Awan I, ‘Debating the Term Cyber-Terrorism: Issues and Problems’ [2014] Internet Journal of Criminology <https://www.internetjournalofcriminology.com/_files/ugd/b93dd4_d6e57fcde0d44fe6a755dbd315c07093.pdf>
Awan I and Blakemore B, Policing Cyber Hate, Cyber Threats and Cyber Terrorism (Ashgate 2012) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4512562>
Ball KS and Webster F, The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age (Pluto 2003) <http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5662437450002746&institutionId=2746&customerId=2745>
Blackbourn J, Learning Lessons from Counter-Terrorism Failures: The United Kingdom’s Pre- and Post- 9/11 Counter-Terrorism Policy (2009) <https://convention2.allacademic.com/one/isa/isa09/>
‘Cabinet Office, (2011). The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World.’ <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf>
‘Cabinet Office National Security Pages’: <https://www.gov.uk/government/publications/security-policy-framework>
‘Cavelty, Dr Myriam Dunn, (2008) Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics. Vol 4 (1). Pp.19-36.’
‘Chalk, P. and Rosenau, W. (2004) Confronting “the Enemy Within”: Security Intelligence, the Police, and Counterterrorism in Four Democracies. Washington: RAND.’ <http://www.rand.org/content/dam/rand/pubs/monographs/2004/RAND_MG100.pdf>
Chen TM, Jarvis L and Macdonald S (eds), ‘The Criminalisation of Terrorists’ Online Preparatory Acts’, Cyberterrorism: understanding, assessment, and response (Springer 2014) <https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=1782052&ppg=175>
Clarke P, ‘Learning from Experience: Counter-Terrorism in the UK since 9/11 (Colin Cramphorn Memorial Lecture, Policy Exchange)’ <https://policyexchange.org.uk/wp-content/uploads/2016/09/learning-from-experience-jun-07.pdf>
Coaffee J, Terrorism, Risk and the Global City: Towards Urban Resilience (Ashgate Pub 2009) <http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/Doc?id=10331433>
‘CONTEST and Related Documents Are Available Online via the UK Home Office Page’ <https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism>
‘Cornish, P. (2007) Domestic Security, Civil Contingencies and Resilience in the United Kingdom: A Guide to Policy. London: Chatham House.’ <http://www.chathamhouse.org/publications/papers/view/108568>
‘Cornish, P (2008) “The National Security Strategy of the United Kingdom: How Radical Can Britain Be?” London: Chatham House.’
‘Cornish, P. (Ed) (2007) Britain and Security. London: Smith Institute.’
‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’ <http://www.ejls.eu/6/78UK.htm>
‘——’ <http://www.ejls.eu/6/78UK.htm>
Denning D, ‘Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.’ <https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm>
‘Edwards, C. (2007) The Case for a National Security Strategy. London: Demos.’ <http://demos.co.uk/files/Demos_report_the_case_for_a_national_security_strategy.pdf>
‘European Parliamentary Research Service, 2013. Briefing: Cyber Security in the EU’: <http://www.europarl.europa.eu/eplibrary/Cyber-security-in-the-European%20Union.pdf>
Fussey P, ‘New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK’ (2004) 2 Surveillance and Society <https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3377/3340>
Graham S, ‘Recasting the “Ring of Steel”: Designing Out Terrorism in the City of London’, Cities, war, and terrorism: towards an urban geopolitics (Blackwell Publishing 2004) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008>
——, ‘Technology Vs “Terrorism”: Circuits of City Surveillance Since September 11, 2001’, Cities, war, and terrorism: towards an urban geopolitics (Blackwell Publishing 2004) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008>
Gregory F, ‘CONTEST: An Evaluation of Revisions to the UK Counter-Terrorism Strategy with a Special Focus on the CBRNE Threat’ <https://www.realinstitutoelcano.org/en/analyses/contest-2009-an-evaluation-of-revisions-to-the-uk-counter-terrorism-strategy-with-a-special-focus-on-the-cbrne-threat-ari/>
Griset P and Mahan S, Terrorism in Perspective (SAGE 2003)
‘Haggerty, K., and Gazso, A. (2005) “Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats”, Canadian Journal of Sociology, 30(2): 169- 187.’ <http://www.jstor.org/discover/10.2307/4146129?sid=21105068938881&uid=3738032&uid=2&uid=4>
