Abstract
This “brief” offers an overview of how analysis of crime and terrorism can be evaluated both in terms of research to practice (what we interpret as “translational”) and combining the two literatures relating to global and local effects. The complications that come from merging two sets of literature, drawing from security studies and criminology, may create challenges for the reader unfamiliar with one or the other. However, our take on this series is that it is supposed to introduce readers to different literature, not necessarily expound on it in detail. If one is interested in pursuing this topic further, references are included.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Anarumo, 2011 for a discussion of the views of US local law enforcement towards getting valid intelligence about terrorism threats and the challenges that they face in prevention and response.
- 2.
See footnote 16 in Treverton et al. (2006).
- 3.
Visit www.rutgerscps.org for more information regarding RTM as well as online resources and tutorials on how to use RTM on ARC GIS.
- 4.
Go to www.unglobalpulse.org to see more information about Global Pulse.
- 5.
- 6.
A botnet is a group of computers that are used to generate viruses, spam, or flood a network with multiple requests to attempt to cause it failure (PCMAG, 2013a).
- 7.
A fast-flux network is a technique used to hide a cybercriminal’s identity (IP address). This allows him/her to create a botnet that can join the network and then disappear before he/she can be traced (Whatis.com, 2013).
- 8.
To see more about staying safe online, go to http://staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud.
- 9.
Patch software is “A fix to a program. In the past, a patch used to mean changing actual executable, machine instructions, but today more often than not, it means replacing an executable module in its entirety such as an .EXE or .DLL file. A profusion of patches to an application implies that its logic was poorly designed in the first place.” (PCMAG, 2013b)
References
Appell, D. (2001). Precautionary principle: The new uncertainty principle. Scientific American 18–19.
Aronofsky, D., & Cooper, M. (2009). The war on terror and international human rights: Does Europe get it right. Denver Journal of International Law and Policy, 37(4), 567–613.
Beck, U. (1992). Risk society: Towards a new modernity. Thousand Oaks, CA: Sage.
Bednar, P. M., Katos, V., & Hennell, C. (2009). On the complexity of collaborative cyber crime investigations. Digital Evidence and Electronic Signature Law Review, 6, 214–219.
Björnehed, E. (2004). Narco-terrorism: The merger of the war on drugs and the war on terror. Global Crime, 6(3&4), 305–324.
Bouchard, M., & Wilkins, C. (2009). Illegal markets and the economics of organized crime. New York: Routledge.
Brané, M., & Lundholm, C. (2008). Human rights behind bars: Advancing the rights of immigration detainees in the United States through human rights frameworks. Immigration Law Journal, 22(2), 147–175.
Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? Rutgers Computer and Technology Law Journal, 30, 1–104.
Brenner, S. W. (2007a). Private-public sector cooperation in combating cybercrime: In search of a model. Journal of International Commercial Law and Technology, 2(2), 58–67.
Brenner, S. W. (2007b). At light speed: Attribution and response to cybercrime/terrorism/warfare. Journal of Criminal Law and Criminology, 97(2), 379–476.
Brown, G. D. (2011). Why Iran didn’t admit Stuxnet was an attack. Joint Force Quarterly, 63, 70–73. Retrieved from http://www.ndu.edu/press/lib/images/jfq-63/JFQ63_70-73_Brown.pdf.
Campbell Collaborative. (2013). Retrieved from http://www.campbellcollaboration.org/crime_and_justice/index.php
Caplan, J., & Kennedy, L. W. (2011). Risk terrain modelling manual. Newark, NJ: Rutgers Center on Public Security.
Carter, D. L., & Carter, J. G. (2009). The intelligence fusion process for state, local, and tribal law enforcement. Criminal Justice and Behavior, 36, 1323–1339.
Carter, J., & Chermak, S. (2012). Evidence-based intelligence practices: Examining the role of fusion centers as a critical source of information. In C. Lum & L. W. Kennedy (Eds.), Evidence-based counterterrorism policy (pp. 65–88). New York: Springer.
