-
1
-
-
0000757609
-
The news media, the problem frame and the production of fear
-
Altheide, D. (1997). The news media, the problem frame and the production of fear. The Sociological Quarterly, 38(4), 647-668.
-
(1997)
The Sociological Quarterly
, vol.38
, Issue.4
, pp. 647-668
-
-
Altheide, D.1
-
2
-
-
84872998933
-
-
Retrieved March 1, 2006, from
-
Anti-Defamation League (1999). CyberTerrorism - Terrorism update. Retrieved March 1, 2006, from http://www.adl.org/terror/focus/16_focus_a.asp.
-
(1999)
CyberTerrorism - Terrorism update
-
-
League, A.1
-
3
-
-
0012443107
-
Networks, netwar and information-age terrorism
-
Z. M. Khalilzhad & J. P. White Eds, Santa Monica, CA: Rand
-
Arquilla, J., Ronfeldt, D., & Zanini, M. (1999). Networks, netwar and information-age terrorism. In Z. M. Khalilzhad & J. P. White (Eds.), The changing role of information in warfare. Santa Monica, CA: Rand.
-
(1999)
The changing role of information in warfare
-
-
Arquilla, J.1
Ronfeldt, D.2
Zanini, M.3
-
5
-
-
84872987917
-
-
Conway, M. (2005). Terrorist use of the internet and fighting back. Paper prepared for presentation at the conference Cybersafety: Safety and security in a networked world: Balancing cyber-rights and responsibilities. Oxford Internet Institute (Oil), Oxford University, UK, 8-10 September, 2005. Retrieved February 1, 2006, from http://www.oii.ox.ac.uk/ research/cybersafety/extensions/pdfs/papers/maura_conway.pdf.
-
Conway, M. (2005). Terrorist "use" of the internet and fighting back. Paper prepared for presentation at the conference Cybersafety: Safety and security in a networked world: Balancing cyber-rights and responsibilities. Oxford Internet Institute (Oil), Oxford University, UK, 8-10 September, 2005. Retrieved February 1, 2006, from http://www.oii.ox.ac.uk/ research/cybersafety/extensions/pdfs/papers/maura_conway.pdf.
-
-
-
-
7
-
-
84937339440
-
Cyberterror and Media-Induced fears: The production of emergency culture
-
Debrix, F. (2001). Cyberterror and Media-Induced fears: The production of emergency culture, Strategies: Journal of Theory, Culture and Politics, 14(1), 149-168.
-
(2001)
Strategies: Journal of Theory, Culture and Politics
, vol.14
, Issue.1
, pp. 149-168
-
-
Debrix, F.1
-
8
-
-
84872996137
-
-
Denning, D. E. (1999). Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy. Presented to The Internet and International Systems:Information Technology and American Foreign Policy Decision Making, The World Affairs Council, San Francisco, December 10, 1999. Retrieved February 1, 2006, from http://www.rand.org/pubs/ monograph _reports/MR1382/MR1382.ch8.pdf.
-
Denning, D. E. (1999). Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy." Presented to "The Internet and International Systems:Information Technology and American Foreign Policy Decision Making," The World Affairs Council, San Francisco, December 10, 1999. Retrieved February 1, 2006, from http://www.rand.org/pubs/ monograph _reports/MR1382/MR1382.ch8.pdf.
-
-
-
-
9
-
-
0011448416
-
Cyberterrorism
-
U.S. House of Representatives, May 23, Retrieved February 1, 2006, from
-
Denning, D. E. (2000). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, May 23, 2000. Retrieved February 1, 2006, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.
-
(2000)
Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services
-
-
Denning, D.E.1
-
10
-
-
84873005657
-
-
Duvall, R. D., & Stohl, M. (1983). Governance by terror, chapter six. In M. Stohl (Ed.), The politics of terrorism (2nd ed., pp. 179-219). New York: Marcel Dekker.
-
Duvall, R. D., & Stohl, M. (1983). Governance by terror, chapter six. In M. Stohl (Ed.), The politics of terrorism (2nd ed., pp. 179-219). New York: Marcel Dekker.
-
-
-
-
11
-
-
0038172257
-
Cyber terrorism: Are we under siege?
-
Embar-Seddon, A. (2002). Cyber terrorism: Are we under siege? American Behavioral Scientist, 45(6), 1033-1043.
