參考文獻
一、中文部分
(一)官方文件
中華民國行政院,2010。《2010 資通安全政策白皮書》(台北:行政院科技顧問組》。
(二)專書
中國現代國際關系研究所反恐怖研究中心,2002。《世界主要國家和地區反恐怖政
策與錯事》。北京:時事出版社。
王崑義,1997。《恐怖與危機-美利衝突的戰略分析》。臺北:漢斯出版社。
王逸舟,1999。《全球化時代的國際安全》。上海:人民出版社。
王逸舟,2002。《恐怖主義溯源》。北京:社會科學文獻出版。
石之瑜,2002。《恐怖主義溯源》。北京:社會科學文獻出版社。
吳東野,2003。《九一一與國際反恐》。台北:財團法人兩岸交流基金會。
李宗勳,2008。《網路社會與安全治理》。台北:元照出版有限公司。
李偉,2006。《國際恐怖主義鬥爭年鑑》。北京:時事出版社。
李偉主編,2005。《國際恐怖主義與反恐鬥爭年鑑》。北京:時事出版社。
李慎明、王逸舟,2009。《2010年全球政治與安全報告》。北京:社會科學文獻出版社。
李慧智,2003。《反恐學》。北京:人民出版社。
汪毓瑋編著,2007。《國際重要恐怖活動與各國反制作為大事紀》。台北:幼獅文
化。
周效坤、楊世松主編,2006。《信息反恐論》。北京:軍事科學出版社。
易君博,2003。《政治理論與研究方法》。台北:三民書局。
林碧炤,2003。《國際政治與外交政策》。臺北:五南圖書出版社。
俞正樑等著,2009。《全球化時代的國際關係》。上海:復旦大學出版社。
胡聯合,2001。《當代世界恐怖主義與對策》。北京:東方出版社。
范明強,2005。《社會學視野中的恐怖主義》。北京:解放軍出版社。
倪世雄。2008。《當代國際關係理論》。台北:五南書局。
翁明賢,2002。《全球化時代的國家安全》。臺北:創世文化事業出版社。
張亞中主編,2007。《國際關係總論》。台北:揚智文化事業股份有限公司。
張家棟。2007年。《恐怖主義論》。北京:時事出版社。
曹雄源。2009年。《戰略解碼:美國國家安全戰略的佈局》。臺北:五南圖書公司。
眾鵬,2004。《大國安全觀比較》。北京:時事出版社。
陸忠偉,2003。《非傳統安全論》。北京:時事出版社。
黃秋龍,2009。《非傳統安全論與政策應用》。台北:結構群文化事業有限公司。
黃秋龍,2010。《兩岸總體安全下的非傳統威脅》。台北:法務部調查局展望與探索雜誌社。
楊伯淑、安東尼‧麥克格魯,2004。《全球化與反全球化》。北京:社會科學文獻出版社。
楊洁勉,2003。《國際合作反恐》。北京:時事出版社。
蔡萬助,2008。《2008年解放軍研究論壇彙編》。國防大學出版。
蘇進強,2002。《911事件後全球戰略評估》。臺北:台灣英文新聞股份有限公司。楊洁勉,2003。《國際合作反恐──超級地緣政治的思考》。北京:時報出版社。
(三)專書譯著
Akbar S. Ahmed著,蔡百詮譯。2003年。《今日的伊斯蘭:穆斯林世界導論》(Islam
Today: A Short Introduction to the Muslim World)。台北:商周出版。
Chava Frankfort-Nachmias著,潘明宏、陳志瑋譯,2003。《社會科學研究方法》
(Research Methods in the Social Sciences)。臺北:韋伯文化國際。
Harry Henderson著,李聯榮、戴艷麗譯,2003。《全球恐怖主義》(Global
Terrorism)。北京:中國社會科學出版社。
Ian O. Lesser著,程克雄譯,2001。《反新恐怖主義》(Countering The New
Terrorism)。北京:新華出版社。
Robert Kagan著,楊紫涵譯,2002。《當前威脅:美國外交與國防政策的危機與
契機》(Present Danger: Crisis and Opportunity in American Foreign and
Defense Policy)。臺北:國防部史政編譯室。
James Smith和 M.、William C. Thomas著,謝豐安、吳福生譯,2002。《恐怖主義
威脅與美國政府的回應》(The Terrorism Threat and U.S. Government Response: Operational and Organizational Factors)。臺北:國防部史政編譯室。
U.S. White House出版,國防部史政編譯室譯,2003。《確保安全網路空間的國家
戰略》(The National Strategy to Secure Cyberspace)。台北:國防部史政編譯
室。
(四)期刊譯著
Richard Weitz著,高一中譯,2010/6。〈網路作戰威脅日增〉(Firewall: The Growing
Threat of Cyber Warfare),《國防譯粹》,第37卷5期,頁35。
