REFERENCES
- Abdelnour-Nocera, J. (2002a). Context and culture in human computer interaction: “Usable” does not mean “senseful.” In F. Sudweeks & C. Ess (Eds.), Proceedings, cultural attitudes towards technology and communication (pp. 505–524). Murdoch, Australia: Murdoch University Press.
- Abdelnour-Nocera, J. (2002b). Ethnography and hermeneutics in cybercultural research: Accessing IRC virtual communities. Journal of Computer-Mediated Communication, 7(2).
- Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66–84.
- Archick, K. (2003). Cybercrime: The council of Europe convention. In J. V. Blane (Ed.), Cybercrime and cyberterrorism (pp. 1–6). Hauppauge, NY: Novinka Books.
- Axelrod, E. M. (2009). Violence goes to the Internet: Avoiding the snare of the net. Springfield, IL: Charles C. Thomas Publisher.
- Barber, B. (1995). Jihad vs. McWorld: How globalism and tribalism are reshaping the world. New York, NY: Random House.
- Baudrillard, J. (2003). Simulacra and simulation. Ann Arbor, MI: The University of Michigan Press.
- Bradley, A. K. (2012). Anatomy of cyberterrorism: Is America vulnerable? New York, NY: BiblioScholar.
- Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. Boston, MA: Northeastern University Press.
- Britt, P. (2005). By law: Catching up with malware. Information Today, 22(11), 1–54.
- Bucher, H. J. (2002). The power of the audience: Interculturality, interactivity and trust in internet-communication: Theory, research design, and empirical results. In F. Sudweeks & C. Ess (Eds.), Proceedings, cultural attitudes towards technology and communication (pp. 3–14). Murdoch, Australia: Murdoch University Press.
- Capurro, R. (2005). Privacy: An intercultural perspective. Ethics and Information Technology, 7(1), 37–47.
- Carooso, J. (2004). Are you 133t? One-time hacker slang now ridiculed by all except those who use it. Network World, 1, 76.
- Castells, M. (2001). The Internet galaxy: Reflections on the Internet, business, and society. Oxford, UK: Oxford University Press.
- Chase, M., Macfadyen, L., Reeder, K., & Roche, J. (2002). Intercultural challenges in networked learning: Hard technologies meet soft skills. First Monday, 7(8), 10–21.
- Conhaim, W. W. (2005). The global net: Part II. Information Today, 21(10), 41–42.
- Conway, M. (2002). What is cyberterrorism? Current History, 2, 436–440.
- Cook, S. E. (2004). New technologies and language change: Toward an anthropology of linguistic frontiers. Annual Review of Anthropology, 33(1), 103–116.
- Crystal, D. (2001). Language and the Internet. Cambridge, UK: Cambridge University Press.
- Davis, M. (1997). Gangland: Cultural elites and the new generationalism. St. Leonards: Allen & Unwin.
- Debrix, F. (2001). Cyberterror and media-induced fears: The production of emergency culture. Strategies: Journal of Theory, Culture & Politics, 14(1), 149–168.
- Dreyfus, S. (1997). Underground: Tales of hacking, madness and obsession on the electronic frontier. London, UK: Mandarin.
- Dunnigan, J. F. (2003). The next war zone: Confronting the global threat of cyberterrorism. New York, NY: Citadel Press.
- Escobar, A. (1996). Welcome to cyberia: Notes on the anthropology of cyberculture. In Z. Sarda & J. R. Ravetz (Eds.), Cyberfutures: Culture and politics on the information superhighway (pp. 111–137). London, UK: Pluto Press.
- Frederick, R. (2005). Tapping into students' cultural identity. Educational Leadership, 63(4), 69–70.
- Fukuyama, F. (1995). Trust: The social virtues and the creation of prosperity. New York, NY: Free Press.
- Geertz, C. (1973). The interpretation of cultures. New York, NY: Basic Books.
- Hall, E. T. (1959). The silent language. Garden City, NY: Doubleday.
- Hall, E. T. (1976). Beyond culture. Garden City, NY: Doubleday.
- Hall, E. T. (1992). An anthropology of everyday of life. Garden City, NY: Doubleday.
- Hay, D. (2000). Spirituality versus individualism: Why we should nurture relational consciousness. International Journal of Children's Spirituality, 5(1), 37–48.
- Hofstede, G. H. (1991). Cultures and organizations: Software of the mind. New York, NY: McGraw-Hill.
- Jandt, F. (2004). An introduction to intercultural communication: Identities in a global community. Thousand Oaks, CA: Sage.
- Johari, A. (2005). Intercultural Internet-based learning: Know your audience and what it values. Educational Technology Research & Development, 53(2), 117–127.
- Jordan, T. (1999). Cyberculture: The culture and politics of cyberspace and the Internet. London, UK: Routledge.
- Juergensmeyer, M. (2000). Terror in the mind of God. Berkeley, CA: University of California Press.
- Kagitcibasi, C. (1994). A critical appraisal of individualism and collectivism: Toward a new formulation. In U. Kim, H. C. Triandis, C. Kagitcibasi, S.-C. Choi, & G. Yoon (Eds.), Individualism and collectivism: Theory, method and applications (pp. 52–65). Thousand Oaks, CA: Sage.
- Kee, E. (2005). Understanding elite speak. Computimes, 3, p. 50.
- Kennedy, S. D. (2001). Security technology and other issues. Information Today, 18(11), 34–35.
- Kling, R., & Carmel, E. (1997). American hegemony in packaged software trade and the “culture of software.” Information Society, 13(1), 125–142.
