-
1
-
-
18444413402
-
Risk, terrorism, and the internet
-
10.1007/s12130-003-1023-7
-
A Anderson 2003 Risk, terrorism, and the internet Knowledge, Technology, & Policy 16 2 24 33 10.1007/s12130-003-1023-7
-
(2003)
Knowledge, Technology, & Policy
, vol.16
, Issue.2
, pp. 24-33
-
-
Anderson, A.1
-
2
-
-
84898326290
-
Chapter II: Knowledge mangement, terrorism, and cyber terrorism
-
L.J. Janczewsk A.M. Colarik (eds). Yurchak Printing Inc. New York
-
Ariely, G. (2008). Chapter II: Knowledge mangement, terrorism, and cyber terrorism. In L. J. Janczewsk & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 7-25). New York: Yurchak Printing Inc.
-
(2008)
Cyber Warfare and Cyber Terrorism
, pp. 7-25
-
-
Ariely, G.1
-
3
-
-
84865378129
-
Chapter 10: Terror's Web: How the Internet is Transforming Terrorism
-
Y. Jewkes & M. Year (Eds.) Willan Publishing
-
Denning, D. E. (2009). Chapter 10: Terror's Web: How the Internet is Transforming Terrorism. In Y. Jewkes & M. Year (Eds.), Handbook on Internet Crime.Willan Publishing.
-
(2009)
Handbook on Internet Crime
-
-
Denning, D.E.1
-
4
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems
-
10.1518/001872095779049543
-
MR Endsley 1995 Toward a theory of situation awareness in dynamic systems Human Factors 37 1 32 64 10.1518/001872095779049543
-
(1995)
Human Factors
, vol.37
, Issue.1
, pp. 32-64
-
-
Endsley, M.R.1
-
5
-
-
0029030537
-
Measurement of situation awareness in dynamic systems
-
10.1518/001872095779049499
-
MR Endsley 1995 Measurement of situation awareness in dynamic systems Human Factors 37 1 65 84 10.1518/001872095779049499
-
(1995)
Human Factors
, vol.37
, Issue.1
, pp. 65-84
-
-
Endsley, M.R.1
-
7
-
-
77956522694
-
-
http://www.contentious.com/2008/11/27/tracking-a-rumor-indian-government- twitter-and-common-sens/(AccessedJune6th,2010) Gartner (AccessedJune6th,2010)
-
Gartner (2010). Gartner Reveals Five Social Software Predictions for 2010 and Beyond, http://www.gartner.com/it/page.jsp?id=1293114 (Accessed June 6th, 2010). http://www.contentious.com/2008/11/27/tracking-a-rumor-indian-government- twitter-and-common-sens/ (Accessed June 6th, 2010).
-
(2010)
Gartner Reveals Five Social Software Predictions for 2010 and beyond
-
-
-
9
-
-
79952898241
-
The uncensored war
-
D Hallin 1993 The uncensored war Peace Review 51 1 51 57
-
(1993)
Peace Review
, vol.51
, Issue.1
, pp. 51-57
-
-
Hallin, D.1
-
10
-
-
33845351880
-
Information warfare and deception
-
W Hutchinson 2006 Information warfare and deception Informing Science 9 213 223 (Pubitemid 44884367)
-
(2006)
Informing Science
, vol.9
, pp. 213-223
-
-
Hutchinson, W.1
-
11
-
-
79952900019
-
-
Indian Ministry of External Affairs AccessedJune4th,2010
-
Indian Ministry of External Affairs. (2009). "Mumbai Terror Attacks - Dossier of Evidence," http://www.hindu.com/nic/dossier.htm (Accessed June 4th, 2010).
-
(2009)
Mumbai Terror Attacks - Dossier of Evidence
-
-
-
12
-
-
79952900788
-
60 dark hours at Hotel Taj
-
H. Baweja (eds). Roli Books New Delhi
-
Khetan, A. (2009). 60 dark hours at Hotel Taj. In H. Baweja (Ed.), 26/11 Mumbai attacked (pp. 46-83). New Delhi: Roli Books.
-
(2009)
26/11 Mumbai Attacked
, pp. 46-83
-
-
Khetan, A.1
-
13
-
-
79952901775
-
-
AccessedNov.9th,2009
-
Kievit, R. (2008). "Twitter messages feed major news channels," http://static.rnw.nl/migratie/www.radionetherlands.nl/features/media/081128- twitter-redirected (Accessed Nov. 9th, 2009).