(五)期刊論文
王崑義,2010。〈非傳統安全與台灣軍事戰略的變革〉,《台灣國際研究季刊》,
第6卷第2期,頁4-15。
巨克毅,2004年。〈國際恐怖主義蓋達組織的意識形態與策略之分析〉。《全球政治評論》,第3期,頁1-17。
李宗勳,2004。〈從全球化觀點看政府公共安全治理模式〉,《中國行政評論》,第13卷第3期,頁75-118。
李宗勳,2004。〈反恐危機管理之新視野與跨域機制〉,《井學叢刊》,第35卷
第2期,頁17-48。
汪舒明,2008年。〈“基地”組織的復興與重構〉。《國際問題研究》,第2期,頁
65-69。
張中勇,2009年。〈孟買恐怖襲擊事件及其影響之後續觀察—─印巴之危機處理
對策〉。《戰略安全研析》,第45期,頁24-27。
黃秋龍,2010。〈非戰爭性軍事行動對制度創新之啟發〉,《國防雜誌》,第25
卷第2期,頁23-47。
(六)學位論文
郭懷舜,2007。《「威爾斯學派」之批判安全研究》。臺北:國立中山大學政治學
研究所碩士論文。
游寶珠,2001。《恐怖主義與國際法》。臺北:國立臺灣海洋大學海洋法律研究所
碩士論文。
蔡育岱,2008。《人類安全:安全研究之新議程》。台北:國立政治大學外交系
博士論文。
(七)研討會論文
徐正祥,2004年。〈中東恐怖組織之源起與發展〉,「第二屆恐怖主義與國家安全
學術研討暨實務」座談會。桃園:中央警察大學恐怖主義研究中心主辦。
傅仁坤、張益銘,2008年。〈中亞區域安全與上海合作組織的發展—─兼論四股
恐怖勢力〉。「第四屆恐怖主義與國家安全學術研討暨實務」座談會。桃園:
中央警察大學恐怖主義研究中心主辦。
童振源,2003/11/3-4。〈反恐戰爭下的全球經貿格局發展〉,「第三屆兩岸遠景論壇
全球化趨勢下的反恐與兩岸關係」研討會。台北:財團法人兩岸交流遠景基
金會等。
潘光,2003/11/3-4。〈全球反恐形勢與中國的反恐國際合作〉,「第三屆兩岸遠景論
壇 全球化趨勢下的反恐與兩岸關係」研討會。台北:財團法人兩岸交流遠
景基金會等。
潘光,2009年。〈國際反恐合作面臨的新挑戰及其績效評估〉。「第五屆恐怖主義
與國家安全學術研討暨實務」座談會。桃園:中央警察大學恐怖主義研究中
心主辦。
(八)網際網路
王金雪,〈美國將與英國和加拿大合作舉行反恐演習〉,《人民網》,2005/3/18,
http://world.people.com.cn/BIG5/1029/3253675.html (瀏覽日期:2010/12/8) 。 ,
幻冽,〈民國一百年!台灣版千禧蟲危機〉,《電腦不難》,2009/5/17,
http://pcnoproblem.twbbs.org/y2k/ (瀏覽日期:2010/2/5)。
〈中國茉莉花革命〉,《維基百科》, http://zh.wikipedia.org/zh-hant/%E4%B8%AD%E5%9C%8B%E8%8C%89%E8%8E%89%E8%8A%B1%E9%9D%A9%E5%91%BD (瀏覽日期:2010/5/7)。
〈2011多莫傑多沃國際機場炸彈襲擊事件〉,《維基百科》,
http://zh.wikipedia.org/zh-hk/2011%E5%B9%B4%E5%A4%9A%E8%8E%AB%E5%82%91%E5%A4%9A%E6%B2%83%E5%9C%8B%E9%9A%9B%E6%A9%9F%E5%A0%B4%E7%82%B8%E5%BD%88%E8%A5%B2%E6%93%8A (瀏覽日期:2011/4/2)。
Mercury,〈中共軍方網路駭客攻擊資訊匯整〉,《尖端科技軍武論壇》,2009/1/1,
http://www.dtmonline.com/forum/cgi-bin/topic.cgi?forum=2&topic=598&show=0&start=60&man=&max=yes (瀏覽日期:2010/12/1)。
二、英文部分
(一)官方文件
EastWest Institute. 2010. Russia, the United States, and Cyber Diplomacy: Opening
Door. New York: EastWest Institute.
Internet Crime Complaint Center. 2010. 2009 Internet Crime Report.
Washington, D. C.: Internet Crime Complaint Center.
National Counterterrorism Center. 2010. Counterterrorism Calendar 2010. Washington
D. C.: National Counterterrorism Center.
U.S. Department of Defense. 2010. Quadrennial Defense Review Report.
