SciELO - Scientific Electronic Library Online

SciELO - Scientific Electronic Library Online

Article References

CASSIM, F. Addressing the spectre of cyber terrorism: a comparative perspective. PER [online]. 2012, vol.15, n.2, pp. 01-37. ISSN 1727-3781.

    Basdeo V "Terrorist financing in Southern Africa: African commitment to combating terrorism" Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV)15-17 January 2011 Jaipur 49-52 [ Links ]

    Bazelon D et al "Computer crimes" 2006 The American Criminal Law Review43 260-308

    [ Links ]

    Brunst PW "Terrorism and the Internet: New Threats Posed by Cyber terrorism and Terrorist Use of the Internet" in A War on Terror? The European Stance on a New Threat, Changing Laws and Human Rights Implications Wade M and Maljevic A (ed) (2010 Springer) 51-78  [ Links ]

    Cassim F "Formulating specialised legislation to address the growing spectre of cybercrime: A comparative study" 2009 PER 36-79 [ Links ]

    Cassim F "Addressing the growing spectre of cyber crime in Africa: evaluating measures adopted by South Africa and other regional role players" 2011 CILSA XLIV 123-138 [ Links ]

    Cassim F "Combating Cyber Terrorism in South Africa: Are Adequate Measures in Place?"Proceedings of the Third Annual Conference of Asian Criminological Society (ACS) 17-19 December 2011 Taiwan 96-105 [ Links ]

    Conway M "Terrorism and New Media: the Cyber Battle Space" in Countering Terrorism and Insurgency in the twenty first centuryJames F Forest (ed) (2007 Praeger SecurityInternational - Greenwood Publishing) 1-31 [ Links ]

    Dominguez R "Electronic Civil Disobedience Post 9/11: Forget Cyber-Terrorism and Swarm the Future Now!" 2008 Third Text 22(5) 661-670

    [ Links ]

    Embar-Seddon A "Cyber terrorism: Are we under siege?" 2002 American Behavioural Scientist 45(6) 1033-1043 [ Links ]

    Garg N "Cyber terrorism: The advent of E-War" Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV)15-17 January 2011 Jaipur 121-123 [ Links ]

    Goodman MD & Brenner S "The Emerging Consensus on Criminal Conduct in Cyberspace" 2002 International Journal of Law and Information Technology139-223 [ Links ]

    Guru A & Mahishwar U "Terror Networking via Social Networking: Are the Laws adequate" Proceedings of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV) 15-17 January 2011 Jaipur 71-73 [ Links ]

    Krapp P "Terror and Play, or What was Hacktivism?" 2005 Grey Room Inc and Massachusetts Institute of Technology 70-93 [ Links ]

    Nappinai NS "Cyber crime law in India: Has Law Kept Pace with Emering Trends? - An Empirical Study" in Legal Discourse in Cyberlaw and TradeKierkegaard SM (ed) (2009 International Association of IT lawyers) 405-414 [ Links ]

    Raghavan TM "In Fear of Cyberterrorism: An Analysis of the Congressional Response" 2003 Journal of Law, Technology and Policy297-312 [ Links ]

    Tushabe F & Baryamureeba V "Cyber Crime in Uganda: Myth or Reality?" 2005 World Academy of Science, Engineering and Technology 8 66-70 [ Links ]

    Van der Merwe Det al 2008 Information and Communications Technology Law (Lexis Nexis) [ Links ]

    Veerasamy N 2009 "Towards a Conceptual Framework for Cyber- terrorism"4thInternational Conference on Information Warfare and Security 26-27 March 2009 Cape Town [ Links ]

    Walker C "Cyber-Terrorism: Legal Principle and Law in the United Kingdom" 2006 Pennsylvania State Law Review 110(3) 625-665 [ Links ]

    Weimann G "Cyber terrorism: The sum of all fears?" 2005 Studies in Conflict and Terrorism129-149 [ Links ]

    Young R "Defining Terrorism: The Evolution of Terrorism as a Legal Concept in International Law and Its Influence on Definitions in Domestic Legislations2006 Boston College International and Comparative Law Review29(1) 23-103

    [ Links ]

    Anonymous 2011 http://www.defenceweb.co.za/index; http://cbr.co.za/news.aspx ; http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm ; http://www.elaw@legabrief.co.za ; http://mg.co.za/article/2011-06-17; http://mg.co.za /article/2010-05-31 ; http://mg.co.za/article/2010-04-19 [ Links ]

    Anonymous 2011 "South Africa to establish a national computer security incident response team" http://www.defenceweb.co.za/index [accessed on 6 October 2011] [ Links ]