CE (Council of Europe). (2010). Information documents SG/Inf(2010)4. Salvador, Brazil. Retrieved April 14, 2013 from http://www.coe.int/t/dghl/standardsetting/t-cy/T-CY%20Bureau%20(2010)%20SG%20Inf(2010)4.pdf
Cha, V. D. (2000). Globalization and the study of international security. Journal of Peace Research, 37(3), 391–403.
CIA. (2013). The world factbook 2013–14. Washington, DC: Central Intelligence Agency. Retrieved from https://www.cia.gov/library/publications/the-world-factbook/index.html.
Cohen, D. H. (2010). Post-9/11 anti-terrorism policy regarding noncitizens and the constitutional idea of equal protection under the laws. Texas Law Review, 88(6), 1323–1343.
Cole, D. (2003). Enemy aliens: Double standards and constitutional freedoms in the war on terrorism. New York: The New Press.
CTC (Counter-Terrorism Committee). (2011). CTC Chairman biographical note, Ertuğrul Apakan. Security Council. Retrieved from https://www.un.org/en/sc/ctc/bio_apakan.html
CTC (Counter-Terrorism Committee). (2013). Our mandate. Security Council. Retrieved from https://www.un.org/en/sc/ctc/index.html
Curtis, G. E., & Karacan, T. (2002). The nexus among terrorists, narcotics traffickers, weapons proliferations, and organized crime networks in Western Europe. Washington, DC: Library of Congress.
Dandurand, Y. & V. Chin. (2004). Links between terrorism and other forms of crime. Retrieved from http://www.rand.org/pubs/issue_papers/IP245.html
Davis, L. E. (2003). Globalization’s security implications. RAND Issue Paper. Retrieved from http://www.rand.org/pubs/issue_papers/IP245.html
Davison, A. (2003). Turkey, a ‘secular’ state? The challenge of description. South Atlantic Quarterly, 102(2/3), 333–350.
Dishman, C. (2001). Terrorism, crime, and transformation. Studies in Conflict and Terrorism, 24(1), 43–58.
Doğruel, F., & Leman, J. (2009). ‘Conduct’ and ‘counterconduct’ on the southern border of Turkey: Multicultural Antakya. Middle Eastern Studies, 45(4), 596–610.
Falliere, N., Murchu, L. O., & Chien, E. (2011). W32.Stuxnet Dossier. Retrieved from http://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-Stuxnet-Update-Feb-2011.pdf
FBI (Federal Bureau of Investigation). (2008). Fact sheet: Justice Department counter-terrorism efforts since 9/11. Washington, DC: Department of Justice.
FEMA (Federal Emergency Management Agency). (2013). Incident command system. Retrieved from http://www.fema.gov/incident-command-system
Ferguson, Y. H., & Mansbach, R. W. (2004). Remapping global politics: History’s revenge and future shock. Cambridge, England: Cambridge University Press.
Flegenheimer, M. (2012). Zappos says hackers may have accessed customer account details. NY Times, January 16. Retrieved from http://bits.blogs.nytimes.com/author/matt-flegenheimer/
Fratta, A. (2010). Post-9/11 responses to mass casualty bombings in Europe: Lessons, trends and implications for the United States. Studies in Conflict and Terrorism, 33(4), 364–385.
Gawande, A. (2013, April 17). Why Boston’s hospitals were ready. The New Yorker. Retrieved from http://www.newyorker.com/online/blogs/newsdesk/2013/04/why-bostons-hospitals-were-ready.html
GCN. (2012, July 31). DOD wants cyberterrorism-prediction software. Retrieved from http://gcn.com/articles/2012/07/31/agg-dod-small-biz-software-support.aspx
Gercke, M. (2011). Understanding cybercrime: A guide for developing countries. International Telecommunication Union. Retrieved from http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITU_Guide_A5_12072011.pdf
Gerring, J. (2001). Social science methodology: A critical framework. Cambridge, England: Cambridge University Press.
Gerring, J. (2010). Social science methodology: Tasks, strategies, criteria. Cambridge, England: Cambridge University Press.
Goodman, M. D., & Brenner, S. W. (2002). Emerging consensus on criminal conduct in cyberspace. International Journal of Law and Information Technology, 10(2), 139–223.
Gottschalk, P. (2009). Value configurations in organised crime. Policing & Security, 19(1), 47–57.