Washington D. C.: U.S. Department of Defense.
U.S. Department of States. 2005. Country Reports on Terrorism,Chapter 6:
Terrorist Group. Washington D. C.: U.S. Department of States.
U.S. Department of States. 2009. Country Reports on Terrorism. Washington: D. C.:
U.S. Department of States.
U.S. Office of Homeland Security. 2002. National Strategy for Homeland Security.
United States: U.S. Office of Homeland Security.
U.S. Office of Homeland Security, 2009. National Infrastructure Protection Plan, United
States: U.S. Office of Homeland Security.
(二)專書
Issac, Alan C.. 1987. An Introduction to Politics. Chicago: Scott Foresman &
Company.
Baylis, John and Steve Smith. 2005. The Globalization of World Politics: An Introduction to International Relations. New York: Oxford University Press.
Buckley, Mary and Rick Fawn. 2003. Global Responses to Terrorism: 9/11, the War in Afghanistan and Beyond. New York: Routledge.
Congressional Research Service. 2004. CRS Report for Congress: Cybercrime:
The Council of Europe Convention. Washington, D. C.: CRS.
Congressional Research Service. 2008. CRS Report for Congress: Bonets,
Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Washington, D. C.: CRS.
Coady , C. A. J and Igor Primoratz, 2004,. Terrorism: The Philosophical Issues. New York: Palgrave Macmillan.
Whittaker, David J.. 2001. The Terrorism Reader. London: Routledge.
Gareau, Frederick H.. 2004. State Terrorism and the United States: From Counterinsurgency to the War on Terrorism. GA: Clarity Press, Inc..
Gus, Martin. 2006. Understanding Terrorism: Challenges, Perspectives, and Issues, London: Sage Publications. Inc..
Hamilton, Daniel S.. 2006. Terrorism and International Relations. Lisbon: Calouste Gulbenkian Foundation.
Jordan, Robert S.. 2001. International Organizations: A Comparative Approach to the Management of Cooperation. Westport Connecticut: Praeger.
Katona, Peter, Michael D. Intriligator., and John P. Sullivan. 2006. Countering Terrorism and WMD: Creating a Global Counter-terrorism Networ. New York: Routledge.
