A Comparative Analysis of the Factors Predicting Fears of Terrorism and Cyberterrorism in a Developing Nation Context

Abstract views: 42 / PDF downloads: 16





Cyberterrorism, exposure to online news, time spent online, political views, risk of immigrant's cyber-attacks, religious service attendance


Considering the continuous use of cyberspace for cyber-attacks and terrorism, the current study examined the phenomena of the fear of terrorism and cyberterrorism. It also investigates the factors influencing the fear of terrorism and of cyberterrorism and the predictive differences between the two. A multistage random sampling technique was utilized to collect data from 510 Indonesian participants at local administrative units and social networking site users. Structural equation model analysis was performed using SmartPLS 3.3.3 software. The results revealed that of the six predictors, exposure to online news, time spent online, political views, risk of immigrants' cyber-attacks, and religiosity significantly influenced creating fear of cyberterrorism. In contrast, religious service attendance was not significantly related to the creation of cyberterrorism fear among individual individuals. At the same time, all the factors, excluding time spent online, were significant predictors of creating fear of terrorism among the citizens of Indonesia. These findings can be utilized by practitioners, academicians, and government bodies to reduce the fear of terrorism and cyberterrorism among bill citizens of a developing nation by devising strategies and regulations and providing them with cyber security.


Download data is not yet available.

Author Biography

Petrus Reinhard Golase, STIK

Petrus Reinhard Golose is currently Head of National Narcotics Board of Republic Indonesia (BNN). He also a lecturer in Sekolah Tinggi Ilmu Kepolisian (STIK-PTIK), Jakarta. He is well known active both in police operation and researcher on counter transnational crimes such as counter terrorism, narcotics and cybercrime. In 2008, he earned doctoral degree at Universitas Indonesia, Depok. In 2019, he receive Doctor Honoris Causa from Universitas Udayana, Bali.


Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics, 25(4), 993-1006. https://doi.org/10.1007/s11948-016-9864-0 DOI: https://doi.org/10.1007/s11948-016-9864-0

Altheide, D. L. (2020). Pandemic in the time of Trump: Digital media logic and deadly politics (Vol. 43, pp. 514-540). Wiley Online Library. DOI: https://doi.org/10.1002/symb.501

Backhaus, S., Gross, M. L., Waismel-Manor, I., Cohen, H., & Canetti, D. (2020). A cyberterrorism effect? Emotional reactions to lethal attacks on critical infrastructure. Cyberpsychology, Behavior, and Social Networking, 23(9), 595-603. https://doi.org/10.1089/cyber.2019.0692 DOI: https://doi.org/10.1089/cyber.2019.0692

Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In V. Benson & J. Mclaney (Eds.), Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Elsevier. DOI: https://doi.org/10.1016/B978-0-12-816203-3.00004-6

Bakry, M., Syatar, A., Abubakar, A., Risal, C., Ahmad, A., & Amiruddin, M. M. (2021). Strengthening the cyber terrorism law enforcement in Indonesia: Assimilation from Islamic jurisdiction. International Journal of Criminology and Sociology, 10, 1267-1276. DOI: https://doi.org/10.6000/1929-4409.2021.10.146

Beale, M., & Weinborn, R. F.-C. (2021). A simple checklist, that is all it takes: A cluster or randomized controlled field trial on improving the treatment of suspected terrorists by the police. Journal of Experimental Criminology, 17, 629-655. https://doi.org/10.1007/s11292-020-09428-9 DOI: https://doi.org/10.1007/s11292-020-09428-9

Ben Naseir, M. A., Dogan, H., Apeh, E., Richardson, C., & Ali, R. (2019). Contextualising the national cyber security capacity in an unstable environment: A Spring Land case study [Paper presentation]. In Á Rocha, H. Adeli, L. Reis, S. Costanzo (Eds.) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing (Vol. 930, pp. 373-382). Springer. https://doi.org/10.1007/978-3-030-16181-1_3 DOI: https://doi.org/10.1007/978-3-030-16181-1_35

Broeders, D., Cristiano, F., & Weggemans, D. (2021). Too close for comfort: cyber terrorism and information security across national policies and international diplomacy. Studies in Conflict & Terrorism. Advance online publication. https://doi.org/10.1080/1057610X.2021.1928887 DOI: https://doi.org/10.1080/1057610X.2021.1928887

Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & Díaz-Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK. European Societies, 23(sup1), S47-S59. https://doi.org/10.1080/14616696.2020.1804973 DOI: https://doi.org/10.1080/14616696.2020.1804973

Chang, L. Y., & Coppel, N. (2020). Building cyber security awareness in a developing country: lessons from Myanmar. Computers & Security, 97, Article 101959. https://doi.org/10.1016/j.cose.2020.101959 DOI: https://doi.org/10.1016/j.cose.2020.101959

Coman, C., Andrioni, F., Ghita, R.-C., & Bularca, M. C. (2021). Social and emotional intelligence as factors in terrorist propaganda: An analysis of the way mass media portrays the behavior of Islamic terrorist groups. Sustainability, 13(21), Article 12219. https://doi.org/10.3390/su132112219 DOI: https://doi.org/10.3390/su132112219

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and Gender, 5(1), 55-60. https://doi.org/10.1089/vio.2017.0048 DOI: https://doi.org/10.1089/vio.2017.0048

Dalle, J., Siyoto, S., Astika, N. D., Negara, D. J., Chandra, T., & Anam, K. (2020). Moderating role of IT adoption and mechanism of dynamic capabilities on Indonesian pharmaceutical firms performance. Systematic Reviews in Pharmacy, 11(9), 982-992. https://doi.org/10.31838/srp.2020.9.142

Farmaki, A., Khalilzadeh, J., & Altinay, L. (2019). Travel motivation and demotivation within politically unstable nations. Tourism Management Perspectives, 29, 118-130. https://doi.org/10.1016/j.tmp.2018.11.004 DOI: https://doi.org/10.1016/j.tmp.2018.11.004

Fischer-Preßler, D., Schwemmer, C., & Fischbach, K. (2019). Collective sense-making in times of crisis: Connecting terror management theory with Twitter user reactions to the Berlin terrorist attack. Computers in Human Behavior, 100, 138-151. https://doi.org/10.1016/j.chb.2019.05.012 DOI: https://doi.org/10.1016/j.chb.2019.05.012

Fox, K. A., Nobles, M. R., & Piquero, A. R. (2009). Gender, crime victimization and fear of crime. Security Journal, 22(1), 24-39. https://doi.org/10.1057/sj.2008.13 DOI: https://doi.org/10.1057/sj.2008.13

Hartanto, D., Dalle, J., Akrim, A., & Anisah, H. U. (2021). Perceived effectiveness of e-governance as an underlying mechanism between good governance and public trust: a case of Indonesia. Digital Policy, Regulation and Governance, 23(6), 598-616. https://doi.org/10.1108/DPRG-03-2021-0046 DOI: https://doi.org/10.1108/DPRG-03-2021-0046

Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135. https://doi.org/10.1007/s11747-014-0403-8 DOI: https://doi.org/10.1007/s11747-014-0403-8

Kadir, N. K., Judhariksawan, J., & Maskun, M. (2019). Terrorism and cyberspace: A phenomenon of cyber-terrorism as transnational crimes. FIAT JUSTISIA: Jurnal Ilmu Hukum, 13(4), 333-344. https://doi.org/10.25041/fiatjustisia.v13no4.1735 DOI: https://doi.org/10.25041/fiatjustisia.v13no4.1735

Kelly, A. H., & McGoey, L. (2018). Facts, power and global evidence: a new empire of truth. Economy and Society, 47(1), 1-26. https://doi.org/10.1080/03085147.2018.1457261 DOI: https://doi.org/10.1080/03085147.2018.1457261

Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49. https://doi.org/10.1016/j.ijcip.2019.01.001 DOI: https://doi.org/10.1016/j.ijcip.2019.01.001

Kriviņš, A., Teivāns-Treinovskis, J., & Tumalavičius, V. (2021). Issues of state and national security: Religiously inspired terrorism in the Baltic States: Internal and external factors. Insights into Regional Development, 3(1), 65-79. https://doi.org/10.9770/IRD.2021.3.1(4) DOI: https://doi.org/10.9770/IRD.2021.3.1(4)

