LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory

Photo by sarahdorweiler from unsplash

This study applies routine activities theory to determine whether the characteristics of jihadi-inspired web defacements in the United States vary from all other defacements performed against IP addresses hosted within… Click to show full abstract

This study applies routine activities theory to determine whether the characteristics of jihadi-inspired web defacements in the United States vary from all other defacements performed against IP addresses hosted within the United States from 2012 to 2016. We focus on target suitability variables and use a sample of over 2.2 million defacements reported by the independent website Zone-H. We estimated a binary logistic regression model and found that jihadi cyberattacks were rare among all the defacements performed in this 5-year period. Additionally, these findings demonstrated jihadists were more likely to target organizational websites and utilized specific attack methods compared to all other defacers. We contextualize our findings and outline a number of avenues for future research.

Keywords: jihadi associated; activities theory; differentiate jihadi; routine activities; characteristics differentiate; examining characteristics

Journal Title: Social Science Computer Review
Year Published: 2021

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.