517
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Public and Private Sector Cooperation in Counteracting Cyberterrorism

Pages 594-608 | Published online: 02 Feb 2011

References

  • National Infrastructure Security Co-ordination Center, "The Creation of the NISCC," http://www.niscc.gov.uk/aboutniscc/nisccinfo.htm, 2 August 2002.
  • Philip Zelikow, "American Economic Intelligence: Past Practice and Future Principles," in Rhodri Jeffreys-Jones and Christopher Andrew, eds., External Vigilance?: 50 Years of the CIA (London: Frank Cass, 1997), pp. 164-177.
  • Her Majesty's Stationery Office, The Strategic Defence Review CM3999 (London: The Stationery Office, 1998); Her Majesty's Stationery Office, The Strategic Defence Review: Supporting Essays (London: The Stationery Office, 1998).
  • Bloomfield , Keith . 2000 . Cyber Terrorism , London : Counter-Terrorism Policy Department, Foreign and Commonwealth Office .
  • Victor A. DeMarines, David Lehman, and John Quilty, "Exploiting the Internet Revolution," in Ashton B. Carter and John P. White, eds., Keeping the Edge: Managing Defense for the Future (Cambridge, Massachusetts: The MIT Press, 2001), p. 91.
  • Gregory D. Grove, Seymour E. Goodman, and Stephen J. Lukasik, "Cyber-attacks and International Law," Survival--The International Institute for Strategic Studies, Vol. 42, No. 3, 2000, pp. 89-103.
  • Keith Bloomfield, Cyber Terrorism, p. 2.
  • Steven Philippsohn, "Fighting Knowledge Crime: The Corporate/Criminal Battlespace," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • Keith Bloomfield, Cyber Terrorism.
  • John Abbott, "Waging War Against the New Cyberwarrior," The Law
  • Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • Bob Ayers, "Intervention and Prevention: New Approaches in the Information Age," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • Neil R. Withington, "Corporate Security in a Global Economy," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 19 June 2001).
  • Kevin Saunders, "Maintaining Business Security in an Insecure Environment," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • Anthony Riem, "How 'Netspionage' Could Change the Way We Live," The Times, City Law Supplement, 19 March 2002, p. 9.
  • Various authors can be cited: Robert Jervis, "What's Wrong With the Intelligence Process?" International Journal of Intelligence and Counterlntelligence, Vol. 1, No. 1, Spring 1986, pp. 28-41; Roy Godson, "Intelligence and Security," pp. 323-358 in Richard H. Schultz, Roy Godson, and George H. Quester, eds., Security Studies for the 21st Century (Washington, D.C.: Brassey's, 1997).
  • Various authors can be cited: Thomas C. Schelling, The Strategy of Conflict (Oxford: Oxford University Press, 1973); Robert Jervis, "What's Wrong with the Intelligence Process?"
  • John Deutch, Arnold Kanter, Brent Scowcroft, and Christopher Hornbarger, "Strengthening the National Security Interagency Process," pp. 265-283 in Ashton B. Carter and John P. White, eds., Keeping the Edge: Managing Defense for the Future (Cambridge, Massachusetts: The MIT Press, 2001).
  • Moore , Mark H. 2000 . Creating Public Value: Strategic Management in Government , Cambridge, Massachusetts : Harvard University Press .
  • Reinicke , Wolfgang H. 1998 . Global Public Policy: Governing Without Government? , Washington, D.C. : The Brookings Institution Press .
  • David Bickford, "Tackling Institutional Inadequacies," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • Keith Bloomfield, Cyber Terrorism, p. 4.
  • Len Hynds, "The National High Tech Crime Unit," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • David Spinks, "EDS-Cyber Crime in Europe: A Call for Action and Co-operation," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 20 June 2001).
  • Phil Williams, "Strategic Intelligence for 21st Century Threats," The Law Enforcement and National Security Global Forum (Edinburgh: PGI Spearhead Ltd., 22 June 2001).
  • Gregory O'Hayon and Trifin Roule, "Wahhabism Creates Rifts in Chechnya's Rebel Government," Jane's Terrorism & Security Monitor, June 2001, p. 10.
  • David Omand, "Towards a New Management Strategy for Defence, RUSI Journal, Vol. 134, No. 3, 1989, pp. 19-26.
  • Anselm Strauss and Juliet Corbin, Basics of Qualitative Research (Newbury Park, California: Sage Publications, 1990).
  • Eells , Richard and Nehemkis , Peter . 1984 . Corporate Intelligence and Espionage: A Blueprint for Executive Decision Making , New York : Macmillan .
  • Patton , Michael Q. 1990 . Qualitative Evaluation and Research Methods , Newbury Park, , California : Sage Publications .
  • Mark Jenkins and Gerry Johnson, "Linking Managerial Cognition and Organizational Performance: A Preliminary Investigation Using Causal Maps," British Journal of Management, Vol. 8, Special Issue, June, 1997, pp. S77-S90.
  • Robert David Steele, "Grafting Intelligence in the Aftermath of Disaster," International Journal of Intelligence and Counterlntelligence, Vol. 15, No. 2, Summer 2002, p. 169.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.