95
Views
1
CrossRef citations to date
0
Altmetric
Articles

Cyberterrorism: Postmodern State of Chaos

Pages 115-123 | Published online: 02 Feb 2011

REFERENCES

  • Baudrillard , J. 2003 . Simulacra and simulation , Ann Arbor, MI : The University of Michigan Press .
  • Best , S. and Kellner , D. 1991 . Postmodern theory: Critical interrogations , New York : The Guilford Press .
  • Blume , S. W. 2007 . Electric power system basics for the nonelectrical professional , New York : Wiley .
  • Bubitt , S. 2002 . “ Digital filming and special effects ” . In The new media book , Edited by: Harries , D. 17 – 29 . London : BFI Publishing .
  • Carmel , D. and Markovitch , S. 1996 . Learning and using opponent models in adversary search . Technical Report, CIS9606 ,
  • Chamberlain , L. 1998 . “ An introduction to chaos and nonlinear dynamics, In L. Chamberlain and M. R. Butz (eds.) ” . In Clinical chaos: A therapeutic guide to nonlinear dynamics and therapeutic change , 3 – 14 . Philadelphia : Brunner/Mazel .
  • Childs , P. 2000 . Modernism: The new critical idiom , London : Routledge .
  • Clem , A. , Galwankar , S. and Buck , G. 2003 . Health implications of cyber-terrorism . Prehospital and Disaster Medicine , 18 ( 3 ) : 272 – 275 .
  • Conway , M. 2002 . What is cyberterrorism? . Current History , 2 : 436 – 440 .
  • Costigan , S. S. and Gold , D. 2007 . Terrornomics , London : Ashgate Publishing .
  • de Leeuw , K. M. M. and Bergstra , J. 2007 . The history of information security: A comprehensive handbook , Philadelphia : Elsevier .
  • Denning , D. E. 2002 . “ Is cyber terror next? ” . In Understanding September 11 , Edited by: Calhoun , C. , Price , P. and Timmer , A. 12 – 15 . New York : The New Press .
  • Derrida , J. 1973 . Speech and phenomena , Evanston, IL : Northwestern University Press .
  • Docherty , T. 1993 . Postmodernism: A reader , London : Harvester Wheatsheaf .
  • Dunnigan , J. F. 2003 . The next war zone: Confronting the global threat of cyberterrorism , New York : Citadel Press .
  • Erbschloe , M. 2004 . Trojans, worms, and spyware: A computer security professional's guide to malicious code , Boston : Butterworth-Heinemann .
  • Ervin , C. K. 2007 . Open target: Where America is vulnerable to attack , New York : Palgrave Macmillan .
  • Eve , R. , Horsfall , S. and Lee , M. 1997 . Chaos, complexity, and sociology: Myths, models, and theories / , Thousand Oaks, CA : Sage Publications .
  • Fadia , A. 2002 . The unofficial guide to ethical hacking , Boston : Course Technology PTR .
  • Freeman , W. 1991 . The physiology of perception . Scientific American , 264 : 78 – 85 .
  • Gebser , J. 1985 . The ever-present origin , Athens, OH : Ohio University Press .
  • Gleick , J. 1987 . Chaos: Making a new science , New York : Viking .
  • Heidegger , M. 1977 . “ The question concerning technology ” . In Martin Heidegger: Basic writings , Edited by: Krell , D. 55 – 93 . New York : Harper & Row .
  • Herrmann , D. S. 2007 . Complete guide to security and privacy metrics: Measuring regulatory compliance, operational resilience, and ROI , Athens, OH : AUERBACH .
  • Jameson , F. 1991 . Postmodernism, or the cultural logic of late capitalism , Durham, NC : Duke University Press .
  • Janczewski , L. J. and Colarik , A. M. 2007 . Cyber warfare and cyber terrorism , Hershey, PA : Idea Group Publishing .
  • Jehle , G. A. and Reny , P. J. 2001 . Advanced microeconomic theory , 2nd , Boston : Addison-Wesley Longman .
  • Jewkes , Y. 2006 . Crime online , Portland, OR : Willan Pub .
  • Khalilzad , Z. and Shapiro , J. 2002 . Strategic appraisal: United States air and space power in the 21st century , Santa Monica, CA : RAND .
  • Kramer , E. M. 1997 . Modern/postmodern: Off the beaten path of antimodernism , Westport, CT : Praeger .
  • Lenzner , R. and Vardi , N. 2007 . The next threat . Forbes , 174 ( 5 ) : 15 – 21 .
  • Lister , M. , Dovey , J. , Giddings , S. , Grant , I. and Kelly , K. 2003 . New media: A critical introduction , New York : Routledge .
  • Littman , M. L. Markov games as a framework for multi-agent reinforcement learning . Proceedings of the Eleventh International Conference on Machine Learning . 1994 , New Brunswick, NJ. pp. 157 – 163 .
  • Lorenz , E. N. 1996 . The essence of chaos , Seattle, WA : University of Washington Press .
  • Lye , K. W. and Wing , J. M. 2005 . Game strategies in network security . International Journal of Information Security , 5 ( 1 ) : 1 – 10 .
  • Matusitz , J. 2007 . Terrorism preparedness for hospitals: Towards better interorganizational communication . The International Journal of Strategic Communication , 1 ( 3 ) : 169 – 189 .
