1. Anthes, G.H. (1996), “Hack attack: cyberthieves siphon millions from US Firms”,Computerworld, Vol. 30 No. 16, p. 81.
2. Managing computer crime: a research outlook
3. Bort, J. (2002), “Time for a new security model”,Network World, Vol. 19 No. 30, pp. s6‐s8.
4. Bronskill, J. (2001), “CSIS on alert for cyber saboteurs: spy agency monitors threat to computer networks”,Ottawa Citizen, 9 January, p. A3.
5. Desmond, P. (2002), “Thwarting cyberterrorism”,Network World, Vol. 19 No. 7, pp. 72‐4.