Gross, J. M. (2011, April). A declaration of cyber-war. Vanity Fair. Retrieved from http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104
Haller, M. H. (1990). Illegal enterprise: A theoretical and historical interpretation. Criminology, 28(2), 207–235.
Herman, M., McDonald, J., & Mastny, V. (2006). Did intelligence matter in the Cold War? Forsvarsstudier.
Hutchinson, S., & O’Malley, P. (2007). A crime–terror nexus? Thinking on some of the links between terrorism and criminality. Studies in Conflict Terrorism, 30(12), 1095–1107.
Ikenberry, G. J. (2003). Review of the book Distant proximities: Dynamics beyond globalization by J.M. Rosenau. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/59217/g-john-ikenberry/distant-proximities-dynamics-beyond-globalization
Jenkins, W. (2007). Homeland security: Preparing for and responding to disasters. In Testimony before the Subcommitte on Homeland Security, Committee on Appropriations, House of Representatives. Washington, DC: GAO.
K2E Security. (2013). Analysis of the Siemens SCADA and Windows shortcut vulnerabilities. Retrieved from http://www.k2esec.com/vulnerabilities/what-is-really-the-concern-with-the-scada-vulnerability
Karimi, N. (2011, March 14). Report: Iran’s paramilitary launches cyber attack. Washington Post. Retrieved from http://www.washingtonpost.com/wpdyn/content/article/2011/03/14/AR2011031401029.html
Kaspersky, E. (2011, November 2). The man who found stuxnet- sergey ulasen in the spotlight. Nota Bene. Retrieved from http://eugene.kaspersky.com/2011/11/02/the-man-who-foundstuxnet-sergey-ulasen-in-the-spotlight/
Kennedy, L. W., Marteache, N., & Gaziarifoglu, Y. (2011). Understanding scalability of risk, global risk assessment: The search for a common methodology. In L. W. Kennedy & E. F. McGarrell (Eds.), Crime and terrorism risk studies in criminology and criminal justice (pp. 29–53). New York: Routledge.
LaFree, G. (2012). Generating terrorism event databases: Results from the global terrorism database, 1970 to 2008. In C. Lum & L. W. Kennedy (Eds.), Event-based counterterrorism policy (pp. 41–64). New York: Springer.
LaFree, G., Yang, S. M., & Crenshaw, M. (2009). Trajectories of terrorism. Criminology and Public Policy, 8(3), 445–473.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy, 9(3), 49–51.
Laub, J. H. (2011). What is translational criminology. NIJ Journal, 268, 16–21.
Lieberman, E. S. (2010). Bridging the qualitative-quantitative divide: Best practices in the development of historically oriented replication databases. Annual Review of Political Science, 13, 37–59.
Loder, A. & Deprez, E. E. (2013, April 19). Boston bombing victim in photo helped identify suspects. Bloomberg. Retrieved from http://www.bloomberg.com/news/2013-04-19/boston-bombing-victim-in-iconic-photo-helped-identify-attackers.html
Lovet, G. (2009). Fighting cybercrime: Technical, juridical and ethical challenges. Retrieved July 06, 2013 from http://www.fortiguard.com/files/VB2009_Fighting_Cybercrime_-_Technical,Juridical_and_Ethical_Challenges.pdf
Lum, C., & Kennedy, L. W. (2012). Evidence-based counterterrorism policy. In L. W. Kennedy & C. Lum (Eds.), Evidence-based counterterrorism policy (pp. 1–3). New York: Springer.
Lum, C., Kennedy, L. W., & Sherley, A. (2006). Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology, 2(4), 489–516.
Lustick, I. (2006). Trapped in the war on terror. Philadelphia: University of Pennsylvania Press.
