physical world and
cyberspace [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Connectivity has become a central
element of government institutions, critical
infrastructures (telecommunications networks,
finance, transportation and emergency services),
culture and education. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] Many critical private,
public, national and military infrastructures can be
vulnerable to cyberattacks as they continue to rely
on legacy traditional security solutions rather than
comprehensive and sophisticated cyber defense
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Cybercrime, cyberterrorism, and
cyberwarfare are all common topics in the
cybersecurity field. Physical terrorism and cyber
terrorism have some common elements and a
common goal, namely terrorism. However, cyber
terrorism remains a vague concept, and there is a
lot of controversy around its precise definition,
goals, risk factors, characteristics and preventive
strategies [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Cybercrime and cyberterrorism are
often used interchangeably, or the term
“cybercrime” can be used to refer to
cyberterrorism, thereby blurring the distinction
between the two, especially for the general public.
Cyberattacks are still considered one of the
highest priority risks for national security around
the world [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Characteristics of and cyberterrorism terrorism</title>
      <p>
        Despite the inherent advantages of information
technology, dependence on information
technology has made countries and societies far
more vulnerable to cyberattacks such as computer
intrusions, program encryption, undetected
internal threats in network firewalls, or cyber
terrorists. The decentralized nature of the Internet,
on the one hand, ensures the relative anonymity of
users, and on the other, makes it insecure and
illsuited for tracking intruders or preventing their
abuse by the internal openness of cyberspace
[
        <xref ref-type="bibr" rid="ref24 ref25 ref26 ref7">7,24-26</xref>
        ].
      </p>
      <p>
        Most researchers agree that a precise definition
of cyber terrorism is needed, both for theoretical
research and for the implementation of practical
applications. At the same time, it is emphasized
that this concept is multidisciplinary in nature,
and should reflect the legal, economic,
technological aspects of the problem. The
definition should indicate the main characteristics
or principles of the concept, as well as the range
of real or potential scenarios to which the term
cyber terrorism can be applied [
        <xref ref-type="bibr" rid="ref27 ref8">8,27</xref>
        ]. Defining
cyber terrorism is even more difficult due to its
abstract nature associated with understanding how
certain incidents occur in cyberspace. Without a
clear definition of the basic concepts, researchers
cannot analyze the same sentences, therefore
conceptualization is a necessary initial stage of
research.
      </p>
      <p>Since cyber terrorism is a combination of the
terms “cyberspace” and “terrorism”, it is
important to clearly define these terms.</p>
      <p>
        "Cyber" in cyber terrorism refers to
cyberspace. It is a prefix that is commonly added
to a number of subgroups dealing with issues in
the cybersecurity discourse, including, but not
limited to, cybercrime, cyberwar, cyber
espionage, and of course cyber terrorism.
Cyberspace, unlike terrorism, is an accepted term.
It refers to the virtual world, including the Internet
and other computer communications
infrastructure, which consists entirely of
computers, algorithms, computer networks and
data. According to [
        <xref ref-type="bibr" rid="ref28 ref9">9,28</xref>
        ], a cyberattack is “a
deliberate computer-to-computer attack that
disrupts, disables, destroys, or takes over a
computer system, or damages or steals the
information it contains”. While cyberattacks
themselves take place in cyberspace, they can
have repercussions in the physical world.
      </p>
      <p>
        Unlike cyberspace, terrorism is a term for
which there is no agreed definition. However,
there are a number of similar aspects that are
broadly agreed upon. [
        <xref ref-type="bibr" rid="ref10 ref23">10,23</xref>
        ] contains a definition
and criteria for what constitutes terrorism:
«...the deliberate creation and exploitation of
fear through violence or threat of violence in the
pursuit of political change. All terrorist acts
involve violence or the threat of violence.
Terrorism is specifically designed to have
farreaching psychological effects beyond the
immediate victim(s) or objects of the terrorist
attack. It is meant to instill fear within, and
thereby intimidate, a wider “target audience”
that might include a rival ethnic or religious
group, an entire country, a national government
or political party, or public opinion in general.
Terrorism is designed to create power where
there is none or to consolidate power where there
is very little. Through the publicity generated by
their violence, terrorists seek to obtain the
leverage, influence, and power they otherwise
lack to effect political change on either a local or
an international scale.»
      </p>
      <p>In this way, terrorism is separated from other
types of crime and irregular warfare (see Table 1).