Lawson, S. T., Yeo, S. K., Yu, H., & Greene, E. (2016). The cyber-doom effect: The impact of fear appeals in the US cyber security debate .. N. Pissanidis, H. Rõigas, & M. Veenendaal (Eds.), 8th International conference on cyber conflict (CyCon) (pp. 65-80). IEEE. DOI: https://doi.org/10.1109/CYCON.2016.7529427

Lee, C. S., Choi, K.-S., Shandler, R., & Kayser, C. (2021). Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events. Journal of Contemporary Criminal Justice, 37(3), 333-355. https://doi.org/10.1177/10439862211001606

Lee, C. S., Choi, K.-S., Shandler, R., & Kayser, C. (2021). Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events. Journal of Contemporary Criminal Justice, 37(3), 333-355. DOI: https://doi.org/10.1177/10439862211001606

Malik, Z. U. A., Xing, H. M., Malik, S., Shahzad, T., Zheng, M., & Fatima, H. (2022). Cyber security situation in Pakistan: A critical analysis. PalArch's Journal of Archaeology of Egypt/Egyptology, 19(1), 23-32. https://archives.palarch.nl/index.php/jae/article/view/10650

Mansoor, M. (2021). Citizens' trust in government as a function of good governance and government agency's provision of quality information on social media during COVID-19. Government Information Quarterly, 38(4), 101597. https://doi.org/10.1016/j.giq. 2021.101597 DOI: https://doi.org/10.1016/j.giq.2021.101597

Mansoor, M., Awan, T. M., & Paracha, O. S. (2021). Predicting pro-environmental behaviors of green electronic appliances' users. International Journal of Business and Economic Affairs, 6(4), 175-186. DOI: https://doi.org/10.24088/IJBEA-2021-64002

Mansoor, M., & Paul, J. (2022). Mass prestige, brand happiness and brand evangelism among consumers. Journal of Business Research, 144, 484-496. https://doi.org/10.1016/j.jbusres.2022.02.015 DOI: https://doi.org/10.1016/j.jbusres.2022.02.015

Miqdad, M., & Oktaviani, S. A. (2021). The contribution of social media value to company's financial performance: Empirical evidence from Indonesia. The Journal of Asian Finance, Economics and Business, 8(1), 305-315. https://doi.org/10.13106/jafeb.2021.vol8.no1.305

Naem Slim Asfour, Q., Mohammed Aqel, S., Mustafa Atia Al-Bakor, F., Fahes Al Zwain, F., & Ahmed Hussein Moqabla, M. (2020). Terrorism from the faculty of education at Taif University Students' viewpoint and the role of the social media in disseminating it (A field study). Sohag University International Journal of Educational Research, 1(1), 123-166. https://doi.org/10.21608/SUIJER.2020.77328 DOI: https://doi.org/10.21608/suijer.2020.77328

Nalaka, S., & Diunugala, H. (2020). Factors associating with social media related crime victimization: Evidence from the undergraduates at a public university in Sri Lanka. International Journal of Cyber Criminology, 14(1), 174-184. https://doi.org/10.5281/zenodo.3748685

Nyadera, I. N., & Bincof, M. O. (2019). Human security, terrorism, and counterterrorism: Boko Haram and the Taliban. International Journal on World Peace, 36(1), 7-32. https://www.proquest.com/scholarly-journals/human-security-terrorism-counterterrorism-boko/docview/2251988988/se-2

Onat, I., Bastug, M. F., Guler, A., & Kula, S. (2022). Fears of cyberterrorism, terrorism, and terrorist attacks: An empirical comparison. Behavioral Sciences of Terrorism and Political Aggression.Advance online publication. http://10.1080/19434472.2022.2046625 DOI: https://doi.org/10.1080/19434472.2022.2046625

Putra, B. A. (2022). Cyber Cooperation between Indonesia and the United States in Addressing the Threat of Cyberterrorism in Indonesia. International Journal of Multicultural and Multireligious Understanding, 9(10), 22-33. http://dx.doi.org/10.18415/ijmmu.v9i10.4058

