Cyberterrorism (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Cyberterrorism" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
7th place
7th place
2nd place
2nd place
5th place
5th place
3rd place
3rd place
20th place
30th place
28th place
26th place
low place
6,830th place
1,216th place
797th place
4th place
4th place
571st place
403rd place
11th place
8th place
1,786th place
1,096th place
low place
low place
2,714th place
2,274th place
204th place
353rd place
446th place
308th place
low place
low place
low place
low place
5,752nd place
3,776th place
18th place
17th place
low place
low place
3,163rd place
1,731st place
low place
8,204th place
833rd place
567th place
105th place
79th place
2,318th place
1,652nd place
38th place
40th place
low place
8,309th place
26th place
20th place
low place
low place
881st place
611th place
1,029th place
657th place
97th place
164th place
low place
low place
low place
low place
68th place
117th place
low place
low place
152nd place
120th place
1,382nd place
876th place
403rd place
238th place
724th place
431st place
350th place
206th place
12th place
11th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
407th place
241st place
low place
low place
593rd place
395th place
low place
low place
low place
low place
low place
6,124th place
138th place
95th place
low place
low place
30th place
24th place
36th place
33rd place
129th place
89th place
6,937th place
4,863rd place
low place
low place
low place
low place
2,772nd place
4,034th place
low place
low place
49th place
47th place
544th place
387th place
355th place
454th place
8th place
10th place
4,397th place
3,801st place
269th place
201st place
low place
8,388th place
193rd place
152nd place
low place
low place
1,663rd place
1,167th place
23rd place
32nd place
low place
low place

amazon.com

apnews.com

archives.gov

obamawhitehouse.archives.gov

bidenwhitehouse.archives.gov

bbc.co.uk

news.bbc.co.uk

bbc.com

bgr.in

bizjournals.com

books.google.com

  • Hower, Sara; Uradnik, Kathleen (2011). Cyberterrorism (1st ed.). Santa Barbara, CA: Greenwood. pp. 140–149. ISBN 9780313343131.
  • Laqueur, Walter; C., Smith; Spector, Michael (2002). Cyberterrorism. Facts on File. pp. 52–53. ISBN 9781438110196.
  • Ruggiero, Vincenzo (1 March 2006). Understanding Political Violence: A Criminological Approach. McGraw Hill. ISBN 9780335217519. Retrieved 13 August 2018.
  • Centre of Excellence Defence Against Terrorism, ed. (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. Vol. 34. Amsterdam: IOS Press. p. 119. ISBN 9781586038366. Retrieved 22 July 2018. The current NATO Definition of cyber terrorism is: 'A cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal.'
  • Centre of Excellence Defence Against Terrorism, ed. (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. Vol. 34. Amsterdam: IOS Press. p. 119. ISBN 9781586038366. Retrieved 22 July 2018. The National Infrastructure Protection Center, now part of the US Department of Homeland Security, states as their understanding of cyber terrorism: 'A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a political, social, or ideological agenda.'
  • Centre of Excellence Defence Against Terrorism, ed. (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. Vol. 34. Amsterdam: IOS Press. p. 119. ISBN 9781586038366. Retrieved 22 July 2018. The Federal Bureau of Investigation has the following definition of cyber terrorism: Any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents.'

