Have a personal or library account? Click to login
The three faces of a digital attack: an analysis of cyber-crime, cyber-terrorism and hacktivism Cover

The three faces of a digital attack: an analysis of cyber-crime, cyber-terrorism and hacktivism

Open Access
|Jan 2026

References

  1. Aleksić, Ž., & Škulić, M. (2007) Kriminalistika (5. izd.). Beograd: Pravni fakultet; Službeni glasnik.
  2. Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141– 165.
  3. Brenner, S.W. (2010). Cybercrime: Criminal threats from cyberspace. Praeger.
  4. Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso Books.
  5. Conway, M. (2007). Terrorism and the internet: New media – new threats? Parliamentary Affairs, 60(2), 288–306.
  6. Cornish, P., Hughes, R., & Livingstone, D. (2009). Cyber space and the national security of the United Kingdom: Threats and responses. London: Chatham House (Royal Institute of International Affairs).
  7. Council of Europe. (2001). Convention on Cybercrime. Council of Europe (COE), 23 November 2001, https://www.coe.int/en/web/cybercrime/the-budapest-convention
  8. Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 239–288). RAND Corporation
  9. Gligorević, R. (2014). Cyber crime. Digital Economics, 163-174.
  10. Deutsch, Karl W. (1966). The Nerves of Government: Principles of Political Communication and Control (2nd ed). New York: Free of Glencoe.
  11. Gligorević, R. (2014). Cyber crime. Economics - innovative and economics research journal, 2(1), pp. 179-189. https://doi.org/10.7251/OIK1301011G
  12. Holt, T. J., & Bossler, A. M. (2016). Cybercrime and digital forensics: An introduction. Routledge.
  13. Jenkins, B. (1975). International Terrorism: A new mode of conflict. Los Angeles: Crescent Publications.
  14. Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? Routledge.
  15. Kešetović, Ž. (2008). Internet kao oruđe terorista. Revija za bezbednost, 4, pp. 37-41.
  16. Matijašević, J., & Spalević, Z. (2010). Specific characteristics of computer criminal offenses with regard to the law regulations. XLV International Scientific Conference on Information, Communication and Energy Systems and Technologies – ICEST 2010 CONFERENCE, 23 - 26 June 2010, Faculty of Technical Sciences, University “St. Clement Ohridski”, Ohrid, Macedonia.
  17. Kovačević, B. (2013). Cyberwar-American pretext for a new cold war? Polemos, 16(2), pp. 91-110.
  18. Krivični zakon Bosne i Hercegovine. Službeni glasnik Bosne i Hercegovine (3/2003, 32/2003, 37/2003, 54/2004, 61/2004, 30/2005, 53/2006, 55/2006, 8/2010, 47/2014, 22/2015, 40/2015, 35/2018, 46/2021, 31/2023, 47/2023).
  19. Krivični zakon Federacije Bosne i Hercegovine. Službene novine Federacije Bosne i Hercegovine (36/2003, 21/2004 69/2004, 18/2005, 42/2010, 42/2011, 59/2014, 76/2014, 46/2016, 75/2017, 31/2023, 58/2025).
  20. Krivični zakonik Republike Srpske. Službeni glasnik Republike Srpske (64/2017, 104/2018, 15/2021, 89/2021, 73/2023, 9/2024, 105/2024, 19/2025, 14/2025, 31/2025).
  21. Krivični zakon Brčko Distrikta BiH. Službeni glasnik BD BiH (19/2020, 3/2024, 14/2024).
  22. Kshetri, N. (2013). Cybercrime and cybersecurity in the global South. Springer.
  23. Olson, P. (2013). We are Anonymous: Inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency. Little, Brown and Company.
  24. Parker, D. B. (1983). Fighting computer crime. New York: Scribner.
  25. Petrović, S. R. (1994). Kompjuterski kriminal. Beograd: Ministarstvo unutrašnjih poslova Republike Srbije; Uredništvo časopisa “Bezebednost”.
  26. Porobić, M., & Bajraktarević, M. (2012). Cyber crime, pranje novca i finansijske istrage. Sarajevo: Visoko sudsko i tužilačko vijeće Bosne i Hercegovine; Swiss Agency for Development and Cooperation (SDC)
  27. Rid, T. (2012). Cyber war will not take place. Oxford University Press.
  28. Schjolberg, S. (1986). Computers and Penal Legislation: A Study of the Legal Politics of a new Technology. Universitetsforlaget.
  29. UN Security Council, Security Council resolution 1566 (2004) [concerning threats to international peace and security caused by terrorism], S/RES/1566 (2004), 8 October 2004.
  30. Votel, J. L. (2015). Statement before the Senate Armed Services Committee on the Posture of the U.S. Special Operations Command. Washington, D.C.
  31. Weimann, G. (2004). Cyberterrorism: how real is the threat? Washington, D.C.: United States Institute of Peace.
  32. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity Press.
  33. Zirojević, M. (2008). Upotreba novih informatiĉkih i komunikacionih medija u svrhe terorizma. Revija za bezbednost, 2(11), pp. 19-21.
Language: English
Page range: 75 - 93
Submitted on: Oct 20, 2025
|
Accepted on: Dec 31, 2025
|
Published on: Jan 26, 2026
Published by: University of Sarajevo
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2026 Jadranka Stojanović, published by University of Sarajevo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.