-
(2002)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 1033-1043
-
-
Embar-Seddon, A.1
-
12
-
-
34247175574
-
Myths and realities of cyber terrorism
-
A. P. Schmid (Ed, Vienna, Austria: ISPAC International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program
-
Flemming, P., & Stohl, M. (2001). Myths and realities of cyber terrorism. In A. P. Schmid (Ed.), Countering terrorism through international cooperation (pp. 70-105). Vienna, Austria: ISPAC (International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program.
-
(2001)
Countering terrorism through international cooperation
, pp. 70-105
-
-
Flemming, P.1
Stohl, M.2
-
13
-
-
0011016060
-
Cyber-attacks by Al Qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say
-
June 27:, Retrieved December 1, 2005, from
-
Gellman, B. (2002). Cyber-attacks by Al Qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say," Washington Post June 27: A01. Retrieved December 1, 2005, from http://www. washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26.
-
(2002)
Washington Post
-
-
Gellman, B.1
-
14
-
-
0003151091
-
The scary world of tv's heavy Viewer
-
April
-
Gerbner, G., & Gross, L. (1976). The scary world of tv's heavy Viewer. Psychology Today, 89-91, April.
-
(1976)
Psychology Today
, pp. 89-91
-
-
Gerbner, G.1
Gross, L.2
-
15
-
-
34247170624
-
Bangs for the buck: A cost-benefit analysis of cyber terrorism
-
Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyber terrorism. Studies in Conflict and Terrorism, 27, 387-408.
-
(2004)
Studies in Conflict and Terrorism
, vol.27
, pp. 387-408
-
-
Giacomello, G.1
-
17
-
-
84872991023
-
-
Grabosky, P. N., & Stohl, M. (2003). Cyberterrorism Reform 82, Autumn:8-13. Retrieved September 15, 2005 from http://www.alrc.gov.au/reform/ summaries/82.htm.
-
Grabosky, P. N., & Stohl, M. (2003). Cyberterrorism Reform 82, Autumn:8-13. Retrieved September 15, 2005 from http://www.alrc.gov.au/reform/ summaries/82.htm.
-
-
-
-
18
-
-
27944455431
-
The myth of cyber terrorism
-
November. Retrieved February 1, 2006, from
-
Green, J. (2002). The myth of cyber terrorism. Washington Monthly, November. Retrieved February 1, 2006, from http://www.washingtonmonthly.com/ features/2001/0211.green.html.
-
(2002)
Washington Monthly
-
-
Green, J.1
-
21
-
-
84873000455
-
-
Lemos, R., Borland, J., Bowman, L., & Junnarkar, S. (2002). E terrorism-threats. Have Digital Myths Diverted Attention from True Threats? CNET News.com. Retrieved August 26, 2002, from http://news. com.com/E-terrorism+Digilal+myth+or+lrue+threat/2009-1001_3-954728.html?tag=nl.
-
Lemos, R., Borland, J., Bowman, L., & Junnarkar, S. (2002). E terrorism-threats. Have Digital Myths Diverted Attention from True Threats?" CNET News.com. Retrieved August 26, 2002, from http://news. com.com/E-terrorism+Digilal+myth+or+lrue+threat/2009-1001_3-954728.html?tag=nl.
-
-
-
-
22
-
-
84873011101
-
Cyber-nightmare
-
Retrieved September 20, 2004, from
-
Lenzner, R., & Vardi, N. (2004). Cyber-nightmare. Forbes. Retrieved September 20, 2004, from http://www.forbes.com/global/2004/0920/ 104_print.html.
-
(2004)
Forbes
-
-
Lenzner, R.1
Vardi, N.2
-
23
-
-
0038050779
-
Emotion and perceived risks of terrorism: A national field experiment
-
Lerner, J. S., Gonzalez, R. M., Small, D. A., & Fischhoff, B. (2003). Emotion and perceived risks of terrorism: A national field experiment. Psychological Science, 14, 144-150.
