1. Bieda, D., Riddle, E., & Halawi, L. (2015). Cyberspace: A venue for terrorism. Issues in Information Systems,
16(3), 33–42.
2. Carr, J., & Shepherd, L. (2010). Inside cyber warfare. Sebastopol, CA: O’Reilly Media Inc.
3. Denning, D. (2001). Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars the future of terror, crime, and militancy (1st ed., pp. 239–288). Santa Monica, CA: RAND.
4. Dhs.gov. (2015). Cybersecurity|Homeland Security. Retrieved from
http://www.dhs.gov/topic/cybersecurity
. Accessed December 24, 2015.
5. Dynes, R. (2006). Natural Hazards Observer—November 2006|Natural Hazards Center. Colorado.edu, Retrieved from
http://www.colorado.edu/hazards/o/archives/2006/nov06/nov06c.html
Accessed December 25, 2015.