Kegley Jr., Charles W. and Eugene R. Withhkopf. 2004. World Politics: Trends & Transformation. California: Thomson Wadsworth.
Pamala L., Griset and Sue Mahan. 2003. Terrorism in Perspective. California: Thousands Oaks.
Saul, Ben. 2006. Defining Terrorism in International Law. New York: Oxford University Press.
Simonsen, Clifford E. and Jeremy R. Spindlove . 2007. Terrorism Today: The Past, The Players, The Future. New Jersey: Pearson Prentice Hall.
Sloan, Stephen. 2006. Terrorism: The Present Threat in Context. New York: Berg.
The Creative Studio at Deloitte. 2010. 2010 Financial Services Global Security Study.
London: The Creative Studio at Deloitte.
(三)專書論文
Amant, Kirk St.. 2008. “International Outsourcing, Personal Data, and Cyber
Terrorism: Approaches for Oversight.” in Ann Shaver and Heidi Hormel, eds..
Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 112-119.
Ariely, Gil. 2008. “Knowledge Management, Terrorism, and Cyber Terrorism.” in
Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 7-16.
Arnes, Andre, 2008, “Large-Scale Monitoring of Critical Digital Infrastructures.” in
Ann Shaver and Heidi Hormel, eds., Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 273-280.
Brunst, Phillip W.. 2008. “Use of Internet by Terrorists.” in Centre of Excellence
Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber Terrorism
(Amsterdam: ISO Press). pp. 34-60.
Chochliouros, Ioannis P., Stergious P. Chochliouros, Anastasia S. Spiliopoulou, and
Evita Lampadari. 2008. “Public Key Infrastructures as a Means for Increasing
Network Security.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 281-290.
Cridland, Clare. 2008. “The History of the Internet: The Interwoven Domain of
Enabling Technologies and Cultural Interaction.” in Centre of Excellence
Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 1-7.
Curran, Kevin, Peter Breslin, Kevin McLaughlin, and Gary Tracey. 2008. “Hacking
and Eavesdropping.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and
Cyber Terrorism (Hershey: Information Science Reference). pp.
307-317.
Curran, Kevin, Kevin Concannon, and Sean McKeever. 2008. “Cyber Terrorism
Attacks.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 1-6.
Disterer, Georg, Ame Alles, and Axel Hervatin. 2008. “Denial-of-Service (DOS)
Attacks: Prevention, Instrusion Detection, and Mitigation.” in Ann Shaver and
Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 262-272.
Everard, Lt. Paul. 2008. “NATO and Cyber Terrorism.” in Centre of
Excellence Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber
Terrorism (Amsterdam: ISO Press). pp. 118-127.
Fagnot, Isabelle J.. 2008. “Behavioral Information Security.” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science
Reference. pp. 199-205.
Gandal, Neil. 2008. “An Introduction to Key Themes in the Economics of Cyber
Security.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 78-82.
Goodman, Seymour E.. 2008. “Critical Information Infrastructure Protection,” in
Centre of Excellence Defence Against Terrorism, Ankara, Turkey, eds..
Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 24-33.
Gupta, Manish and H.R. Rao. 2008. “Role of FS-ISAC in Countering Cyber
Terrorism,” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 83-90.
Jennex, E. Murray. 2008. “Cyber War Defense: Systems Development with Integrated
Security” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 241-253.
Jennex, Murray E.. 2008. “A Model for Emergency Response Systems,” in Ann
Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey:
Information Science Reference). pp. 383-391.
Kiltz, Stefan, Andreas Lang, and Jana Dittmann. 2008. “Malware: Specialized Trojan
Horse.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 154-160.
Knapp, Kenneth J. and William R. Boulton. 2008. “Ten Information Warfare Trends,”
in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 17-25.
Knop, Dr. Katharina von. 2008. “Institutionalization of a Wed-focused, Multinational
Counter-terrorism Campaign-Building a Collective Open Source Intelligent
System, A Discussion Paper.” in Centre of Excellence Defence Against
Terrorism, Ankara, Turkey, eds.. Responses to Cyber Terrorism (Amsterdam ISO
Press, pp. 8-23.