Herzog S, ‘Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses’ (2011) 4 Journal of Strategic Security <https://digitalcommons.usf.edu/jss/vol4/iss2/4/>
‘HM Government (2010): A Strong Britain in an Age of Uncertainty. The National Security Strategy. London: TSO’ <http://webarchive.nationalarchives.gov.uk/20121015000000/http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf>
‘Jarvis, L. & Macdonald, S. (2014) “What Is Cyberterrorism? Findings from a Survey of Researchers” Terrorism and Political Violence 37(1): Pp. 68-90’ <http://www.tandfonline.com/doi/abs/10.1080/1057610X.2014.853603?journalCode=uter20#.VJKDjSusU6w>
Keeble H and Hollington K, Terror Cops: Fighting Terrorism on Britain’s Streets (Pocket Books 2010)
Kenney M, ‘Cyber-Terrorism in a Post-Stuxnet World’
‘Kirshner, J. Barry Strauss, B., Fanis, M. and Evangelista, “Iraq and Beyond: The New U.S. National Security Strategy”, Cornell University Peace Studies Program Paper 27.’ <http://pacs.einaudi.cornell.edu/node/8135>
Kirstie Ball, ‘The Constant State of Emergency?: Surveillance after 9/11’, The Intensification Of Surveillance : crime, terrorism and warfare in the information age (Pluto Press) <http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5665222410002746&institutionId=2746&customerId=2745>
Lambert R and Freedman L, Countering Al-Qaeda in London: Police and Muslims in Partnership (Hurst 2011)
‘Lambert, R (2008) “Empowering Salafis and Islamists Against Al-Qaeda: A London Counterterrorism Case Study”. PS: Political Science & Politics, Vol. 41(1), 31-35.’
‘Lum, C., Kennedy, L.W. and Sherley, A. (2006) “Are Counter-Terrorism Strategies Effective?” Journal of Experimental Criminology Vol. 2 (4). 489-516.’
Lyon D, Surveillance after September 11, vol Themes for the 21st century (Polity 2003)
‘Martin, Thomas, (2014). Governing an Unknowable Future: The Politics of Britain’s Prevent Policy. Critical Studies on Terrorism Vol. 7 (1). 62-78’
‘MI5 - Threat Advice’ <https://www.mi5.gov.uk/home/the-threats/overview.html>
‘Monar, J. (2007) “Common Threat and Common Response? The European Union’s Counter-Terrorism Strategy and Its Problems”, Government and Opposition, Vol. 42 (3), 292-313.’
‘National Commission on Terrorist Attacks Upon the United States’ <http://www.9-11commission.gov/>
‘Omand, Sir David, 2009. The National Security Strategy: Implications for the UK Intelligence Community.’ <http://dematerialisedid.com/pdfs/National_Security_Strategy.pdf>
Parker A, ‘Director General Speaks on Terrorism, Technology and Oversight’ <https://www.mi5.gov.uk/news/director-general-speaks-on-terrorism-technology-and-oversight>
‘Pressman, J. (2007) “Rethinking Transnational Counterterrorism: Beyond a National Framework”, The Washington Quarterly, Vol. 20 (4), 63-73.’
‘Rudner, M. (2013) “Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge,” International Journal of Intelligence and CounterIntelligence, 26(3), Pp. 453-481’ <http://www.tandfonline.com/doi/abs/10.1080/08850607.2013.780552#.U6b_R_ldU6w>
Silke A, ‘Deterring Terrorists’, Terrorists, victims, and society: psychological perspectives on terrorism and its consequences (Wiley 2003) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=366881>
‘Stohl, M. (2007). “Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games,” Crime, Law and Social Change 46:223-238’
‘The Cyberterrorism Project’ <http://www.cyberterrorism-project.org/publications/>
‘Thomas, P. (2010) “Failed and Friendless: The UK’s ‘Preventing Violent Extremism’ Programme” The British Journal of Politics and International Relations, Vol 12 (3) 442-458.’ <http://eprints.hud.ac.uk/8949/>
Weimann G, Terror on the Internet: The New Arena, the New Challenges (United States Institute of Peace Press 2006)
‘White House, 2010. National Security Strategy’ <http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf>
Wilkinson P, Homeland Security in the UK: Future Preparedness for Terrorist Attack since 9/11 (Routledge 2007) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629>
Wilkinson, Paul (ed), ‘An Assessment of the Contribution of Intelligence Led Counter-Terrorism to UK Homeland Security Post 9/11 within the “Contest” Strategy’, Homeland Security in the UK: Future Preparedness for Terrorist Attack Since 9/11 (Routledge; New Ed edition (14 Jun 2007)) <https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629>