Centro de Documentação da PJ
Monografia

2585317.E.5
O'DAY, Alan
Cyberterrorism / edited by Alan O'Day.- Aldershot : Ashgate, 2004.- xi, 312 p. ; 25 cm. - (The international library of essays in terrorism)
ISBN 0-7546-2426-9


CIBERTERRORISMO, TERRORISMO, CRIME INFORMÁTICO, CRIME VIA INTERNET

lntroduction. 1 - Fred Cohen (2003), 'Cyber-Risks and Critical Infrastructures', Strategic Security lntelligence, 2003-02-27 (an Internet journal), pp. 1-10. 2 - Ayn Embar-Seddon (2002), 'Cyberterrorism: Are We Under Siege?', American Behavioral Scientist, 45, pp. 1033-43. 3 - John J. Stanton (2002), 'Terror in Cyberspace', American Behavioral Scientist, 45, pp. 1017-32. 4 - James David Ballard, Joseph G. Hornik and Douglas McKenzie (2002), 'Technological Facilitation of Terrorism: Definition, Legal, and Policy Issues', American Behavioral Scientist, 45, pp. 989-1016. 5 - Kathy Crilley (2001), 'Information Warfare: New Battlefields. Terrorists, Propaganda and the Internet', ASLlB Proceedings, 53, pp. 250-64. 6 - Brian H. Spitzberg and Gregory Hoobler (2002), 'Cyberstalking and the Technologies of Interpersonal Terrorism', New Media and Society, 4, pp. 71-92. 7 - Stephen Hinde (2001), 'Incalculable Potential for Damage by Cyber-terrorism', Computers and Security, 20, pp. 568-72. 8 - S.M. Furnell and M.J. Warren (1999), 'Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium?', Computers and Security, 18, pp.28-34. 9 - August Bequai (2002), 'White Collar Crime: A Handmaiden of International Tech Terrorism', Computers and Security, 21, pp. 514-19. 10 - Sarah Gordon and Richard Ford (2002), 'Cyberterrorism?', Computers and Security, 21, pp. 636-47. 11 - Kevin C. Desouza and Tobin Hensgen (2003), 'Semiotic Emergent Framework to Address the Reality of Cyberterrorism', Technological Forecasting and Social Change, 70, pp. 385-96. 12 - Fred Cohen (2002), 'Terrorism and Cyberspace', Network Security, 5, pp. 17-19. 13 - Timothy L. Thomas (2003), 'AI Qaeda and the Internet: The Danger of "Cyberplanning"', Parameters, Spring, pp. 112-23. 14 - John Arquilla and David Ronfeldt (1999), 'The Advent of Netwar: Analytic Background', Studies in Conflict and Terrorism, 22, pp. 193-206. 15 - Michael Whine (1999), 'Cyberspace - A New Medium for Communication, Command, and Control by Extremists', Studies in Conflict and Terrorism, 22, pp.231-45. 16 - Yacov Y. Haimes (2002), 'Risk of Terrorism to Cyber-Physical and Organizational Societal Infrastructures', Public Works Management and Policy, 6, pp. 231-40. 17 - Richard Schwing (2002), 'A Mental Model Proposed to Address Sustainability and Terrorism Issues', Risk Analysis, 22, pp. 415-20. 18 - Randy Kluver (2003), 'Globalization, Informatization, and Intercultural Communication', American Communication Journal (an Internet journal), pp. 1-13. 19 - Peter Chalk (1999), 'The Evolving Dynamic of Terrorism in the 1990s', Australian Journal of lntemational Affairs, 53, pp. 151-67. 20 - Sean P. Eagan (1996), 'From Spikes to Bombs: The Rise of Eco-Terrorism', Studies in Conflict and Terrorism, 19, pp. 1-18. 21 - Joseph L. Albini (2001), 'Dealing with the Modern Terrorist: The Need for Changes in Strategies and Tactics in the New War on Terrorism' , Criminal Justice Policy Review, 12, pp. 255-81. 22 - Jeffrey W. Seifert (2002), 'The Effects of September 11, 2001, Terrorist Attacks on Public and Private Information Infrastructures: A Preliminary Assessment of Lessons Learned', Government lnformation Quarterly, 19, pp. 225-42.