Leipnik, Mark R.. 2008. “Use of Geographic Information Systems in Cyber Warfare
and Cyber Counterterrorism.” in Ann Shaver and Heidi Hormel, eds.. Cyber
Warfare and Cyber Terrorism (Hershey: Information Science
Reference). pp. 291-297.
Liberati, Deiego. 2008. “Identification Through Data Mining,” in Ann Shaver and
Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 374-380.
Mishra, Alok and Deepti Mishra. 2008. “Cyber Stalking: A Challenge for Web
Security,” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber
Terrorism (Hershey: Information Science Reference). pp. 216-225.
Nugent, John H. and Mahesh Raisinghni. 2008. “Bits and Bytes vs. Bullets and
Bombs: A New Form of Warfare.” in Ann Shaver and Heidi Hormel, eds.. Cyber
Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 26-34.
Owen, Robert S.. 2008. “Infratructures of Cyber Warfare.” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 35-41.
Ozeren, Superintendent Suleyman. 2008. “Cyberterrorism and International
Cooperation: General Overview of the Available Mechanisms to Facilitate an
Overwhelming Task.” in Centre of Excellence Defence Against Terrorism,
Ankara, Turkey, eds.. Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 70-88.
Politis, Dionysios V. and Konstantions P. Theodoridis. 2008. “Spam, Spim, and
Illegal Advertisement.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare
and Cyber Terrorism (Hershey: Information Science Reference). pp. 146-153.
Robotis, Konstantions and Theodoros Tzouramanis. 2008. “Electronic Money
Management in Modern Online Businesses.” in Ann Shaver and Heidi Hormel,
eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 129-137.
Rowe, Neil C.. 2008. “Deception in Defense of Computer Systems from Cyber
Attacks.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 97-104.
Rowe, Neil C.. 2008. “Ethics of Cyber War Attacks.” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 105-111.
Rowe, Neil C. and Custy E. John. 2008. “Deception in Cyber Attacks.” in Ann Shaver
and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 91-96.
Saleh, Kassem, Imran Zualkernan, and Ibrahim AI Kattan. 2008. “A Roadmap for
Delivering Trustworthy IT Processes.” in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 57-75.
Schneidewind, Norman F.. 2008. “Cyber Security Models,” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp.228-240.
Shahar, Yael. 2008. “The Internet as a Tool for Intelligence and Counter-Terrorism.” in
Centre of Excellence Defence Against Terrorism, Ankara, Turkey, eds.. Responses
to Cyber Terrorism (Amsterdam: ISO Press). pp. 104-118.
Thion, Romuald. 2008. “Network-Based Passive Information Gathering,” in Ann
Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey:
Information Science Reference). pp. 120-128.
Tikk, Ms Eneken and Ms Reet OORN. 2008. “Legal and Policy Evaluation:
International Coordination of Prosecution and Prevention of Cyber Terrorism,”
in Centre of Excellence Defence Against Terrorism, Ankara, Turkey, eds..
Responses to Cyber Terrorism (Amsterdam: ISO Press). pp. 89-103.
Tzouramanis, Theodoros. 2008. “SOL Code Poisoning: The Most Prevalent
Technique for Attacking Web Powered Databases,” in Ann Shaver and Heidi
Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 161-170.
Warren, M. J.. 2008. “Terrorism and the Internet,” in Ann Shaver and Heidi Hormel,
eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 42-49.
Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. 2008. “Steganography,”
in Ann Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 50-56.
Weimann, Gabriel. 2008. “The Reliance of Al-Qaeda on the Internet.” in Centre of
Excellence Defence Against Terrorism, Ankara, Turkey, eds.. Responses to Cyber
Terrorism (Amsterdam: ISO Press). pp. 61-69.