  • Matusitz , J. 2008 . Postmodernism and networks of cyberterrorists . Journal of Digital Forensic Practice , 2 ( 1 ) : 17 – 26 .
  • McHale , B. 1993 . Constructing postmodernism , New York : Routledge .
  • McQuail , D. 2000 . McQuail's mass communication theory , Thousand Oaks, CA : Sage Publications .
  • Merry , U. 1995 . Coping with uncertainty: Insights from the new sciences of chaos, self-organization, and complexity , Westport, CT : Greenwood Publishing .
  • Motter , A. E. and Lai , Y. C. 2002 . Cascade-based attacks on complex networks . Physical Review E , 66 : 65 – 102 .
  • Mounier , J. , Peckel , E. , Rose , M. , Lopez , S. , Leisy , M. and Arnold , G. 2005 . Spam . Skiing , 57 ( 5 ) : 16 – 20 .
  • Neel , J. J. 2005 . Game theory can be used to analyze cognitive radio . Electronic Engineering Times , 1386 : 69 – 72 .
  • Norman , D. 1993 . Things that make us smart: Defending human attributes in the age of the machine , New York : Addison-Wesley .
  • Perrow , C. 2007 . The next catastrophe: Reducing our vulnerabilities to natural, industrial, and terrorist disasters , Princeton, NJ : Princeton University Press .
  • Poster , M. 1997 . “ Cyberdemocracy: The Internet and the public sphere, In D. Porter ” . In Internet culture , 201 – 218 . New York : Routledge .
  • Ravindran , A. R . 2007 . Operations research and management science handbook , Boca Raton, FL : CRC .
  • Remer , R. 2005 . An introduction to chaos theory for psychodramatists . Journal of Group Psychotherapy, Psychodrama, & Sociometry , 58 ( 3 ) : 130 – 150 .
  • Reyes , A. , Brittson , R. , O'Shea , K. and Steel , J. 2007 . Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors , Burlington, MA : Syngress Publishing .
  • Roberts , K. 2004 . Lovemarks: The future beyond brands , Brooklyn, NY : PowerHouse Books .
  • Salmon , W. 1984 . Scientific explanation and the causal structure of the world , Princeton, NJ : Princeton University Press .
  • Sataloff , R. T. 2004 . Chaos . ENT: Ear, Nose & Throat Journal , 83 ( 2 ) : 80
  • Schudel , G. and Smith , D. J. 2008 . Router security strategies: Securing IP network traffic planes , Indianapolis, IN : Cisco Press .
  • Shoniregun , C. A. 2007 . Synchronizing Internet protocol security , New York : Springer .
  • Stewart , L. 1989 . Does God play dice: Mathematics of chaos , Oxford : Blackwell .
  • Stone , A. 2001 . USA's dependence on satellites places nation at risk: Militarization of space controversial, perhaps inevitable . USA Today , January 11 : A1
  • Strogatz , S. H. 2001 . Nonlinear dynamics and chaos: With applications to physics, biology, chemistry and engineering , Jackson, TN : Perseus Books Group .
  • Sullivant , J. 2007 . Strategies for protecting national critical infrastructure assets: A focus on problem-solving , New York : Wiley .
  • Thiriet , M. 2007 . Biology and mechanics of blood flows , New York : Springer .
  • Thomas , D. 2000 . Cybercrime: Security and surveillance in the information age , New York : Routledge .
  • Turner , P. E. 2005 . Cheating viruses and game theory . American Scientist , 93 ( 5 ) : 428 – 435 .
  • Valovic , T. S. 2000 . Digital mythologies: The hidden complexities of the Internet , Piscataway, NJ : Rutgers University Press .
  • Vegh , S. 2002 . Hacktivists or cyberterrorists? The changing media discourse on hacking . First Monday , 7 ( 10 ) : 12 – 25 .
  • Vermaas , P. E. , Kroes , P. , Light , A. and Moore , S. A. 2007 . Philosophy and design: From engineering to architecture , New York : Springer .
  • Waters , D. 2007 . Global logistics: New directions in supply chain management , London, , UK : Kogan Page .
  • Watts , D. J. 1999 . Small worlds: The dynamics of networks between order and randomness , Princeton, NJ : Princeton University Press .
  • Watts , D. J. 2004 . Six degrees: The science of a connected age , New York : W. W. Norton & Company .
  • Weber , M. 2003 . Invasion of privacy! Big Brother and the company hackers , Boston : Course Technology PTR .
  • Wehrfritz , G. and Vitisca , G. 2000 . Raiding the Love Bug . Newsweek , 135 ( 21 ) : 44 – 45 .
  • Weimann , G. 2005 . Cyberterrorism: The sum of all fears? . Studies in Conflict & Terrorism , 48 ( 2 ) : 129 – 149 .
  • Weiss , A. 2002 . Process consulting: How to launch, implement, and conclude successful consulting projects , New York : Pfeiffer .
  • Wilkinson , P. 2006 . Terrorism versus democracy: The liberal state response , London : Routledge .
  • Xu , C. Z. 2005 . Scalable and secure Internet services and architecture , Boca Raton, FL : Chapman & Hall/CRC .
  • Yorke , J. 2005 . The world's biggest ideas: Chaos . New Scientist , 187 ( 2517 ) : 37

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.