For a response, having a criterion to distinguish
terrorists from other threats is of particular
importance in cyberspace, where attribution can
be particularly difficult.</p>
      <p>Based on the definition of terrorism, a set of
criteria for cyber terrorism can be formed (see
Table 2).
Conducted either by an
organization with an identifiable
chain of command or conspiratorial
cell structure (whose members
wear no uniform or identifying
insignia) or by individuals or a small
collection of individuals directly
influenced, motivated, or inspired
by the ideological aims or example
of some existent terrorist
movement and/or its leaders</p>
      <sec id="sec-2-1">
        <title>Perpetrated by a subnational group or non-state entity</title>
        <p>
          Source: [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          The term "cyber terrorism" was introduced in
the 1980s. There is still no agreement in the
international community as to what kind of cyber
activity is cyber terrorism [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. In [
          <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15">12-15</xref>
          ] the
following definition of cyber terrorism is given:
«Cyberterrorism is the convergence of
cyberspace and terrorism. It refers to unlawful
attacks and threats of attacks against computers,
networks and the information stored therein when
done to intimidate or coerce a government or its
people in furtherance of political or social
objectives. Further, to qualify as cyberterrorism,
an attack should result in violence against
persons or property, or at least cause enough
harm to generate fear. Attacks that lead to death
or bodily injury, explosions, or severe economic
loss would be examples. Serious attacks against
critical infrastructures could be acts of
cyberterrorism, depending on their impact.
Attacks that disrupt nonessential services or that
are mainly a costly nuisance would not.»
        </p>
        <p>
          Other definitions of cyber terrorism are rather
derivatives of this basic one. For example [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]:
«Cyberterrorism is the convergence of
terrorism and cyberspace. ... unlawful attacks and
threats of attack against computers, networks,
and the information… done to intimidate or
coerce a government or its people in furtherance
of political or social objectives...to qualify a
cyberterrorism, an attack should result in
violence against persons or property, or at least
cause enough harm to generate fear».
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Cyberterrorism and</title>
    </sec>
    <sec id="sec-4">
      <title>Cyberspace Threats other</title>
      <p>
        The authors of the book [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] propose to
consider all actions carried out by a terrorist cell
or an individual via the Internet as cyber
terrorism. The UN Office on Drugs and Crime has
classified six ways the Internet is used for terrorist
activities: propaganda (recruitment, radicalization
and incitement); financing; preparation; planning
(through secret communication and information
from open sources); execution; and cyberattacks.
      </p>
      <p>Depending on the criminals involved and their
motivation, cyber attacks can be classified into the
types of cyber threats presented and defined in
Table 3.</p>
      <p>Definition
the emergence of popular political action, of the self-activity of groups of
people, in cyberspace. It is a combination of grassroots political protest with
computer hacking. Hacktivists operate within the fabric of cyberspace,
struggling over what is technologically possible in virtual lives, and reaches out
of cyberspace utilising virtual powers to mould offline life. Social movements
and popular protest are integral parts of twenty-first-century societies.</p>
      <sec id="sec-4-1">
        <title>Cyberwarfare</title>
      </sec>
      <sec id="sec-4-2">
        <title>Cybercrime Cyberespionage Chaotic</title>
        <p>
          Hacktivism is activism gone electronic [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
actions by a nation-state to penetrate another nation's computers or networks
for the purposes of causing damage or disruption [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]
use of computers or other electronic devices via information systems to
facilitate illegal behaviours [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]
cyber espionage involves obtaining secret or classified information without
permission from individuals, companies or governments for economic, political
or military advantage using illicit means through the Internet, networks and/or
computers, and can involve cracking or malicious software such as Trojan
horses and spyware [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]
agents that have operated in cyberspace, such as criminals, hacktivists,
industrial spies, nation states, terrorists, and insiders, there are also new
challenging threats, such as chaotic actors, vigilantes, and regulators [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]
As shown in Table 4, there are a number of
overlaps between cyberattacks that create a cyber
threat, demonstrating confusion from the media
and other actors who mislabel cyberattacks. For
example, the distinction between hacktivism and
other forms of cyber activity is especially
important because acts of hacktivism have been
flagged as cyber terrorism in a number of
publications. While there is a definite difference
between cyber terrorism and hacktivism, the
purpose of the latter is not to maim, kill or
intimidate; although the means to achieve the
desired results may be similar. Consequently,
"hacktivism does highlight the threat of cyber
terrorism, the potential for people without moral
constraints to use methods similar to those
developed by hackers to wreak havoc."