Woda, Krzysztof. 2008. “The Analysis of Money Laundering Techniques.” in Ann
Shaver and Heidi Hormel, eds.. Cyber Warfare and Cyber Terrorism (Hershey: Information Science Reference). pp. 138-145.
(四)期刊論文
Adams, M.. 2006. “Hybridizing Habitus and Reflexivity: Towards an Understanding of Contemporary Identity?.” Sociology. 40(3): 115-143.
Adamson, Flona B.. 2007. “Remapping the Boundaries of ‘State’ and ‘National Identity’: Incorporating Diasporas into IR Theorizing.” European Journal of International Relations. 13(4): 489-526.
Andrew Peterson. 2008. “Addressing Tomorrow’s Terrorists.” Journal of National
Security Law & Policy. 2: 297-354.
Busumtwi-Sam, James. 2002. “Development and Human Security.” International Journal. 57(2): 253-272.
Byman, Daniel L.. 2006/9-11. “Friends Like These: Counterinsurgency and the War on Terrorism,” International Security. 31(2): 79-115.
Davis, Elizabeth Van Wie. 2008/4/14. “Terrorism and the Beijing Olympics: Uyghur Discontent,” China Brief. 8: 1-6.
Donnelly, J.. 2006. “Sovereign Inequalities and Hierarchy in Anarchy: American Power and International Society.” European Journal of International Relations. 12(2): 124-139.
Granville, Johann. 2003. “Tracking Computer Hacking: The Dangers of Cyber Terrorism.” Global Society. 17(1): 89-97.
Ivanon, Viktor. 2010/2/12. “Moscow’s Terror Fighter.” Newsweek. 1(15): 56-59.
Manutscharjan, Aschot. 2009. “Russia’s National Security Strategy Until 2020.” Konrad-Adenauer-Stiftung E.V.. 62: 159-162.
McNeal, S. Gregory. 2007-2008. “Cyber Embargo: Countering the Internet Jihad.” Journal of International Law. 39: 789-827.
Piggin, Richard. 2010/11-12. “The Reality of Cyber Terrorism.” Engineering & Technology. 5(17): 36-38.
Post, Jerrold M., Kevin G. Ruby, and Eric D. Shaw. 2000. “From Car Bombs to Logic Bombs:
The Growing Threat From Information Terrorism.” Terrorism and Political Violence.
12(2): 97-112.
Prichard, Janet J. and E. Laurie Macdonald. 2004. “Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks.” Journal of Information Technology Education. 3: 280-289.
Schmid, Alex P.. 2004. “Frameworks for Conceptualizing Terrorism.” Terrorism and Political Violence. 16(2): 197-221.
Shah, Nishant. 2007. “Subject to Technology: Internet Pornography, Cyber-Terrorism and the Indian State.” Inter-Asia Cultural Studies. 8: 349-365.
(五)研討會論文
Wilshusen, Gregory C. and David A. Powner, 2009. “Continued Efforts Are Needed to
Protect Information Systems from Evolving Threats,” statement for the record to
the subcommittee on Terrorism and Homeland Security Committee on the
Judiciary, (Washington, D. C.: U.S. Government Accountability Office), pp.
1-20.
(六)網際網路
Ashford, Warwick. 2011/3/4. “South Korean Websites Come Under Cyber Attack.”
ComputerWeekly.com. At
http://www.computerweekly.com/Articles/2011/03/04/245708/South-Korean-websi
tes-come-under-cyber-attack.htm (accessed 2011/3/6).
Bachfeld, Daniel. 2003. “War der Wurm drin?,” IT-Sicherheit in der
US-Stromverssorgung. At http://www.heise.de/artikel-archiv/ct/2003/18/034
(accessed 2011/4/12).
Craucamp, Andrew. 2011/2/8. “Online Security Firm Feel the Wrath of Anonymous.” Memeburn. At http://memeburn.com/2011/02/online-security-firm-feels-the-wrath-of-anonymous/(accessed 2011/2/9).
