[1]
Awan, I. 2014. Debating the Term Cyber-Terrorism: Issues and Problems. Internet Journal of Criminology. (2014).
[2]
Awan, I. and Blakemore, B. 2012. Policing cyber hate, cyber threats and cyber terrorism. Ashgate.
[3]
Ball, K.S. and Webster, F. 2003. The intensification of surveillance: crime, terrorism and warfare in the information age. Pluto.
[4]
Blackbourn, J. 2009. Learning Lessons from Counter-Terrorism Failures: The United Kingdom’s Pre- and Post- 9/11 Counter-Terrorism Policy.
[5]
Cabinet Office National Security Pages: https://www.gov.uk/government/publications/security-policy-framework.
[6]
Chen, T.M. et al. eds. 2014. The Criminalisation of Terrorists’ Online Preparatory Acts. Cyberterrorism: understanding, assessment, and response. Springer.
[7]
Clarke, P. 2007. Learning from Experience: counter-terrorism in the UK since 9/11 (Colin Cramphorn Memorial Lecture, Policy Exchange).
[8]
Coaffee, J. 2009. Terrorism, risk and the global city: towards urban resilience. Ashgate Pub.
[9]
CONTEST and related documents are available online via the UK Home Office page: https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism.
[10]
Denning, D. 2000. Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. (2000).
[11]
Fussey, P. 2004. New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK. Surveillance and Society. 2, 2/3 (2004).
[12]
Graham, S. 2004. Recasting the ‘Ring of Steel’: Designing Out Terrorism in the City of London. Cities, war, and terrorism: towards an urban geopolitics. Blackwell Publishing.
[13]
Graham, S. 2004. Technology Vs ‘Terrorism’: Circuits of City Surveillance Since September 11, 2001. Cities, war, and terrorism: towards an urban geopolitics. Blackwell Publishing.
[14]
Gregory, F. 2009. CONTEST: An Evaluation of Revisions to the UK Counter-Terrorism Strategy with a Special Focus on the CBRNE Threat.
[15]
Griset, P. and Mahan, S. 2003. Terrorism in perspective. SAGE.
[16]
Herzog, S. 2011. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security. 4, 2 (2011).
[17]
Keeble, H. and Hollington, K. 2010. Terror cops: fighting terrorism on Britain’s streets. Pocket Books.
[18]
Kenney, M. Cyber-Terrorism in a Post-Stuxnet World.
[19]
Kirstie Ball The Constant State of Emergency?: Surveillance after 9/11. The Intensification Of Surveillance :  crime, terrorism and warfare in the information age. Pluto Press.
[20]
Lambert, R. and Freedman, L. 2011. Countering Al-Qaeda in London: police and Muslims in partnership. Hurst.
[21]
Lyon, D. 2003. Surveillance after September 11. Polity.
[22]
MI5 - Threat advice: https://www.mi5.gov.uk/home/the-threats/overview.html.
[23]
National Commission on Terrorist Attacks Upon the United States: http://www.9-11commission.gov/.
[24]
Parker, A. 2015. Director General speaks on terrorism, technology and oversight. (2015).
[25]
Silke, A. 2003. Deterring Terrorists. Terrorists, victims, and society: psychological perspectives on terrorism and its consequences. Wiley.
[26]
The Cyberterrorism Project: http://www.cyberterrorism-project.org/publications/.
[27]
Weimann, G. 2006. Terror on the internet: the new arena, the new challenges. United States Institute of Peace Press.
[28]
Wilkinson, P. 2007. Homeland security in the UK: future preparedness for terrorist attack since 9/11. Routledge.
[29]
Wilkinson, Paul ed. An Assessment of the Contribution of Intelligence Led Counter-Terrorism to UK Homeland Security Post 9/11 within the ‘Contest’ Strategy. Homeland Security in the UK: Future Preparedness for Terrorist Attack Since 9/11. Routledge; New Ed edition (14 Jun. 2007).
[30]
Cabinet Office, (2011). The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World.
[31]
Cavelty, Dr Myriam Dunn, (2008) Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics. Vol 4 (1). pp.19-36.
[32]
Chalk, P. and Rosenau, W. (2004) Confronting ‘the Enemy Within’: Security Intelligence, the Police, and Counterterrorism in Four Democracies. Washington: RAND.
[33]
Cornish, P. (2007) Domestic Security, Civil Contingencies and Resilience in the United Kingdom: A Guide to Policy. London: Chatham House.
[34]
Cornish, P (2008) ‘The National Security Strategy of the United Kingdom: How Radical Can Britain Be?’ London: Chatham House.
[35]
Cornish, P. (ed) (2007) Britain and Security. London: Smith Institute.
[36]
Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).
[37]
Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).
[38]
Edwards, C. (2007) The Case for a National Security Strategy. London: Demos.
[39]
European Parliamentary Research Service, 2013. Briefing: Cyber Security in the EU:
[40]
Haggerty, K., and Gazso, A. (2005) ‘Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats’, Canadian Journal of Sociology, 30(2): 169- 187.
[41]
HM Government (2010): A Strong Britain in an Age of Uncertainty. The National Security Strategy. London: TSO.
[42]
Jarvis, L. & Macdonald, S. (2014) ‘What is Cyberterrorism? Findings from a Survey of Researchers’ Terrorism and Political Violence 37(1): pp. 68-90.
[43]
Kirshner, J. Barry Strauss, B., Fanis, M. and Evangelista, ‘Iraq and Beyond: The New U.S. National Security Strategy’, Cornell University Peace Studies Program Paper 27.
[44]
Lambert, R (2008) ‘Empowering Salafis and Islamists Against Al-Qaeda: A London Counterterrorism Case Study’. PS: Political Science & Politics, Vol. 41(1), 31-35.
[45]
Lum, C., Kennedy, L.W. and Sherley, A. (2006) ‘Are Counter-terrorism strategies effective?’ Journal of Experimental Criminology Vol. 2 (4). 489-516.
[46]
Martin, Thomas, (2014). Governing an Unknowable Future: The Politics of Britain’s Prevent Policy. Critical Studies on Terrorism Vol. 7 (1). 62-78.
[47]
Monar, J. (2007) ‘Common Threat and Common Response? The European Union’s Counter-Terrorism Strategy and its Problems’, Government and Opposition, Vol. 42 (3), 292-313.
[48]
Omand, Sir David, 2009. The National Security Strategy: Implications for the UK intelligence community.
[49]
Pressman, J. (2007) ‘Rethinking Transnational Counterterrorism: Beyond a National Framework’, The Washington Quarterly, Vol. 20 (4), 63-73.
[50]
Rudner, M. (2013) ‘Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge,’ International Journal of Intelligence and CounterIntelligence, 26(3), pp. 453-481.
[51]
Stohl, M. (2007). ‘Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games,’ Crime, Law and Social Change 46:223-238.
[52]
Thomas, P. (2010) ‘Failed and Friendless: the UK’s “Preventing Violent Extremism” Programme’ The British Journal of Politics and International Relations, Vol 12 (3) 442-458.
[53]
White House, 2010. National Security Strategy.