727
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

The Role of Intercultural Communication in Cyberterrorism

Pages 775-790 | Received 02 Dec 2013, Accepted 12 Dec 2013, Published online: 25 Sep 2014

REFERENCES

  • Abdelnour-Nocera, J. (2002a). Context and culture in human computer interaction: “Usable” does not mean “senseful.” In F. Sudweeks & C. Ess (Eds.), Proceedings, cultural attitudes towards technology and communication (pp. 505–524). Murdoch, Australia: Murdoch University Press.
  • Abdelnour-Nocera, J. (2002b). Ethnography and hermeneutics in cybercultural research: Accessing IRC virtual communities. Journal of Computer-Mediated Communication, 7(2).
  • Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66–84.
  • Archick, K. (2003). Cybercrime: The council of Europe convention. In J. V. Blane (Ed.), Cybercrime and cyberterrorism (pp. 1–6). Hauppauge, NY: Novinka Books.
  • Axelrod, E. M. (2009). Violence goes to the Internet: Avoiding the snare of the net. Springfield, IL: Charles C. Thomas Publisher.
  • Barber, B. (1995). Jihad vs. McWorld: How globalism and tribalism are reshaping the world. New York, NY: Random House.
  • Baudrillard, J. (2003). Simulacra and simulation. Ann Arbor, MI: The University of Michigan Press.
  • Bradley, A. K. (2012). Anatomy of cyberterrorism: Is America vulnerable? New York, NY: BiblioScholar.
  • Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston, MA: Northeastern University Press.
  • Britt, P. (2005). By law: Catching up with malware. Information Today, 22(11), 1–54.
  • Bucher, H. J. (2002). The power of the audience: Interculturality, interactivity and trust in internet-communication: Theory, research design, and empirical results. In F. Sudweeks & C. Ess (Eds.), Proceedings, cultural attitudes towards technology and communication (pp. 3–14). Murdoch, Australia: Murdoch University Press.
  • Capurro, R. (2005). Privacy: An intercultural perspective. Ethics and Information Technology, 7(1), 37–47.
  • Carooso, J. (2004). Are you 133t? One-time hacker slang now ridiculed by all except those who use it. Network World, 1, 76.
  • Castells, M. (2001). The Internet galaxy: Reflections on the Internet, business, and society. Oxford, UK: Oxford University Press.
  • Chase, M., Macfadyen, L., Reeder, K., & Roche, J. (2002). Intercultural challenges in networked learning: Hard technologies meet soft skills. First Monday, 7(8), 10–21.
  • Conhaim, W. W. (2005). The global net: Part II. Information Today, 21(10), 41–42.
  • Conway, M. (2002). What is cyberterrorism? Current History, 2, 436–440.
  • Cook, S. E. (2004). New technologies and language change: Toward an anthropology of linguistic frontiers. Annual Review of Anthropology, 33(1), 103–116.
  • Crystal, D. (2001). Language and the Internet. Cambridge, UK: Cambridge University Press.
  • Davis, M. (1997). Gangland: Cultural elites and the new generationalism. St. Leonards: Allen & Unwin.
  • Debrix, F. (2001). Cyberterror and media-induced fears: The production of emergency culture. Strategies: Journal of Theory, Culture & Politics, 14(1), 149–168.
  • Dreyfus, S. (1997). Underground: Tales of hacking, madness and obsession on the electronic frontier. London, UK: Mandarin.
  • Dunnigan, J. F. (2003). The next war zone: Confronting the global threat of cyberterrorism. New York, NY: Citadel Press.
  • Escobar, A. (1996). Welcome to cyberia: Notes on the anthropology of cyberculture. In Z. Sarda & J. R. Ravetz (Eds.), Cyberfutures: Culture and politics on the information superhighway (pp. 111–137). London, UK: Pluto Press.
  • Frederick, R. (2005). Tapping into students' cultural identity. Educational Leadership, 63(4), 69–70.
  • Fukuyama, F. (1995). Trust: The social virtues and the creation of prosperity. New York, NY: Free Press.
  • Geertz, C. (1973). The interpretation of cultures. New York, NY: Basic Books.
  • Hall, E. T. (1959). The silent language. Garden City, NY: Doubleday.
  • Hall, E. T. (1976). Beyond culture. Garden City, NY: Doubleday.
  • Hall, E. T. (1992). An anthropology of everyday of life. Garden City, NY: Doubleday.
  • Hay, D. (2000). Spirituality versus individualism: Why we should nurture relational consciousness. International Journal of Children's Spirituality, 5(1), 37–48.
  • Hofstede, G. H. (1991). Cultures and organizations: Software of the mind. New York, NY: McGraw-Hill.
  • Jandt, F. (2004). An introduction to intercultural communication: Identities in a global community. Thousand Oaks, CA: Sage.
  • Johari, A. (2005). Intercultural Internet-based learning: Know your audience and what it values. Educational Technology Research & Development, 53(2), 117–127.
  • Jordan, T. (1999). Cyberculture: The culture and politics of cyberspace and the Internet. London, UK: Routledge.
  • Juergensmeyer, M. (2000). Terror in the mind of God. Berkeley, CA: University of California Press.
  • Kagitcibasi, C. (1994). A critical appraisal of individualism and collectivism: Toward a new formulation. In U. Kim, H. C. Triandis, C. Kagitcibasi, S.-C. Choi, & G. Yoon (Eds.), Individualism and collectivism: Theory, method and applications (pp. 52–65). Thousand Oaks, CA: Sage.
  • Kee, E. (2005). Understanding elite speak. Computimes, 3, p. 50.
  • Kennedy, S. D. (2001). Security technology and other issues. Information Today, 18(11), 34–35.
  • Kling, R., & Carmel, E. (1997). American hegemony in packaged software trade and the “culture of software.” Information Society, 13(1), 125–142.
