@article{Awan_2014, title={Debating the Term Cyber-Terrorism: Issues and Problems}, url={https://www.internetjournalofcriminology.com/_files/ugd/b93dd4_d6e57fcde0d44fe6a755dbd315c07093.pdf}, journal={Internet Journal of Criminology}, author={Awan, Imran}, year={2014} }
@book{Awan_Blakemore_2012, address={Farnham}, title={Policing cyber hate, cyber threats and cyber terrorism}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4512562}, publisher={Ashgate}, author={Awan, Imran and Blakemore, Brian}, year={2012} }
@book{Ball_Webster_2003, address={London}, title={The intensification of surveillance: crime, terrorism and warfare in the information age}, url={http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5662437450002746&institutionId=2746&customerId=2745}, publisher={Pluto}, author={Ball, Kirstie S. and Webster, Frank}, year={2003} }
@book{Blackbourn_2009, title={Learning Lessons from Counter-Terrorism Failures: The United Kingdom’s Pre- and Post- 9/11 Counter-Terrorism Policy}, url={https://convention2.allacademic.com/one/isa/isa09/}, author={Blackbourn, Jessie}, year={2009} }
@misc{Clarke_2007, title={Learning from Experience: counter-terrorism in the UK since 9/11 (Colin Cramphorn Memorial Lecture, Policy Exchange)}, url={https://policyexchange.org.uk/wp-content/uploads/2016/09/learning-from-experience-jun-07.pdf}, author={Clarke, Peter}, year={2007} }
@book{Coaffee_2009, address={Farnham, Surrey, England}, title={Terrorism, risk and the global city: towards urban resilience}, url={http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/Doc?id=10331433}, publisher={Ashgate Pub}, author={Coaffee, Jon}, year={2009} }
@article{Denning_2000, title={Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.}, url={https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm}, author={Denning, Dorothy}, year={2000} }
@article{Fussey_2004, title={New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK}, volume={2}, url={https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3377/3340}, number={2/3}, journal={Surveillance and Society}, author={Fussey, Pete}, year={2004} }
@inbook{Graham_2004a, address={Malden, MA}, title={Recasting the ‘Ring of Steel’: Designing Out Terrorism in the City of London}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008}, booktitle={Cities, war, and terrorism: towards an urban geopolitics}, publisher={Blackwell Publishing}, author={Graham, Stephen}, year={2004} }
@inbook{Graham_2004b, address={Malden, MA}, title={Technology Vs ‘Terrorism’: Circuits of City Surveillance Since September 11, 2001}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008}, booktitle={Cities, war, and terrorism: towards an urban geopolitics}, publisher={Blackwell Publishing}, author={Graham, Stephen}, year={2004} }
@misc{Gregory_2009, title={CONTEST: An Evaluation of Revisions to the UK Counter-Terrorism Strategy with a Special Focus on the CBRNE Threat}, url={https://www.realinstitutoelcano.org/en/analyses/contest-2009-an-evaluation-of-revisions-to-the-uk-counter-terrorism-strategy-with-a-special-focus-on-the-cbrne-threat-ari/}, author={Gregory, Frank}, year={2009} }
@book{Griset_Mahan_2003, address={London}, title={Terrorism in perspective}, publisher={SAGE}, author={Griset, Pamala and Mahan, Sue}, year={2003} }
@article{Herzog_2011, title={Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses}, volume={4}, url={https://digitalcommons.usf.edu/jss/vol4/iss2/4/}, number={2}, journal={Journal of Strategic Security}, author={Herzog, Stephen}, year={2011} }
@book{Keeble_Hollington_2010, address={London}, title={Terror cops: fighting terrorism on Britain’s streets}, publisher={Pocket Books}, author={Keeble, Harry and Hollington, Kris}, year={2010} }
@article{Kenney, title={Cyber-Terrorism in a Post-Stuxnet World}, author={Kenney, Michael} }
@inbook{Kirstie Ball, title={The Constant State of Emergency?: Surveillance after 9/11}, url={http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5665222410002746&institutionId=2746&customerId=2745}, booktitle={The Intensification Of Surveillance : crime, terrorism and warfare in the information age}, publisher={Pluto Press}, author={Kirstie Ball} }
@book{Lambert_Freedman_2011, address={London}, title={Countering Al-Qaeda in London: police and Muslims in partnership}, publisher={Hurst}, author={Lambert, Robert and Freedman, Lawrence}, year={2011} }
@book{Lyon_2003, address={Cambridge}, title={Surveillance after September 11}, volume={Themes for the 21st century}, publisher={Polity}, author={Lyon, David}, year={2003} }
@article{Parker_2015, title={Director General speaks on terrorism, technology and oversight}, url={https://www.mi5.gov.uk/news/director-general-speaks-on-terrorism-technology-and-oversight}, author={Parker, Andrew}, year={2015} }
@inbook{Silke_2003, address={Chichester}, title={Deterring Terrorists}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=366881}, booktitle={Terrorists, victims, and society: psychological perspectives on terrorism and its consequences}, publisher={Wiley}, author={Silke, Andrew}, year={2003} }
@book{Weimann_2006, address={Washington, D.C.}, title={Terror on the internet: the new arena, the new challenges}, publisher={United States Institute of Peace Press}, author={Weimann, Gabriel}, year={2006} }
@book{Wilkinson_2007, address={London}, title={Homeland security in the UK: future preparedness for terrorist attack since 9/11}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629}, publisher={Routledge}, author={Wilkinson, Paul}, year={2007} }
