-
1
-
-
84885798705
-
-
AFP News Agency [Electronic Version] 12.12.2005. Retrieved April 2008
-
AFP News Agency. (2005). Hacker Attacks in US Linked to Chinese Military [Electronic Version]. Breitbart.com, 12.12.2005. Retrieved April 2008 from http://www.breitbart.com/article.php?id=051212224756.jwmkvntb&show-article= 1.
-
(2005)
Hacker Attacks in US Linked to Chinese Military
-
-
-
3
-
-
77958463086
-
Cybersecurity-The truth about cyberterrorism [Electronic version]
-
Retrieved April 2008
-
Berinato, S. (2002). Cybersecurity-The Truth About Cyberterrorism [Electronic Version]. CIO Magazine. Retrieved April 2008 from http://www.cio.com/article/30933/CYBERSECURITY-The-Truth-About-Cyberterrorism.
-
(2002)
CIO Magazine
-
-
Berinato, S.1
-
5
-
-
80052007349
-
Use of the internet by terrorists-A threat analysis
-
Centre of Excellence-Defence Against Terrorism (Ed.) Amsterdam: IOS Press
-
Brunst, P. W. (2008). Use of the Internet by Terrorists-A Threat Analysis. In Centre of Excellence-Defence Against Terrorism (Ed.), Responses to Cyber Terrorism (pp. 34-60). Amsterdam: IOS Press.
-
(2008)
Responses to Cyber Terrorism
, pp. 34-60
-
-
Brunst, P.W.1
-
7
-
-
84885760549
-
-
Retrieved April 2008
-
Buettner, R. (2001). Web of Terror Thrivin on Net. Retrieved April 2008 from http://www.nydai-lynews.com/archives/news/2001/09/18/2001-09-18-web-of- terror-thriving-on
-
(2001)
Web of Terror Thrivin on Net
-
-
Buettner, R.1
-
8
-
-
51149084879
-
-
Centers for Disease Control and Prevention. (2007). Bioterrorism Overview. From http://www.bt.cdc.gov/bioterrorism/overview.asp
-
(2007)
Bioterrorism Overview
-
-
-
11
-
-
33750320271
-
Terrorists turn to the web as base of operations
-
7 August
-
Coll, S., & Glassner, S. (2005, 7 August). Terrorists Turn to the Web as Base of Operations. The Washington Post, p. A01.
-
(2005)
The Washington Post
-
-
Coll, S.1
Glassner, S.2
-
12
-
-
84859596962
-
The future of cyberterrorism
-
Collin, B. C. (1997). The Future of Cyberterrorism. Crime and Justice International, 13(2), 15-18.
-
(1997)
Crime and Justice International
, vol.13
, Issue.2
, pp. 15-18
-
-
Collin, B.C.1
-
13
-
-
56149123275
-
-
Committee on Water Systems Security Research Washington, DC: The National Academies Press
-
Committee on Water Systems Security Research. (2007). Improving the Nation's Water Security. Washington, DC: The National Academies Press.
-
(2007)
Improving the Nation's Water Security
-
-
-
15
-
-
62849125514
-
Hackers take down the most wired country in europe [Electronic version]
-
Retrieved April 2008
-
Davis, J. (2007). Hackers Take Down the Most Wired Country in Europe [Electronic Version]. Wired Magazine. Retrieved April 2008 from http://www.wired.com/politics/security/maga-zine/15-09/ff-estonia.
-
(2007)
Wired Magazine
-
-
Davis, J.1
-
16
-
-
0242440508
-
Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy
-
Arquilla, J. & Ronfeldt, D. (Eds.) Santa Monica, CA: Rand Corp.
-
Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In Arquilla, J. & Ronfeldt, D. (Eds.), Networks and Netwars (pp. 239-288). Santa Monica, CA: Rand Corp.
-
(2001)
Networks and Netwars
, pp. 239-288
-
-
Denning, D.E.1
-
17
-
-
0037401061
-
Semiotic emergent framework to address the reality of cyberterrorism
-
Desouza, K. C., & Hensgen, T. (2003). Semiotic Emergent Framework to Address the Reality of Cyberterrorism. Technological Forecasting & Social Change, 70, 385-396.
-
(2003)
Technological Forecasting & Social Change
, vol.70
, pp. 385-396
-
-
Desouza, K.C.1
Hensgen, T.2
-
18
-
-
84885745701
-
Russians seem to be hacking into pentagon [Electronic version]
-
07.10.1999. Retrieved April 2008
-
Drogin, B. (1999). Russians seem to be Hacking into Pentagon [Electronic Version]. San Francisco Chronicle Online, 07.10.1999. Retrieved April 2008 from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/ MN58558.DTL.