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Violent or threatens violence</title>
      </sec>
      <sec id="sec-4-4">
        <title>Designed to have far- reaching</title>
        <p>psychological repercussions beyond the
immediate victim or target
Conducted either by an organization with
an identifiable chain of command or
conspiratorial cell structure (whose
members wear no uniform or identifying
insignia) or by individuals or a small
collection of individuals directly influenced,
motivated, or inspired by the ideological
aims or example of some existent terrorist
movement and/or its leaders</p>
      </sec>
      <sec id="sec-4-5">
        <title>Perpetrated by a subnational group or nonstate entity.</title>
        <p>✓
X
X
✓</p>
      </sec>
      <sec id="sec-4-6">
        <title>Hackt Cyberw Cyber Cyberesp Chaotic Vigilant Cyberter ivism arfare crime ionage Actors es rorism</title>
        <p>✓
X
X</p>
        <p>X
X
X
X
X
X
✓
✓
X
-✓
✓
✓
✓
✓
✓</p>
        <p>Likewise, although cyber terrorism and cyber
warfare are different, they have similarities; to
attack computers, networks and information
stored in them and cause damage in pursuit of
political or ideological goals. In the case of cyber
terrorism, its very nature must be violent and must
be designed to be terrifying. While cyber war can
lead to violence and have psychological
consequences that go beyond the immediate
victim or purpose, it can be argued that such
effects are accidental and not necessary, as in the
case of cyber terrorism. Consequently, cyber
attacks by nation states cannot be considered acts
of cyber terrorism. These distinctions between
different cyber threats are important as they
enable smarter countermeasures.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Framework of Cyberterrorism</title>
      <p>The structure reflecting the main objects and
processes of cyber terrorism to be modeled is
shown in Fig. 1. It consists of three main sections:
Operating Forces, Techniques и Objectives.</p>
      <p>Five forces are considered: characteristics,
purpose / focus, types, capabilities and social
factors. Each workforce, in turn, has a number of
related subclauses. Operational forces provide the
context in which cyber terrorism operates.
Various high-level techniques are presented.
These high-level techniques are supported by a
variety of information gathering and computer
and network security techniques. The objectives
are similar to the motivation for standard terrorist
activities, although there are some differences to
show more pronounced intent.</p>
      <p>The framework's contribution is to organize
the area of cyber terrorism and provide its context
for analytical review and in-depth modeling. The
operational forces describe the various benefits of
using cyberterrorism, the intended systems to be
attacked, and the terrorist's mindset. The
"Techniques" section discusses the classification
of attack tactics. The "Objectives" section
discusses the immediate objectives of the attacker
and also distinguishes between cyberterror
activities and helper functions that can be used by
computers and networks (which are often
confused with cyberterrorism). This discussion
helps to clarify important details regarding the
functional thinking of cyber terrorists, as well as
clarify which aspects of cybercrime and hacking
will be used.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion</title>
      <p>Cybercrime, regardless of how it is defined or
classified, can have devastating consequences for
computerized networks. Until a universally
effective solution to this universal problem is
found, the strength of a cybersecurity governance
regime will depend on an information security
management system that emphasizes a
comprehensive cyber risk assessment that takes
into account all possible threats to an
organization's business, including internal and
external threats. Modeling the technologies and
processes for conducting cyberattacks, and not
least the behavior of attackers, should lead to the
construction of effective systems for ensuring the
cybersecurity of critical infrastructures. The
classification of cyber threats given in the article,
the definition of cyber terrorism and its
characteristics should focus the attention of the
model developer on the processes and entities that
should be reflected in the models of cyber
terrorism in the first place.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Simanjuntak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. P.</given-names>
            <surname>Ipung</surname>
          </string-name>
          and
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>lim, "Text Classification Techniques Used to Facilitate Cyber Terrorism Investigation,"</article-title>
          in Proceeding of Second International Conference on Advances in Computing, Control, and
          <article-title>Tele-communication Technologies (ACT</article-title>
          <year>2010</year>
          ), Jakarta,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Lord</given-names>
            <surname>Jopling UK NATO General Rapporteur</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>171 CDS 11 E rev. 1 final InformationS And National Security General Report," NATO Par</source>
          l iamentary Assembly International Secretariat, Brussles,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. A. A.</given-names>
            &amp;.