Daniel, Jeremy. 2011/3/17. “Hacker Group Anonymous Declares War on ‘Global Banking Cartel’.” At
http://memeburn.com/2011/03/hacker-group-anonymous-declares-war-on-global-banking-cartel/ (accessed 2011/3/19).
FBI. “Cyber Crime,” The FBI (Federal Bureau of Investigation). At
http://www.fbi.gov/wanted/cyber (accessed 2011/4/1).
FBI. “Ten Most Wanted,” The FBI (Federal Bureau of Investigation). At http://www.fbi.gov/wanted/topten (access 2011/5/5).
Keinon, Herb. 2011/4/11. “Security Cabinet Gives IDF Go-Head for Military Action.” The Jerusalem Post. At http://www.jpost.com/Defense/Article.aspx?id=216032
(accessed 2011/4/14).
Keteyian, Armen. 2010/12/20. “Latest Terror Threat in U.S. Armed to Poison Food.” CBS News. At http://www.cbsnews.com/stories/2010/12/20/eveningnews/main7169266.shtml
(accessed 2010/2/28).
Kitsantonis, Niki. 2010/12/30. “Bomb Blast Damages Athens Court Buildings.” The
New York Times. At
http://www.nytimes.com/2010/12/31/world/europe/31greece.html (accessed
2011/5/4).
Krebs, Brian. 2003/2/14. “A Short History of Computer Virus and Attacks.” The Washington Post. At http://www.washingtonpost.com/ac2/wp-dyn/A50636-2002Jun26
(accessed 2011/2/17).
Lambrecht, Bill. 2010/7/24. “Boeing in Ongoing Cyber Terrorism Fight.” Australian IT.
At
http://www.theaustralian.com.au/australian-it/the-hub/boeing-among-defence-firms-fighting-cyber-terrorism/story-fn4mm2dt-1225883695304 (accessed 2011/5/11).
Leyden, John. 2001/1/22. “Mass Hack Takes Out Govt. Sites.” The Register. At
http://www.theregister.co.uk/2001/01/22/mass_hack_takes_out_govt/
(accessed 2010/11/20).
Linder, Douglas. 2006. “The Oklahoma Bombing Conspirators.” At
http://law2.umkc.edu/faculty/projects/ftrials/mcveigh/conspirators.html
(accessed 2011/1/13).
Mccarthy, Kieren. 2007/3/8. “Factsheet: DNS attack.” ICNN Blog. At
http://blog.icann.org/2007/03/factsheet-dns-attack/ (assessed 2011/2/8).
McCann, Steve. 2011/3/2. “The Terrorist who Burrowed in.” American Thinker. At http://www.americanthinker.com/blog/2011/03/the_terrorist_who_burrowed_in.html (accessed 2011/5/4).
Milan, Mark. 2011/5/1 “Sony apologizes for PlayStation Breach, offers compensation,” CNN. At http://edition.cnn.com/2011/TECH/gaming.gadgets/05/01/playstation.online/index.html?iref=allsearch (accessed 2011/5/15).
Milan, Mark. 2011/5/3. “Sony: PC game network was also hacked.” CNN. At
http://edition.cnn.com/2011/TECH/gaming.gadgets/05/02/sony.hack/index.html?iref=allsearch (accessed 2011/5/4).
Musharbash, Y.. 2004/6/17. “US-Firmen-Website für Qaida-Botschaft gehackt,” Spiegel Online. At
http://www.spiegel.de/politik/ausland/0,1518,304473,00.html (accessed 2011/2/2).
Neill, James. “Qualitative versus Quantitative Research: Key Points in a Classic Debate.” at http://wilderdom.com/research/QualitativeVersusQuantitativeResearch.html
(accessed 2010/10/30).
Palatino, Mong. 2011/4/13. “Malaysia: Cyber Attack Shut Down Independent News Website,” GlobalVoices. At http://globalvoicesonline.org/2011/04/13/malaysia-cyber-attacks-shut-down-independent-news-website/ (accessed 2011/4/15).