Markoff, J., Sanger, D. E., & Shanker, T. (2010, January 25). In digital combat, U.S. finds no easy deterrent. New York Times. Retrieved from http://www.nytimes.com/2010/01/26/world/26cyber.html?_r=1&pagewanted=all
Marks, P. (2011, January). Why the Stuxnet worm is like nothing seen before. New Scientist. Retrieved from http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is-like-nothing-seen-before.html?full=true#.UdOiavm1HTA
Matarese, J. (2013, April 18). Security meeting held for Long Island Marathon after bombings. ABC. Retrieved from http://abclocal.go.com/ktrk/story?section=news/local/long_island&id=9066594
Merola, L. M. (2012). Evaluating the legal challenges and effects of counterterrorism policy. In C. Lum & L. W. Kennedy (Eds.), Evidence-based counterterrorism policy (pp. 281–300). New York: Springer.
Moitra, S. D. (2005). Developing policies for cybercrime: Some empirical issues. European Journal of Crime, Criminal Law and Criminal Justice, 13(3), 435–464.
Mueller, J. (2006). Overblown. New York: Free Press.
Mueller, P. & Yadegari, B. (2012). The Stuxnet Worm. Retrieved March 15, 2013 from http://www.cs.arizona.edu/~collberg/Teaching/466566/2012/Resources/presentations/2012/topic9-final/report.pdf.
National Commission on Terrorist Attacks Upon the United States. (2004). The 9/11 commission report: Final report of the National Commission on Terrorist Attacks upon the United States. Washington, DC: National Commission on Terrorist Attacks Upon the United States.
NCSA (National Cyber Security Alliance). (2013). Stay safe online. Retrieved from http://staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud
Newman, G. R., & Clarke, R. V. (2003). Superhighway robbery: Preventing e-commerce crime. New York: Routledge.
Ozkan, O. (2013). A law enforcement perspective to intelligence failure in mass casualty terrorist attacks by global jihadist movements. A comparative study of September 11, 2001 and November 15–20, 2003 attacks. Dissertation. Newark, NJ: Rutgers University.
PCMAG. (2013a). Botnet. Retrieved July 20, 2013 from http://www.pcmag.com/encyclopedia/term/38866/botnet
PCMAG. (2013c). Patch. Retrieved July 20, 2013 from http://www.pcmag.com/encyclopedia/term/48892/patch
Perri, F. S., Lichtenwald, T. G., & MacKenzie, P. M. (2009). The evil twins: The crime terror nexus. Forensic Examiner, 18(4), 16–29.
Pickert, J. & Sorenson, S. (2013, April 23). Inside reddit’s hunt for Boston bombers. Time. Retrieved from http://nation.time.com/2013/04/23/inside-reddits-hunt-for-the-boston-bombers/
Reuters. (2005, August 8). Chronology of Iran’s nuclear program. NY Times. Retrieved from http://www.nytimes.com/2005/08/08/international/08timeline-iran.html?_r=0
Rodoplu, U., Arnold, J. L., Tokyay, R., Ersoy, G., Cetiner, S., & Yücel, T. (2005a). Impact of the terrorist bombings of the Neve Shalom and Beth Israel synagogues on a hospital in Istanbul, Turkey. Academic Emergency Medicine, 12(2), 135–139.
Rodoplu, U., Arnold, J. L., Tokyay, R., Ersoy, G., Cetiner, S., & Yücel, T. (2005b). Impact of the terrorist bombings of the Hong Kong Shanghai Bank Corporation headquarters and the British Consulate on two hospitals in Istanbul, Turkey in November, 2003. Journal of Trauma-Injury Infection and Critical Care, 59(1), 195–201.
Rosenau, J. N. (2003). Distant proximities: Dynamics beyond globalization. Princeton, NJ: Princeton University Press.
Rössel, T. (2011). Post-Stuxnet industrial security issues demand new malware solutions. Manufacturing Engineering, 146(5), 30–35.
Rusnak, D. M., Kennedy, L. W., Eldivan, I. S., & Caplan, J. M. (2012). Analyzing terrorism using spatial analysis techniques: A case study of Turkish cities. In C. Lum & L. W. Kennedy (Eds.), Evidence-based counterterrorism policy (pp. 167–185). New York: Springer.
Sacco, V., & Kennedy, L. W. (2002). The criminal event: Explorations in time and space. Belmont, CA: Wadsworth.
Sacco, V., & Kennedy, L. W. (2010). The criminal event (5th ed.). Toronto, ON, Canada: Nelson.