            <surname>C. E. Dogrul</surname>
          </string-name>
          ,
          <article-title>"Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism</article-title>
          .," Tallinn,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>DCSINT</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Handbook No. 1</source>
          .02,
          <string-name>
            <surname>Critical</surname>
            <given-names>Infrastructure</given-names>
          </string-name>
          <article-title>Threats and Terrorism," US Army Training</article-title>
          and
          <string-name>
            <given-names>Doctrine</given-names>
            <surname>Command</surname>
          </string-name>
          , Fort Leavenworth, Kansas,
          <year>2006</year>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>NATO</surname>
          </string-name>
          ,
          <article-title>"173 DSCFC 09 E bis - NATO and Cyber Defence," NATO, Brussles</article-title>
          , Belgium,
          <year>2009</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Jarvis</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Macdonald</surname>
          </string-name>
          ,
          <article-title>"What Is Cyberterrorism? Findings From a Survey of Researchers," Terrorism and Political Violence</article-title>
          , vol.
          <volume>27</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>657</fpage>
          -
          <lpage>678</lpage>
          , (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Michael</given-names>
            <surname>Kenney</surname>
          </string-name>
          , “
          <article-title>Cyber-Terrorism in a Post-Stuxnet World</article-title>
          ,” Orbis 59, no.
          <issue>1</issue>
          (
          <year>2015</year>
          ):
          <fpage>112</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Bruce</given-names>
            <surname>Hoffman</surname>
          </string-name>
          , Inside Terrorism: Revised and
          <string-name>
            <given-names>Expanded</given-names>
            <surname>Edition</surname>
          </string-name>
          (New York: Columbia University Press,
          <year>2017</year>
          ),
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>[9] NATO, "171 CDS 11 E rev. 1 final - Information and National Security," 09 11</source>
          <year>2011</year>
          . [Online]. Available: http://www.natopa.int/default.asp?SHORTCUT=
          <fpage>2589</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Valentyn</surname>
            <given-names>Sobchuk</given-names>
          </string-name>
          , Volodymyr Pichkur, Oleg Barabash, Oleksandr Laptiev, Kovalchuk Igor,
          <string-name>
            <given-names>Amina</given-names>
            <surname>Zidan</surname>
          </string-name>
          .
          <article-title>Algorithm of control of functionally stable manufacturing processes of enterprises</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>206</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Oleksandr</surname>
            <given-names>Laptiev</given-names>
          </string-name>
          , Oleh Stefurak, Igor Polovinkin, Oleg Barabash, Savchenko Vitalii,
          <string-name>
            <given-names>Olena</given-names>
            <surname>Zelikovska</surname>
          </string-name>
          .
          <article-title>The method of improving the signal detection quality by accounting for interference</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>172</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Oleksandr</surname>
            <given-names>Laptiev</given-names>
          </string-name>
          , Savchenko Vitalii, Serhii Yevseiev, Halyna Haidur, Sergii Gakhov,
          <string-name>
            <given-names>Spartak</given-names>
            <surname>Hohoniants</surname>
          </string-name>
          .
          <article-title>The new method for detecting signals of means of covert obtaining information</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>176</fpage>
          -
          <lpage>181</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Svynchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Nikodem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kochan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          .
          <article-title>Image compression using fractal functions</article-title>
          .
          <source>Fractal and Fractional</source>
          ,
          <year>2021</year>
          ,
          <volume>5</volume>
          (
          <issue>2</issue>
          ), 31.pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          . DOI:
          <volume>10</volume>
          .3390/fractalfract5020031 - 14
          <source>Apr</source>
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Oleg</surname>
            <given-names>Barabash</given-names>
          </string-name>
          , Oleksandr Laptiev, Valentyn Sobchuk, Ivanna Salanda, Yulia Melnychuk,
          <string-name>
            <given-names>Valerii</given-names>
            <surname>Lishchyna</surname>
          </string-name>
          .
          <article-title>Comprehensive Methods of Evaluation of Distance Learning System Functioning</article-title>
          .
          <source>International Journal of Computer Network and Information Security (IJCNIS)</source>
          . Vol.
          <volume>13</volume>
          , No. 3,
          <string-name>
            <surname>Jun</surname>
          </string-name>
          .
          <year>2021</year>
          . рр.
          <volume>62</volume>
          -
          <fpage>71</fpage>
          , DOI: 10.5815/ijcnis.
          <year>2021</year>
          .
          <volume>03</volume>
          .06.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savchenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotenko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Akhramovych</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samosyuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shuklin</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>Biehun A. Method of Determining Trust and Protection of Personal Data in Social Networks</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          , Vol.
          <volume>13</volume>
          , No.
          <volume>1</volume>
          ,
          <year>2021</year>
          . рр.