Pate, Jason and Gavin Cameron. 2001/8. “Covert Biological Weapons Attacks against Agricultural Targets: Assessing the Impact against U.S. Agriculture.” At http://belfercenter.ksg.harvard.edu/files/covert_biological_weapons_attacks_against_agricultural_targets.pdf (accessed 2011/2/28).
Pellerin, Cheryl. 2010/10/18. “Cyberspace is the New Domain of Warfare security.” U.S. Department of Defense. At http://www.defense.gov/news/newsarticle.aspx?id=61310 (accessed 2011/1/15).
Persson, C.. 2006/12/28. “Rückfall ins Telefonzeitalter" nach Erdbeben.” Heise Online. At http://www.heise.de/newsticker/meldung/Rueckfall-ins-Telefonzeitalter-nach-Erdbeben-129683.html (accessed 2011/2/28).
Pike, John. 2005/4/27. “Attack on U.S. Embassies in Kenya and Tanzania.”
GlobalSecurity.org. At http://www.globalsecurity.org/security/ops/98emb.htm
(assessed 2011/1/13).
Ressa, Maria. 2011/5/4. “Spreading terror: From Bin Laden to Facebook in Southeast Asia.” CNN. At http://edition.cnn.com/2011/OPINION/05/03/bin.laden.southeast.asia/index.html?iref=allsearch (accessed 2011/3/4).
Schneier, Bruce. 2006/9/16. “Terrorism and September 11.” The Beheyeldin Dynasty.
At
http://baheyeldin.com/writings/terrorism/bruce-schneier-on-terrorism-and-septemb
er-11.html/ (accessed 2011/3/14).
Scrub. 2010/3/13. “FBI 2009 Crime Statistics.” ScamFraudAlert Blog. At
http://scamfraudalert.wordpress.com/2010/03/13/fbi-2009-cybercrime-statistics/
(accessed 2011/1/4).
Strickland, Eliza. 2009/7/8. “Cyber Attack Hits Government Websites; North Korea Is Blamed.” Discover. At http://blogs.discovermagazine.com/80beats/2009/07/08/cyber-attack-hits-government-web-sites-north-korea-is-blamed/ (accessed 2011/3/2).
The White House: Office of the Press Secretary. 2010/12/1. “Presidential Proclamation: National Cybersecurity Awareness Month,” The White House: Office of the Press Secretary. At
http://www.whitehouse.gov/the-press-office/2010/10/01/presidential-proclamation-national-cybersecurity-awareness-month (accessed 2011/2/4).
2011/1/8. “Mail Bomb Ignites in DC Postal Facility; Addressed to DHS.” World on Terror News,
At
http://waronterrornews.typepad.com/home/2011/01/mail-bomb-ignites-in-dc-postal
(accessed 2011/5/4).
2011/5/4. “Cyberattack on Nonghyup Bank traced to North.” Korea Joongang Daily. At
http://joongangdaily.joins.com/article/view.asp?aid=2935718 (accessed 2011/5/4).
2011/5/5. “Analysis: Experts Sceptical on New Iran ‘Cyber Attack’ Claim.” Reuters News. At
http://af.reuters.com/article/energyOilNews/idAFLDE74417H20110505?sp=true
(accessed 2011/5/5).
2010/11/24. “Office of the Coordinator for Counterterrorism,” U.S. Department of State. At http://www.state.gov/s/ct/rls/other/des/123085.htm (accessed 2011/2/18).
“Antinomy.” Encyclopedia Britannica eb.com. At http://www.britannica.com/EBchecked/topic/28270/antinomy (accessed 2011/5/22).
“Nimda,” Wikipedia. At http://en.wikipedia.org/wiki/Nimda (accessed 2011/2/6).
“2007 Cyber Attacks on Estonia,” Wikipedia. At http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia (accessed 2011/2/6).
“2011 Canadian Government Hacking,” Wikipedia. At http://en.wikipedia.org/wiki/2011_Canadian_government_hackings (accessed 2011/4/30).