{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T02:04:09Z","timestamp":1770948249998,"version":"3.50.1"},"reference-count":65,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Digital Forensic Practice"],"published-print":{"date-parts":[[2009,9,9]]},"DOI":"10.1080\/15567280802678657","type":"journal-article","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T08:05:23Z","timestamp":1252915523000},"page":"161-171","source":"Crossref","is-referenced-by-count":15,"title":["Cyberterrorism: Its Effects on Health-Related Infrastructures"],"prefix":"10.1080","volume":"2","author":[{"given":"Jonathan","family":"Matusitz","sequence":"first","affiliation":[{"name":"University of Central Florida","place":["USA"]}]},{"given":"Elizabeth","family":"Minei","sequence":"additional","affiliation":[{"name":"University of Oklahoma","place":["USA"]}]}],"member":"301","published-online":{"date-parts":[[2009,9,11]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1049023X00001163"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1525\/curh.2002.101.659.436"},{"key":"e_1_3_2_4_1","volume-title":"Neuromancer","author":"Gibson W.","year":"1984","unstructured":"Gibson , W. 1984 . Neuromancer , New York : Ace Books ."},{"key":"e_1_3_2_5_1","volume-title":"Get Real: A Philosophical Adventure in Virtual Reality","author":"Zhai P.","year":"1998","unstructured":"Zhai , P. 1998 . Get Real: A Philosophical Adventure in Virtual Reality , New York : Rowman & Littlefield Publishers ."},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/1149086"},{"key":"e_1_3_2_7_1","volume-title":"Terrorism: The Present Threat in Context","author":"Sloan S.","year":"2006","unstructured":"Sloan , S. 2006 . Terrorism: The Present Threat in Context , Oxford, UK : Berg Publishers ."},{"key":"e_1_3_2_8_1","volume-title":"A Study in Political Violence: The Indonesian Experience","author":"Sloan S.","year":"1981","unstructured":"Sloan , S. 1981 . A Study in Political Violence: The Indonesian Experience , Norman, OK : University of Oklahoma Press ."},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/10.2.238"},{"issue":"4","key":"e_1_3_2_10_1","first-page":"10","article-title":"Countering Cyber Terrorism Effectively: Are We Ready to Rumble","volume":"1","author":"Jalil S.A.","year":"2003","unstructured":"Jalil , S.A. 2003 . Countering Cyber Terrorism Effectively: Are We Ready to Rumble . GIAC Security Essentials Certification (GSEC) Practical Assignment Version , 1 ( 4 ) : 10 \u2013 15 .","journal-title":"GIAC Security Essentials Certification (GSEC) Practical Assignment Version"},{"key":"e_1_3_2_11_1","volume-title":"The Next War Zone: Confronting the Global Threat of Cyberterrorism","author":"Dunnigan J.F.","year":"2003","unstructured":"Dunnigan , J.F. 2003 . The Next War Zone: Confronting the Global Threat of Cyberterrorism , New York : Citadel Press ."},{"issue":"44","key":"e_1_3_2_12_1","first-page":"3","article-title":"Cyber Terrorism: A Clear and Present Danger to Civilized Society?","volume":"3","author":"Jain R.","year":"2005","unstructured":"Jain , R. 2005 . Cyber Terrorism: A Clear and Present Danger to Civilized Society? . Information Systems Education Journal , 3 ( 44 ) : 3","journal-title":"Information Systems Education Journal"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1377883"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/10576100590905110"},{"key":"e_1_3_2_15_1","volume-title":"Cyberterrorism and Computer Crimes: Issues Surrounding the Establishment of an International Legal Regime","author":"Aldrich R.W.","year":"2000","unstructured":"Aldrich , R.W. 2000 . Cyberterrorism and Computer Crimes: Issues Surrounding the Establishment of an International