Awan, I. (2014) ‘Debating the Term Cyber-Terrorism: Issues and Problems’, Internet Journal of Criminology [Preprint]. Available at: https://www.internetjournalofcriminology.com/_files/ugd/b93dd4_d6e57fcde0d44fe6a755dbd315c07093.pdf.
Awan, I. and Blakemore, B. (2012) Policing cyber hate, cyber threats and cyber terrorism. Farnham: Ashgate. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4512562.
Ball, K.S. and Webster, F. (2003) The intensification of surveillance: crime, terrorism and warfare in the information age. London: Pluto. Available at: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5662437450002746&institutionId=2746&customerId=2745.
Blackbourn, J. (2009) Learning Lessons from Counter-Terrorism Failures: The United Kingdom’s Pre- and Post- 9/11 Counter-Terrorism Policy. Available at: https://convention2.allacademic.com/one/isa/isa09/.
‘Cabinet Office, (2011). The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World.’ (no date). Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf.
Cabinet Office National Security Pages: (no date). Available at: https://www.gov.uk/government/publications/security-policy-framework.
‘Cavelty, Dr Myriam Dunn, (2008) Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics. Vol 4 (1). pp.19-36.’ (no date).
‘Chalk, P. and Rosenau, W. (2004) Confronting “the Enemy Within”: Security Intelligence, the Police, and Counterterrorism in Four Democracies. Washington: RAND.’ (no date). Available at: http://www.rand.org/content/dam/rand/pubs/monographs/2004/RAND_MG100.pdf.
Chen, T.M., Jarvis, L. and Macdonald, S. (eds) (2014) ‘The Criminalisation of Terrorists’ Online Preparatory Acts’, in Cyberterrorism: understanding, assessment, and response. New York, NY: Springer. Available at: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=1782052&ppg=175.
Clarke, P. (2007) ‘Learning from Experience: counter-terrorism in the UK since 9/11 (Colin Cramphorn Memorial Lecture, Policy Exchange)’. Available at: https://policyexchange.org.uk/wp-content/uploads/2016/09/learning-from-experience-jun-07.pdf.
Coaffee, J. (2009) Terrorism, risk and the global city: towards urban resilience. Farnham, Surrey, England: Ashgate Pub. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/Doc?id=10331433.
CONTEST and related documents are available online via the UK Home Office page (no date). Available at: https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism.
‘Cornish, P. (2007) Domestic Security, Civil Contingencies and Resilience in the United Kingdom: A Guide to Policy. London: Chatham House.’ (no date). Available at: http://www.chathamhouse.org/publications/papers/view/108568.
‘Cornish, P (2008) “The National Security Strategy of the United Kingdom: How Radical Can Britain Be?” London: Chatham House.’ (no date).
‘Cornish, P. (ed) (2007) Britain and Security. London: Smith Institute.’ (no date).
‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’ (no date a). Available at: http://www.ejls.eu/6/78UK.htm.
‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’ (no date b). Available at: http://www.ejls.eu/6/78UK.htm.
Denning, D. (2000) ‘Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.’ Available at: https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm.
‘Edwards, C. (2007) The Case for a National Security Strategy. London: Demos.’ (no date). Available at: http://demos.co.uk/files/Demos_report_the_case_for_a_national_security_strategy.pdf.
‘European Parliamentary Research Service, 2013. Briefing: Cyber Security in the EU’: (no date). Available at: http://www.europarl.europa.eu/eplibrary/Cyber-security-in-the-European%20Union.pdf.
Fussey, P. (2004) ‘New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK’, Surveillance and Society, 2(2/3). Available at: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3377/3340.
Graham, S. (2004a) ‘Recasting the “Ring of Steel”: Designing Out Terrorism in the City of London’, in Cities, war, and terrorism: towards an urban geopolitics. Malden, MA: Blackwell Publishing. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008.
Graham, S. (2004b) ‘Technology Vs “Terrorism”: Circuits of City Surveillance Since September 11, 2001’, in Cities, war, and terrorism: towards an urban geopolitics. Malden, MA: Blackwell Publishing. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008.
Gregory, F. (2009) ‘CONTEST: An Evaluation of Revisions to the UK Counter-Terrorism Strategy with a Special Focus on the CBRNE Threat’. Available at: https://www.realinstitutoelcano.org/en/analyses/contest-2009-an-evaluation-of-revisions-to-the-uk-counter-terrorism-strategy-with-a-special-focus-on-the-cbrne-threat-ari/.
Griset, P. and Mahan, S. (2003) Terrorism in perspective. London: SAGE.
‘Haggerty, K., and Gazso, A. (2005) “Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats”, Canadian Journal of Sociology, 30(2): 169- 187.’ (no date). Available at: http://www.jstor.org/discover/10.2307/4146129?sid=21105068938881&uid=3738032&uid=2&uid=4.
