Altheide, D. (1997). The news media, the problem frame and the production of fear. The Sociological Quarterly, 38
Anti-Defamation League (1999). CyberTerrorism – Terrorism update.
Retrieved March 1, 2006, from http://www.adl.org/terror/focus/16_focus_a.asp
Arquilla, J., Ronfeldt, D., & Zanini, M. (1999). Networks, netwar and information-age terrorism. In Z. M. Khalilzhad & J. P. White (Eds.), The changing role of information in warfare. Santa Monica, CA: Rand.
Barnett, R. J. (1973). Roots of war: The men and institutions behind U.S. foreign policy. Baltimore: Penguin Books.
Conway, M. (2005). Terrorist “use” of the internet and fighting back. Paper prepared for presentation at the conference Cybersafety: Safety and security in a networked world: Balancing cyber-rights and responsibilities
. Oxford Internet Institute (OII), Oxford University, UK, 8–10 September, 2005. Retrieved February 1, 2006, from http://www.oii.ox.ac.uk/research/cybersafety/extensions/pdfs/papers/maura_conway.pdf
Damphousse, K. R., & Smith, B. L. (1998). The internet: A terrorist medium for the 21st century. In H. W. Kushner (Ed.), The future of terrorism: Violence in the new millennium. Thousand Oaks, CA: SAGE.
Debrix, F. (2001). Cyberterror and Media-Incluced fears: The production of emergency culture, Strategies: Journal of Theory, Culture and Politics, 14(1), 149–168.
Denning, D. E. (1999). Activism, hacktivism, and cyber terrorism: The internet as a tool for influencing foreign policy.” Presented to “The Internet and International Systems:Information Technology and American Foreign Policy Decision Making,” The World Affairs Council, San Francisco, December 10, 1999. Retrieved February 1, 2006, from http://www.rand.org/pubs/monograph_reports/MR1382/MR1382.ch8.pdf
Denning, D. E. (2000). Cyberterrorism
. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives, May 23, 2000. Retrieved February 1, 2006, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html
Duvall, R. D., & Stohl, M. (1983). Governance by terror, chapter six. In M. Stohl (Ed.), The politics of terrorism (2nd ed., pp. 179–219). New York: Marcel Dekker.
Embar-Seddon, A. (2002). Cyber terrorism: Are we under siege? American Behavioral Scientist, 45
Flemming, P., & Stohl, M. (2001). Myths and realities of cyber terrorism. In A. P. Schmid (Ed.), Countering terrorism through international cooperation (pp. 70–105). Vienna, Austria: ISPAC (International Scientific and Professional Advisory Council of the United Nations Crime Prevention and Criminal Justice Program.
Gellman, B. (2002). Cyber-attacks by Al Qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say,” Washington Post June 27: A01. Retrieved December 1, 2005, from http://www.washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26
Gerbner, G., & Gross, L. (1976). The scary world of tv’s heavy Viewer. Psychology Today, 89–91, April.
Giacomello, G. (2004). Bangs for the buck: A cost-benefit analysis of cyber terrorism. Studies in Conflict and Terrorism, 27
Glassner, B. (1999). The culture of fear: Why Americans are afraid of the wrong things. New York: Basic Books.
Grabosky, P. N., & Stohl, M. (2003). Cyberterrorism Reform
82, Autumn:8–13. Retrieved September 15, 2005 from http://www.alrc.gov.au/reform/summaries/82.htm
Green, J. (2002). The myth of cyber terrorism. Washington Monthly
, November. Retrieved February 1, 2006, from http://www.washingtonmonthly.com/features/2001/0211.green.html
Hoffman, L. (2006). ‘Cyber Storm’ simulation aims to head off computer assault, February 9, 2006. Retrieved March 1, 2006, from http://shns.abc15.com/shns/story.cfm?pk=CYBERSTORM-02-09-06&cat=WW
Hundley, R. O., & Anderson, R. H. (1996). A qualitative methodology for the assessment of cyberspace-related risks. Santa Monica: Rand.
Lemos, R., Borland, J., Bowman, L., & Junnarkar, S. (2002). E terrorism-threats. Have Digital Myths Diverted Attention from True Threats?” CNET News.com. Retrieved August 26, 2002, from http://news.com.com/E-terrorism+Digital+myth+or+true+threat/2009-1001_3-954728.html?tag=nl
Lenzner, R., & Vardi, N. (2004). Cyber-nightmare. Forbes.