-
(2003)
Psychological Science
, vol.14
, pp. 144-150
-
-
Lerner, J.S.1
Gonzalez, R.M.2
Small, D.A.3
Fischhoff, B.4
-
24
-
-
84873014519
-
The war on hype: The deadly terror lurking around the corner may not be such a big, ominous threat after all
-
February 19, Retrieved March 1, 2006, from
-
Lewis, J. A. (2006). The war on hype: The deadly terror lurking around the corner may not be such a big, ominous threat after all. San Francisco Chronicle, February 19, 2006. Retrieved March 1, 2006, from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2006/02/19/ INGDDH8E2V1.DTL
-
(2006)
San Francisco Chronicle
-
-
Lewis, J.A.1
-
25
-
-
0036763542
-
Anger, fear, uncertainty, and attitudes: A test of the Cognitive-Functional Model
-
Nabi, R. L. (2002). Anger, fear, uncertainty, and attitudes: A test of the Cognitive-Functional Model. Communication Monographs, 69(3), 204-216.
-
(2002)
Communication Monographs
, vol.69
, Issue.3
, pp. 204-216
-
-
Nabi, R.L.1
-
26
-
-
84872999794
-
Countering the Changing Threat of International Terrorism
-
National Commission on Terrorism
-
National Commission on Terrorism. (1998). Countering the Changing Threat of International Terrorism. Report of the National Commission on Terrorism, http://www.fas.org/irp/threat/commission.html.
-
(1998)
Report of the National Commission on Terrorism
-
-
-
27
-
-
85016006634
-
Cyber-terrorism: The shape of future conflict
-
October, Retrieved March 1, 2006, from
-
Rathmell, A. (1997). Cyber-terrorism: The shape of future conflict. Royal United Service Institute Journal October, 40-46. Retrieved March 1, 2006, from http://www.kcl.ac.uk/orgs/icsa/old/rusi.html.
-
(1997)
Royal United Service Institute Journal
, pp. 40-46
-
-
Rathmell, A.1
-
28
-
-
84872983107
-
-
Congressional Research Service, October 20, Retrieved February 1, 2006, from
-
Rollins, J., & Wilson, C. (2005). Terrorist capabilities for cyberattack: Overview and Policy Issues, Congressional Research Service, October 20, 2005. Retrieved February 1, 2006, from http://www.fas.org/sgp/crs/terror/ RL33123.pdf.
-
(2005)
Terrorist capabilities for cyberattack: Overview and Policy Issues
-
-
Rollins, J.1
Wilson, C.2
-
30
-
-
84872997303
-
-
Savas, A. (2006). IBM launches internal network protection. Computer weekly. Com, Monday, 27 February 2006. Retrieved March 1, 2006, from http://www.computerweekly.com/Articles/2006/02/27/214429/ IBMlaunchesinternalnetworkprotection.htm.
-
Savas, A. (2006). IBM launches internal network protection. Computer weekly. Com, Monday, 27 February 2006. Retrieved March 1, 2006, from http://www.computerweekly.com/Articles/2006/02/27/214429/ IBMlaunchesinternalnetworkprotection.htm.
-
-
-
-
31
-
-
84873005621
-
Decoding computer intruders
-
April 24, Retrieved March 1, 2006, from
-
Schwartz, J. (2003). Decoding computer intruders. The New York Times, April 24, 2003. Retrieved March 1, 2006, from http://tech2.nytimes. com/mem/technology/techreview.html?res=9C02E3D71F3A F937A15757C0A9659C8B63.
-
(2003)
The New York Times
-
-
Schwartz, J.1
-
32
-
-
84872997590
-
-
Simpson, P. (2005). Don't fear e-terror hype Computer Weekly March 7. Retrieved February 1, 2006, from http://www.computerweekly.com/Articles/2005/04/ 26/209612/Don'tfeare-terrorhype.htm.
-
Simpson, P. (2005). Don't fear e-terror hype Computer Weekly March 7. Retrieved February 1, 2006, from http://www.computerweekly.com/Articles/2005/04/ 26/209612/Don'tfeare-terrorhype.htm.
-
-
-
-
33
-
-
84872993996
-
-
USA Today, May 5, Retrieved February 1, 2006, from
-
Squitieri, T. (2002). Cyberspace full of terror targets, USA Today, May 5, 2002. Retrieved February 1, 2006, from http://www.usatoday.com/tech/news/ 2002/05/06/cyber-terror.htm.
