Anon. n.d.-a. ‘Cabinet Office, (2011). The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World.’
Anon. n.d.-b. ‘Cabinet Office National Security Pages’: Retrieved (https://www.gov.uk/government/publications/security-policy-framework).
Anon. n.d.-c. ‘Cavelty, Dr Myriam Dunn, (2008) Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics. Vol 4 (1). Pp.19-36.’
Anon. n.d.-d. ‘Chalk, P. and Rosenau, W. (2004) Confronting “the Enemy Within”: Security Intelligence, the Police, and Counterterrorism in Four Democracies. Washington: RAND.’
Anon. n.d.-e. ‘CONTEST and Related Documents Are Available Online via the UK Home Office Page’. Retrieved (https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism).
Anon. n.d.-f. ‘Cornish, P. (2007) Domestic Security, Civil Contingencies and Resilience in the United Kingdom: A Guide to Policy. London: Chatham House.’
Anon. n.d.-g. ‘Cornish, P (2008) “The National Security Strategy of the United Kingdom: How Radical Can Britain Be?” London: Chatham House.’
Anon. n.d.-h. ‘Cornish, P. (Ed) (2007) Britain and Security. London: Smith Institute.’
Anon. n.d.-i. ‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’
Anon. n.d.-j. ‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’
Anon. n.d.-k. ‘Edwards, C. (2007) The Case for a National Security Strategy. London: Demos.’
Anon. n.d.-l. ‘European Parliamentary Research Service, 2013. Briefing: Cyber Security in the EU’:
Anon. n.d.-m. ‘Haggerty, K., and Gazso, A. (2005) “Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats”, Canadian Journal of Sociology, 30(2): 169- 187.’
Anon. n.d.-n. ‘HM Government (2010): A Strong Britain in an Age of Uncertainty. The National Security Strategy. London: TSO’.
Anon. n.d.-o. ‘Jarvis, L. & Macdonald, S. (2014) “What Is Cyberterrorism? Findings from a Survey of Researchers” Terrorism and Political Violence 37(1): Pp. 68-90’.
Anon. n.d.-p. ‘Kirshner, J. Barry Strauss, B., Fanis, M. and Evangelista, “Iraq and Beyond: The New U.S. National Security Strategy”, Cornell University Peace Studies Program Paper 27.’
Anon. n.d.-q. ‘Lambert, R (2008) “Empowering Salafis and Islamists Against Al-Qaeda: A London Counterterrorism Case Study”. PS: Political Science & Politics, Vol. 41(1), 31-35.’
Anon. n.d.-r. ‘Lum, C., Kennedy, L.W. and Sherley, A. (2006) “Are Counter-Terrorism Strategies Effective?” Journal of Experimental Criminology Vol. 2 (4). 489-516.’
Anon. n.d.-s. ‘Martin, Thomas, (2014). Governing an Unknowable Future: The Politics of Britain’s Prevent Policy. Critical Studies on Terrorism Vol. 7 (1). 62-78’.
Anon. n.d.-t. ‘MI5 - Threat Advice’. Retrieved (https://www.mi5.gov.uk/home/the-threats/overview.html).
Anon. n.d.-u. ‘Monar, J. (2007) “Common Threat and Common Response? The European Union’s Counter-Terrorism Strategy and Its Problems”, Government and Opposition, Vol. 42 (3), 292-313.’
Anon. n.d.-v. ‘National Commission on Terrorist Attacks Upon the United States’. Retrieved (http://www.9-11commission.gov/).
Anon. n.d.-w. ‘Omand, Sir David, 2009. The National Security Strategy: Implications for the UK Intelligence Community.’
Anon. n.d.-x. ‘Pressman, J. (2007) “Rethinking Transnational Counterterrorism: Beyond a National Framework”, The Washington Quarterly, Vol. 20 (4), 63-73.’
Anon. n.d.-y. ‘Rudner, M. (2013) “Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge,” International Journal of Intelligence and CounterIntelligence, 26(3), Pp. 453-481’.
Anon. n.d.-z. ‘Stohl, M. (2007). “Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games,” Crime, Law and Social Change 46:223-238’.