Sanger, D. E. & Schmitt, E. (2012, July 26). Rise is seen in cyberattacks targeting U.S. infrastructure. NY Times. Retrieved from http://www.nytimes.com/2012/07/27/us/cyberattacks-are-up-national-security-chief-says.html
Schmid, I. S. (2004). Statistics of terrorism: The challenge of measuring trends, global terrorism. Forum of Crime and Society, 4(1–2), 49–69.
Scholte, J. (2005). Globalization: A critical introduction (2nd ed.). New York: Palgrave McMillan.
Senay, B. (2008). How do the youth perceive and experience Turkish citizenship. Middle Eastern Studies, 44(6), 963–976.
Shearer, J. (2011). W32. Stuxnet. Symantec. Retrieved May 27, 2013 from http://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99
Sheehan, I. S. (2012). Assessing and comparing data sources for terrorism research. In C. Lum & L. W. Kennedy (Eds.), Evidence-based counterterrorism policy (pp. 13–40). New York: Springer.
Shively, K. (2008). Taming Islam: Studying religion in secular Turkey. Anthropological Quarterly, 81(3), 683–711.
Sieber, U., & Brunst, P. W. (2007). Cyberterrorism—The use of the Internet for terrorist purposes. Washington, DC: Congressional Research Service, Library of Congress.
START. (2011). Background report: 9/11, Ten years later. College Park, MD: University of Maryland.
Stouffer, K., Falco, J., & Scarfone, K. (2011). Guide to industrial control systems (ICS) security. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf.
Sullivan, E., Barr, B., & Zezima, K. (2013, April 19). Tamerlan Tsarnaev dead: Boston marathon bombing suspect one dies in shootout (live updates). Huffington Post. Retrieved from http://www.huffingtonpost.com/2013/04/19/tamerlan-tsarnaev-dead-boston-bombing-suspect-dies_n_3116056.html
Surowiecki, J. (2013, April 24). The wise way to crowdsource a manhunt. The New Yorker. Retrieved from http://www.newyorker.com/online/blogs/comment/2013/04/reddit-tsarnaev-marathon-bombers-wisdom-of-crowds.html?currentPage=all
Terdiman, D. (2012, April 13). Report: Stuxnet delivered to Iranian nuclear plant on thumb drive. CBS News. Retrieved from http://www.cbsnews.com/8301-501465_162-57413557-501465/report-stuxnet-delivered-to-iranian-nuclear-plant-on-thumb-drive/
TRAC (Transactional Records Access Clearinghouse). (2010). Detention of criminal aliens: What has congress bought. Syracuse, NY: Syracuse University. Retrieved from http://trac.syr.edu/immigration/reports/224/index.html.
Treverton, G. F., Jones, S. G., Boraz, S., & Lipscy, P. (2006). Toward a theory of intelligence. Santa Monica, CA: Rand.
UN News Centre. (2011, March 16). Growing links between crime and terrorism the focus of UN Forum. Retrieved from http://www.un.org/apps/news/story.asp?NewsID=37780&Cr=terrorism&Cr1,%20Date%20of%20last%20access:%20July%2024,%202012
UNDP (United Nations Development Programme). (2013, February 17). Afghan national police cadets return home from training in Turkey. UNDP Afghanistan. Retrieved from http://www.undp.org.af/undp/index.php?option=com_content&view=article&id=239%3Aafghan-national-police-cadets-return-home-from-training-in-turkey&catid=30%3Awhat-we-do&Itemid=28
United Nations. (2013). Global pulse. Retrieved from www.unglobalpulse.org
United Nations General Assembly, 60th session. (2006, September 20). Resolution 288. The United Nations global counter-terrorism strategy. (A/RES/60/288). Official record. New York.
