Centre of Excellence Defence Against Terrorism, ed (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. 34. Amsterdam: IOS Press. p. 119. ISBN9781586038366. https://books.google.com/books?id=tFmxVnDhBRQC2018年7月22日閲覧. "The current NATO Definition of cyber terrorism is: 'A cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal.'"
Centre of Excellence Defence Against Terrorism, ed (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. 34. Amsterdam: IOS Press. p. 119. ISBN9781586038366. https://books.google.com/books?id=tFmxVnDhBRQC2018年7月22日閲覧. "The National Infrastructure Protection Center, now part of the US Department of Homeland Security, states as their understanding of cyber terrorism: 'A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a political, social, or ideological agenda.'"
Centre of Excellence Defence Against Terrorism, ed (2008). Responses to Cyber Terrorism. NATO science for peace and security series. Sub-series E: Human and societal dynamics, ISSN 1874-6276. 34. Amsterdam: IOS Press. p. 119. ISBN9781586038366. https://books.google.com/books?id=tFmxVnDhBRQC2018年7月22日閲覧. "The Federal Bureau of Investigation has the following definition of cyber terrorism: Any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents.'"
Hardy, Keiran; Williams, George (11 August 2014). Cyberterrorism: Understanding, Assessment, and Response. Springer. pp. 1–23. doi:10.1007/978-1-4939-0962-9_1
Warf, Barney (August 2016). “Relational Geographies of Cyberterrorism and Cyberwar.”. Space & Polity20 (2): 143–157. doi:10.1080/13562576.2015.1112113.
Holt, Thomas J.; Freilich, Joshua D.; Chermak, Steven M. (2017). “Exploring the Subculture of Ideologically Motivated Cyber-Attackers”. Journal of Contemporary Criminal Justice33 (3): 212–233. doi:10.1177/1043986217699100.
Costigan, Sean (2015年1月25日). “Cyber terrorism must be jointly tackled”. Sunday Guardian. オリジナルの2015年4月2日時点におけるアーカイブ。. https://web.archive.org/web/20150402122425/http://www.sunday-guardian.com/extra/cyber-terrorism-must-be-jointly-tackled2015年3月12日閲覧. "States are actively engaged in weaponising code and are all too willing to hide behind the challenges of attribution — many will be apt to share code with proxies in furtherance of their objectives, just as states continue to support terrorism in the 'physical' realm. [...] Reduced technical complexity, lowered costs and most importantly, the continued push to connect the virtual and the physical — think of the growth of the Internet of Things or Machine-to-Machine connectivity — is making for new, enticing physical targets worldwide."
Costigan, Sean (2015年1月25日). “Cyber terrorism must be jointly tackled”. Sunday Guardian. オリジナルの2015年4月2日時点におけるアーカイブ。. https://web.archive.org/web/20150402122425/http://www.sunday-guardian.com/extra/cyber-terrorism-must-be-jointly-tackled2015年3月12日閲覧. "States are actively engaged in weaponising code and are all too willing to hide behind the challenges of attribution — many will be apt to share code with proxies in furtherance of their objectives, just as states continue to support terrorism in the 'physical' realm. [...] Reduced technical complexity, lowered costs and most importantly, the continued push to connect the virtual and the physical — think of the growth of the Internet of Things or Machine-to-Machine connectivity — is making for new, enticing physical targets worldwide."