A Comparative Analysis of the Factors Predicting Fears of Terrorism and Cyberterrorism in a Developing Nation Context
Abstract views: 690 / PDF downloads: 464
DOI:
https://doi.org/10.29333/ejecs/1372Keywords:
Cyberterrorism, exposure to online news, time spent online, political views, risk of immigrant's cyber-attacks, religious service attendanceAbstract
Considering the continuous use of cyberspace for cyber-attacks and terrorism, the current study examined the phenomena of the fear of terrorism and cyberterrorism. It also investigates the factors influencing the fear of terrorism and of cyberterrorism and the predictive differences between the two. A multistage random sampling technique was utilized to collect data from 510 Indonesian participants at local administrative units and social networking site users. Structural equation model analysis was performed using SmartPLS 3.3.3 software. The results revealed that of the six predictors, exposure to online news, time spent online, political views, risk of immigrants' cyber-attacks, and religiosity significantly influenced creating fear of cyberterrorism. In contrast, religious service attendance was not significantly related to the creation of cyberterrorism fear among individual individuals. At the same time, all the factors, excluding time spent online, were significant predictors of creating fear of terrorism among the citizens of Indonesia. These findings can be utilized by practitioners, academicians, and government bodies to reduce the fear of terrorism and cyberterrorism among bill citizens of a developing nation by devising strategies and regulations and providing them with cyber security.
Downloads
References
Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics, 25(4), 993-1006. https://doi.org/10.1007/s11948-016-9864-0 DOI: https://doi.org/10.1007/s11948-016-9864-0
Altheide, D. L. (2020). Pandemic in the time of Trump: Digital media logic and deadly politics (Vol. 43, pp. 514-540). Wiley Online Library. DOI: https://doi.org/10.1002/symb.501
Backhaus, S., Gross, M. L., Waismel-Manor, I., Cohen, H., & Canetti, D. (2020). A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure. Cyberpsychology, Behavior, and Social Networking, 23(9), 595-603. https://doi.org/10.1089/cyber.2019.0692 DOI: https://doi.org/10.1089/cyber.2019.0692
Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In V. Benson & J. Mclaney (Eds.), Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Elsevier. DOI: https://doi.org/10.1016/B978-0-12-816203-3.00004-6
Bakry, M., Syatar, A., Abubakar, A., Risal, C., Ahmad, A., & Amiruddin, M. M. (2021). Strengthening the cyber terrorism law enforcement in Indonesia: Assimilation from Islamic jurisdiction. International Journal of Criminology and Sociology, 10, 1267-1276. DOI: https://doi.org/10.6000/1929-4409.2021.10.146
Beale, M., & Weinborn, R. F.-C. (2021). A simple checklist, that is all it takes: A cluster or randomized controlled field trial on improving the treatment of suspected terrorists by the police. Journal of Experimental Criminology, 17, 629-655. https://doi.org/10.1007/s11292-020-09428-9 DOI: https://doi.org/10.1007/s11292-020-09428-9
Ben Naseir, M. A., Dogan, H., Apeh, E., Richardson, C., & Ali, R. (2019). Contextualising the national cyber security capacity in an unstable environment: A Spring Land case study [Paper presentation]. In Á Rocha, H. Adeli, L. Reis, S. Costanzo (Eds.) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing (Vol. 930, pp. 373-382). Springer. https://doi.org/10.1007/978-3-030-16181-1_3 DOI: https://doi.org/10.1007/978-3-030-16181-1_35
Broeders, D., Cristiano, F., & Weggemans, D. (2021). Too close for comfort: cyber terrorism and information security across national policies and international diplomacy. Studies in Conflict & Terrorism. Advance online publication. https://doi.org/10.1080/1057610X.2021.1928887 DOI: https://doi.org/10.1080/1057610X.2021.1928887
Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies, 23(sup1), S47-S59. https://doi.org/10.1080/14616696.2020.1804973 DOI: https://doi.org/10.1080/14616696.2020.1804973