Anon. n.d.-aa. ‘The Cyberterrorism Project’. Retrieved (http://www.cyberterrorism-project.org/publications/).
Anon. n.d.-ab. ‘Thomas, P. (2010) “Failed and Friendless: The UK’s ‘Preventing Violent Extremism’ Programme” The British Journal of Politics and International Relations, Vol 12 (3) 442-458.’
Anon. n.d.-ac. ‘White House, 2010. National Security Strategy’.
Awan, Imran. 2014. ‘Debating the Term Cyber-Terrorism: Issues and Problems’. Internet Journal of Criminology.
Awan, Imran, and Brian Blakemore. 2012. Policing Cyber Hate, Cyber Threats and Cyber Terrorism. Farnham: Ashgate.
Ball, Kirstie S., and Frank Webster. 2003. The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age. London: Pluto.
Blackbourn, Jessie. 2009. Learning Lessons from Counter-Terrorism Failures: The United Kingdom’s Pre- and Post- 9/11 Counter-Terrorism Policy.
Chen, Thomas M., Lee Jarvis, and Stuart Macdonald, eds. 2014. ‘The Criminalisation of Terrorists’ Online Preparatory Acts’. in Cyberterrorism: understanding, assessment, and response. New York, NY: Springer.
Clarke, Peter. 2007. ‘Learning from Experience: Counter-Terrorism in the UK since 9/11 (Colin Cramphorn Memorial Lecture, Policy Exchange)’.
Coaffee, Jon. 2009. Terrorism, Risk and the Global City: Towards Urban Resilience. Farnham, Surrey, England: Ashgate Pub.
Denning, Dorothy. 2000. ‘Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.’
Fussey, Pete. 2004. ‘New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK’. Surveillance and Society 2(2/3).
Graham, Stephen. 2004a. ‘Recasting the “Ring of Steel”: Designing Out Terrorism in the City of London’. in Cities, war, and terrorism: towards an urban geopolitics. Malden, MA: Blackwell Publishing.
Graham, Stephen. 2004b. ‘Technology Vs “Terrorism”: Circuits of City Surveillance Since September 11, 2001’. in Cities, war, and terrorism: towards an urban geopolitics. Malden, MA: Blackwell Publishing.
Gregory, Frank. 2009. ‘CONTEST: An Evaluation of Revisions to the UK Counter-Terrorism Strategy with a Special Focus on the CBRNE Threat’.
Griset, Pamala, and Sue Mahan. 2003. Terrorism in Perspective. London: SAGE.
Herzog, Stephen. 2011. ‘Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses’. Journal of Strategic Security 4(2).
Keeble, Harry, and Kris Hollington. 2010. Terror Cops: Fighting Terrorism on Britain’s Streets. London: Pocket Books.
Kenney, Michael. n.d. ‘Cyber-Terrorism in a Post-Stuxnet World’.
Kirstie Ball. n.d. ‘The Constant State of Emergency?: Surveillance after 9/11’. in The Intensification Of Surveillance :  crime, terrorism and warfare in the information age. Pluto Press.
Lambert, Robert, and Lawrence Freedman. 2011. Countering Al-Qaeda in London: Police and Muslims in Partnership. London: Hurst.
Lyon, David. 2003. Surveillance after September 11. Vol. Themes for the 21st century. Cambridge: Polity.
Parker, Andrew. 2015. ‘Director General Speaks on Terrorism, Technology and Oversight’.
Silke, Andrew. 2003. ‘Deterring Terrorists’. in Terrorists, victims, and society: psychological perspectives on terrorism and its consequences. Chichester: Wiley.
Weimann, Gabriel. 2006. Terror on the Internet: The New Arena, the New Challenges. Washington, D.C.: United States Institute of Peace Press.
Wilkinson, Paul. 2007. Homeland Security in the UK: Future Preparedness for Terrorist Attack since 9/11. London: Routledge.
Wilkinson, Paul, ed. n.d. ‘An Assessment of the Contribution of Intelligence Led Counter-Terrorism to UK Homeland Security Post 9/11 within the “Contest” Strategy’. in Homeland Security in the UK: Future Preparedness for Terrorist Attack Since 9/11. Routledge; New Ed edition (14 Jun. 2007).