Legal Regime , Colorado Springs, CO : Institute for National Security Studies . Occasional Paper 32"},{"issue":"5","key":"e_1_3_2_16_1","first-page":"15","article-title":"The Next Threat","volume":"174","author":"Lenzner R.","year":"2007","unstructured":"Lenzner , R. and Vardi , N. 2007 . The Next Threat . Forbes , 174 ( 5 ) : 15 \u2013 21 .","journal-title":"Forbes"},{"issue":"1","key":"e_1_3_2_17_1","first-page":"14","article-title":"Defending against Cyber Crime and Terrorism","volume":"74","author":"Aeilts T.","year":"2005","unstructured":"Aeilts , T. 2005 . Defending against Cyber Crime and Terrorism . FBI Law Enforcement Bulletin , 74 ( 1 ) : 14 \u2013 20 .","journal-title":"FBI Law Enforcement Bulletin"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(07)70021-0"},{"key":"e_1_3_2_19_1","volume-title":"Information Warfare: How to Survive Cyber Attacks","author":"Erbschloe M.","year":"2001","unstructured":"Erbschloe , M. 2001 . Information Warfare: How to Survive Cyber Attacks , Boston : McGraw-Hill ."},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1560775500097741"},{"key":"e_1_3_2_21_1","volume-title":"Terror on the Internet: The New Arena, the New Challenges","author":"Weimann G.","year":"2006","unstructured":"Weimann , G. 2006 . Terror on the Internet: The New Arena, the New Challenges , Washington, DC : United States Institute of Peace ."},{"issue":"3","key":"e_1_3_2_22_1","first-page":"16","article-title":"Countering Cyber Attacks","volume":"41","author":"Wagner C.G.","year":"2007","unstructured":"Wagner , C.G. 2007 . Countering Cyber Attacks . The Futurist , 41 ( 3 ) : 16","journal-title":"The Futurist"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511481604"},{"key":"e_1_3_2_24_1","unstructured":"Denning D. (2000 May 23). Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. http:\/\/www.cs.georgetown.edu\/~denning\/infosec\/cyberterror.html (Accessed: 10 October 2003 )."},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/047009480X"},{"key":"e_1_3_2_26_1","first-page":"A7","article-title":"After Estonia Cyber Attacks: U.S. Frets over Potential Cyber War","volume":"117","author":"Krebsbach K.","year":"2007","unstructured":"Krebsbach , K. 2007 . After Estonia Cyber Attacks: U.S. Frets over Potential Cyber War . US Banker , 117 : A7","journal-title":"US Banker"},{"key":"e_1_3_2_27_1","volume-title":"Networks and Netwars: The Future of Terror, Crime, and Militancy","author":"Arquilla J.","year":"2001","unstructured":"Arquilla , J. and Ronfeldt , D. , eds. 2001 . Networks and Netwars: The Future of Terror, Crime, and Militancy , Santa Monica : RAND ."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1163\/9789401204354"},{"key":"e_1_3_2_29_1","volume-title":"Terrorism and Homeland Security: An Introduction with Applications","author":"Purpura P.","year":"2006","unstructured":"Purpura , P. 2006 . Terrorism and Homeland Security: An Introduction with Applications , Philadelphia : Butterworth ."},{"key":"e_1_3_2_30_1","volume-title":"Disaster Nursing and Emergency Preparedness for Chemical, Biological and Radiological Terrorism and Other Hazards","author":"Veenema T.G.","year":"2007","unstructured":"Veenema , T.G. 2007 . Disaster Nursing and Emergency Preparedness for Chemical, Biological and Radiological Terrorism and Other Hazards , New York : Springer ."},{"key":"e_1_3_2_31_1","volume-title":"Public Health and Preventive Medicine","author":"Wallace R.B.","year":"2007","unstructured":"Wallace , R.B. 2007 . Public Health and Preventive Medicine , Boston : McGraw-Hill ."