Chang, L. Y., & Coppel, N. (2020). Building cyber security awareness in a developing country: lessons from Myanmar. Computers & Security, 97, Article 101959. https://doi.org/10.1016/j.cose.2020.101959 DOI: https://doi.org/10.1016/j.cose.2020.101959
Coman, C., Andrioni, F., Ghita, R.-C., & Bularca, M. C. (2021). Social and emotional intelligence as factors in terrorist propaganda: An analysis of the way mass media portrays the behavior of Islamic terrorist groups. Sustainability, 13(21), Article 12219. https://doi.org/10.3390/su132112219 DOI: https://doi.org/10.3390/su132112219
Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and Gender, 5(1), 55-60. https://doi.org/10.1089/vio.2017.0048 DOI: https://doi.org/10.1089/vio.2017.0048
Dalle, J., Siyoto, S., Astika, N. D., Negara, D. J., Chandra, T., & Anam, K. (2020). Moderating role of IT adoption and mechanism of dynamic capabilities on Indonesian pharmaceutical firms performance. Systematic Reviews in Pharmacy, 11(9), 982-992. https://doi.org/10.31838/srp.2020.9.142
Farmaki, A., Khalilzadeh, J., & Altinay, L. (2019). Travel motivation and demotivation within politically unstable nations. Tourism Management Perspectives, 29, 118-130. https://doi.org/10.1016/j.tmp.2018.11.004 DOI: https://doi.org/10.1016/j.tmp.2018.11.004
Fischer-Preßler, D., Schwemmer, C., & Fischbach, K. (2019). Collective sense-making in times of crisis: Connecting terror management theory with Twitter user reactions to the Berlin terrorist attack. Computers in Human Behavior, 100, 138-151. https://doi.org/10.1016/j.chb.2019.05.012 DOI: https://doi.org/10.1016/j.chb.2019.05.012
Fox, K. A., Nobles, M. R., & Piquero, A. R. (2009). Gender, crime victimization and fear of crime. Security Journal, 22(1), 24-39. https://doi.org/10.1057/sj.2008.13 DOI: https://doi.org/10.1057/sj.2008.13
Hartanto, D., Dalle, J., Akrim, A., & Anisah, H. U. (2021). Perceived effectiveness of e-governance as an underlying mechanism between good governance and public trust: a case of Indonesia. Digital Policy, Regulation and Governance, 23(6), 598-616. https://doi.org/10.1108/DPRG-03-2021-0046 DOI: https://doi.org/10.1108/DPRG-03-2021-0046
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. https://doi.org/10.1007/s11747-014-0403-8 DOI: https://doi.org/10.1007/s11747-014-0403-8
Kadir, N. K., Judhariksawan, J., & Maskun, M. (2019). Terrorism and cyberspace: A phenomenon of cyber-terrorism as transnational crimes. FIAT JUSTISIA: Jurnal Ilmu Hukum, 13(4), 333-344. https://doi.org/10.25041/fiatjustisia.v13no4.1735 DOI: https://doi.org/10.25041/fiatjustisia.v13no4.1735
Kelly, A. H., & McGoey, L. (2018). Facts, power and global evidence: a new empire of truth. Economy and Society, 47(1), 1-26. https://doi.org/10.1080/03085147.2018.1457261 DOI: https://doi.org/10.1080/03085147.2018.1457261
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49. https://doi.org/10.1016/j.ijcip.2019.01.001 DOI: https://doi.org/10.1016/j.ijcip.2019.01.001
Kriviņš, A., Teivāns-Treinovskis, J., & Tumalavičius, V. (2021). Issues of state and national security: Religiously inspired terrorism in the Baltic States: Internal and external factors. Insights into Regional Development, 3(1), 65-79. https://doi.org/10.9770/IRD.2021.3.1(4) DOI: https://doi.org/10.9770/IRD.2021.3.1(4)
Lawson, S. T., Yeo, S. K., Yu, H., & Greene, E. (2016). The cyber-doom effect: The impact of fear appeals in the US cyber security debate .. N. Pissanidis, H. Rõigas, & M. Veenendaal (Eds.), 8th International conference on cyber conflict (CyCon) (pp. 65-80). IEEE. DOI: https://doi.org/10.1109/CYCON.2016.7529427
Lee, C. S., Choi, K.-S., Shandler, R., & Kayser, C. (2021). Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events. Journal of Contemporary Criminal Justice, 37(3), 333-355. https://doi.org/10.1177/10439862211001606
Lee, C. S., Choi, K.-S., Shandler, R., & Kayser, C. (2021). Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events. Journal of Contemporary Criminal Justice, 37(3), 333-355. DOI: https://doi.org/10.1177/10439862211001606
