Cyberterrorism: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
(Created page with ' =Bibliography= Updates and more via http://extreme.ajatukseni.net/2009/11/10/bibliography/ Primary research material compiled by Jarkko Moilanen: *Arquilla J. and Ronfeldt ...')
(No difference)

Revision as of 14:09, 21 July 2010


Bibliography

Updates and more via http://extreme.ajatukseni.net/2009/11/10/bibliography/

Primary research material compiled by Jarkko Moilanen:

  • Arquilla J. and Ronfeldt D. (1993) Cyberwar is coming ! Comparative Strategy Vol 12 No 2 s.141–165. Routledge, London.
  • Arquilla, J., Ronfeldt, D. and Zanini, M. (1999) Networks, Netwar and Information-Age Terrorism. In Lesser Ian (ed.) et al. Countering the New Terrorism. Rand. California.
  • Arquilla J. and Ronfeldt, D. (2001) The Advent of Netwar (Revisited) in Arquilla, J. and Ronfeldt, D. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy. Rand, Santa Monica, pp. 1-25.
  • Blyth, T. (2001) Cyberterrorism and Private Corporations: New Threat Models and Risk Management Implications. Read 24.2.2001. http://www.terrorism.com/documents/iw-privatrisk.pdf
  • Collin, B. (1996) The Future of Cyberterrorism. Paper presented at the 11th Annual International Symposium on Criminal Justice Issues, University of Illinois at Chicago. http://afgen.com/terrorism1.html.
  • Damphousse, K. and Smith, B. (1998) The Internet; A Terrorist Medium for the 21st Century. In Kushner, Harvey(ed.): The Future of Terrorism: Violence in the New Millenium. SAGE Publications Ltd, London.
  • Denning, D. (2000a) Testimony before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives. Read 4.2.2009. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.
  • Denning, D. (2000b) ‘Cyberterrorism.’ Global Dialogue. Read 17.2.2009. http://www.cs.georgetown.edu/~denning/infosec/cyberterror-GD.doc
  • Denning, D. (2000c) Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Read 3.2.2009. http://www.nautilus.org/infopolicy/workshop/papers/denning.html.
  • Devost, Matthew (1995) National Security in the Information Age. Read 1.2.2009. Copy of the thesis can be found at: http://blog.devost.net/2002/06/21/national-security-in-the-information-age/
  • Devost, M., Houghton, B. and Pollard, N. (2001) Organizing for Information Warfare: “The Truth is Out There.” Read 24.2.2001. http://www.terrorism.com/documents/suntzu2.pdf
  • Furnell, S.M. And Warren M.J. (1999) Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium? Computers & Security, 18 (1999). Elsevier Science Ltd. London.
  • Manion, M. and A. Goodrum (2000). Terrorism or civil disobedience: Toward a Hacktivist Ethic.ACM SIGCAS Computers and Society 30(2): 14-19.
  • Moore, D., Shannon, C. and Brown J. (2002) Code-Red: a case study on the spread and victims of an Internet worm. Cooperative Association for Internet Data Analysis – CAIDA, San Diego Supercomputer Center, University of California, San Diego.
  • Post, J., Ruby, K. and Shaw, E. (2000) From car bombs to logic bombs: The growing threat from information terrorism. Terrorism and Political Violence,12:2,97 — 122.
  • Ronfeld, D. and Martinez, A. (1997) A Comment on the Zapatista “Netwar” in Arquilla, John, and Ronfeldt David (eds.), In Athena’s Camp: Preparing for Conflict in the Information Age, Rand, Santa Monica. pp. 369-391.
  • Rosteck, T. (1994) Computer Hackers: Rebels With a Cause. Concordia University, Montreal, Quebec. Read 25.6.2009. http://www.textfiles.com/history/hack7.txt
  • Red Hat Linux Security Guide (2002) Chapter 2. Attackers and Vulnerabilities.

http://www.redhat.com/docs/manuals/linux/RHL-9-Manual/security-guide/ch-risk.html

  • Still, V. (1997) Informaatiosota. In Saarenpää Ahti and Pöysti Tuomas (eds.): Tietoturvallisuus ja laki, näkökohtia tietoturvallisuuden oikeudellisessa sääntelyssä. Edita Oy, Helsinki.
  • Tucker, D. (2001) What is New about the New Terrorism and How Dangerous is It? Terrorism and Political Violence,13:3,1 — 14.
  • Valeri, L. and Knights, M. (2000) Affecting trust: Terrorism, internet and offensive information warfare. Terrorism and Political Violence,12:1,15 — 36.
  • Vatis, M. (2001) Cyber attacks during the war on terrorism: A predictive analysis. Read 5.2.2009. http://www.ists.dartmouth.edu/ISTS/counterterrorism/cyber_a1.pdf
  • Wray, S. (1998a) The Electronic Disturbance Theater and Electronic Civil Disobedience. Read 14.4.2009. Http://www.thing.net/~rdom/ecd/EDTECD.html
  • Wray, S. (1998b) On Electronic Civil Disobedience. Read 14.4.2009. http://www.thing.net/~rdom/ecd/oecd.html.