-
1
-
-
84861644529
-
-
Cyber attacks against critical U.S. networks rising at a faster rate
-
Aitoro, J. R. (2009a). Cyber attacks against critical U.S. networks rising at a faster rate. http://www.nextgov.com/nextgov/ng_20091208_4177.php.
-
(2009)
-
-
Aitoro, J.R.1
-
4
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, S. G. 1968. Crime and punishment: An economic approach. Journal of Politic Economy, 76(2): 167-217.
-
(1968)
Journal of Politic Economy
, vol.76
, Issue.2
, pp. 167-217
-
-
Becker, S.G.1
-
7
-
-
0024162137
-
The economics of crime deterrence: A survey of theory and evidence
-
Cameron, S. 1988. The economics of crime deterrence: A survey of theory and evidence. Kyklos, 41(2): 301-323.
-
(1988)
Kyklos
, vol.41
, Issue.2
, pp. 301-323
-
-
Cameron, S.1
-
8
-
-
84937328218
-
Reopening the deterrence debate: Thinking about a peaceful and prosperous tomorrow
-
Carns, M. P. C. 2001. Reopening the deterrence debate: Thinking about a peaceful and prosperous tomorrow. Small Wars & Insurgencies, 11(2): 7-16.
-
(2001)
Small Wars & Insurgencies
, vol.11
, Issue.2
, pp. 7-16
-
-
Carns, M.P.C.1
-
9
-
-
70449589193
-
Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears
-
Chu, H., Deng, D., Chao, H. and Huang, Y. 2009. Next generation of terrorism: Ubiquitous cyber terrorism with the accumulation of all intangible fears. Journal of Universal Computer Science, 15(12): 2373-2386.
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.12
, pp. 2373-2386
-
-
Chu, H.1
Deng, D.2
Chao, H.3
Huang, Y.4
-
10
-
-
0037401061
-
Semiotic emergent framework to address the reality of cyber terrorism
-
Desouza, K. C. and Hensgen, T. 2003. Semiotic emergent framework to address the reality of cyber terrorism. Technological Forecasting and Social Change, 70(4): 385-396.
-
(2003)
Technological Forecasting and Social Change
, vol.70
, Issue.4
, pp. 385-396
-
-
Desouza, K.C.1
Hensgen, T.2
-
12
-
-
3943076566
-
Cyber terrorism, computer crime, and reality
-
Foltz, C. B. 2004. Cyber terrorism, computer crime, and reality. Information Management & Computer Security, 12(2/3): 154-166.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2-3
, pp. 154-166
-
-
Foltz, C.B.1
-
15
-
-
3943054719
-
Politicians speak out on cyber terrorism
-
Gengler, B. 1999. Politicians speak out on cyber terrorism. Network Security, 1999(10): 6
-
(1999)
Network Security
, vol.1999
, Issue.10
, pp. 6
-
-
Gengler, B.1
-
16
-
-
0031315435
-
Deterring the terrorist: A psychological evaluation of different strategies for deterring terrorism
-
Ginges, J. 1997. Deterring the terrorist: A psychological evaluation of different strategies for deterring terrorism. Terrorism and Political Violence, 9(1): 170-185.
-
(1997)
Terrorism and Political Violence
, vol.9
, Issue.1
, pp. 170-185
-
-
Ginges, J.1
-
18
-
-
0347869861
-
Organizing to minimize a cyber-terrorist threat?
-
Griffith, D. A. 1999. Organizing to minimize a cyber-terrorist threat?. Marketing Management, 8(2): 9-15.
-
(1999)
Marketing Management
, vol.8
, Issue.2
, pp. 9-15
-
-
Griffith, D.A.1
-
19
-
-
34547798962
-
Genetic programming for prevention of cyber terrorism through dynamic and evolving intrusion detection
-
Hansen, J. V., Lowry, P. B., Meservy, R. and McDonald, D. 2005. Genetic programming for prevention of cyber terrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4): 1362-1374.