Malik, Z. U. A., Xing, H. M., Malik, S., Shahzad, T., Zheng, M., & Fatima, H. (2022). Cyber security situation in Pakistan: A critical analysis. PalArch's Journal of Archaeology of Egypt/Egyptology, 19(1), 23-32. https://archives.palarch.nl/index.php/jae/article/view/10650
Mansoor, M. (2021). Citizens' trust in government as a function of good governance and government agency's provision of quality information on social media during COVID-19. Government Information Quarterly, 38(4), 101597. https://doi.org/10.1016/j.giq. 2021.101597 DOI: https://doi.org/10.1016/j.giq.2021.101597
Mansoor, M., Awan, T. M., & Paracha, O. S. (2021). Predicting pro-environmental behaviors of green electronic appliances' users. International Journal of Business and Economic Affairs, 6(4), 175-186. DOI: https://doi.org/10.24088/IJBEA-2021-64002
Mansoor, M., & Paul, J. (2022). Mass prestige, brand happiness and brand evangelism among consumers. Journal of Business Research, 144, 484-496. https://doi.org/10.1016/j.jbusres.2022.02.015 DOI: https://doi.org/10.1016/j.jbusres.2022.02.015
Miqdad, M., & Oktaviani, S. A. (2021). The contribution of social media value to company's financial performance: Empirical evidence from Indonesia. The Journal of Asian Finance, Economics and Business, 8(1), 305-315. https://doi.org/10.13106/jafeb.2021.vol8.no1.305
Naem Slim Asfour, Q., Mohammed Aqel, S., Mustafa Atia Al-Bakor, F., Fahes Al Zwain, F., & Ahmed Hussein Moqabla, M. (2020). Terrorism from the faculty of education at Taif University Students' viewpoint and the role of the social media in disseminating it (A field study). Sohag University International Journal of Educational Research, 1(1), 123-166. https://doi.org/10.21608/SUIJER.2020.77328 DOI: https://doi.org/10.21608/suijer.2020.77328
Nalaka, S., & Diunugala, H. (2020). Factors associating with social media related crime victimization: Evidence from the undergraduates at a public university in Sri Lanka. International Journal of Cyber Criminology, 14(1), 174-184. https://doi.org/10.5281/zenodo.3748685
Nyadera, I. N., & Bincof, M. O. (2019). Human security, terrorism, and counterterrorism: Boko Haram and the Taliban. International Journal on World Peace, 36(1), 7-32. https://www.proquest.com/scholarly-journals/human-security-terrorism-counterterrorism-boko/docview/2251988988/se-2
Onat, I., Bastug, M. F., Guler, A., & Kula, S. (2022). Fears of cyberterrorism, terrorism, and terrorist attacks: An empirical comparison. Behavioral Sciences of Terrorism and Political Aggression.Advance online publication. http://10.1080/19434472.2022.2046625 DOI: https://doi.org/10.1080/19434472.2022.2046625
Putra, B. A. (2022). Cyber Cooperation between Indonesia and the United States in Addressing the Threat of Cyberterrorism in Indonesia. International Journal of Multicultural and Multireligious Understanding, 9(10), 22-33. http://dx.doi.org/10.18415/ijmmu.v9i10.4058
Prensky, M. (2001). Digital natives, digital immigrants part 2: Do they really think differently? On the Horizon, 9(6), 1-6. https://doi.org/10.1108/10748120110424843 DOI: https://doi.org/10.1108/10748120110424843
Rogers, M. B., Loewenthal, K. M., Lewis, C. A., Amlôt, R., Cinnirella, M., & Ansari, H. (2007). The role of religious fundamentalism in terrorist violence: A social psychological analysis. International Review of Psychiatry, 19(3), 253-262. https://doi.org/10.1080/09540260701349399 DOI: https://doi.org/10.1080/09540260701349399
Rosmarin, D. H., Pargament, K. I., & Mahoney, A. (2009). The role of religiousness in anxiety, depression, and happiness in a Jewish community sample: A preliminary investigation. Mental Health, Religion and Culture, 12(2), 97-113. https://doi.org/10.1080/13674670802321933 DOI: https://doi.org/10.1080/13674670802321933
Sarker, J. U. (2021). The opportunity for religious tourism: In the perspective of Bangladesh. Journal of Business, 6(4), 1-10. https://doi.org/10.18533/job.v6i4.209
Setiawan, D. A. (2020). Cyber terrorism and its prevention in Indonesia. Jurnal Media Hukum, 27(2), 267-283. DOI: https://doi.org/10.18196/jmh.20200156
Sevde, K. (2021). Triangle of cyber, terrorism and radicalization. Cyberpolitik Journal, 6(11), 48-58.