  • Kluver, R. (2004a). Globalization, informatization, and intercultural communication. In F. Jandt (Ed.), Intercultural communication: A global reader (pp. 425–437). Thousand Oaks, CA: Sage.
  • Kluver, R. (2004b). Political culture and information technology in the 2001 Singapore general election. Political Communication, 21, 435–458.
  • Kluver, R. (2005). The architecture of control: A Chinese strategy for e-governance. The Journal of Public Policy, 25(1), 75–97.
  • Kramer, E. (2003). Cosmopoly: Occidentalism and the new world order. In E. M. Kramer (Ed.), The emerging monoculture: Assimilation and the “Model Minority” (pp. 234–291). Westport, CT: Praeger.
  • Krapp, P. (2005). Terror and play, or what was hacktivism? Grey Room, 1(21), 70–93.
  • Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.
  • Lévy, P. (2000). Kyberkultura. Prague: Karolinum.
  • Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, CA: RAND Corporation.
  • MacNulty, A. A. R. (1999). Socio-political change and asymmetry in information warfare and intelligence. InfoWarCon99. Washington, DC: September 1999.
  • Matusitz, J. (2008). Cyberterrorism: Postmodern state of chaos. Information Security Journal: A Global Perspective, 17(4), 179–187.
  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
  • Mitnick, K., & Simons, W. L. (2002). The art of deception: Controlling the human element of security. New York, NY: Wiley.
  • Morse, M. (1998). Virtualities: Television, media art and cyberculture. Bloomington, IN: Indiana University Press.
  • Murdock, G. P. (1965). Culture and society. Pittsburgh, PA: University of Pittsburgh Press.
  • Nakada, M., & Tamura, T. (2005). Japanese conceptions of privacy: An intercultural perspective. Ethics and Information Technology, 7(1), 27–36.
  • Nayar, P. K. (2010). An introduction to new media and cybercultures. New York, NY: Wiley.
  • Neighly, P. (2000). Meet the hackers. America's Network, 104(9), 43–47.
  • Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron? Boston University Law Review, 81, 101–130.
  • Ohbuchi, K. I., Fukushima, O., & Tedeschi, J. T. (1999). Cultural values in conflict management: Goal orientation, goal attainment, and tactical decision. Journal of Cross-Cultural Psychology, 30, 51–71.
  • Poster, M. (2001). What's the matter with the Internet? Minneapolis, MN: University of Minnesota Press.
  • Pratt, M. K. (2005). E-mail exposure. Computerworld, 39(32), 37–39.
  • Rice, L. M. (2004). Analysis: Terror on the Web. United Press International, 1, 10–21.
  • Schmid, A. P. (1984). Political terrorism: A research guide to concepts, theories, data bases, and literature. Amsterdam: Transaction Books.
  • Schweitzer, D. (2005). A convert with a crush on his Mac. Computerworld, 39(31), p. 30.
  • Sinha, D. (1997). A cultural perspective on organizational behavior in India. In P. C. Earley & M. Erez (Eds), New perspectives on international industrial/organizational psychology (pp. 53–74). San Francisco, CA: Lexington.
  • Sinha, D., & Tripathi, R. C. (1994). Individualism in a collectivist culture: A case of coexistence of opposites. In U. Kim, H. C. Triandis, C. Kagitcibasi, S. C. Choi, & G. Yoon (Eds.), Individualism and collectivism: Theory, method, and applications (pp. 123–136). Thousand Oaks, CA: Sage.
  • Slay, J., Darzanos, K., Quirchmayr, G., & Koronios, A. (2003, June). Towards a mature understanding of “culture” in information systems security research. Paper presented at the IFIP Joint WG 8.2 + 9.4 Conference, Athens University of Economics and Business, Greece.
  • Smith, H. J. (2001). Information privacy and marketing: What the U.S. should (and shouldn't) learn from Europe. California Management Review, 43(2), 8–33.
  • Smith, P. B., & Bond, M. H. (1993). Social psychology across cultures. Cambridge, UK: Cambridge University Press.
  • Straub, D., Loch, K., Evaristo, R., Karahanna, E., & Strite, M. (2002). Toward a theory-based measurement of culture. Journal of Global Information Management, 10(1), 13–23.
  • Sun Tzu (2003). The art of war. London, UK: Penguin Books.
  • Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The invasion of the Chinese cyberspies (and the man who tried to stop them). Time, 166(10), 34–39.
  • Ting-Toomey, S., & Chung, L. (2005). Understanding intercultural communication. Los Angeles, CA: Roxbury Publishing Company.
  • Tran, L. (1996). The concept of privacy in intercultural communication. In A. Barthel (Ed.), Intercultural interaction and development: Converging perspectives (pp. 210–217). Sydney, Australia: University of Technology-Sydney.
  • Triandis, H. C. (1995). Individualism and collectivism. Boulder, CO: Westview.
  • Verhoeven, L. (2000). Components in early second language reading and spelling. Scientific Studies of Reading, 4(4), 313–330.
  • Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism. New York, NY: McGraw-Hill.
  • Voronov, M., & Singer, J. A. (2002). The myth of individualism-collectivism: A critical review. The Journal of Social Psychology, 142(4), 461–480.
  • Wang, G. (1994). Treading different paths: Informatization in Asian nations. Norwood, NJ: Ablex.
  • Wood, J. T. (1994). Gendered lives: Communication, gender, and culture. Belmont, CA: Wadsworth.
  • Wright, M. M. (2005). Finding a place in cyberspace. Frontiers: A Journal of Women Studies, 26(1), 48–59.
  • Yager, T. (2004). Imagine no possessions. InfoWorld, 26(47), 50.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.