-
(2005)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1362-1374
-
-
Hansen, J.V.1
Lowry, P.B.2
Meservy, R.3
McDonald, D.4
-
20
-
-
0002019023
-
An arsenal of believers: Talking to the human bombs
-
Hassan, N. 2001. An arsenal of believers: Talking to the human bombs. The New Yorker, 77(36)
-
(2001)
The New Yorker
, vol.77
, Issue.36
-
-
Hassan, N.1
-
21
-
-
84861602747
-
The impact of cyber terrorism on investment for information system security
-
New Orleans, LA: Proceedings of the 40th Annual Meeting of Decision Science Institute
-
Hua, J. and Bapna, S. 2009. "The impact of cyber terrorism on investment for information system security". New Orleans, LA: Proceedings of the 40th Annual Meeting of Decision Science Institute.
-
(2009)
-
-
Hua, J.1
Bapna, S.2
-
25
-
-
2442602908
-
Education, poverty, political violence, and terrorism: Is there a connection?
-
Krueger, A. and Maleckova, J. 2003. Education, poverty, political violence, and terrorism: Is there a connection?. Journal of Economic Perspectives, 17(4): 119-144.
-
(2003)
Journal of Economic Perspectives
, vol.17
, Issue.4
, pp. 119-144
-
-
Krueger, A.1
Maleckova, J.2
-
27
-
-
85042402319
-
The origins of new terrorism
-
Morgan, M. J. 2004. The origins of new terrorism. Parameters, 34: 9-42.
-
(2004)
Parameters
, vol.34
, pp. 9-42
-
-
Morgan, M.J.1
-
28
-
-
84861639980
-
-
Morris, D. A. (2001). Tracking a computer hacker. http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/Web%20Papers/tracking_a_computer_hacker.doc.
-
(2001)
Tracking a computer hacker
-
-
Morris, D.A.1
-
29
-
-
84861616754
-
-
Nelson, B., Choi, R., Lacobucci, M., Mitchell, M. and Gagnon, G. 1996. Cyber terror: Prospects and Implications. Retrieved 16 May 2008
-
(1996)
Cyber terror: Prospects and Implications. Retrieved 16 May 2008
-
-
Nelson, B.1
Choi, R.2
Lacobucci, M.3
Mitchell, M.4
Gagnon, G.5
-
30
-
-
38049165610
-
Theory of deterrence and individual behavior. Can lawsuits control file sharing on the Internet?
-
Oksanen, V. and Valimaki, M. 2007. Theory of deterrence and individual behavior. Can lawsuits control file sharing on the Internet?. Review of Law and Economics, 3(3): 693-714.
-
(2007)
Review of Law and Economics
, vol.3
, Issue.3
, pp. 693-714
-
-
Oksanen, V.1
Valimaki, M.2
-
32
-
-
84861616753
-
Principle of cyber-warfare
-
West Point, NY: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
Parks, R. C. and Duggan, D. P. June 2001. "Principle of cyber-warfare". June, West Point, NY: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security.
-
(2001)
-
-
Parks, R.C.1
Duggan, D.P.2
-
34
-
-
0038489333
-
Altruism and fatalism: The characteristics of Palestinian suicide terrorists
-
Pedahzur, A., Perliger, A. and Weinberg, L. 2003. Altruism and fatalism: The characteristics of Palestinian suicide terrorists. Deviant Behavior: An Interdisciplinary Journal, 24: 405-423.
-
(2003)
Deviant Behavior: An Interdisciplinary Journal
, vol.24
, pp. 405-423
-
-
Pedahzur, A.1
Perliger, A.2
Weinberg, L.3
-
35
-
-
0009124330
-
How optimal penalties change with the amount of harm
-
Rasmusen, E. 1995. How optimal penalties change with the amount of harm. International Review of Law and Economics, 15(1): 101-108.
-
(1995)
International Review of Law and Economics
, vol.15
, Issue.1
, pp. 101-108
-
-
Rasmusen, E.1
-
36
-
-
28444443053
-
Do "bad boys" really get the girls? Delinquency as a cause and consequence of dating behavior among adolescents
-
Rebellon, C. and Manasse, M. 2004. Do "bad boys" really get the girls? Delinquency as a cause and consequence of dating behavior among adolescents. Justice Quarterly, 21(2): 355-390.
