REFERENCES
- Baudrillard , J. 2003 . Simulacra and simulation , Ann Arbor, MI : The University of Michigan Press .
- Best , S. and Kellner , D. 1991 . Postmodern theory: Critical interrogations , New York : The Guilford Press .
- Blume , S. W. 2007 . Electric power system basics for the nonelectrical professional , New York : Wiley .
- Bubitt , S. 2002 . “ Digital filming and special effects ” . In The new media book , Edited by: Harries , D. 17 – 29 . London : BFI Publishing .
- Carmel , D. and Markovitch , S. 1996 . Learning and using opponent models in adversary search . Technical Report, CIS9606 ,
- Chamberlain , L. 1998 . “ An introduction to chaos and nonlinear dynamics, In L. Chamberlain and M. R. Butz (eds.) ” . In Clinical chaos: A therapeutic guide to nonlinear dynamics and therapeutic change , 3 – 14 . Philadelphia : Brunner/Mazel .
- Childs , P. 2000 . Modernism: The new critical idiom , London : Routledge .
- Clem , A. , Galwankar , S. and Buck , G. 2003 . Health implications of cyber-terrorism . Prehospital and Disaster Medicine , 18 ( 3 ) : 272 – 275 .
- Conway , M. 2002 . What is cyberterrorism? . Current History , 2 : 436 – 440 .
- Costigan , S. S. and Gold , D. 2007 . Terrornomics , London : Ashgate Publishing .
- de Leeuw , K. M. M. and Bergstra , J. 2007 . The history of information security: A comprehensive handbook , Philadelphia : Elsevier .
- Denning , D. E. 2002 . “ Is cyber terror next? ” . In Understanding September 11 , Edited by: Calhoun , C. , Price , P. and Timmer , A. 12 – 15 . New York : The New Press .
- Derrida , J. 1973 . Speech and phenomena , Evanston, IL : Northwestern University Press .
- Docherty , T. 1993 . Postmodernism: A reader , London : Harvester Wheatsheaf .
- Dunnigan , J. F. 2003 . The next war zone: Confronting the global threat of cyberterrorism , New York : Citadel Press .
- Erbschloe , M. 2004 . Trojans, worms, and spyware: A computer security professional's guide to malicious code , Boston : Butterworth-Heinemann .
- Ervin , C. K. 2007 . Open target: Where America is vulnerable to attack , New York : Palgrave Macmillan .
- Eve , R. , Horsfall , S. and Lee , M. 1997 . Chaos, complexity, and sociology: Myths, models, and theories / , Thousand Oaks, CA : Sage Publications .
- Fadia , A. 2002 . The unofficial guide to ethical hacking , Boston : Course Technology PTR .
- Freeman , W. 1991 . The physiology of perception . Scientific American , 264 : 78 – 85 .
- Gebser , J. 1985 . The ever-present origin , Athens, OH : Ohio University Press .
- Gleick , J. 1987 . Chaos: Making a new science , New York : Viking .
- Heidegger , M. 1977 . “ The question concerning technology ” . In Martin Heidegger: Basic writings , Edited by: Krell , D. 55 – 93 . New York : Harper & Row .
- Herrmann , D. S. 2007 . Complete guide to security and privacy metrics: Measuring regulatory compliance, operational resilience, and ROI , Athens, OH : AUERBACH .
- Jameson , F. 1991 . Postmodernism, or the cultural logic of late capitalism , Durham, NC : Duke University Press .
- Janczewski , L. J. and Colarik , A. M. 2007 . Cyber warfare and cyber terrorism , Hershey, PA : Idea Group Publishing .
- Jehle , G. A. and Reny , P. J. 2001 . Advanced microeconomic theory , 2nd , Boston : Addison-Wesley Longman .
- Jewkes , Y. 2006 . Crime online , Portland, OR : Willan Pub .
- Khalilzad , Z. and Shapiro , J. 2002 . Strategic appraisal: United States air and space power in the 21st century , Santa Monica, CA : RAND .
- Kramer , E. M. 1997 . Modern/postmodern: Off the beaten path of antimodernism , Westport, CT : Praeger .
- Lenzner , R. and Vardi , N. 2007 . The next threat . Forbes , 174 ( 5 ) : 15 – 21 .
- Lister , M. , Dovey , J. , Giddings , S. , Grant , I. and Kelly , K. 2003 . New media: A critical introduction , New York : Routledge .
- Littman , M. L. Markov games as a framework for multi-agent reinforcement learning . Proceedings of the Eleventh International Conference on Machine Learning . 1994 , New Brunswick, NJ. pp. 157 – 163 .
- Lorenz , E. N. 1996 . The essence of chaos , Seattle, WA : University of Washington Press .
- Lye , K. W. and Wing , J. M. 2005 . Game strategies in network security . International Journal of Information Security , 5 ( 1 ) : 1 – 10 .
- Matusitz , J. 2007 . Terrorism preparedness for hospitals: Towards better interorganizational communication . The International Journal of Strategic Communication , 1 ( 3 ) : 169 – 189 .
