Policies, Laws and Strategies for Responding to Cyberterrorism in Thailand
Keywords:
Cyberterrorism, Cyberterrorism Policies, Strategies for RespondingAbstract
This article explains the policies and strategies currently used in Thailand for responding to terrorism. This study uses in-depth interviews with technicians and policy analysis experts in the area of cyber-attack, including more than 30 people in 15 governmental agencies. Specifically, the study begins by exploring the definition of cyberterrorism. Moreover, the study uses document research in both Thai and English and concludes that Thailand’s governmental agencies understand the concept of cyberterrorism and have already established policies and strategies for responding to it in the future.
Downloads
References
Abdulmana, S., & Saleh, B. (2014). Coordinate negative content filtering and threat detection in Thailand on the Internet infrastructure. In The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). IEEE.
Ayala, L. (2016). Detection of Cyber-Attacks. In Cybersecurity for Hospitals and Healthcare Facilities. Apress, Berkeley, CA.
Bhardwaj, A., & Goundar, S. (2020). Keyloggers: silent cyber security weapons. Network Security, 2020(2).
Dayem, L. (2018). The Ethics of Cyber Warfare. Illini Journal of International Security, 4(1).
Dever, J., (2013). Cyberwarfare: attribution, preemption, and national self-defense. JL & Cyber Warfare, 2, 25.
E Silva, K. K. (2018). Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?. International Review of Law, Computers & Technology, 32(1).
Futter, A. (2018). Hacking the bomb: cyber threats and nuclear weapons. Georgetown University Press.
Gaia, J., Sanders, G. L., Sanders, S. P., Upadhyaya, S., Wang, X., & Yoo, C. W. (2021). Dark Traits and Hacking Potential. Journal of Organizational Psychology, 27(3).
Gandhi, F., Pansaniya, D., & Naik, S. (2022). Ethical Hacking: Types of Hackers, Cyber Attacks and Security. International Research Journal of Innovations in Engineering and Technology, 6(1).
Goel, S. (2020). National cyber security strategy and the emergence of strong digital borders. Connections, 19(1).
Gompert, D. C., & Libicki, M. (2019). Cyber war and nuclear peace. Survival, 61(4), 45-62.
Heinl, C. H. (2014). Regional cybersecurity: moving toward a resilient ASEAN cybersecurity regime. Asia policy, (18).
Holt, T. J. (2020). Computer hacking and the hacker subculture. The palgrave handbook of international cybercrime and cyberdeviance.
Jirawannakool, K., Sanglertsilapachai, N., & Siwamogsatham, S. (2009). Computer Security Incident Handling and Phishing Cases in Thailand. In Global E-Governance. IOS Press.
Kim, S. K., Cheon, S. P., & Eom, J. H. (2019). A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution. International Journal of Advanced Computer Research, 9(40).
Klein, J. J. (2018). Deterring and dissuading cyberterrorism. Air & Space Power Journal-Africa and Francophonie, 9(1).
Kobia, R. (2021). International Inter-Agency Coordination of State and Non-State Actors in Combating Global Cyber threat: Case Study of Kenya and Zambia (Doctoral dissertation, University of Nairobi).
Kostyuk, N., & Zhukov, Y. M. (2019). Invisible digital front: Can cyber-attacks shape battlefield events?. Journal of Conflict Resolution, 63(2), 317-347.
Kugler, R. L. (2009). “Deterrence of cyberattacksâ€, Cyberpower and national security, 320.
Kumar, S., & Agarwal, D. (2018). Hacking attacks, methods, techniques and their protection measures. International Journal of Advance Research in Computer Science and Management, 4(4).
McDonald, C. (2021). Friends, rivals, foes: The private sector and online vigilantism impact on police cyber capabilities.
Mahoney, C. W. (2021). Corporate Hackers. Strategic Studies Quarterly, 15(1).
Nakayama, S. (2012). Govt Claims Cyberdefense Right/Says International Laws Should be Applied to Computer Infiltration. Yomiuri Shimbun.
Noguchi, M., & Ueda, H. (2019). An analysis of the actual status of recent cyberattacks on critical infrastructures. NEC Technical Journal, Special Issue Cybersecurity, 12(2).
Norris, P., (2003). “Digital divide? Civic engagement, information poverty & the Internet in democratic societies,†at http://ksghome.harvard.edu/~.pnorris.shorenstein.ksg/book1.htm, accessed 5 February 2004.
Perlroth, N. (2021). This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. Bloomsbury Publishing USA.
Rauta, V. (2020). Towards a typology of non-state actors in ‘hybrid warfare’: proxy, auxiliary, surrogate and affiliated forces. Cambridge Review of International Affairs, 33(6).
Richet, J. L. (2013). From young hackers to crackers. International Journal of Technology and Human Interaction (IJTHI), 9(3).
Rugge, F. (2018). Confronting an†Axis of Cyber�: China, Iran, North Korea, Russia in Cyberspace. Ledizioni-LediPublishing.
Schmid, Alex P and Jongman, Albert J. (2008). Political Terrorism: A New Guide to Actors, Authors, Concepts, Data Bases, Theories, & Literature (updated edn). (New Burnswick, NJ: Transaction, 2008).
Schneier, B. (2021, July). Invited Talk: The Coming AI Hackers. In International Symposium on Cyber Security Cryptography and Machine Learning. Springer, Cham.
Segal, A. (2011). Cyberspace Governance: The Next Step. Council on Foreign Relations, Policy Innovation Memorandum, (2), 1.
Silke, Andrew. (2004). “The Road Less Travelled: Recent Trends in Terrorism Researchâ€, in Andrew Silke (ed.) Research on Terrorism: Trends, Achievements and Failures (Abingdon: Routledge), 186-213.
Smith, A. D., & Rupp, W. T. (2002). Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Information Management & Computer Security.
Sun, L. (2021). Discussion on computer network security prevention based on big data era. In Journal of Physics: Conference Series (Vol. 1848, No. 1, p. 012103). IOP Publishing.
Tan, W. L., & Khader, M. (2022). Impact of justiceâ€related dispositions on support for cyber vigilantism: The mediating effect of perceived severity of transgression. Legal and Criminological Psychology.
Taneski, N. (2021). Transformation of war–use of conventional military forces against no-state actors. The Annual of the Faculty of Philosophy in Skopje, 74.
Tantawutho, T. (2017, January). The computer crime incidents and the future of countermeasures in Thailand. In 2017 Third Asian Conference on Defence Technology (ACDT). IEEE.
ThaiCERT. (2018). Cybersecurity strategy for critical information infrastructure in Thailand.
Bangkok: Electronic Transactions Development Agency. Pg.1-28
Wenhong, X. (2020). Challenges to cyber sovereignty and response measures. Mirovaia ekonomika i mezhdunarodnye otnosheniia, 64(2).
Yeo, S., Birch, A. S., & Bengtsson, H. I. J. (2019). The Role of State Actors in Cybersecurity: Can State Actors Find Their Role in Cyberspace?. In National Security: Breakthroughs in Research and Practice. IGI Global.
Published
How to Cite
Issue
Section
Copyright (c) 2022 Natthamon Petchkla, Sumonthip Chitsawang

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The authors hold the copyright. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. How ever the author should affirming that the article is their original work should accompany the article via online submission form. Authors are permitted to share a Preprint of their article anywhere at any time. Link Declaration of originality (PDF)