},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1049023X00000753"},{"issue":"3","key":"e_1_3_2_33_1","first-page":"79","article-title":"Addressing Cyber Security in the Oil and Gas Industry","volume":"233","author":"Sevounts G.","year":"2006","unstructured":"Sevounts , G. 2006 . Addressing Cyber Security in the Oil and Gas Industry . Pipeline & Gas Journal , 233 ( 3 ) : 79 \u2013 80 .","journal-title":"Pipeline & Gas Journal"},{"key":"e_1_3_2_34_1","volume-title":"Wormwood Forest: A Natural History of Chernobyl","author":"Mycio M.","year":"2005","unstructured":"Mycio , M. 2005 . Wormwood Forest: A Natural History of Chernobyl , Washington, DC : Joseph Henry Press ."},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198251583.001.0001"},{"issue":"1","key":"e_1_3_2_36_1","first-page":"179","article-title":"A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict","volume":"47","author":"Brown D.","year":"2006","unstructured":"Brown , D. 2006 . A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict . Harvard International Law Journal , 47 ( 1 ) : 179 \u2013 221 .","journal-title":"Harvard International Law Journal"},{"issue":"2","key":"e_1_3_2_37_1","first-page":"31","article-title":"Safety First","volume":"17","author":"Jacobs J.","year":"2005","unstructured":"Jacobs , J. 2005 . Safety First . Water Environment & Technology , 17 ( 2 ) : 31 \u2013 34 .","journal-title":"Water Environment & Technology"},{"issue":"35","key":"e_1_3_2_38_1","first-page":"22","article-title":"Plugging Holes","volume":"23","author":"Preimesberger C.","year":"2006","unstructured":"Preimesberger , C. 2006 . Plugging Holes . eWeek , 23 ( 35 ) : 22 \u2013 28 .","journal-title":"eWeek"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.56021\/9780801883187"},{"key":"e_1_3_2_40_1","first-page":"10","article-title":"The Truth about Cyber-Terrorism","volume":"1","author":"Berinato S.","year":"2002","unstructured":"Berinato , S. 2002 . The Truth about Cyber-Terrorism . CIO Magazine , 1 : 10 \u2013 21 .","journal-title":"CIO Magazine"},{"issue":"6","key":"e_1_3_2_41_1","first-page":"60","article-title":"Cyber Terror","volume":"77","author":"Haugh R.","year":"2003","unstructured":"Haugh , R. 2003 . Cyber Terror . H&HN: Hospitals & Health Networks , 77 ( 6 ) : 60","journal-title":"H&HN: Hospitals & Health Networks"},{"key":"e_1_3_2_42_1","volume-title":"Stedman's Guide to the HIPAA Privacy Rule","author":"Rockel K.","year":"2005","unstructured":"Rockel , K. 2005 . Stedman's Guide to the HIPAA Privacy Rule , Philadelphia : Lippincott Williams & Wilkins ."},{"key":"e_1_3_2_43_1","volume-title":"Black Ice: The Invisible Threat of Cyber-Terrorism","author":"Verton D.","year":"2003","unstructured":"Verton , D. 2003 . Black Ice: The Invisible Threat of Cyber-Terrorism , New York : McGraw-Hill ."},{"issue":"2","key":"e_1_3_2_44_1","first-page":"379","article-title":"At Light Speed: Attribution and Response to Cybercrime\/Terrorism\/Warfare","volume":"97","author":"Brenner S.W.","year":"2007","unstructured":"Brenner , S.W. 2007 . At Light Speed: Attribution and Response to Cybercrime\/Terrorism\/Warfare . The Journal of Criminal Law & Criminology , 97 ( 2 ) : 379 \u2013 475 .","journal-title":"The Journal of Criminal Law & Criminology"},{"key":"e_1_3_2_45_1","first-page":"31","article-title":"In Defense of Cyberterrorism: An Argument for Anticipating Cyber-Attacks","volume":"1","author":"Brenner S.W.","year":"2002","unstructured":"Brenner , S.W. and Goodman , M.D. 2002 . In Defense of Cyberterrorism: An Argument for Anticipating Cyber-Attacks . The University of Illinois Journal of Law, Technology & Policy , 1 : 31 \u2013 40 .","journal-title":"The University of Illinois Journal of Law, Technology & Policy"},{"issue":"2","key":"e_1_3_2_46_1","first-page":"15","article-title":"Information Warfare: An Analysis of the Threat of