          <volume>15</volume>
          -
          <fpage>21</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Serhii</surname>
            <given-names>Yevseiev</given-names>
          </string-name>
          , Oleksandr Laptiev, Sergii Lazarenko, Anna Korchenko,
          <string-name>
            <given-names>Іryna</given-names>
            <surname>Manzhul</surname>
          </string-name>
          .
          <article-title>Modeling the protection of personal data from trust and the amount of information on social networks</article-title>
          .
          <source>Number</source>
          <volume>1</volume>
          (
          <year>2021</year>
          ), «EUREKA: Physics and Engineering» pp.
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          . DOI:
          <volume>10</volume>
          .21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2021</year>
          .001615
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Denning</surname>
          </string-name>
          , "- Cyberterrorism‖,
          <source>Testimony before the Special Oversight Panel of Terrorism Committee on Armed Services, US House of Representatives," 23 05</source>
          <year>2000</year>
          . [Online]. Available: https://pdfs.semanticscholar.
          <source>org/7fdd/ae586 b6d2167919 abba17eb90e5219b7835b.pdf</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Dorothy</given-names>
            <surname>Denning</surname>
          </string-name>
          ,
          <year>2001</year>
          . “Is Cyber Terror Next?” New York: U.S. Social Science Research Council, at http://www.ssrc.org/sept11/essays/dennin g.htm.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Dorothy</surname>
            <given-names>Denning</given-names>
          </string-name>
          ,
          <year>2000b</year>
          . “Cyberterrorism,” Global Dialogue (Autumn), at http://www.cs.georgetown.edu/~denning/i nfosec/cyberterror-GD.doc.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Dorothy</given-names>
            <surname>Denning</surname>
          </string-name>
          ,
          <year>1999</year>
          . “Activism, Hacktivism, and
          <article-title>Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy</article-title>
          ,” Washington D.C.: Nautilus, at http://www.nautilus.org/infopolicy/workshop/papers/denning.html.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Gordon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Ford</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2002</year>
          ) Cyberterrorism? Computers &amp; Security,
          <volume>21</volume>
          (
          <issue>7</issue>
          ):
          <fpage>636</fpage>
          -
          <lpage>647</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <article-title>UNoDC, "The Use Of The Internet For Terrorist Purposes,"</article-title>
          <source>United Nations Office On Drugs And Crime</source>
          , Vienna,
          <year>2012</year>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Paul</given-names>
            <surname>Taylor</surname>
          </string-name>
          and Tim Jordan,
          <article-title>Hacktivism and Cyberwars: Rebels with a Cause?</article-title>
          (New York: Routledge,
          <year>2004</year>
          ),
          <volume>1</volume>
          , papers3://publication/uuid/50380B27-672A4D1A
          <string-name>
            <surname>-</surname>
          </string-name>
          89C0-6FC517868773.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Richard</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Clarke</surname>
            and
            <given-names>Robert</given-names>
          </string-name>
          <string-name>
            <surname>Knake</surname>
          </string-name>
          , Cyber War:
          <article-title>The Next Threat to National Security and What To Do About It</article-title>
          , Terrorism and Political Violence, vol.
          <volume>23</volume>
          (New York: HarperCollins Publishers,
          <year>2012</year>
          ),
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Samuel</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>McQuade</surname>
            , Understanding and
            <given-names>Managing</given-names>
          </string-name>
          <string-name>
            <surname>Cybercrime</surname>
          </string-name>
          (Boston: Pearson Education,
          <year>2006</year>
          ),
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Khan</surname>
          </string-name>
          , “
          <article-title>States Rather than Criminals Pose a Greater Threat to Global Cyber Security: A Critical Analysis</article-title>
          ,”
          <volume>93</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Tyson</surname>
            <given-names>Macaulay</given-names>
          </string-name>
          ,
          <source>RIoT Control: Understanding and Managing Risks and the Internet of Things</source>
          (Cambridge: Morgan Kaufmann,
          <year>2016</year>
          ),
          <fpage>228</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Salih</surname>
            <given-names>Tutun</given-names>
          </string-name>
          , Mohammad T. Khasawneh,
          <string-name>
            <given-names>Jun</given-names>
            <surname>Zhuang</surname>
          </string-name>
          .
          <article-title>New framework that uses patterns and relations to understand terrorist behaviors // Expert Systems With Applications 78 (</article-title>
          <year>2017</year>
          )
          <fpage>358</fpage>
          -
          <lpage>375</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>