    Anonymous 2011 "SA takes first steps towards Computer Security Incident Response Team (CSIRT)" http://cbr.co.za/news.aspx [accessed on 6 October 2011] [ Links ]

    Anonymous 2011 "European Convention on Cyber crime" http://conven tions.coe.int/Treaty/en/Treaties/Html/185.htm [accessed on 16 February 2011] [ Links ]

    Anonymous 2011 "eLaw and Management" http://www.elaw@legabrief.co.za [accessed on 14 September 2011] [ Links ]

    Anonymous 2011 "Terrorists favour "easy" fake SA passports" http://mg.co.za/article/2011-06-17 [accessed on 5thOctober 2011] [ Links ]

    Anonymous 2011 "There is no World Cup terror threat" http://mg.co.za/article/2010-05-31 [accessed on 3rd October 2011] [ Links ]

    Anonymous 2011 "Right-wing link in arms cache found" http://mg.co.za/article/2010-04-19 [accessed on 3rdOctober 2011] [ Links ]

    Anonymous 2011"eLaw and Management" http://www.elaw@legabrief.co.za [accessed on 3rdOctober 2011]

    [ Links ]

    Anonymous 2012 http://www.csoonline.com/article/700397/liberman-cybersecurity-act-of-2012; http://www.elaw@legalbrief.co.za; http://wwwnews.bbc.co.uk [ Links ]

    Anonymous 2012 "Lieberman: Cybersecurity Act of 2012 will help us protect critical infrastructure" http://www.csoonline.com/article/700397/liberman-cybersecurity-act-of-2012 [accessed on 23 April 2012] [ Links ]

    Anonymous 2012"eLaw and Management" http://www.elaw@legalbrief.co.za [accessed on 4 April 2012] [ Links ]

    Anonymous "New terror laws come into force" http://wwwnews.bbc.co.uk [accessed on 1 May 2012]

    [ Links ]

    Anonymous 2012mhtml:file: // E:\Warning of rise in cyber-terrorism - Crime - UK - The Independent; mhtml: file: //E:\Cambridge Wireless debates UK cyber terrorism agency Business Wee... [ Links ]

    Anonymous 2012 "Cambridge Wireless debates UK Cyber Terrorism Agency" Business Weekly mhtml: file: //E:\Cambridge Wireless debates UK cyber terrorism agency Business Wee... [accessed on 23 April 2012] [ Links ]

    Botha A 2005 "PAGAD: A Case study of Radical Islam in South Africa" Terrorism Monitor3(17) http://www.jamestown.org[accessed on5thOctober 2011] [ Links ]

    Denning D 2000 "Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy" http://www/iwar.org.uk/cyberterror/resources/denning.htm [accessed on3 October 2011] [ Links ]

    FATF http://www.fatf-gafi.org [accessed on 5thOctober 2011] [ Links ]

    Frauenheim 2002 "IDC: Cyber terror and other prophecies" http://news.cnet.com/2100-1001-977780.html?tag=fd_top [accessed on07 April 2012] [ Links ]

    Gerke M 2009 "Understanding Cybercrime: a guide for developing countries (ITU 2009)" http://www.itu.int/ITU-D/cyb/cybersecurity/legislation/html [accessed on 29 September 2011] [ Links ]

    Gordon S & Ford R 2002 "Cyberterrorism?" Computers and Security21(7) 636-647 http://www.symantec.com/avcenter/reference/cyberterrorism [accessed on 29 September 2011] [ Links ]

    Green J 'The Myth of Cyberterrorism' http://www.washingtonmonthly.com/features/2001/0211.green.html (accessed on 17 April 2012). [ Links ]

    Kufa M 2009 "Cybersurfing without boundaries" http://umkn-lib01.int.unisa.ac.za/nxt/gateway [accessed on7thOctober 2009] [ Links ]

    Kumar N "Africa could become the cybercrime capital of the world" http://www.psfk.com/2010/04 [accessed on6 December 2010] [ Links ]

    Nicholls C" UK Anti-Terrorism Crime and Security Act 2001: Too much...too soon"CHRI News http://www.humanrightsiniative.org/publicatons/hl/1/5/2012 [accessed on 1 May 2012] [ Links ]

    Pollit MM 1998 "Cyber Terrorism-Fact or Fancy?" http://www.scribd.com/doc/ [accessed on3rdOctober 2011] [ Links ]

    SABRIC https://www.sabric.co.za [accessed on16 February 2011] [ Links ]

    Stohl M "Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?" Crime Law and Social Change http://ceps.anu.edu.au/publications/pdfs/stohl [accessed on 17 April 2012] [ Links ]