Policies, Laws and Strategies for Responding to Cyberterrorism in Thailand

Natthamon Petchkla, Sumonthip Chitsawang


This article explains the policies and strategies currently used in Thailand for responding to terrorism. This study uses in-depth interviews with technicians and policy analysis experts in the area of cyber-attack, including more than 30 people in 15 governmental agencies. Specifically, the study begins by exploring the definition of cyberterrorism. Moreover, the study uses document research in both Thai and English and concludes that Thailand’s governmental agencies understand the concept of cyberterrorism and have already established policies and strategies for responding to it in the future.


Cyberterrorism; Cyberterrorism Policies; Strategies for Responding;

Full Text:



Abdulmana, S., & Saleh, B. (2014). Coordinate negative content filtering and threat detection in Thailand on the Internet infrastructure. In The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). IEEE.

Ayala, L. (2016). Detection of Cyber-Attacks. In Cybersecurity for Hospitals and Healthcare Facilities. Apress, Berkeley, CA.

Bhardwaj, A., & Goundar, S. (2020). Keyloggers: silent cyber security weapons. Network Security, 2020(2).

Dayem, L. (2018). The Ethics of Cyber Warfare. Illini Journal of International Security, 4(1).

Dever, J., (2013). Cyberwarfare: attribution, preemption, and national self-defense. JL & Cyber Warfare, 2, 25.

E Silva, K. K. (2018). Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?. International Review of Law, Computers & Technology, 32(1).

Futter, A. (2018). Hacking the bomb: cyber threats and nuclear weapons. Georgetown University Press.

Gaia, J., Sanders, G. L., Sanders, S. P., Upadhyaya, S., Wang, X., & Yoo, C. W. (2021). Dark Traits and Hacking Potential. Journal of Organizational Psychology, 27(3).

Gandhi, F., Pansaniya, D., & Naik, S. (2022). Ethical Hacking: Types of Hackers, Cyber Attacks and Security. International Research Journal of Innovations in Engineering and Technology, 6(1).

Goel, S. (2020). National cyber security strategy and the emergence of strong digital borders. Connections, 19(1).

Gompert, D. C., & Libicki, M. (2019). Cyber war and nuclear peace. Survival, 61(4), 45-62.

Heinl, C. H. (2014). Regional cybersecurity: moving toward a resilient ASEAN cybersecurity regime. Asia policy, (18).

Holt, T. J. (2020). Computer hacking and the hacker subculture. The palgrave handbook of international cybercrime and cyberdeviance.

Jirawannakool, K., Sanglertsilapachai, N., & Siwamogsatham, S. (2009). Computer Security Incident Handling and Phishing Cases in Thailand. In Global E-Governance. IOS Press.

Kim, S. K., Cheon, S. P., & Eom, J. H. (2019). A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution. International Journal of Advanced Computer Research, 9(40).

Klein, J. J. (2018). Deterring and dissuading cyberterrorism. Air & Space Power Journal-Africa and Francophonie, 9(1).

Kobia, R. (2021). International Inter-Agency Coordination of State and Non-State Actors in Combating Global Cyber threat: Case Study of Kenya and Zambia (Doctoral dissertation, University of Nairobi).

Kostyuk, N., & Zhukov, Y. M. (2019). Invisible digital front: Can cyber-attacks shape battlefield events?. Journal of Conflict Resolution, 63(2), 317-347.

Kugler, R. L. (2009). “Deterrence of cyberattacks”, Cyberpower and national security, 320.

Kumar, S., & Agarwal, D. (2018). Hacking attacks, methods, techniques and their protection measures. International Journal of Advance Research in Computer Science and Management, 4(4).

McDonald, C. (2021). Friends, rivals, foes: The private sector and online vigilantism impact on police cyber capabilities.

Mahoney, C. W. (2021). Corporate Hackers. Strategic Studies Quarterly, 15(1).

Nakayama, S. (2012). Govt Claims Cyberdefense Right/Says International Laws Should be Applied to Computer Infiltration. Yomiuri Shimbun.

Noguchi, M., & Ueda, H. (2019). An analysis of the actual status of recent cyberattacks on critical infrastructures. NEC Technical Journal, Special Issue Cybersecurity, 12(2).

Norris, P., (2003). “Digital divide? Civic engagement, information poverty & the Internet in democratic societies,” at http://ksghome.harvard.edu/~.pnorris.shorenstein.ksg/book1.htm, accessed 5 February 2004.

Perlroth, N. (2021). This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury Publishing USA.

Rauta, V. (2020). Towards a typology of non-state actors in ‘hybrid warfare’: proxy, auxiliary, surrogate and affiliated forces. Cambridge Review of International Affairs, 33(6).

Richet, J. L. (2013). From young hackers to crackers. International Journal of Technology and Human Interaction (IJTHI), 9(3).

Rugge, F. (2018). Confronting an” Axis of Cyber”?: China, Iran, North Korea, Russia in Cyberspace. Ledizioni-LediPublishing.

Schmid, Alex P and Jongman, Albert J. (2008). Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature (updated edn). (New Burnswick, NJ: Transaction, 2008).

Schneier, B. (2021, July). Invited Talk: The Coming AI Hackers. In International Symposium on Cyber Security Cryptography and Machine Learning. Springer, Cham.

Segal, A. (2011). Cyberspace Governance: The Next Step. Council on Foreign Relations, Policy Innovation Memorandum, (2), 1.

Silke, Andrew. (2004). “The Road Less Travelled: Recent Trends in Terrorism Research”, in Andrew Silke (ed.) Research on Terrorism: Trends, Achievements and Failures (Abingdon: Routledge), 186-213.

Smith, A. D., & Rupp, W. T. (2002). Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Information Management & Computer Security.

Sun, L. (2021). Discussion on computer network security prevention based on big data era. In Journal of Physics: Conference Series (Vol. 1848, No. 1, p. 012103). IOP Publishing.

Tan, W. L., & Khader, M. (2022). Impact of justice‐related dispositions on support for cyber vigilantism: The mediating effect of perceived severity of transgression. Legal and Criminological Psychology.

Taneski, N. (2021). Transformation of war–use of conventional military forces against no-state actors. The Annual of the Faculty of Philosophy in Skopje, 74.

Tantawutho, T. (2017, January). The computer crime incidents and the future of countermeasures in Thailand. In 2017 Third Asian Conference on Defence Technology (ACDT). IEEE.

ThaiCERT. (2018). Cybersecurity strategy for critical information infrastructure in Thailand.

Bangkok: Electronic Transactions Development Agency. Pg.1-28

Wenhong, X. (2020). Challenges to cyber sovereignty and response measures. Mirovaia ekonomika i mezhdunarodnye otnosheniia, 64(2).

Yeo, S., Birch, A. S., & Bengtsson, H. I. J. (2019). The Role of State Actors in Cybersecurity: Can State Actors Find Their Role in Cyberspace?. In National Security: Breakthroughs in Research and Practice. IGI Global.

DOI: http://dx.doi.org/10.29303/ius.v10i2.1095


  • There are currently no refbacks.

Copyright (c) 2022 Natthamon Petchkla, Sumonthip Chitsawang

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Analytics Jurnal IUS statcounter


View full indexing services.