E-Canada and the Emerging Cyber Attack Exigency

Authors

  • Craig MacEachern

Keywords:

Information in Society

Abstract

This paper examines the growing concern surrounding cyber-attacks, and warns about the possible impacts of a cyber-attack upon Canadian e-government, economy, and infrastructure. This paper covers historical examples of cyber-attacks on a global scale, then focuses on Canadian e-government vulnerabilities, and suggests some ways in which Canadian government must adapt its domestic security and internet policies to confront the future inevitability of cyber-attacks.  

Author Biography

Craig MacEachern

Craig MacEachern came tumbling up in the small mill town of Port Hawkesbury, Cape Breton. His interests lie in computer security, computer culture, and global politics. This paper was originally developed for INFO 5500: Information in Society. Craig is a first year Library and Information Studies student at Dalhousie, and currently works at Dalhousie's iLab as a Research Assistant.

References

Branscomb, L. (2004). Protecting civil society from terrorism: The search for a sustainable strategy. Technology in Society, 26(2-3), 271-285.<br /> <a href="http://dx.doi.org/10.1016/j.techsoc.2004.01.004" target="_blank">http://dx.doi.org/10.1016/j.techsoc.2004.01.004</a><br /> <br /> Canadian Security Intelligence Service. (2008a). Terrorism. Retrieved from http://www.csis-scrs.gc.ca/prrts/trrrsm/index-eng.asp<br /> <br /> Canadian Security Intelligence Service. (2008b). Working Against Information Security Threats. Retrieved from http://www.csisscrs.gc.ca/prrts/nfrmtn/wrkng-eng.asp<br /> <br /> CBC News. (Nov. 10, 2010). Federal online glitch leaked private info. Retrieved from http://www.cbc.ca/canada/ottawa/story/2010/11/10/privacy-glitch-111.html<br /> <br /> Coates, J. F. (1996). A thriving future for terrorism. Technological Forecasting and Social Change, 51(3), 295-299. <br /> <a href="http://dx.doi.org/10.1016/0040-1625%2895%2900198-0" target="_blank">http://dx.doi.org/10.1016/0040-1625(95)00198-0</a><br /> <br /> Czinkota, M. R., Knight, G. A., Liesch, P. W., &amp; Steen, J. (2005). Positioning terrorism in management and marketing: Research propositions. Journal of International Management, 11(4), 581-604. <br /> <a href="http://dx.doi.org/10.1016/j.intman.2005.09.011" target="_blank">http://dx.doi.org/10.1016/j.intman.2005.09.011</a><br /> <br /> Dearstyne, B. W. (2005). Fighting terrorism, making war: Critical insights in the management of information and intelligence. Government Information Quarterly, 22(2), 170-186.<br /> <a href="http://dx.doi.org/10.1016/j.giq.2005.01.001" target="_blank">http://dx.doi.org/10.1016/j.giq.2005.01.001</a><br /> <br /> Denning, D. E. (2000). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, May 23, 2000. Retrieved from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html<br /> <br /> Desouza, K. C., Koh, W. T. H., &amp; Ouksel, A. M. (2006). Information technology, innovation and the war on terrorism. Technological Forecasting and Social Change, 74(2), 125-128. <br /> <a href="http://dx.doi.org/10.1016/j.techfore.2006.07.006" target="_blank">http://dx.doi.org/10.1016/j.techfore.2006.07.006</a><br /> <br /> Drummond, D. (2010). Official Google blog: A new approach to China. Retrieved from http://googleblog.blogspot.com/2010/01/new-approach-to-china.html<br /> <br /> Dycus, S. (2010). Congress's role in cyber warfare. Journal of National Security Law &amp; Policy, 4(1), 155-171. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&amp;db=tsh&amp;AN=22049795&amp;site=isc-live<br /> <br /> Engel, P. (2010). The 5 steps of a cybersecurity risk assessment. Risk Management (00355593), 57(8), 39-39. Retrieved from http://search.ebscohost.com/ login.aspx?direct=true &amp;db=tsh&amp;AN=22049795 &amp;site=isc-live<br /> <br /> Gewirtz, D. (2009). How critical infrastructure is at risk of a cyber attack. Journal of Counterterrorism &amp; Homeland Security International, 15(2), 8-10. Retrieved from http://search.ebscohost.com/login.aspx?direct=true &amp;db=tsh&amp; AN=22049795&amp;site=isc-live E-Canada and Cyber Attacks 14<br /> <br /> Goodman, S. E., Kirk, J. C., &amp; Kirk, M. H. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 74(2), 193-210. <br /> <a href="http://dx.doi.org/10.1016/j.techfore.2006.07.007" target="_blank">http://dx.doi.org/10.1016/j.techfore.2006.07.007</a><br /> <br /> Government of Canada. (2010) Canada's cyber security strategy. Retrieved from http://www.publicsafety.gc.ca/prg/ns/cbr/ccss-scc-eng.aspx<br /> <br /> Halchin, L. E. (2002). Electronic government in the age of terrorism. Government Information Quarterly, 19(3), 243-254. doi: 10.1016/s0740-624x(02)00104-1<br /> <br /> Halchin, L. E. (2004). Electronic government: Government capability and terrorist resource. Government Information Quarterly, 21(4), 406-419. <br /> <a href="http://dx.doi.org/10.1016/j.giq.2004.08.002" target="_blank">http://dx.doi.org/10.1016/j.giq.2004.08.002</a><br /> <br /> Holbrook, E. (2010). Cyberwarfare: WWIII or exaggeration? Risk Management (00355593), 57(8), 8-10. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&amp;db=tsh&amp;AN=22049795&amp;site=isc-live<br /> <br /> Internet Movie Database. (2010). Wargames (1983) &ndash; memorable quotes. Retrieved from http://www.imdb.com/title/tt0086567/quotes<br /> <br /> Kohlmann, E. F. (2006). The real online terrorist threat. Foreign Affairs, 85(5), 115-124. Retrieved from http://search.ebscohost.com/login.aspx?direct=true &amp;db=tsh&amp;AN=22049795&amp;site=isc-live<br /> <br /> Lee, J., &amp; Rao, H. R. (2007). Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government-citizens online interactions in a turbulent environment. Decision Support Systems, 43(4), 1431-1449. <br /> <a href="http://dx.doi.org/10.1016/j.dss.2006.04.008" target="_blank">http://dx.doi.org/10.1016/j.dss.2006.04.008</a><br /> <br /> Lin, C.-H., Liou, D.-Y., &amp; Wu, K.-W. (2007). Opportunities and challenges created by terrorism. Technological Forecasting and Social Change, 74(2), 148-164. <br /> <a href="http://dx.doi.org/10.1016/j.techfore.2006.02.004" target="_blank">http://dx.doi.org/10.1016/j.techfore.2006.02.004</a><br /> <br /> Mueller, R. (2009). YouTube &ndash; Cyber-terrorism. Retrieved from http://www.youtube.com/ watch?v=Y2uNxpqo7CE<br /> <br /> Oliver, M. (2007). 'Internet jihadist' jailed for 10 years. Retrieved from http://www.guardian.co.uk/technology/2007/jul/05/terrorism.uknews<br /> <br /> Oxford English Dictionary. (1989). Hacker, n. -- Oxford English Dictionary, Retrieved from http://dictionary.oed.com/<br /> <br /> Post, J. M. (2010). &mdash;When hatred is bred in the bone:? The social psychology of terrorism. Annals of the New York Academy of Sciences, 1208(1), 15-23. <br /> <a href="http://dx.doi.org/10.1111/j.1749-6632.2010.05694.x" target="_blank">http://dx.doi.org/10.1111/j.1749-6632.2010.05694.x</a><br /> PMid:20955321<br /> <br /> Stohl, M. (2007). Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games? Crime, Law &amp; Social Change, 46(4/5), 223-238. <br /> <a href="http://dx.doi.org/10.1007/s10611-007-9061-9" target="_blank">http://dx.doi.org/10.1007/s10611-007-9061-9</a><br /> <br /> Tibbetts, J. (2010). Report exposes 'economic damage' caused by hackers. Retrieved from http://www.ottawacitizen.com/news/Report+exposes+economic+damage+caused+hackers/3875625/story.html<br /> <br /> Victoroff, J. (2009). Suicide terrorism and the biology of significance. Political Psychology, 30(3), 397-400. <br /> <a href="http://dx.doi.org/10.1111/j.1467-9221.2009.00704.x" target="_blank">http://dx.doi.org/10.1111/j.1467-9221.2009.00704.x</a><br /> <br /> Wikileaks. (2010). Cable Viewer. Retrieved from http://www.wikileaks.ch/cablegate.html

Downloads

Published

2011-03-20

Issue

Section

Articles