Prensky, M. (2001). Digital natives, digital immigrants part 2: Do they really think differently? On the Horizon, 9(6), 1-6. https://doi.org/10.1108/10748120110424843 DOI: https://doi.org/10.1108/10748120110424843

Rogers, M. B., Loewenthal, K. M., Lewis, C. A., Amlôt, R., Cinnirella, M., & Ansari, H. (2007). The role of religious fundamentalism in terrorist violence: A social psychological analysis. International Review of Psychiatry, 19(3), 253-262. https://doi.org/10.1080/09540260701349399 DOI: https://doi.org/10.1080/09540260701349399

Rosmarin, D. H., Pargament, K. I., & Mahoney, A. (2009). The role of religiousness in anxiety, depression, and happiness in a Jewish community sample: A preliminary investigation. Mental Health, Religion and Culture, 12(2), 97-113. https://doi.org/10.1080/13674670802321933 DOI: https://doi.org/10.1080/13674670802321933

Sarker, J. U. (2021). The opportunity for religious tourism: In the perspective of Bangladesh. Journal of Business, 6(4), 1-10. https://doi.org/10.18533/job.v6i4.209

Setiawan, D. A. (2020). Cyber terrorism and its prevention in Indonesia. Jurnal Media Hukum, 27(2), 267-283. DOI: https://doi.org/10.18196/jmh.20200156

Sevde, K. (2021). Triangle of cyber, terrorism and radicalization. Cyberpolitik Journal, 6(11), 48-58.

Shandler, R., Gross, M. L., Backhaus, S., & Canetti, D. (2022). Cyber terrorism and public support for retaliation–a multi-country survey experiment. British Journal of Political Science, 52(2), 850-868. https://doi.org/10.1017/S0007123420000812 DOI: https://doi.org/10.1017/S0007123420000812

Soomro, T. R., & Hussain, M. (2019). Social media-related cybercrimes and techniques for their prevention. Applied Computer Systems, 24(1), 9-17. https://doi.org/10.2478/acss-2019-0002 DOI: https://doi.org/10.2478/acss-2019-0002

Steingartner, W., Galinec, D., & Kozina, A. (2021). Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, 13(4), Article 597. https://doi.org/10.3390/sym13040597 DOI: https://doi.org/10.3390/sym13040597

Stockemer, D., Niemann, A., Unger, D., & Speyer, J. (2020). The "refugee crisis," immigration attitudes, and Euroscepticism. International Migration Review, 54(3), 883-912. https://doi.org/10.1177/0197918319879926 DOI: https://doi.org/10.1177/0197918319879926

Stohl, M. (2006). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime, Law and Social Change, 46(4), 223-238. https://doi.org/10.1007/s10611-007-9061-9 DOI: https://doi.org/10.1007/s10611-007-9061-9

Syahrin, M. A. (2018). Law enforcement of foreign workers abusing immigration residence permit: Case studies on energy and mining companies. In Proceedings of the 2018 International Conference on Energy and Mining Law (pp. 184-189). Atlantis Press. https://doi.org/10.2991/iceml-18.2018.41 DOI: https://doi.org/10.2991/iceml-18.2018.41

Vergani, M., O'Brien, K. S., Lentini, P., & Barton, G. (2019). Does the awareness of mortality shape people's openness to violence and conflict? An examination of terror management theory. Political Psychology, 40(1), 111-124. https://doi.org/10.1111/pops.12488 DOI: https://doi.org/10.1111/pops.12488

Wahab, S. (2021). Causes and consequences of terrorism in Khyber Pakhtunkhwa, Pakistan. International Journal of Research, 8(2), 234-245.

Wahlström, M., & Törnberg, A. (2021). Social media mechanisms for right-wing political violence in the 21st century: Discursive opportunities, group dynamics, and co-ordination. Terrorism and Political Violence, 33(4), 766-787. https://doi.org/10.1080/09546553.2019.1586676 DOI: https://doi.org/10.1080/09546553.2019.1586676




How to Cite

Reinhard Golase, P. (2022). A Comparative Analysis of the Factors Predicting Fears of Terrorism and Cyberterrorism in a Developing Nation Context. Journal of Ethnic and Cultural Studies, 9(4), 106–119. https://doi.org/10.29333/ejecs/1372



Original Manuscript