[1]
|
Lonsdale, D.J. (2004) The Nature of War in the Information Age: Clausewitzian Future. Frank Cass, London, 1.
|
[2]
|
Berinato, S. (2002) The Truth about Cyberterrorism. CIO.
http://www.cio.com.au/article/26124/truth_about_cyberterrorism/
|
[3]
|
Denning, D.E. (2000) Cyberterrorism. Special Oversight Panel on Terrorism Committee on Armed Services US House of Representatives. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html
|
[4]
|
Taylor, R.W. (2006) Digital Crime and Digital Terrorism. Pearson/Prentice Hall, Upper Saddle River.
|
[5]
|
Pollitt, M.M. (1998) Cyberterrorism—Fact or Fancy? Computer Fraud & Security, 2, 8-10.
|
[6]
|
Lonsdale, D.J. (2004) The Nature of War in the Information Age: Clausewitzian Future. Frank Cass, London, 135.
|
[7]
|
Garrison, L. and Martin, G. (2001) Cyberterrorism: An Evolving Concept. Highlights.
|
[8]
|
Verton, D. (2003) Black Ice: The Invisible Threat of Cyber-Terrorism. McGraw-Hill/Osborne, New York.
|
[9]
|
Charmaz, K. (2006) Constructing Grounded Theory. Sage Publications, London.
|
[10]
|
Bryant, A. and Kathy, C. (2007) Grounded Theory Research: Methods and Practices. In: Bryant, A. and Charmaz, K., Eds., The Sage Handbook of Grounded Theory, Sage Publications Ltd, Thousand Oaks.
|
[11]
|
Bryant, A. and Charmaz, K. (2007) The Sage Handbook of Grounded Theory. SAGE, London.
|
[12]
|
Strauss, A.L. (1987) Qualitative Analysis for Social Scientists. Cambridge University Press, Cambridge.
|
[13]
|
Corbin, J. and Strauss, A. (2008) Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Sage.
|
[14]
|
La Rossa, R. (2005) Grounded Theory Methods and Qualitative Family Research. Journal of Marriage and Family, 67.
http://dx.doi.org/10.1111/j.1741-3737.2005.00179.x
|