From Citizendium
Jump to navigation Jump to search
This article is developing and not approved.
Main Article
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
A list of key readings about Cyberterrorism.
Please sort and annotate in a user-friendly manner. For formatting, consider using automated reference wikification.
  • Anti-Terrorism Coalition (ATC). Database of Terrorist Websites and eGroups at [1]
  • Bosch, O. (2002). Cyber Terrorism and Private Sector Efforts for Information Infrastructure Protection. Creating Trust in Critical Networks Workshop of the ITU Strategy and Policy Unit.
  • Center for Strategic and International Studies (1998). Cybercrime, Cyberterrorism, Cyberwarfare, Averting an Electronic Waterloo.
  • CERT Coordination Center (2005). International Coordination for Cyber Crime and Terrorism in the 21st Century [2]
  • Colarik, A. [3](2006). Cyber Terrorism: Political and Economic Implications. Idea Group Publishing.
  • David, M. & Sakurai, K. (2003). Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. Proceedings of the 17th International Conference on Advanced Information Networking and Applications.
  • Denning, D. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a tool for Influencing Foreign Policy. Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop.
  • Denning, D. (2000). Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.
  • Denning, D. (2001). Chapter Eight, Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Networks and Netwars: The Future of Terror, Crime, and Militancy [4]
  • Denning, D. (2001). Cyberwarriors: Activists and terrorists turn to cyberspace. Harvard International Review. 23(2).
  • Flemming, P. & Stohl, M. (2000). Myths and Realities of Cyberterrorism. International Conference on Countering Terrorism Through Enhanced Cooperation [5]
  • Gibson, W. (1984). Neuromancer. Berkley Publishing Group.
  • Institute for Security Technology Studies at Dartmouth College (2002). Cyber Security of the Electric Power Industry.
  • Jachowicz, L. (2003). How to prevent and fight international and domestic Cyberterrorism and Cyberhooliganism [6]
  • Janczewski, L. & Colarik, A. (2005). Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Idea Group Publishing.
  • Janczewski, L. & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Information Science Reference.
  • Lawson, S. (2005). Information Warfare: An Analysis of the Threat of Cyber Terrorism Towards the US Critical Infrastructure. SANS GSEC.
  • Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies.
  • Lourdeau, K. (2005). Testimony of Keith Lourdeau, Deputy Assistant Director, Cyber Division, FBI Before the Senate Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, Cyber Terrorism [7]
  • Nagpal, R. (2002). Cyber Terrorism in the Context of Globalization. Proceedings of the 2nd World Congress on Informatics and Law.
  • Nisbet, C. (2004). Cybercrime and cyber terrorism. Securing Electronic Business Processes – Highlights of the Information Security Solutions Conference 2003. Vieweg.
  • Pollitt, M. (2005). Cyberterrorism – Fact or Fancy? [8]
  • Raghavan, T. (2003). In Fear of Cyberterrorism: An Analysis of the Congressional Response. Journal of Law, Technology & Policy. 1.
  • Rogerson, S. (2003, August). Cyber terrorism and the threat to democracy. IMIS Journal. 13(4).
  • Sofaer, A. & Goodman, S. (2000, August). A Proposal for an International Convention on Cyber Crime and Terrorism at [9]
  • Tan, K. (2003). Confronting Cyberterrorism with Cyber Deception. Master’s Thesis. Naval Postgraduate School.
  • Tyrer, H. (2002). Chapter 16: Cyber-terrorism. Science and Technology of Terrorism and Counterterrorism. Marcel Dekker, Inc.
  • United States House of Representatives Committee on Science (2005). Hearing Charter: Cyber Terrorism – A View From The Gilmore Commission [10]
  • United States Department of Energy (2005). 21 Steps to improve Cyber Security of SCADA Networks. President’s Critical Infrastructure Protection Board [11]
  • Verton, D. (2003). Black Ice: The Invisible Threat of Cyber-Terrorism. McGraw-Hill.
  • Warren, M. & Furnell, S. (2005). Cyber-Terrorism – Political Evolution of the Computer Hacker [12]
  • Yurcik, W. (1999). Adaptive Multi-Layer Network Survivability: A Unified Framework for Countering Cyber-Terrorism. Proceedings of the Workshop on Countering Cyber-Terrorism.