{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:50:57Z","timestamp":1759092657750},"reference-count":18,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,11]]},"DOI":"10.1016\/s0167-4048(02)01116-1","type":"journal-article","created":{"date-parts":[[2003,1,9]],"date-time":"2003-01-09T12:31:12Z","timestamp":1042115472000},"page":"636-647","source":"Crossref","is-referenced-by-count":38,"title":["Cyberterrorism?"],"prefix":"10.1016","volume":"21","author":[{"given":"Sarah","family":"Gordon","sequence":"first","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)01116-1_BIB1","unstructured":"Collin, B., 1997. The Future of Cyberterrorism, Crime and Justice International, March 1997, pp.15\u201318."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB2","unstructured":"Crenshaw, M. 1999. How Terrorism Ends. US Institute of Peace working group report, May 1999."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB3","unstructured":"Denning, D., \u201cCyberterrorism\u201d, Testimony before the Special Oversight Panel of Terrorism Committee on Armed Services, US House of Representatives, 23 May 2000. (http:\/\/www.cs.georgetown.edu\/\u223cdenning\/infosec\/cyberterror.html)"},{"key":"10.1016\/S0167-4048(02)01116-1_BIB4","unstructured":"DOC, 2002. US Department of Commerce, Export Administration Regulations (EAR), 15 C.F.R. Parts 730\u2013774. Sections 740.13, 740.17 and 742.15 are the principal references for the export of encryption items."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB5","unstructured":"DOD, 2002. Department of Defense Education Activity Internal Physical Security. Department of Defense. DoDEA Regulatoin 4700.2"},{"key":"10.1016\/S0167-4048(02)01116-1_BIB6","unstructured":"DOS, 2002. United States Code. Title 22, Section 2656f."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB7","unstructured":"FBI, 2002. Code of Federal.Regulations. 28 CFR. Section 0.85 on Judicial Administration. July 2001."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB8","unstructured":"Hamblen, M. Clinton commits $1.46B to fight cyberterrorism http:\/\/www.cnn.com\/TECH\/computing\/9901\/26\/clinton.idg, 26 January 1999."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB9","doi-asserted-by":"crossref","unstructured":"HLS, 2002. National Strategy for Homeland Security. Office of Homeland Security. July 2002.","DOI":"10.1016\/S1353-4858(02)08004-2"},{"key":"10.1016\/S0167-4048(02)01116-1_BIB10","unstructured":"Holland, J. 2001. Investigators look into how library computers may have linked terrorists. South Florida Sun-Sentineel. Miami, FL."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB11","unstructured":"Legion, 2002. http:\/\/legion.virginia.edu Retrieved from the World Wide Web, August 2002."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB12","unstructured":"Luening, E. 2000. Clinton launches plan to protect IT infrastructure. CNET, 7 January 2000."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB13","unstructured":"McKay, N. 1998. Pentagon Deflects Web Assault. Wired, September 1998."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB14","unstructured":"Reuters, 2000. Canadian dollar in for a ride with Martin Firing. http:\/\/biz.yahoo.com\/rf\/020602\/canada_economy_dollar_2.html."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB15","doi-asserted-by":"crossref","unstructured":"Stone, V. 1993. Social interaction and social development in virtual environments. Teleoperators and Virtual Environments, Vol. 2. pp. 153\u2013161.","DOI":"10.1162\/pres.1993.2.2.153"},{"key":"10.1016\/S0167-4048(02)01116-1_BIB16","doi-asserted-by":"crossref","unstructured":"Whiteback, C. 1993. Virtual environments: Ethical issues and significant confusions. Teleoperators and Virtual Environments, Vol. 2. pp. 147\u2013152.","DOI":"10.1162\/pres.1993.2.2.147"},{"key":"10.1016\/S0167-4048(02)01116-1_BIB17","unstructured":"Whitelaw, K. 1998. Terrorists on the Web: Electronic \u2018Safe Haven\u2019. US News & World Report, Vol.124, p. 46."},{"key":"10.1016\/S0167-4048(02)01116-1_BIB18","unstructured":"WCC, 2002. IFIP World Computer Congress Workshop. IFIP World Computer Congress. Montreal, Quebec, Canada. August 2002."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802011161?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802011161?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T12:29:34Z","timestamp":1583929774000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802011161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11]]},"references-count":18,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2002,11]]}},"alternative-id":["S0167404802011161"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)01116-1","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,11]]}}}