breakinggov.com

business-standard.com

civil.ge

cnn.com

cqpress.com

library.cqpress.com

cyprus-mail.com

delfi.lt

deloitte.com

www2.deloitte.com

doi.org

  • Qasemi, Hamid Reza (2016). "Chapter 12: Iran and Its Policy Against Terrorism". In Dawoody, Alexander R. (ed.). Eradicating Terrorism from the Middle East. Policy and Administrative Approaches. Vol. 17. Springer International Publishing Switzerland. p. 201 - 206. doi:10.1007/978-3-319-31018-3. ISBN 978-3-319-31018-3.
  • Canetti, Daphna; Gross, Michael; Waismel-Manor, Israel; Levanon, Asaf; Cohen, Hagit (1 February 2017). "How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks". Cyberpsychology, Behavior, and Social Networking. 20 (2): 72–77. doi:10.1089/cyber.2016.0338. PMID 28121462.
  • Gross, Michael (2016). "The psychological effects of cyber terrorism". The Bulletin of the Atomic Scientists. 72 (5). National Institutes of Health: 284–291. Bibcode:2016BuAtS..72e.284G. doi:10.1080/00963402.2016.1216502. PMC 5370589. PMID 28366962.
  • Hardy, Keiran; Williams, George (11 August 2014). Chen, Thomas M.; Jarvis, Lee; Macdonald, Stuart (eds.). Cyberterrorism: Understanding, Assessment, and Response. Springer. pp. 1–23. doi:10.1007/978-1-4939-0962-9_1.
  • Qasemi, Hamid Reza (2016). "Chapter 12: Iran and Its Policy Against Terrorism". In Dawoody, Alexander R. (ed.). Eradicating Terrorism from the Middle East. Policy and Administrative Approaches. Vol. 17. Springer International Publishing Switzerland. p. 207. doi:10.1007/978-3-319-31018-3. ISBN 978-3-319-31018-3.
  • Warf, Barney (August 2016). "Relational Geographies of Cyberterrorism and Cyberwar". Space & Polity. 20 (2): 143–157. doi:10.1080/13562576.2015.1112113. S2CID 146837558.
  • Holt, Thomas J.; Freilich, Joshua D.; Chermak, Steven M. (2017). "Exploring the Subculture of Ideologically Motivated Cyber-Attackers". Journal of Contemporary Criminal Justice. 33 (3): 212–233. doi:10.1177/1043986217699100. S2CID 152277480.

dtic.mil

oai.dtic.mil

dw.com

ebscohost.com

search.ebscohost.com

europa.eu

europol.europa.eu

everycrsreport.com

fbi.gov

leb.fbi.gov

  • [1], William L. Tafoya, Ph.D., "Cyber Terror", FBI Law Enforcement Bulletin (FBI.gov), November 2011

foxnews.com

georgetown.edu

cs.georgetown.edu

  • Dorothy E. Denning (23 May 2000). "Cyberterrorism". cs.georgetown.edu. Archived from the original on 10 March 2014. Retrieved 19 June 2016.

govinfosecurity.com

harvard.edu

ui.adsabs.harvard.edu

hlrecord.org

iht.com

independent.co.uk

jewishreview.co.il

jpost.com

jstor.org

kievukraine.info

news.kievukraine.info

kratikal.com

law.com

liebertpub.com

medianama.com

memri.org

cjlab.memri.org

nationalcrimeagency.gov.uk

ndtv.com

newsweek.com

nih.gov

pubmed.ncbi.nlm.nih.gov

ncbi.nlm.nih.gov

nis.go.kr

eng.nis.go.kr

nist.gov

csrc.nist.gov

nytimes.com

praguepost.com

reuters.com

security-affairs.com

securityinfowatch.com

  • "StackPath". www.securityinfowatch.com. 15 October 2021. Retrieved 30 November 2021.

securityintelligence.com

segmentech.com

semanticscholar.org

api.semanticscholar.org

sunday-guardian.com

  • Compare: Costigan, Sean (25 January 2015). "Cyber terrorism must be jointly tackled". Sunday Guardian. Archived from the original on 2 April 2015. Retrieved 12 March 2015. States are actively engaged in weaponising code and are all too willing to hide behind the challenges of attribution — many will be apt to share code with proxies in furtherance of their objectives, just as states continue to support terrorism in the 'physical' realm. [...] Reduced technical complexity, lowered costs and most importantly, the continued push to connect the virtual and the physical — think of the growth of the Internet of Things or Machine-to-Machine connectivity — is making for new, enticing physical targets worldwide.

surfsafe.pk

telegraph.co.uk

thedailystar.net

thediplomat.com

theguardian.com

thehindubusinessline.com

theregister.co.uk

theworldnews.net

threatconnect.com

timesofisrael.com

today.az

tribuneindia.com

twitter.com

help.twitter.com

uic.edu

repository.law.uic.edu

  • Iqbal, Mohammad. "Defining Cyberterrorism". The John Marshall Journal of Information Technology & Privacy Law. 22 (2): 397–408.

un.org

washingtontimes.com

web.archive.org

welivesecurity.com

wired.com

worldcat.org

search.worldcat.org

worlddialogue.org

yahoo.com

ca.news.yahoo.com

zdnetasia.com

  • Yu, Eileen (27 May 2011). "China dispatches online army". ZDNet Asia. Retrieved 3 June 2011. Geng Yansheng, spokesperson for China's Defense Ministry, was quoted to say that the PLA set up the cyberwar unit, or 'cyber blue team', to support its military training and upgrade the army's Internet security defense.