the ever - increasing growth of cyberspace and its attractiveness in this space has led to a significant portion of the daily activities of Citizens, businesses, recreation and entertainment to the atmosphere; cyber terrorism is one of these strategic threats which has faced many countries such as the islamic republic of iran in recent years .the strategic documents of the leading countries indicate that this threat is the first priority of the threats of these countries so that they allocate a lot of resources to deal with it .in this paper , after studying the relevant backgrounds of terrorism and cyber terrorism , its position among other cyber - cyber threats has been explained and finally the definition of the researcher - made cyber - terrorism has been explained and finally the definition of threats , methods of threat assessment , management approaches and by using them , the conceptual model is drawn and the final model is presented .
قوامی، ندا؛ کلانتری، رضا و رحیمی، مینا (1388)، تبیین نقش بیمۀ امنیت فضای تبادل اطلاعات در مدیریت مخاطرات، پژوهشکدۀ امنیت مرکز تحقیقات مخابرات ایران، تهران.
معین، محمد (1363)، فرهنگ معین، چ 6، تهران: امیرکبیر.
ناجی راد، محمدعلی (1387)، جهانیشدن تروریسم، چ 1، تهران: انتشارات وزارت امور خارجه.
Akhgar, B., Choraś, M., Brewster, B., Bosco, F., Vermeersch, E., Luda, V., … Wells, D., (2016), Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. Combatting Cybercrime and Cyberterrorism Springer, Cham.
Albahar, M., (2017), Cyber Attacks and Terrorism: A Twenty-First Century Conundrum. Science And Engineering Ethics. https://doi.org/10.1007/s11948-016-9864-0
Al Mazari, A., Anjarin, H., Habib, S. A., Nyakwende, E., (2016), Cyber Terrorism Taxonomies: Definition,Targets, Patterns, Risk Factors, and Mitigation Strategies. International Journal of Cyber Warfare and Terrorism (IJCWT), 6(1), 1–12.
Bester, P.C., (2019), Emerging challenges in terrorism and counterterrorism: A national security perspective. Paper presented on 17 January 2019 at the, The Hague University of Applied Sciences, Faculty of Public Managament, Law and Safety, The Hague.
Chuipka, , (2017), The Strategies of Cyberterrorism: Is Cyberterrorism an effective means to Achieving the Goals of Terrorists. http://137.122.14.44/handle/10393/35695
Denning, D.E., (2001), Is Cyber Terror Next? Social Science Research Council, W, DC, USA.
Forest, Brian., (2009), Terrorism, Crime, and Public Policy, UK, Cambridge University Press.
Haimes,Y.Yacov., (2009), Risk Modeling, Assessment, and Management, Third Edition, John Wiley and Sons, Inc.
Edwards, Frances, Steinhäusler, Friedrich., (2007), NATO AND TERRORISM On Scene: New Challenges for First Responders and Civil Protection, U.S.A, San José State University Department of Political Science,Division of Physics and Biophysics,Salzburg, Austria University of Salzburg San José, CA, U.S.A.
Leson, (2005), Assessing and / Managing the Terrorism Threat, U.S. Department of JusticeOffice of Justice Programs,Washington, DC 20531.
Lourdeau, K., (2004), Testimony of Keith Lourdeau, Deputy Assistant Director, Cyber Division, FBI before the Senate Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, February 24, 2004, Senate, Washington, DC, USA. http://www.fbi.gov/news/ testimony/hearing-on-cyber-terrorism.
Fidler, David, Buchan, Russell, Crawford, Emily, Adhihetty, TJ, Harrison Dinniss, Heather, Ducheine, Paul, Eichensehr, Kristen, Housen-Couriel, Deborah, Ivanov, Eduard,Kim, Sung-Won, Nasu, Hitoshi, K. Nkusi, Fred, Ellen O’Connell, Mary, Sobrinho de Morais Neto Arnaldo, Tsagourias, Nicholas, Ziolkowski, Katharina., (2016), Study Group on Cybersecurity, Terrorism, and International Law, INTERNATIONAL LAW ASSOCIATION, http://www.ila-hq.org/en/studygroups/
index.cfm/cid/1050.
Salleh, M., Selamat, S. R., Yusof, R., Sahib, S., (2016), Discovering Cyber Terrorism Using Trace Pattern. International Journal of Network Security.
SEissa, Israa., Ibrahim, Jamaludin., Yahaya, Nor-Zaiasron., (2017), Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review, International Journal of Science and Research, ISSN (Online): 2319-7064.
Veerasamy, namosha, Grobler, , Sloms, B. V., (2016), Building an Ontology for Cyberterrorism.https://www.researchgate.net
Amirli, H., & Thaghafi, K. (2022). provides a conceptual model of threats arising from cyber – terrorism. Quarterly Journal Strategic Studies in Cyberspace, 2(2), 7-44.
MLA
Hossein Amirli; Kamyar Thaghafi. "provides a conceptual model of threats arising from cyber – terrorism", Quarterly Journal Strategic Studies in Cyberspace, 2, 2, 2022, 7-44.
HARVARD
Amirli, H., Thaghafi, K. (2022). 'provides a conceptual model of threats arising from cyber – terrorism', Quarterly Journal Strategic Studies in Cyberspace, 2(2), pp. 7-44.
VANCOUVER
Amirli, H., Thaghafi, K. provides a conceptual model of threats arising from cyber – terrorism. Quarterly Journal Strategic Studies in Cyberspace, 2022; 2(2): 7-44.