338
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

The Networks That Fight Cyberterrorist Networks

Pages 616-626 | Received 19 Jan 2013, Accepted 07 Feb 2013, Published online: 24 May 2013

REFERENCES

  • Aeilts , T. 2005 . Defending against cybercrime and terrorism . FBI Law Enforcement Bulletin , 74 ( 1 ) : 14 – 20 .
  • Albert , R. , Jeong , H. and Barabasi , A. L. 2000 . Error and attack tolerance of complex networks . Nature , 406 ( 27 ) : 378 – 382 .
  • Arquilla , J. and Ronfeldt , D. , eds. 2001 . Networks and netwars: The future of terror, crime, and militancy Santa Monica , CA : RAND. .
  • Arquilla , J. , Ronfeldt , D. and Zanini , M. 1999 . “ Networks, netwar and information-age terrorism. ” . In Countering the new terrorism Edited by: Lesser , I. O. , Hoffman , B. , Arquilla , J. , Ronfeldt , D. F. , Zanini , M. and Jenkins , B. M. 39 – 88 . Santa Monica , CA : RAND. .
  • Axelrod , E. M. and Nicoletti , J. 2009 . Violence goes to the Internet: Avoiding the snare of the net Springfield , IL : Charles C. Thomas Publisher. .
  • Barabasi , A. L. 2002 . Linked: The new science of networks. Cambridge , MA : Perseus. .
  • Bavelas , A. 1950 . Communication patterns in task-oriented groups . Journal of the Acoustical Society of America , 22 : 725 – 730 .
  • Beucke , D. and Grow , B. 2005 . One man's phishing expedition . Business Week , 3938 : 16
  • Block , R. 2006 . Financial firms are warned of terrorist cyber threat . Wall Street Journal , 248 ( 129 ) January 12 : A6
  • Boyle , M. 2005 . The latest hit: CSI in your hard drive . Fortune , 152 ( 10 ) : 39
  • Bradley , A. K. 2012 . Anatomy of cyberterrorism: Is America vulnerable? New York , NY : BiblioScholar. .
  • Brenner , S. W. 2007 . “At light speed”: Attribution and response to cybercrime/terrorism/warfare . The Journal of Criminal Law & Criminology , 97 ( 2 ) : 379 – 475 .
  • Brenner , S. W. 2012 . Cybercrime and the law: Challenges, issues, and outcomes Boston , MA : Northeastern University Press. .
  • Carlson , S. 2004 . Courses in cyber forensics gain popularity on campuses . Chronicle of Higher Education , 50 ( 30 ) : A37
  • Carlson , C. and Fisher , D. 2004 . Feds pressured on phishing . eWeek , 21 ( 39 ) : 14
  • Castilla , E. , Hwang , H. , Granovetter , E. and Granovetter , M. 2000 . “ Social networks in Silicon Valley. ” . In The Silicon Valley edge Edited by: Lee , C. M. , Miller , W. F. , Hancock , M. G. and Rowen , H. S. 218 – 247 . Stanford , CA : Stanford University Press. .
  • Clem , A. , Galwankar , S. and Buck , G. 2003 . Health implications of cyber-terrorism . Prehospital and Disaster Medicine , 18 ( 3 ) : 272 – 275 .
  • Colarik , A. M. 2006 . Cyber terrorism: Political and economic implications Hershey , PA : Idea Group Publishing. .
  • Coleman , R. 2002 . Hackers beware: Student lab ranks among the world's best computer security teams . UNT News , : A1
  • Conway , M. 2002 . What is cyberterrorism? . Current History , 2 : 436 – 440 .
  • Cyber Forensics at Purdue University . 2007 . Available at www.cyberforensics.purdue.edu
  • Delio , M. 2005 . Enterprises share phishing tales . InfoWorld , 27 ( 4 ) : 35
  • Digital Evidence . 2007 . Available at http://ncfs.ucf.edu/digital_evd.html
  • DiNardo , K. 2004 . Be careful out there . USA Today , June 25 : A4
  • Dorogovtsev , S. N. and Mendes , J. F. F. 2003 . Evolution of networks: From biological networks to the Internet and WWW Oxford , , UK : Oxford University Press. .
  • Dunnigan , J. F. 2003 . The next war zone: Confronting the global threat of cyberterrorism New York , NY : Citadel Press. .
  • Fisher , D. , Nobel , C. and Taft , D. 2003 . The high-tech war . eWeek , 20 ( 13 ) : 1
  • Gabrys , E. 2002 . The international dimensions of cyber-crime . Information Systems Security , 11 ( 4 ) : 21 – 32 .
  • Goodman , M. 2001 . Making computer crime count . FBI Law Enforcement Bulletin , 70 ( 8 ) : 10 – 17 .
  • Graham-Rowe , D. 2003 . Red alert on the e-war front . New Scientist , 179 ( 2402 ) : 38 – 43 .
  • Habeeb , M. 2004 . Venturing into computer forensics . Community College Week , 17 ( 7 ) : 12
  • Hafner , K. and Markoff , J. 1991 . Cyberpunk: Outlaws and hackers on the computer frontier New York , NY : Simon & Schuster. .
  • Holsapple , M. 2005 . Purdue engages law enforcement with computer forensics triage training . Purdue University News , October 26 : A1
  • Hosmer , C. , Gordon , G. , Hyde , C. and Grant , T. Cyber forensics 2000 . Proceedings, 1st Annual Study of the State-of-the-Art in Cyber Forensics . Washington , DC .