- Matusitz , J. 2008 . Postmodernism and networks of cyberterrorists . Journal of Digital Forensic Practice , 2 ( 1 ) : 17 – 26 .
- McHale , B. 1993 . Constructing postmodernism , New York : Routledge .
- McQuail , D. 2000 . McQuail's mass communication theory , Thousand Oaks, CA : Sage Publications .
- Merry , U. 1995 . Coping with uncertainty: Insights from the new sciences of chaos, self-organization, and complexity , Westport, CT : Greenwood Publishing .
- Motter , A. E. and Lai , Y. C. 2002 . Cascade-based attacks on complex networks . Physical Review E , 66 : 65 – 102 .
- Mounier , J. , Peckel , E. , Rose , M. , Lopez , S. , Leisy , M. and Arnold , G. 2005 . Spam . Skiing , 57 ( 5 ) : 16 – 20 .
- Neel , J. J. 2005 . Game theory can be used to analyze cognitive radio . Electronic Engineering Times , 1386 : 69 – 72 .
- Norman , D. 1993 . Things that make us smart: Defending human attributes in the age of the machine , New York : Addison-Wesley .
- Perrow , C. 2007 . The next catastrophe: Reducing our vulnerabilities to natural, industrial, and terrorist disasters , Princeton, NJ : Princeton University Press .
- Poster , M. 1997 . “ Cyberdemocracy: The Internet and the public sphere, In D. Porter ” . In Internet culture , 201 – 218 . New York : Routledge .
- Ravindran , A. R . 2007 . Operations research and management science handbook , Boca Raton, FL : CRC .
- Remer , R. 2005 . An introduction to chaos theory for psychodramatists . Journal of Group Psychotherapy, Psychodrama, & Sociometry , 58 ( 3 ) : 130 – 150 .
- Reyes , A. , Brittson , R. , O'Shea , K. and Steel , J. 2007 . Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors , Burlington, MA : Syngress Publishing .
- Roberts , K. 2004 . Lovemarks: The future beyond brands , Brooklyn, NY : PowerHouse Books .
- Salmon , W. 1984 . Scientific explanation and the causal structure of the world , Princeton, NJ : Princeton University Press .
- Sataloff , R. T. 2004 . Chaos . ENT: Ear, Nose & Throat Journal , 83 ( 2 ) : 80
- Schudel , G. and Smith , D. J. 2008 . Router security strategies: Securing IP network traffic planes , Indianapolis, IN : Cisco Press .
- Shoniregun , C. A. 2007 . Synchronizing Internet protocol security , New York : Springer .
- Stewart , L. 1989 . Does God play dice: Mathematics of chaos , Oxford : Blackwell .
- Stone , A. 2001 . USA's dependence on satellites places nation at risk: Militarization of space controversial, perhaps inevitable . USA Today , January 11 : A1
- Strogatz , S. H. 2001 . Nonlinear dynamics and chaos: With applications to physics, biology, chemistry and engineering , Jackson, TN : Perseus Books Group .
- Sullivant , J. 2007 . Strategies for protecting national critical infrastructure assets: A focus on problem-solving , New York : Wiley .
- Thiriet , M. 2007 . Biology and mechanics of blood flows , New York : Springer .
- Thomas , D. 2000 . Cybercrime: Security and surveillance in the information age , New York : Routledge .
- Turner , P. E. 2005 . Cheating viruses and game theory . American Scientist , 93 ( 5 ) : 428 – 435 .
- Valovic , T. S. 2000 . Digital mythologies: The hidden complexities of the Internet , Piscataway, NJ : Rutgers University Press .
- Vegh , S. 2002 . Hacktivists or cyberterrorists? The changing media discourse on hacking . First Monday , 7 ( 10 ) : 12 – 25 .
- Vermaas , P. E. , Kroes , P. , Light , A. and Moore , S. A. 2007 . Philosophy and design: From engineering to architecture , New York : Springer .
- Waters , D. 2007 . Global logistics: New directions in supply chain management , London, , UK : Kogan Page .
- Watts , D. J. 1999 . Small worlds: The dynamics of networks between order and randomness , Princeton, NJ : Princeton University Press .
- Watts , D. J. 2004 . Six degrees: The science of a connected age , New York : W. W. Norton & Company .
- Weber , M. 2003 . Invasion of privacy! Big Brother and the company hackers , Boston : Course Technology PTR .
- Wehrfritz , G. and Vitisca , G. 2000 . Raiding the Love Bug . Newsweek , 135 ( 21 ) : 44 – 45 .
- Weimann , G. 2005 . Cyberterrorism: The sum of all fears? . Studies in Conflict & Terrorism , 48 ( 2 ) : 129 – 149 .
- Weiss , A. 2002 . Process consulting: How to launch, implement, and conclude successful consulting projects , New York : Pfeiffer .
- Wilkinson , P. 2006 . Terrorism versus democracy: The liberal state response , London : Routledge .
- Xu , C. Z. 2005 . Scalable and secure Internet services and architecture , Boca Raton, FL : Chapman & Hall/CRC .
- Yorke , J. 2005 . The world's biggest ideas: Chaos . New Scientist , 187 ( 2517 ) : 37