- Kluver, R. (2004a). Globalization, informatization, and intercultural communication. In F. Jandt (Ed.), Intercultural communication: A global reader (pp. 425–437). Thousand Oaks, CA: Sage.
- Kluver, R. (2004b). Political culture and information technology in the 2001 Singapore general election. Political Communication, 21, 435–458.
- Kluver, R. (2005). The architecture of control: A Chinese strategy for e-governance. The Journal of Public Policy, 25(1), 75–97.
- Kramer, E. (2003). Cosmopoly: Occidentalism and the new world order. In E. M. Kramer (Ed.), The emerging monoculture: Assimilation and the “Model Minority” (pp. 234–291). Westport, CT: Praeger.
- Krapp, P. (2005). Terror and play, or what was hacktivism? Grey Room, 1(21), 70–93.
- Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.
- Lévy, P. (2000). Kyberkultura. Prague: Karolinum.
- Libicki, M. C. (2009). Cyberdeterrence and cyberwar. Santa Monica, CA: RAND Corporation.
- MacNulty, A. A. R. (1999). Socio-political change and asymmetry in information warfare and intelligence. InfoWarCon99. Washington, DC: September 1999.
- Matusitz, J. (2008). Cyberterrorism: Postmodern state of chaos. Information Security Journal: A Global Perspective, 17(4), 179–187.
- Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
- Mitnick, K., & Simons, W. L. (2002). The art of deception: Controlling the human element of security. New York, NY: Wiley.
- Morse, M. (1998). Virtualities: Television, media art and cyberculture. Bloomington, IN: Indiana University Press.
- Murdock, G. P. (1965). Culture and society. Pittsburgh, PA: University of Pittsburgh Press.
- Nakada, M., & Tamura, T. (2005). Japanese conceptions of privacy: An intercultural perspective. Ethics and Information Technology, 7(1), 27–36.
- Nayar, P. K. (2010). An introduction to new media and cybercultures. New York, NY: Wiley.
- Neighly, P. (2000). Meet the hackers. America's Network, 104(9), 43–47.
- Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron? Boston University Law Review, 81, 101–130.
- Ohbuchi, K. I., Fukushima, O., & Tedeschi, J. T. (1999). Cultural values in conflict management: Goal orientation, goal attainment, and tactical decision. Journal of Cross-Cultural Psychology, 30, 51–71.
- Poster, M. (2001). What's the matter with the Internet? Minneapolis, MN: University of Minnesota Press.
- Pratt, M. K. (2005). E-mail exposure. Computerworld, 39(32), 37–39.
- Rice, L. M. (2004). Analysis: Terror on the Web. United Press International, 1, 10–21.
- Schmid, A. P. (1984). Political terrorism: A research guide to concepts, theories, data bases, and literature. Amsterdam: Transaction Books.
- Schweitzer, D. (2005). A convert with a crush on his Mac. Computerworld, 39(31), p. 30.
- Sinha, D. (1997). A cultural perspective on organizational behavior in India. In P. C. Earley & M. Erez (Eds), New perspectives on international industrial/organizational psychology (pp. 53–74). San Francisco, CA: Lexington.
- Sinha, D., & Tripathi, R. C. (1994). Individualism in a collectivist culture: A case of coexistence of opposites. In U. Kim, H. C. Triandis, C. Kagitcibasi, S. C. Choi, & G. Yoon (Eds.), Individualism and collectivism: Theory, method, and applications (pp. 123–136). Thousand Oaks, CA: Sage.
- Slay, J., Darzanos, K., Quirchmayr, G., & Koronios, A. (2003, June). Towards a mature understanding of “culture” in information systems security research. Paper presented at the IFIP Joint WG 8.2 + 9.4 Conference, Athens University of Economics and Business, Greece.
- Smith, H. J. (2001). Information privacy and marketing: What the U.S. should (and shouldn't) learn from Europe. California Management Review, 43(2), 8–33.
- Smith, P. B., & Bond, M. H. (1993). Social psychology across cultures. Cambridge, UK: Cambridge University Press.
- Straub, D., Loch, K., Evaristo, R., Karahanna, E., & Strite, M. (2002). Toward a theory-based measurement of culture. Journal of Global Information Management, 10(1), 13–23.
- Sun Tzu (2003). The art of war. London, UK: Penguin Books.
- Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The invasion of the Chinese cyberspies (and the man who tried to stop them). Time, 166(10), 34–39.
- Ting-Toomey, S., & Chung, L. (2005). Understanding intercultural communication. Los Angeles, CA: Roxbury Publishing Company.
- Tran, L. (1996). The concept of privacy in intercultural communication. In A. Barthel (Ed.), Intercultural interaction and development: Converging perspectives (pp. 210–217). Sydney, Australia: University of Technology-Sydney.
- Triandis, H. C. (1995). Individualism and collectivism. Boulder, CO: Westview.
- Verhoeven, L. (2000). Components in early second language reading and spelling. Scientific Studies of Reading, 4(4), 313–330.
- Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism. New York, NY: McGraw-Hill.
- Voronov, M., & Singer, J. A. (2002). The myth of individualism-collectivism: A critical review. The Journal of Social Psychology, 142(4), 461–480.
- Wang, G. (1994). Treading different paths: Informatization in Asian nations. Norwood, NJ: Ablex.
- Wood, J. T. (1994). Gendered lives: Communication, gender, and culture. Belmont, CA: Wadsworth.
- Wright, M. M. (2005). Finding a place in cyberspace. Frontiers: A Journal of Women Studies, 26(1), 48–59.
- Yager, T. (2004). Imagine no possessions. InfoWorld, 26(47), 50.