Herzog, S. (2011) ‘Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses’, Journal of Strategic Security, 4(2). Available at: https://digitalcommons.usf.edu/jss/vol4/iss2/4/.
‘HM Government (2010): A Strong Britain in an Age of Uncertainty. The National Security Strategy. London: TSO’ (no date). Available at: http://webarchive.nationalarchives.gov.uk/20121015000000/http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf.
‘Jarvis, L. & Macdonald, S. (2014) “What is Cyberterrorism? Findings from a Survey of Researchers” Terrorism and Political Violence 37(1): pp. 68-90’ (no date). Available at: http://www.tandfonline.com/doi/abs/10.1080/1057610X.2014.853603?journalCode=uter20#.VJKDjSusU6w.
Keeble, H. and Hollington, K. (2010) Terror cops: fighting terrorism on Britain’s streets. London: Pocket Books.
Kenney, M. (no date) ‘Cyber-Terrorism in a Post-Stuxnet World’.
‘Kirshner, J. Barry Strauss, B., Fanis, M. and Evangelista, “Iraq and Beyond: The New U.S. National Security Strategy”, Cornell University Peace Studies Program Paper 27.’ (no date). Available at: http://pacs.einaudi.cornell.edu/node/8135.
Kirstie Ball (no date) ‘The Constant State of Emergency?: Surveillance after 9/11’, in The Intensification Of Surveillance : crime, terrorism and warfare in the information age. Pluto Press. Available at: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5665222410002746&institutionId=2746&customerId=2745.
‘Lambert, R (2008) “Empowering Salafis and Islamists Against Al-Qaeda: A London Counterterrorism Case Study”. PS: Political Science & Politics, Vol. 41(1), 31-35.’ (no date).
Lambert, R. and Freedman, L. (2011) Countering Al-Qaeda in London: police and Muslims in partnership. London: Hurst.
‘Lum, C., Kennedy, L.W. and Sherley, A. (2006) “Are Counter-terrorism strategies effective?” Journal of Experimental Criminology Vol. 2 (4). 489-516.’ (no date).
Lyon, D. (2003) Surveillance after September 11. Cambridge: Polity.
‘Martin, Thomas, (2014). Governing an Unknowable Future: The Politics of Britain’s Prevent Policy. Critical Studies on Terrorism Vol. 7 (1). 62-78’ (no date).
MI5 - Threat advice (no date). Available at: https://www.mi5.gov.uk/home/the-threats/overview.html.
‘Monar, J. (2007) “Common Threat and Common Response? The European Union’s Counter-Terrorism Strategy and its Problems”, Government and Opposition, Vol. 42 (3), 292-313.’ (no date).
National Commission on Terrorist Attacks Upon the United States (no date). Available at: http://www.9-11commission.gov/.
‘Omand, Sir David, 2009. The National Security Strategy: Implications for the UK intelligence community.’ (no date). Available at: http://dematerialisedid.com/pdfs/National_Security_Strategy.pdf.
Parker, A. (2015) ‘Director General speaks on terrorism, technology and oversight’. Available at: https://www.mi5.gov.uk/news/director-general-speaks-on-terrorism-technology-and-oversight.
‘Pressman, J. (2007) “Rethinking Transnational Counterterrorism: Beyond a National Framework”, The Washington Quarterly, Vol. 20 (4), 63-73.’ (no date).
‘Rudner, M. (2013) “Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge,” International Journal of Intelligence and CounterIntelligence, 26(3), pp. 453-481’ (no date). Available at: http://www.tandfonline.com/doi/abs/10.1080/08850607.2013.780552#.U6b_R_ldU6w.
Silke, A. (2003) ‘Deterring Terrorists’, in Terrorists, victims, and society: psychological perspectives on terrorism and its consequences. Chichester: Wiley. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=366881.
‘Stohl, M. (2007). “Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games,” Crime, Law and Social Change 46:223-238’ (no date).
The Cyberterrorism Project (no date). Available at: http://www.cyberterrorism-project.org/publications/.
‘Thomas, P. (2010) “Failed and Friendless: the UK’s ‘Preventing Violent Extremism’ Programme” The British Journal of Politics and International Relations, Vol 12 (3) 442-458.’ (no date). Available at: http://eprints.hud.ac.uk/8949/.
Weimann, G. (2006) Terror on the internet: the new arena, the new challenges. Washington, D.C.: United States Institute of Peace Press.
‘White House, 2010. National Security Strategy’ (no date). Available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf.
Wilkinson, P. (2007) Homeland security in the UK: future preparedness for terrorist attack since 9/11. London: Routledge. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629.
Wilkinson, Paul (ed.) (no date) ‘An Assessment of the Contribution of Intelligence Led Counter-Terrorism to UK Homeland Security Post 9/11 within the “Contest” Strategy’, in Homeland Security in the UK: Future Preparedness for Terrorist Attack Since 9/11. Routledge; New Ed edition (14 Jun. 2007). Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629.