-
(2008)
Twitter Messages Feed Major News Channels
-
-
Kievit, R.1
-
14
-
-
13944275945
-
Determinants of sourcing during technology growth and maturity: An empirical study of e-commerce sourcing
-
R Kishore M Agrawal HR Rao 2004-2005 Determinants of sourcing during technology growth and maturity: an empirical study of e-commerce sourcing Journal of Management Information Systems 21 3 47 82 (Pubitemid 40264569)
-
(2004)
Journal of Management Information Systems
, vol.21
, Issue.3
, pp. 47-82
-
-
Kishore, R.1
Agrawal, M.2
Rao, H.R.3
-
16
-
-
0036510429
-
Security 'review' and the first amendment
-
WE Lee 2002 Security 'review' and the first amendment Harvard Journal of Law & Public Policy 25 2 743 763
-
(2002)
Harvard Journal of Law & Public Policy
, vol.25
, Issue.2
, pp. 743-763
-
-
Lee, W.E.1
-
21
-
-
79952900471
-
Twenty-First Century Embedded Journalists: Lawful Target?
-
A. M. Tulud, A. B. Ching & C. J. Strong (Eds.) Department of Army
-
Moore, D. W. (2009). Twenty-First Century Embedded Journalists: Lawful Target?. In A. M. Tulud, A. B. Ching & C. J. Strong (Eds.), The Armay Lawyer (pp. 1-32) Department of Army.
-
(2009)
The Armay Lawyer
, pp. 1-32
-
-
Moore, D.W.1
-
23
-
-
33751170051
-
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
-
DOI 10.1016/j.ijhcs.2006.08.012, PII S1071581906001285
-
J Qin Y Zhou E Reid G Lai H Chen 2007 Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity International Journal of Human Computer Studies 65 71 84 10.1016/j.ijhcs.2006. 08.012 (Pubitemid 44780146)
-
(2007)
International Journal of Human Computer Studies
, vol.65
, Issue.1
, pp. 71-84
-
-
Qin, J.1
Zhou, Y.2
Reid, E.3
Lai, G.4
Chen, H.5
-
24
-
-
79952900617
-
-
AccessedNov.15th,2009
-
Raman, B. (2009). "Mumbai terrorist attack - some aspects," http://globalpoliticsonline.com/wped/2009/01/17/mumbai-terrorist-attack-some- aspects/ (Accessed Nov. 15th, 2009).
-
(2009)
Mumbai Terrorist Attack - Some Aspects
-
-
Raman, B.1
-
28
-
-
0442283535
-
-
US Army Research Institute for the Behavioral and Social Sciences
-
Strater, L. D., Endsley, M. R., Pleban, R. J., & Matthews, M. D. (2001). "Measures of platoon leader situation awareness in virtual decision-making exercise," US Army Research Institute for the Behavioral and Social Sciences.
-
(2001)
Measures of Platoon Leader Situation Awareness in Virtual Decision-making Exercise
-
-
Strater, L.D.1
Endsley, M.R.2
Pleban, R.J.3
Matthews, M.D.4
-
29
-
-
79952901702
-
Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism
-
Taipale, K. A. (2005). "Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism," Yale ISP 2005 Global Flow of Information, Draft.
-
(2005)
Yale ISP 2005 Global Flow of Information, Draft
-
-
Taipale, K.A.1
-
30
-
-
85023972678
-
Www.terrorism.com: Terror on the Internet
-
10.1080/10576100290101214
-
Y Tsfati G Weimann 2002 www.terrorism.com: terror on the Internet Studies in Conflict & Terrorism 25 317 332 10.1080/10576100290101214
-
(2002)
Studies in Conflict & Terrorism
, vol.25
, pp. 317-332
-
-
Tsfati, Y.1
Weimann, G.2
-
33
-
-
79952901701
-
-
Special Report, United States Institute of Peace
-
Weimann, G. (2004). " www.terror.net : How Modern Terrorism Uses the Internet," Special Report, United States Institute of Peace (116), pp.1-12.
-
(2004)
How Modern Terrorism Uses the Internet
, Issue.116
, pp. 1-12
-
-
Weimann, G.1
|