-
(1999)
San Francisco Chronicle Online
-
-
Drogin, B.1
-
19
-
-
0038172257
-
Cyberterrorism-Are we under siege?
-
Embar-Seddon, A. (2002). Cyberterrorism-Are We Under Siege? American Behavioral Scientist, 45(6), 1033-1043.
-
(2002)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 1033-1043
-
-
Embar-Seddon, A.1
-
20
-
-
84885711312
-
Security experts lift lid on Chinese hack attacks [Electronic version]
-
23.11.2005. Retrieved April 2008
-
Espiner, T. (2005). Security Experts Lift Lid on Chinese Hack Attacks [Electronic Version]. ZDNet News, 23.11.2005. Retrieved April 2008 from http://news.zdnet.com/2100-1009-22-5969516.html.
-
(2005)
ZDNet News
-
-
Espiner, T.1
-
21
-
-
84885794457
-
Russia hacking stories refuted [Electronic version]
-
27.09.1999. Retrieved April 2008
-
FCW Staff. (1999). Russia Hacking Stories Refuted [Electronic Version]. Federal Computer Week, 27.09.1999. Retrieved April 2008 from http://www.fcw.com/print/5-188/news/68553-1.html.
-
(1999)
Federal Computer Week
-
-
-
22
-
-
3943076566
-
Cyberterrorism, computer crime, and reality
-
Foltz, B. (2004). Cyberterrorism, Computer Crime, and Reality. Information Management & Computer Security, 12(2), 270-295.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.2
, pp. 270-295
-
-
Foltz, B.1
-
23
-
-
84885769175
-
-
Retrieved April 2008
-
Force10 Networks. (2007). Customer Profile: DE-CIX. Retrieved April 2008 from https://www.force10networks.com/company/customer-profiles/profiles-de-cix. asp
-
(2007)
Customer Profile: DE-CIX
-
-
-
24
-
-
0011016060
-
Cyber-attacks by al qaeda feared
-
27 June
-
Gellman, B. (2002, 27 June). Cyber-Attacks by Al Qaeda Feared. The Washington Post, p. A01.
-
(2002)
The Washington Post
-
-
Gellman, B.1
-
25
-
-
34247170624
-
Bangs for the buck: A cost-benefit analysis of cyberterrorism
-
Giacomello, G. (2004). Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism. Studies in Conflict & Terrorism, 27(5), 387-408.
-
(2004)
Studies in Conflict & Terrorism
, vol.27
, Issue.5
, pp. 387-408
-
-
Giacomello, G.1
-
26
-
-
33845764672
-
Water and terrorism
-
Gleick, P. H. (2006). Water and Terrorism. Water Policy, 8, 481-503.
-
(2006)
Water Policy
, vol.8
, pp. 481-503
-
-
Gleick, P.H.1
-
27
-
-
70549098211
-
Hackers attack via Chinese web sites [Electronic version]
-
25.08.2005 Retrieved April 2008
-
Graham, B. (2005). Hackers Attack Via Chinese Web Sites [Electronic Version]. The Washington Post Online, 25.08.2005, A01. Retrieved April 2008 from http://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/ AR2005082402318.html.
-
(2005)
The Washington Post Online
-
-
Graham, B.1
-
28
-
-
27944455431
-
The myth of cyberterrorism [Electronic version]
-
Retrieved April 2008
-
Green, J. (2002). The Myth of Cyberterrorism [Electronic Version]. Washington Monthly. Retrieved April 2008 from http://www.washingtonmonthly.com/ features/2001/0211.green.html.
-
(2002)
Washington Monthly
-
-
Green, J.1
-
29
-
-
84885790110
-
Terrorists 'Use google maps to hit UK troops' [Electronic version]
-
Harding, T. (2007). Terrorists 'Use Google Maps to Hit UK Troops' [Electronic Version]. The Telegraph Online. From http://www.telegraph.co.uk/ news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml.
-
(2007)
The Telegraph Online
-
-
Harding, T.1
-
30
-
-
84885775520
-
-
6 February 2007. Retrieved April 2008
-
ICANN. (2007). Factsheet: Root Server Attack on 6 February 2007. Retrieved April 2008 from http://icann.org/announcements/factsheet-dns-attack- 08mar07.pdf
-
(2007)
Factsheet: Root Server Attack
-
-
-
32
-
-
84885760032
-
Nato says cyber warfare poses as great a threat as a missile attack [Electronic version]
-
Retrieved April 2008
-
Johnson, B. (2008). Nato Says Cyber Warfare Poses as Great a Threat as a Missile Attack [Electronic Version]. The Guardian Online. Retrieved April 2008 from http://www.guardian.co.uk/technology/2008/mar/06/hitechcrime.uksecurity.
