The role of computer forensics in the fight against terrorism
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communic...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
University Dzon Nezbit
2020-01-01
|
Series: | Megatrend Revija |
Subjects: | |
Online Access: | https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2020/1820-31592001129S.pdf |
id |
doaj-2a3fada8a8db4392b279f16b8e1f4135 |
---|---|
record_format |
Article |
spelling |
doaj-2a3fada8a8db4392b279f16b8e1f41352020-11-25T04:11:27ZengUniversity Dzon NezbitMegatrend Revija1820-31592560-33292020-01-011711291421820-31592001129SThe role of computer forensics in the fight against terrorismStevanović Miroslav D.0Đurđević Dragan Ž.1Univerzitet Megatrend, Pravni fakultet, Beograd, SerbiaUniverzitet Megatrend, Fakultet za civilno vazduhoplovstvo, Beograd, SerbiaIn this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy is evaluated from the point of view of functionality. In this sense, it is an attempt to present elements that influence the effectiveness of counter-terrorism in the information age. Related to this is the specification of the role that digital forensics can play in this area. The conclusion is that an effective counter-terrorism strategy must necessarily encompass the institutional incorporation of digital forensics since it alone can contribute to the timely detection or assertion of responsibility for terrorism in a networked computing environment.https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2020/1820-31592001129S.pdfcontemporary terrorismconflict contextualizationdigital footprintforensic intelligence processsecurity procedures |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Stevanović Miroslav D. Đurđević Dragan Ž. |
spellingShingle |
Stevanović Miroslav D. Đurđević Dragan Ž. The role of computer forensics in the fight against terrorism Megatrend Revija contemporary terrorism conflict contextualization digital footprint forensic intelligence process security procedures |
author_facet |
Stevanović Miroslav D. Đurđević Dragan Ž. |
author_sort |
Stevanović Miroslav D. |
title |
The role of computer forensics in the fight against terrorism |
title_short |
The role of computer forensics in the fight against terrorism |
title_full |
The role of computer forensics in the fight against terrorism |
title_fullStr |
The role of computer forensics in the fight against terrorism |
title_full_unstemmed |
The role of computer forensics in the fight against terrorism |
title_sort |
role of computer forensics in the fight against terrorism |
publisher |
University Dzon Nezbit |
series |
Megatrend Revija |
issn |
1820-3159 2560-3329 |
publishDate |
2020-01-01 |
description |
In this paper, the authors examine the adequacy of the counter-terrorism concept, which does not envisage institutional responsibility for collecting, processing, and fixing traces of cyber-related terrorist activities. The starting point is the fact that today numerous human activities and communication take place in the cyberspace. Firstly, the focus is on the aspects of terrorism that present a generator of challenges to social stability and, in this context, the elements of the approach adopted by the current National Security Strategy of the Republic of Serbia. In this analysis, adequacy is evaluated from the point of view of functionality. In this sense, it is an attempt to present elements that influence the effectiveness of counter-terrorism in the information age. Related to this is the specification of the role that digital forensics can play in this area. The conclusion is that an effective counter-terrorism strategy must necessarily encompass the institutional incorporation of digital forensics since it alone can contribute to the timely detection or assertion of responsibility for terrorism in a networked computing environment. |
topic |
contemporary terrorism conflict contextualization digital footprint forensic intelligence process security procedures |
url |
https://scindeks-clanci.ceon.rs/data/pdf/1820-3159/2020/1820-31592001129S.pdf |
work_keys_str_mv |
AT stevanovicmiroslavd theroleofcomputerforensicsinthefightagainstterrorism AT đurđevicdraganz theroleofcomputerforensicsinthefightagainstterrorism AT stevanovicmiroslavd roleofcomputerforensicsinthefightagainstterrorism AT đurđevicdraganz roleofcomputerforensicsinthefightagainstterrorism |
_version_ |
1724417624658411520 |