  • Jalil , S. A. 2003 . Countering cyber terrorism effectively: Are we ready to rumble . GIAC Security Essentials Certification (GSEC) Practical Assignment Version , 1 ( 4 ) : 10 – 15 .
  • Janczewski , L. J. and Colarik , A. M. 2007 . Cyber warfare and cyber terrorism Hershey , PA : Idea Group Publishing. .
  • Krebs , B. 2007 . Terrorism's hook into your inbox: U.K. case shows link between online fraud and Jihadist networks . Washington Post , July 5 : A3
  • Lawrence , M. 2006 . Terrorist war games focus on IT . Security Management , 50 ( 7 ) : 29 – 36 .
  • Leavitt , H. J. 1951 . Some effects of certain communication patterns on group performance . Journal of Abnormal and Social Psychology , 46 : 38 – 50 .
  • Libicki , M. C. 2009 . Cyberdeterrence and cyberwar Santa Monica , CA : RAND. .
  • McCracken , H. 2004 . Is this any way to fix security holes? . PC World , 22 ( 11 ) : 17
  • McKenzie , W. 2004 . Hacker manifesto Cambridge , MA : Harvard University Press. .
  • Mercer , L. D. 2004 . Computer forensics characteristics and preservation of digital evidence . FBI Law Enforcement Bulletin , 73 ( 3 ) : 28 – 32 .
  • Messmer , E. 2005 . DoD targets child porn on military PCs . Network World , : A1
  • Mokhiber , R. 2000 . White collar crime spree . Multinational Monitor , 21 ( 7 ) : 38
  • Monge , P. R. and Contractor , N. S. 2003 . Theories of communication networks New York , NY : Oxford University Press. .
  • Moore , C. 2005 . Cyber sleuths . Career World , 34 ( 1 ) : 6 – 9 .
  • Mueller , R. S. III . 2005 . The FBI . Vital Speeches of the Day , 72 ( 5 ) : 130 – 133 .
  • Murphy , P. A. 2005 . To catch a cyber thief . Stores , 87 ( 9 ) : 71 – 77 .
  • Oklahoma Digital Forensics Lab . 2007 . Available at https://odfl.ou.edu
  • Phillips , A. , Nelson , B. , Enfinger , F. and Steuart , C. 2005 . Guide to computer forensics and investigations Boston , MA : Course Technology. .
  • Power , R. 2006 . Stalking “cyber terrorists” in Sofia: Event report . Computer Fraud & Security , 11 : 4 – 8 .
  • Prosise , C. and Mandia , K. 2001 . Incident response: Investigating computer crime. New York , NY : McGraw Hill. .
  • Radcliff , D. 2002 . The security sentinels . Computerworld , 36 ( 15 ) : 34 – 35 .
  • Reyes , A. , Brittson , R. , O'Shea , R. and Steel , J. 2007 . Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors Rockland , MA : Syngress Publishing. .
  • Rist , O. and Chee , B. 2004 . EnCase keeps tabs on compliance . InfoWorld , 26 ( 41 ) : 31 – 32 .
  • Roberts , P. F. 2005 . School studies net attacks . eWeek , 22 ( 19 ) : 18
  • Schwartau , W. 1996 . Cyberterrorism: Protecting your personal security in the electronic age New York , NY : Thunder Mouth Press. .
  • Scott , J. 2000 . Social network analysis: An introduction New York , NY : Sage Publications. .
  • Shah , N. 2007 . Subject to technology: Internet pornography, cyber-terrorism and the Indian state . Inter-Asia Cultural Studies , 8 ( 3 ) : 349 – 366 .
  • Smith , S. 2000 . College starts cyber forensics program . Community College Week , 12 ( 13 ) : 20
  • Swartz , J. 2004 . Cyberterror impact, defense under scrutiny . USA Today , August 7 : A2
  • Thibodeau , P. 2002 . White House pushes voluntary data sharing . Computerworld , 36 ( 31 ) : 10
  • Thilmany , J. 2004 . Rifling for evidence . Mechanical Engineering , 126 ( 10 ) : 18 – 20 .
  • Thornburgh , N. , Forney , M. , Bennett , B. , Burger , T. J. and Shannon , E. 2005 . The invasion of the Chinese cyberspies (and the man who tried to stop them) . Time , 166 ( 10 ) : 34 – 39 .
  • Verton , D. 1999 . New cyberterror threatens AF . Federal Computer Week , May 3 : A1
  • Verton , D. 2003a . Black ice: The invisible threat of cyber-terrorism New York , NY : McGraw-Hill. .
  • Verton , D. 2003b . Private sector key to cybercrime fight . Computerworld , 37 ( 46 ) : 12
  • Wang , S. J. 2007a . Internet forensics on the basis of evidence gathering with Peep attacks . Computer Standards & Interfaces , 29 ( 4 ) : 423 – 429 .
  • Wang , S. J. 2007b . Measures of retaining digital evidence to prosecute computer-based cyber-crimes . Computer Standards & Interfaces , 29 ( 2 ) : 216 – 223 .
  • Wasserman , S. and Faust , K. 1994 . Social network analysis Cambridge , MA : Cambridge University Press. .
  • Wellman , B. and Berkowitz , S. D. , eds. 1988 . Social structures: A network approach Cambridge , MA : Cambridge University Press. .
  • Zangrilli , A. 2002 . Twenty questions with an electronic evidence expert . Modern Practice , 4 ( 1 ) : 10 – 21 .
  • Zepp , C. 1999 . Virtuality community: Hackers . Sociology and the Internet , 4 ( 3 ) : 1 – 14 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.