Have a personal or library account? Click to login
The three faces of a digital attack: an analysis of cyber-crime, cyber-terrorism and hacktivism Cover

The three faces of a digital attack: an analysis of cyber-crime, cyber-terrorism and hacktivism

Open Access
|Jan 2026

Abstract

In the modern digital age, the boundaries between crime, terrorism and hacktivism in cyber space are becoming increasingly blurred. Although the usual elements of violence, political motivation, threat and fear provide a line of continuity that runs through the long and complex history of terrorism, it should also be taken into account that technological innovation has created a new form of terrorism. In recent years, the matter of “cyber” terrorism has become very interesting, as a kind of form of computer crime. Cyber terrorism implies the use of information resources in the form of threats or blackmail in order to achieve a specific terrorist goal. In the focus of attention is the abuse of the Internet as the most important global communication network. The use of the Internet by terrorists can be threefold: as a weapon, as a means of communication between activists and as a medium for addressing the public.

Precisely for these reasons, it is necessary to spread the culture of using computer technology, but attention should also be paid to the security culture. After an unsuccessful defense against a cyber attack, Internet forensics allows us to reconstruct the events in order to discover the attackers and their methods of operation. Given that it is an extremely complex matter, in the paper we also looked at the general determinants related to computer crime, computer terrorism and hacktivism.

Language: English
Page range: 75 - 93
Submitted on: Oct 20, 2025
|
Accepted on: Dec 31, 2025
|
Published on: Jan 26, 2026
Published by: University of Sarajevo
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2026 Jadranka Stojanović, published by University of Sarajevo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.