UNODC (United Nations Office on Drug and Crime). (2011). Open-ended intergovernmental expert group to conduct a comprehensive study of the problem of cybercrime. Retrieved from http://www.unodc.org/unodc/en/expert-group-to-conduct-study-cybercrime-jan-2011.html
UNSC (United Nations Security Council). (2001). Resolution 1373. S/RES/1373. Retrieved May 12, 2013 from http://www.un.org/en/sc/ctc/specialmeetings/2012/docs/United%20Nations%20Security%20Council%20Resolution%201373%20(2001).pdf
USGAO (United States General Accounting Office). (2004, March). Critical infrastructure protection: Challenges and efforts to secure control systems. Report to Congressional Requesters. Retrieved from http://www.gao.gov/new.items/d04354.pdf
Van Brunschot, E. G., & Kennedy, L. W. (2008). Risk balance and security. Thousand Oaks, CA: Sage.
Van Brunschot, E. G., & Kennedy, L. W. (2011). The risk of crime, a framework. In L. W. Kennedy & E. F. McGarrell (Eds.), Crime and terrorism risk studies in criminology and criminal justice (pp. 7–16). New York: Routledge.
Verdelho, P. (2008). The effectiveness of international co-operation against cybercrime: Examples of good practice. Project on Cybercrime of the Council of Europe. Council of Europe. Retrieved May 14, 2013 from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/t-cy/DOC-567study4-Version7_en.PDF
Voloder, L. (2012). Secular citizenship and muslim belonging in Turkey. Ethnic and Racial Studies., 36(5), 838–856.
WCVB. (2013, April 18). ‘Lord & Taylor’ video leads to identification of Boston marathon bombing suspect.. Retrieved May 25, 2013 from http://www.wcvb.com/news/local/metro/-Lord-Taylor-video-leads-to-identification-of-Boston-Marathon-bombing-suspect/-/11971628/19778450/-/idadl6/-/index.html
Whatis.com. (2013). Fast-flux DNS. Retrieved June 29, 2013 from http://whatis.techtarget.com/definition/fast-flux-DNS
White, J. B. (2002). Islamist mobilization in turkey: A study in vernacular politics. Seattle, WA: University of Washington Press.
WHO (World Health Organization). (2009). Pandemic influenza preparedness and response. Retrieved from http://www.who.int/csr/disease/influenza/PIPGuidance09.pdf
Wilson, C. (2005). Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress. Washington, DC: Library of Congress. Retrieved from http://www.history.navy.mil/library/online/computerattack.htm.
Wilson, C. (2008). Cyberterrorism: Vulnerabilities and policy issues for congress. Washington, DC: Library of Congress. Retrieved from http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA477642.
Wortley, R. & Smallbone, S. (2006). Child pornography on the Internet. Center for Problem Oriented Policing. Retrieved from http://www.popcenter.org/problems/child_pornography/print/
Yavuz, U. G. & Yildirim, N. (n.d.) International Police Cooperation on Counter-Terrorism (CT) in Turkey. Retrieved May 25, 2013 (http://www.un.org/en/terrorism/ctitf/pdfs/central_asia_turkey.pdf).
Zgoba, K., Witt, P., Dalessandro, M., & Veysey, B. (2008). Megan’s law: Assessing the practical and monetary efficacy. Trenton, NJ: The Research and Evaluation Unit Office of Policy Planning New Jersey Department of Corrections.
Zhu, B., Joseph, A., & Sastry, S. (2011, October). Taxonomy of cyber attacks on SCADA Systems. Proceedings of the 2011 IEEE International Conference on Cyber, Physical, and Social Computing (CPSCom 2011). Dalian, China.
Anarumo, M. (2011). Threats, vulnerability, and exposure to terrorism: The practitioner’s view of terrorism threat. In L. W. Kennedy & E. F. McGarrell (Eds.), Crime and terrorism risk (pp. 54–79). New York: Routledge.
Boone, W. (2013). Risk management. In R. Radvanovsky & J. Brodsky (Eds.), Handbook of SCADA/control systems security (pp. 41–83). Boca Raton, FL: CRC Press.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 The Author
About this chapter
Cite this chapter
Kennedy, L.W., Irvin-Erickson, Y., Kennedy, A.R. (2014). Translational Criminology and Counterterrorism: Global Threats and Local Responses. In: Translational Criminology and Counterterrorism. SpringerBriefs in Criminology(). Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5556-1_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5556-1_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5555-4
Online ISBN: 978-1-4614-5556-1
eBook Packages: Humanities, Social Sciences and LawSocial Sciences (R0)