-
(2002)
Cyberspace full of terror targets
-
-
Squitieri, T.1
-
34
-
-
0037497016
-
Terror in Cyberspace terrorists will exploit and widen the gap between governing structures and the public
-
Stanton, J. J. (2002). Terror in Cyberspace terrorists will exploit and widen the gap between governing structures and the public. American Behavioral Scientist, 45(6), 1017-1032.
-
(2002)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 1017-1032
-
-
Stanton, J.J.1
-
35
-
-
21444451808
-
The superpowers and international terrorism
-
M. Stohl & G. Lopez Eds, Greenwood Press
-
Stohl, M. (1986). The superpowers and international terrorism. In M. Stohl & G. Lopez (Eds.), Government violence and repression: An agenda for research. Greenwood Press, 207-228.
-
(1986)
Government violence and repression: An agenda for research
, pp. 207-228
-
-
Stohl, M.1
-
36
-
-
33845615774
-
Demystifying terrorism: The myths and realities of contemporary political terrorism
-
M. Stohl Ed, 3rd ed, New York: Marcel Decker
-
Stohl, M. (1988a). Demystifying terrorism: The myths and realities of contemporary political terrorism. In M. Stohl (Ed.), The politics of terrorism (3rd ed.). New York: Marcel Decker.
-
(1988)
The politics of terrorism
-
-
Stohl, M.1
-
37
-
-
84872996038
-
-
Stohl, M. (2006). Knowledge claims and the study of terrorism. In S. Melnick & J. Victoroff (Eds.), Psychology and terrorism. Amsterdam, the Netherlands: los Press (forthcoming).
-
Stohl, M. (2006). Knowledge claims and the study of terrorism. In S. Melnick & J. Victoroff (Eds.), Psychology and terrorism. Amsterdam, the Netherlands: los Press (forthcoming).
-
-
-
-
38
-
-
34247133250
-
Networks of terror: Theoretical assumptions and pragmatic consequences
-
forthcoming
-
Stohl, C., & Stohl, M. (2007). Networks of terror: Theoretical assumptions and pragmatic consequences, Communication Theory, (forthcoming).
-
(2007)
Communication Theory
-
-
Stohl, C.1
Stohl, M.2
-
39
-
-
85048941387
-
Al Qaeda and the internet: The danger of cyberplanning
-
Retrieved February 1, 2006, from Carlisle
-
Thomas, T. L. (2003). Al Qaeda and the internet: The danger of "cyberplanning." Parameters, 33(1), 112-23. Retrieved February 1, 2006, from Carlisle http://www.army.mil/usawc/Parameters/03spring/thomas.pdf.
-
(2003)
Parameters
, vol.33
, Issue.1
, pp. 112-123
-
-
Thomas, T.L.1
-
40
-
-
84873008024
-
Intelligence experts comb web for terror clues
-
November 12. Retrieved March 1, 2006, from
-
Warner, B. (2003). Intelligence experts comb web for terror clues. Reuters News Service, November 12. Retrieved March 1, 2006, from http://www.chron.com/disp/story.mp1/special/iraq/2218091.html.
-
(2003)
Reuters News Service
-
-
Warner, B.1
-
41
-
-
84873007102
-
-
US News and World Report. (1998). Terrorists on the web: Electronic 'safe haven' guerrillas use guns, bombs and home pages. 124(24), 46, June 22.
-
US News and World Report. (1998). Terrorists on the web: Electronic 'safe haven' guerrillas use guns, bombs and home pages. 124(24), 46, June 22.
-
-
-
-
42
-
-
27944454740
-
Cyber terrorism: The sum of all fears'?
-
Weimann, G. (2005). Cyber terrorism: The sum of all fears'? Studies in Conflict and Terrorism, 28, 129-149.
-
(2005)
Studies in Conflict and Terrorism
, vol.28
, pp. 129-149
-
-
Weimann, G.1
-
43
-
-
84872988638
-
-
White, C., K., C. (1998). Cyber-terrorism: Modem mayhem. Carlisle Barracks, Pennsylvania: U.S. Army War College. Retrieved March 1, 2006, from http://stinet.dtic.mil/dticrev/a345705.pdf.
-
White, C., K., C. (1998). Cyber-terrorism: Modem mayhem. Carlisle Barracks, Pennsylvania: U.S. Army War College. Retrieved March 1, 2006, from http://stinet.dtic.mil/dticrev/a345705.pdf.
-
-
-
|