1. Berner, S. (2003) Cyber-terrorism: reality or paranoia? South African Journal of Information Management, Vol 5, No 1, p. 1-4.;
2. Buckland, B., Schreier, F. & Winkler, T. (2010). Demokratsko upravljanje: izazovi Sajber bezbednosti, Beograd: Forum za bezbednost i demokratiju.;
3. Giles, J. (2010). Benevolen Hackers Poke Holes in E-Banking, http://www. newscientist.com/article/mg20527455.400-benevolent-hackers-poke-holes-in-ebanking.html, pristupljeno 04.02.2015.;
4. Golumbic, M. (2007). Fighting Terror Online: The Convergence of Security, Technology and the Law. New York: Springer.;
5. Lap’kov, A. & Kecapeeva, T. (1998). Ëkonomičeskaja prestupnost’: harakteristika i faktornyj analiz, (3), (125-130).;