Shandler, R., Gross, M. L., Backhaus, S., & Canetti, D. (2022). Cyber terrorism and public support for retaliation–a multi-country survey experiment. British Journal of Political Science, 52(2), 850-868. https://doi.org/10.1017/S0007123420000812 DOI: https://doi.org/10.1017/S0007123420000812
Soomro, T. R., & Hussain, M. (2019). Social media-related cybercrimes and techniques for their prevention. Applied Computer Systems, 24(1), 9-17. https://doi.org/10.2478/acss-2019-0002 DOI: https://doi.org/10.2478/acss-2019-0002
Steingartner, W., Galinec, D., & Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), Article 597. https://doi.org/10.3390/sym13040597 DOI: https://doi.org/10.3390/sym13040597
Stockemer, D., Niemann, A., Unger, D., & Speyer, J. (2020). The "refugee crisis," immigration attitudes, and Euroscepticism. International Migration Review, 54(3), 883-912. https://doi.org/10.1177/0197918319879926 DOI: https://doi.org/10.1177/0197918319879926
Stohl, M. (2006). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime, Law and Social Change, 46(4), 223-238. https://doi.org/10.1007/s10611-007-9061-9 DOI: https://doi.org/10.1007/s10611-007-9061-9
Syahrin, M. A. (2018). Law enforcement of foreign workers abusing immigration residence permit: Case studies on energy and mining companies. In Proceedings of the 2018 International Conference on Energy and Mining Law (pp. 184-189). Atlantis Press. https://doi.org/10.2991/iceml-18.2018.41 DOI: https://doi.org/10.2991/iceml-18.2018.41
Vergani, M., O'Brien, K. S., Lentini, P., & Barton, G. (2019). Does the awareness of mortality shape people's openness to violence and conflict? An examination of terror management theory. Political Psychology, 40(1), 111-124. https://doi.org/10.1111/pops.12488 DOI: https://doi.org/10.1111/pops.12488
Wahab, S. (2021). Causes and consequences of terrorism in Khyber Pakhtunkhwa, Pakistan. International Journal of Research, 8(2), 234-245.
Wahlström, M., & Törnberg, A. (2021). Social media mechanisms for right-wing political violence in the 21st century: Discursive opportunities, group dynamics, and co-ordination. Terrorism and Political Violence, 33(4), 766-787. https://doi.org/10.1080/09546553.2019.1586676 DOI: https://doi.org/10.1080/09546553.2019.1586676
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Journal of Ethnic and Cultural Studies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
By submitting a manuscript to JECS, authors agree to transfer without charge the following rights to JECS upon acceptance of the manuscript: first worldwide publication rights and the right for JECS to grant permissions as JECS editors judge appropriate for the redistribution of the article, its abstract, and its metadata in professional indexing and reference services. Any revenues from such redistribution are used solely to support the continued publication and distribution of articles.
Accepted 2022-10-20
Published 2022-11-04