Bakri, N.A.M., et al.: Pestle analysis on cloud computing
Google Scholar
Caldwell, T.: Hacktivism goes hardcore. Netw. Secur. 5, 12–17 (2015)
CrossRef
Google Scholar
Casey, T.: Threat agent library helps identify information security risks. Intel White Paper (2007)
Google Scholar
Commission, E.: Towards a general policy on the fight against cyber crime. Technical report, COM (2007) 267 final (2007). http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2007:0267:FIN:EN:PDF
Dale, C.: The uk tour-operating industry: a competitive analysis. J. Vacation Mark. 6(4), 357–367 (2000)
CrossRef
Google Scholar
Dingledine, R., Mathewson, N., Syverson, P.: Deploying low-latency anonymity: design challenges and social factors. IEEE Secur. Privacy 5(5), 83–87 (2007). https://doi.org/10.1109/MSP.2007.108
CrossRef
Google Scholar
Gómez-Romero, J., Ruiz, M.D., Martín-Bautista, M.J.: Open data analysis for environmental scanning in security-oriented strategic analysis. In: 2016 19th International Conference on Information Fusion (FUSION), pp. 91–97. IEEE (2016)
Google Scholar
Gordon, L.A., Loeb, M.P., Sohail, T.: A framework for using insurance for cyber-risk management. Commun. ACM 46(3), 81–85 (2003)
CrossRef
Google Scholar
Klein, A.G.: Vigilante media: unveiling anonymous and the hacktivist persona in the global press. Commun. Monogr. 82(3), 379–401 (2015)
CrossRef
Google Scholar
Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cyber crime on the financial sector. Comput. Secur. 45, 58–74 (2014)
CrossRef
Google Scholar
Nurmi, J., Niemelä, M.S.: Tor de-anonymisation techniques. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 657–671. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64701-2_52
CrossRef
Google Scholar
Published by BBC: Anonymous hackers ‘cost PayPal 3.5m’ (2012). http://www.bbc.com/news/uk-20449474
Published by Der Spiegel: State Department Secrets Revealed, How America Views the World (2010). http://www.spiegel.de/international/world/state-department-secrets-revealed-how-america-views-the-world-a-732819.html
Published by Der Spiegel: Visa, MasterCard Move To Choke WikiLeaks (2010). https://www.forbes.com/sites/andygreenberg/2010/12/07/visa-mastercard-move-to-choke-wikileaks/
Published by The Guardian: Cyber cold war is just getting started, claims Hillary Clinton (2017). https://www.theguardian.com/us-news/2017/oct/16/cyber-cold-war-is-just-getting-started-claims-hillary-clinton
Richardson Jr., J.V.: The library and information economy in turkmenistan. IFLA J. 32(2), 131–139 (2006)
CrossRef
Google Scholar
Sheehan, N.T.: A risk-based approach to strategy execution. J. Bus. Strategy 31(5), 25–37 (2010)
CrossRef
Google Scholar
Solomon, R.: Electronic protests: hacktivism as a form of protest in uganda. Comput. Law Secur. Rev. 33(5), 718–728 (2017)
CrossRef
Google Scholar
Taylor, R.W., Fritsch, E.J., Liederbach, J.: Digital Crime and Digital Terrorism. Prentice Hall Press, New Jersey (2014)
Google Scholar
The Tor Project Foundation. https://www.torproject.org/
UN: United Nations Office on Drugs and Crime the SOCTA Handbook Guidance on the preparation and use of serious and organized crime threat. United Nations Office on Drugs and Crime (2010)
Google Scholar
Wall, D.: Crime and the Internet. Routledge, London (2003)
CrossRef
Google Scholar
Yar, M.: Cybercrime and Society. Sage, London (2013)
Google Scholar
Yüksel, İ.: Developing a multi-criteria decision making model for pestel analysis. Int. J. Bus. Manag. 7(24), 52 (2012)
CrossRef
Google Scholar