Retrieved September 20, 2004, from http://www.forbes.com/global/2004/0920/104_print.html
Lerner, J. S., Gonzalez, R. M., Small, D. A., & Fischhoff, B. (2003). Emotion and perceived risks of terrorism: A national field experiment. Psychological Science, 14
Lewis, J. A. (2006). The war on hype: The deadly terror lurking around the corner may not be such a big, ominous threat after all. San Francisco Chronicle,
February 19, 2006. Retrieved March 1, 2006, from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2006/02/19/INGDDH8E2V1.DTL
Nabi, R. L. (2002). Anger, fear, uncertainty, and attitudes: A test of the Cognitive-Functional Model. Communication Monographs, 69(3), 204–216.
National Commission on Terrorism. (1998). Countering the Changing Threat of International Terrorism
. Report of the National Commission on Terrorism, http://www.fas.org/irp/threat/commission.html
Rathmell, A. (1997). Cyber-terrorism: The shape of future conflict. Royal United Service Institute Journal
. October, 40–46. Retrieved March 1, 2006, from http://www.kcl.ac.uk/orgs/icsa/Old/rusi.html
Rollins, J., & Wilson, C. (2005). Terrorist capabilities for cyberattack: Overview and Policy Issues, Congressional Research Service, October 20, 2005. Retrieved February 1, 2006, from http://www.fas.org/sgp/crs/terror/RL33123.pdf
Ryter J. C. (2004). Can we trust the guy who gave us Y2K?? Jon Christian Ryter March 27, 2004 NewsWithViews.com retrieved on February 1, 2006 from http://www.newswithviews.com/Ryter/jon28.htm
Savas, A. (2006). IBM launches internal network protection. Computer weekly. Com
, Monday, 27 February 2006. Retrieved March 1, 2006, from http://www.computerweekly.com/Articles/2006/02/27/214429/IBMlaunchesinternalnetworkprotection.htm
Schwartz, J. (2003). Decoding computer intruders. The New York Times,
April 24, 2003. Retrieved March 1, 2006, from http://tech2.nytimes.com/mem/technology/techreview.html?res=9C02E3D71F3AF937A15757C0A9659C8B63
Simpson, P. (2005). Don’t fear e-terror hype Computer Weekly March 7. Retrieved February 1, 2006, from http://www.computerweekly.com/Articles/2005/04/26/209612/Don’tfeare-terrorhype.htm
Squitieri, T. (2002). Cyberspace full of terror targets , USA Today, May 5, 2002. Retrieved February 1, 2006, from http://www.usatoday.com/tech/news/2002/05/06/cyber-terror.htm
Stanton, J. J. (2002). Terror in cyberspace terrorists will exploit and widen the gap between governing structures and the public. American Behavioral Scientist, 45
Stohl, M. (1986). The superpowers and international terrorism. In M. Stohl & G. Lopez (Eds.), Government violence and repression: An agenda for research. Greenwood Press, 207–228.
Stohl, M. (1988a). Demystifying terrorism: The myths and realities of contemporary political terrorism. In M. Stohl (Ed.), The politics of terrorism (3rd ed.). New York: Marcel Decker.
Stohl, M. (2006). Knowledge claims and the study of terrorism. In S. Melnick & J. Victoroff (Eds.), Psychology and terrorism. Amsterdam, the Netherlands: Ios Press (forthcoming).
Stohl, C., & Stohl, M. (2007). Networks of terror: Theoretical assumptions and pragmatic consequences, Communication Theory. (forthcoming).
Thomas, T. L. (2003). Al Qaeda and the internet: The danger of “cyberplanning.” Parameters, 33
(1), 112–23. Retrieved February 1, 2006, from Carlisle http://www.army.mil/usawc/Parameters/03spring/thomas.pdf
Warner, B. (2003). Intelligence experts comb web for terror clues. Reuters News Service, November 12. Retrieved March 1, 2006, from http://www.chron.com/disp/story.mp1/special/iraq/2218091.html
US News and World Report. (1998). Terrorists on the web: Electronic ‘safe haven’ guerrillas use guns, bombs and home pages. 124(24), 46, June 22.
Weimann, G. (2005). Cyber terrorism: The sum of all fears? Studies in Conflict and Terrorism, 28
White, C., K., C. (1998). Cyber-terrorism: Modem mayhem
. Carlisle Barracks, Pennsylvania: U.S. Army War College. Retrieved March 1, 2006, from http://stinet.dtic.mil/dticrev/a345705.pdf