-
(2008)
The Guardian Online
-
-
Johnson, B.1
-
33
-
-
84885802257
-
Terrorists in cyberspace
-
20 December 2005
-
Kristof, N. D. (2005, 20 December 2005). Terrorists in Cyberspace. The New York Times, p. 31.
-
(2005)
The New York Times
, pp. 31
-
-
Kristof, N.D.1
-
34
-
-
84885712640
-
Al-qa'eda launches voice of the caliphate internet news bulletins [Electronic version]
-
Retrieved April 2008
-
La Guardia, A. (2005). Al-Qa'eda Launches Voice of the Caliphate Internet News Bulletins [Electronic Version]. The Telegraph Online. Retrieved April 2008 from http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2005/09/28/wirq128. xml&sSheet=/news/2005/09/28/ixnewstop.html.
-
(2005)
The Telegraph Online
-
-
La Guardia, A.1
-
36
-
-
84885705243
-
The next threat [Electronic version]
-
Lenzner, R., & Vardi, N. (2004). The Next Threat [Electronic Version]. Forbes Magazine. From http://www.forbes.com/forbes/2004/0920/070- print.html.
-
(2004)
Forbes Magazine
-
-
Lenzner, R.1
Vardi, N.2
-
37
-
-
84885753559
-
Al-qaeda plot to bring down UK internet [Electronic version]
-
Leppard, D. (2007). Al-Qaeda Plot to Bring Down UK Internet [Electronic Version]. The Times Online. From http://www.timesonline.co.uk/tol/news/uk/crime/ article1496831.ece.
-
(2007)
The Times Online
-
-
Leppard, D.1
-
38
-
-
84885738548
-
Mass hack takes out govt sites [Electronic version]
-
Retrieved April 2008
-
Leyden, J. (2001). Mass Hack Takes Out Govt Sites [Electronic Version]. The Register. Retrieved April 2008 from http://www.theregister.co.uk/2001/01/22/ mass-hack-takes-out-govt/.
-
(2001)
The Register
-
-
Leyden, J.1
-
39
-
-
51849163501
-
-
Miniwatts Marketing Group Retrieved April 2008
-
Miniwatts Marketing Group. (2007). Internet Usage Statistics. Retrieved April 2008 from http://www.internetworldstats.com/
-
(2007)
Internet Usage Statistics
-
-
-
40
-
-
84885747691
-
US-firmen-website für qaida-botschaft gehackt
-
17.06.2004
-
Musharbash, Y. (2004). US-Firmen-Website für Qaida-Botschaft gehackt. Spiegel Online, 17.06.2004.
-
(2004)
Spiegel Online
-
-
Musharbash, Y.1
-
42
-
-
84885731370
-
-
Retrieved April 2008
-
National Conference of State Legislatures. (2002). Cyberterrorism. Retrieved April 2008 from http://www.ncsl.org/programs/lis/cip/cyberterrorism. htm.
-
(2002)
Cyberterrorism
-
-
-
43
-
-
84861176909
-
-
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G. (1999). Cyberterror: Prospects and Implications. From http://www.nps.edu/ Academics/Centers/CTIW/files/Cyberterror%20Prospects%20and%20Implications.pdf.
-
(1999)
Cyberterror: Prospects and Implications
-
-
Nelson, B.1
Choi, R.2
Iacobucci, M.3
Mitchell, M.4
Gagnon, G.5
-
44
-
-
84885811216
-
Lufthansa online demonstration
-
OLG
-
OLG Frankfurt A.M. (2006). Lufthansa Online Demonstration. Multimedia und Recht 2006, 547-552.
-
(2006)
Multimedia und Recht 2006
, pp. 547-552
-
-
Frankfurt, A.M.1
-
45
-
-
84885726169
-
Rückfall ins telefonzeitalter
-
Retrieved April 2008
-
Persson, C. (2006). "Rückfall ins Telefonzeitalter," Nach Erdbeben. Retrieved April 2008 from http://www.heise.de/newsticker/Rueckfall- ins-Telefonzeitalter-nach-Erdbeben-/meldung/83007
-
(2006)
Nach Erdbeben
-
-
Persson, C.1
-
46
-
-
84861099598
-
-
27.04.2005 Retrieved April 2008
-
Pike, J. (2005, 27.04.2005). Eligible Receiver. Retrieved April 2008 from http://www.globalsecu-rity.org/military/ops/eligible-receiver.htm
-
(2005)
Eligible Receiver
-
-
Pike, J.1
-
47
-
-
84859341068
-
Cyberterrorism-Fact or fancy?
-
February 1998
-
Pollitt, M. M. (1998). Cyberterrorism-Fact or Fancy? Computer Fraud & Security (February 1998), 8-10.
