[1]
|
J. Matusitz, “Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo,” Information Security Journal: A Global Perspective, Vol. 20, No. 1, 2011, pp. 34-44.
|
[2]
|
M. Dogrul, A. Aslan and E. Celik, “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism,” 2011 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, pp. 1-15.
|
[3]
|
M. Conway, “Against Cyberterrorism,” Communications of the ACM, Vol. 54, No. 2, 2011, pp. 26-28.
doi:10.1145/1897816.1897829
|
[4]
|
Z. Yunos, S. H. Suid, R. Ahmad and Z. Ismail, “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) Against Cyber Terrorism: Towards Development of a Policy Framework,” IEEE Sixth International Conference on Information Assurance & Security, Atlanta, 23-25 August 2010, pp. 21-27.
|
[5]
|
P. A. H. Williams, “Information Warfare: Time for a Redefinition,” Proceedings of the 11th Australian Information Warfare & Security Conference, Perth Western, 30 November-2 December, 2010, pp. 37-44.
|
[6]
|
D. Ho, “The Focus Group Interview: Rising to the Challenge in Qualitative Research,” Australian Review of Applied Linguistics, Vol. 29, No. 1, 2006, pp. 1-19.
|
[7]
|
J. Bray, N. Johns and D. Kilburn, “An Exploratory Study into the Factors Impeding Ethical Consumption,” Journal of Business Ethics, Vol. 98, No. 4, 2011, pp. 597-608.
doi:10.1007/s10551-010-0640-9
|
[8]
|
Y. Kamarulzaman, “A Focus Group Study of Consumer Motivations for e-Shopping: UK versus Malaysia,” African Journal of Business Management, Vol. 5, No. 16, 2011, pp. 6778-6784.
|
[9]
|
F. Saleem, M. Hassali, A. Shafie, S. Bashir and M. Atif, “Perceptions of Disease State Management among Pakistani Hypertensive Patients: Findings from a Focus Group Discussion,” Tropical Journal of Pharmaceutical Research, Vol. 10, No. 6, 2011, pp. 833-840.
doi:10.4314/tjpr.v10i6.18
|
[10]
|
D. R. Cooper and P. S. Schindler, “Business Research Method,” McGraw-Hill Companies, Inc., New York, 2008.
|
[11]
|
UK Cabinet Office, “The UK Cyber Security Strategy—Protecting and Promoting the UK in a Digital World,” 2011. http://www.cabinetoffice.gov.uk/sites/default/files/resources/The UK Cyber Security Strategy-web ver.pdf
|
[12]
|
N. Veerasamy and J. H. P. Eloff, “Application of Non-Quantitative Modelling in the Analysis of a Network Warfare Environment,” World Academy of Science, Engineering and Technology Conference, Paris, 2008.
|
[13]
|
D. E. Denning, “Cyberterrorism,” Testimony given to the House Armed Services Committee Special Oversight Panel on Terrorism, 23 May 2000.
|
[14]
|
J. Rollins and C. Wilson, “Terrorist Capabilities for Cyberattack: Overview and Policy Issues,” CRS Report for Congress, 2007.
|
[15]
|
M. Mohammad, “The Need to Identify Terrorists and Remove the Causes of Terrorism,” In: H. Makaruddin, Ed., Terrorism and the Real Issues, Pelanduk Publications (M) Sdn Bhd, Subang Jaya, 2003, pp. 29-40.
|
[16]
|
ACT 574 Penal Code, “Chapter VIA—Offences Relating to Terrorism. Section 130B (1)-(5),” Zul Rafique & Partner Report, 1997.
|
[17]
|
R. Ahmad and Z. Yunos, “A Dynamic Cyber Terrorism Framework,” International Journal of Computer Science and Information Security, Vol. 10, No. 2, 2012, pp. 149-158.
|