-
(2004)
Justice Quarterly
, vol.21
, Issue.2
, pp. 355-390
-
-
Rebellon, C.1
Manasse, M.2
-
39
-
-
84903667395
-
-
Philadelphia, PA: University of Pennsylvania Press
-
Sageman, M. 2004. Understanding terror networks, Philadelphia, PA: University of Pennsylvania Press.
-
(2004)
Understanding terror networks
-
-
Sageman, M.1
-
40
-
-
29444436912
-
Can computer crime be deterred?
-
Sherizen, S. 1995. Can computer crime be deterred?. Security Journal, 6: 177-181.
-
(1995)
Security Journal
, vol.6
, pp. 177-181
-
-
Sherizen, S.1
-
41
-
-
33847372060
-
Cybercrime & misdemeanors: A reevaluation of the computer fraud and abuse act
-
Skibell, R. 2003. Cybercrime & misdemeanors: A reevaluation of the computer fraud and abuse act. Berkeley Technology Law Journal, 18: 909-944.
-
(2003)
Berkeley Technology Law Journal
, vol.18
, pp. 909-944
-
-
Skibell, R.1
-
43
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W. and Welke, R. J. 1998. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4): 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
46
-
-
84861639981
-
-
U.S. Government. (2009). 2009 report to Congress of the U.S.-China economic and security review commission
-
U.S. Government. (2009). 2009 report to Congress of the U.S.-China economic and security review commission. http://www.uscc.gov/annual_report/2009/annual_report_full_09.pdf
-
-
-
-
47
-
-
84861618786
-
-
US-CERT. (2005). Vulnerabilities in TCP
-
US-CERT. (2005). Vulnerabilities in TCP. http://www.us-cert.gov/cas/techalerts/TA04-111A.html
-
-
-
-
48
-
-
54049133723
-
-
Harbin, China: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing
-
Velasco, E., Chen, W., Ji, P. and Hsieh, R. August 2008. Challenges of location tracking techniques in wireless forensics, August, Harbin, China: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
-
(2008)
Challenges of location tracking techniques in wireless forensics
-
-
Velasco, E.1
Chen, W.2
Ji, P.3
Hsieh, R.4
-
50
-
-
12944300212
-
The mind of terrorist: A review and critique of psychological approach
-
Victoroff, J. 2005. The mind of terrorist: A review and critique of psychological approach. The Journal of Conflict Resolution, 49(1): 3-41.
-
(2005)
The Journal of Conflict Resolution
, vol.49
, Issue.1
, pp. 3-41
-
-
Victoroff, J.1
-
51
-
-
77955740556
-
Cyber terrorism: Legal principle and the law in the United Kingdom
-
Walker, C. 2006. Cyber terrorism: Legal principle and the law in the United Kingdom. Penn State Law Review, 110: 625-665.
-
(2006)
Penn State Law Review
, vol.110
, pp. 625-665
-
-
Walker, C.1
-
52
-
-
84861620399
-
U.S. vulnerable to cyber terrorism
-
Wehde, E. 1998. U.S. vulnerable to cyber terrorism. Computer Fraud & Security, 1: 6-7.
-
(1998)
Computer Fraud & Security
, vol.1
, pp. 6-7
-
-
Wehde, E.1
-
53
-
-
22744443906
-
A site where hackers are welcome: Using hack-in contests to shape preferences and deter computer crime
-
Wible, B. 2003. A site where hackers are welcome: Using hack-in contests to shape preferences and deter computer crime. The Yale Law Journal, 112(6): 1577-1623.
-
(2003)
The Yale Law Journal
, vol.112
, Issue.6
, pp. 1577-1623
-
-
Wible, B.1
-
56
-
-
0004221332
-
-
Chicago, IL: University of Chicago Press
-
Zimring, F. and Hawkins, G. 1973. Deterrence, Chicago, IL: University of Chicago Press.
-
(1973)
Deterrence
-
-
Zimring, F.1
Hawkins, G.2
|