-
(1998)
Computer Fraud & Security
, pp. 8-10
-
-
Pollitt, M.M.1
-
49
-
-
84885768453
-
-
Reuters Retrieved April 2008
-
Reuters. (2001). This Jihad WEb Site Brought to You by⋯ Visa? Retrieved April 2008 from http://www.usatoday.com/tech/news/2001/09/19/jihad- sites.htm
-
(2001)
This Jihad WEb Site Brought to You By⋯ Visa?
-
-
-
52
-
-
84885698227
-
The threat of cybercrime
-
Council of Europe (Ed.) Strasbourg: Council of Europe
-
Sieber, U. (2004). The Threat of Cybercrime. In Council of Europe (Ed.), Organized Crime in Europe: The Threat of Cybercrime (pp. 81-217). Strasbourg: Council of Europe.
-
(2004)
Organized Crime in Europe: The Threat of Cybercrime
, pp. 81-217
-
-
Sieber, U.1
-
53
-
-
84877778410
-
Cyberterrorism and other use of the internet for terrorist purposes-Threat analysis and evaluation of international conventions
-
Council of Europe (Ed.) Strasbourg: Council of Europe Publishing
-
Sieber, U., & Brunst, P. W. (2008). Cyberterrorism and Other Use of the Internet for Terrorist Purposes-Threat Analysis and Evaluation of International Conventions. In Council of Europe (Ed.), Cyberterrorism-The Use of the Internet for Terrorist Purposes (pp. 9-105). Strasbourg: Council of Europe Publishing.
-
(2008)
Cyberterrorism-The use of the Internet for Terrorist Purposes
, pp. 9-105
-
-
Sieber, U.1
Brunst, P.W.2
-
54
-
-
84885698467
-
Estonia's defense minister says kremlin involvement possible in cyberattacks [Electronic version]
-
Retrieved April 2008
-
Sliva, J., & Ritter, K. (2006). Estonia's Defense Minister Says Kremlin Involvement Possible in Cyberattacks [Electronic Version]. The Sydney Morning Herald Online. Retrieved April 2008 from http://www.smh.com.au/news/ Technology/Estonia39s-defense-minister-says-Kremlin-involvement-possible-in- cyberattacks/2007/05/18/1178995335698.html.
-
(2006)
The Sydney Morning Herald Online
-
-
Sliva, J.1
Ritter, K.2
-
56
-
-
84885707028
-
-
Infrastructure Defense, Inc., United States Senate, Committee on Governmental Affairs
-
Testimony of James Adams, Chief Executive Officer, Infrastructure Defense, Inc., United States Senate, Committee on Governmental Affairs (2000).
-
(2000)
Testimony of James Adams, Chief Executive Officer
-
-
-
59
-
-
84885782046
-
Russia accused of unleashing cyberwar to disable Estonia [Electronic version]
-
17.05.2007
-
Traynor, I. (2007). Russia Accused of Unleashing Cyberwar to Disable Estonia [Electronic Version]. The Guardian Online, 17.05.2007 from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia.
-
(2007)
The Guardian Online
-
-
Traynor, I.1
-
60
-
-
85023972678
-
-
Terror on the Internet
-
Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict & Terrorism, 2002(25), 317-332.
-
(2002)
Studies in Conflict & Terrorism
, vol.2002
, Issue.25
, pp. 317-332
-
-
Tsfati, Y.1
Weimann, G.2
-
61
-
-
84885749980
-
Way radical, dude [Electronic version]
-
Vargas, J. A. (2006). Way Radical, Dude [Electronic Version]. The Washington Post Online. From http://www.washingtonpost.com/wp-dyn/content/ article/2006/10/08/AR2006100800931.html.
-
(2006)
The Washington Post Online
-
-
Vargas, J.A.1
-
64
-
-
16344367669
-
How modern terrorism uses the internet [Electronic version]
-
Weimann, G. (2004b). www.terror.net. How Modern Terrorism Uses the Internet [Electronic Version]. Special Report (United States Institute of Peace), 116.
-
(2004)
Special Report (United States Institute of Peace)
, pp. 116
-
-
Weimann, G.1
-
65
-
-
27944454740
-
Cyberterrorism: The sum of all fears?
-
Weimann, G. (2005). Cyberterrorism: The Sum of All Fears? Studies in Conflict & Terrorism, 28, 129-149.
-
(2005)
Studies in Conflict & Terrorism
, vol.28
, pp. 129-149
-
-
Weimann, G.1
-
67
-
-
0037686228
-
-
Pacific Grove, CA: Brooks/Cole Publishing Co.
-
White, J. R. (1990). Terrorism-an Introduction. Pacific Grove, CA: Brooks/Cole Publishing Co.
-
(1990)
Terrorism-An Introduction
-
-
White, J.R.1
|