@inbook{Chen_Jarvis_Macdonald_2014, address={New York, NY}, title={The Criminalisation of Terrorists’ Online Preparatory Acts}, url={https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=1782052&ppg=175}, booktitle={Cyberterrorism: understanding, assessment, and response}, publisher={Springer}, year={2014} }
@misc{Cabinet Office, (2011). The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World., url={https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf} }
@article{Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3)., url={http://www.ejls.eu/6/78UK.htm} }
@article{Cavelty, Dr Myriam Dunn, (2008) Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics. Vol 4 (1). pp.19-36. }
@misc{The Cyberterrorism Project, url={http://www.cyberterrorism-project.org/publications/} }
@misc{European Parliamentary Research Service, 2013. Briefing: Cyber Security in the EU:, url={http://www.europarl.europa.eu/eplibrary/Cyber-security-in-the-European%20Union.pdf} }
@article{Jarvis, L. & Macdonald, S. (2014) ‘What is Cyberterrorism? Findings from a Survey of Researchers’ Terrorism and Political Violence 37(1): pp. 68-90, url={http://www.tandfonline.com/doi/abs/10.1080/1057610X.2014.853603?journalCode=uter20#.VJKDjSusU6w} }
@article{Rudner, M. (2013) ‘Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge,’ International Journal of Intelligence and CounterIntelligence, 26(3), pp. 453-481, url={http://www.tandfonline.com/doi/abs/10.1080/08850607.2013.780552#.U6b_R_ldU6w} }
@article{Stohl, M. (2007). ‘Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games,’ Crime, Law and Social Change 46:223-238 }
@misc{Cabinet Office National Security Pages:, url={https://www.gov.uk/government/publications/security-policy-framework} }
@article{Cornish, P. (2007) Domestic Security, Civil Contingencies and Resilience in the United Kingdom: A Guide to Policy. London: Chatham House., url={http://www.chathamhouse.org/publications/papers/view/108568} }
@article{Cornish, P. (ed) (2007) Britain and Security. London: Smith Institute. }
@article{Cornish, P (2008) ‘The National Security Strategy of the United Kingdom: How Radical Can Britain Be?’ London: Chatham House. }
@article{Edwards, C. (2007) The Case for a National Security Strategy. London: Demos., url={http://demos.co.uk/files/Demos_report_the_case_for_a_national_security_strategy.pdf} }
@misc{HM Government (2010): A Strong Britain in an Age of Uncertainty. The National Security Strategy. London: TSO, url={http://webarchive.nationalarchives.gov.uk/20121015000000/http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf} }
@article{Kirshner, J. Barry Strauss, B., Fanis, M. and Evangelista, ‘Iraq and Beyond: The New U.S. National Security Strategy’, Cornell University Peace Studies Program Paper 27., url={http://pacs.einaudi.cornell.edu/node/8135} }
@misc{National Commission on Terrorist Attacks Upon the United States, url={http://www.9-11commission.gov/} }
@article{Omand, Sir David, 2009. The National Security Strategy: Implications for the UK intelligence community., url={http://dematerialisedid.com/pdfs/National_Security_Strategy.pdf} }
@misc{White House, 2010. National Security Strategy, url={http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf} }
@misc{CONTEST and related documents are available online via the UK Home Office page, url={https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism} }
@article{Chalk, P. and Rosenau, W. (2004) Confronting ‘the Enemy Within’: Security Intelligence, the Police, and Counterterrorism in Four Democracies. Washington: RAND., url={http://www.rand.org/content/dam/rand/pubs/monographs/2004/RAND_MG100.pdf} }
@inbook{ title={An Assessment of the Contribution of Intelligence Led Counter-Terrorism to UK Homeland Security Post 9/11 within the ‘Contest’ Strategy}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629}, booktitle={Homeland Security in the UK: Future Preparedness for Terrorist Attack Since 9/11}, publisher={Routledge; New Ed edition (14 Jun. 2007)} }
@article{Lambert, R (2008) ‘Empowering Salafis and Islamists Against Al-Qaeda: A London Counterterrorism Case Study’. PS: Political Science & Politics, Vol. 41(1), 31-35. }
@article{Lum, C., Kennedy, L.W. and Sherley, A. (2006) ‘Are Counter-terrorism strategies effective?’ Journal of Experimental Criminology Vol. 2 (4). 489-516. }
@article{Martin, Thomas, (2014). Governing an Unknowable Future: The Politics of Britain’s Prevent Policy. Critical Studies on Terrorism Vol. 7 (1). 62-78 }
@article{Monar, J. (2007) ‘Common Threat and Common Response? The European Union’s Counter-Terrorism Strategy and its Problems’, Government and Opposition, Vol. 42 (3), 292-313. }
@article{Pressman, J. (2007) ‘Rethinking Transnational Counterterrorism: Beyond a National Framework’, The Washington Quarterly, Vol. 20 (4), 63-73. }
@article{Thomas, P. (2010) ‘Failed and Friendless: the UK’s “Preventing Violent Extremism” Programme’ The British Journal of Politics and International Relations, Vol 12 (3) 442-458., url={http://eprints.hud.ac.uk/8949/} }
@article{Haggerty, K., and Gazso, A. (2005) ‘Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats’, Canadian Journal of Sociology, 30(2): 169- 187., url={http://www.jstor.org/discover/10.2307/4146129?sid=21105068938881&uid=3738032&uid=2&uid=4} }
@misc{MI5 - Threat advice, url={https://www.mi5.gov.uk/home/the-threats/overview.html} }
@article{Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3)., url={http://www.ejls.eu/6/78UK.htm} }