Cyber-Terrorism Towards the US Critical Infrastructure","volume":"1","author":"Lawson S.M.","year":"2002","unstructured":"Lawson , S.M. 2002 . Information Warfare: An Analysis of the Threat of Cyber-Terrorism Towards the US Critical Infrastructure . SANS Institute , 1 ( 2 ) : 15 \u2013 26 .","journal-title":"SANS Institute"},{"key":"e_1_3_2_47_1","first-page":"12","article-title":"Dutch Botnet Suspects Ran 1.5 Million Machines","volume":"2","author":"Keizer G.","year":"2005","unstructured":"Keizer , G. 2005 . Dutch Botnet Suspects Ran 1.5 Million Machines . TechWeb Technology News , 2 : 12 \u2013 18 .","journal-title":"TechWeb Technology News"},{"key":"e_1_3_2_48_1","volume-title":"Botnet Detection: Countering the Largest Security Threat","author":"Lee W.","year":"2007","unstructured":"Lee , W. , Wang , C. and Dagon , D. 2007 . Botnet Detection: Countering the Largest Security Threat , New York : Springer ."},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-991-5"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-583-2"},{"key":"e_1_3_2_51_1","volume-title":"It's a Disaster: The Money and Politics That Follow Earthquakes, Hurricanes and Other Catastrophic Losses","author":"Russell D.","year":"1999","unstructured":"Russell , D. 1999 . It's a Disaster: The Money and Politics That Follow Earthquakes, Hurricanes and Other Catastrophic Losses , Landsdowne, PA : Silver Lake Publishing ."},{"issue":"3","key":"e_1_3_2_52_1","first-page":"783","article-title":"Known Unknowns: The Illusion of Terrorism Insurance","volume":"93","author":"Boardman M.E.","year":"2005","unstructured":"Boardman , M.E. 2005 . Known Unknowns: The Illusion of Terrorism Insurance . The Georgetown Law Journal , 93 ( 3 ) : 783 \u2013 844 .","journal-title":"The Georgetown Law Journal"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/15567280701723901"},{"issue":"95","key":"e_1_3_2_54_1","first-page":"1054","article-title":"Insurance, Terrorism, and 9\/11: Reflections on Three Threshold Questions","volume":"9","author":"Jerry R.H.","year":"2002","unstructured":"Jerry , R.H. II. 2002 . Insurance, Terrorism, and 9\/11: Reflections on Three Threshold Questions . Connecticut Insurance Law Journal , 9 ( 95 ) : 1054 \u2013 1069 .","journal-title":"Connecticut Insurance Law Journal"},{"key":"e_1_3_2_55_1","volume-title":"Proceedings of the SCADA Security Scientific Symposium","author":"Peterson D.","year":"2007","unstructured":"Peterson , D. 2007 . Proceedings of the SCADA Security Scientific Symposium , Sunrise, FL : Digital Bond Press ."},{"key":"e_1_3_2_56_1","volume-title":"Cybersecurity for SCADA Systems","author":"Shaw W.","year":"2006","unstructured":"Shaw , W. 2006 . Cybersecurity for SCADA Systems , Tulsa, OK : PennWell Corp ."},{"key":"e_1_3_2_57_1","first-page":"2","article-title":"The Information Empowered Enterprise: Driving Operational Excellence","volume":"54","author":"Martin G.","year":"2007","unstructured":"Martin , G. 2007 . The Information Empowered Enterprise: Driving Operational Excellence . Control Engineering , 54 : 2 \u2013 3 .","journal-title":"Control Engineering"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1057\/9780230510555"},{"key":"e_1_3_2_59_1","volume-title":"Practical Modern SCADA Protocols","author":"Clarke G.","year":"2004","unstructured":"Clarke , G. and Reynders , D. 2004 . Practical Modern SCADA Protocols , Burlington, MA : Newnes ."},{"key":"e_1_3_2_60_1","volume-title":"Automation of Wastewater Treatment Facilities","author":"Water Environment Federation","year":"2006","unstructured":"Water Environment Federation . 2006 . Automation of Wastewater Treatment Facilities , Boston : McGraw-Hill ."},{"key":"e_1_3_2_61_1","volume-title":"Gray Hat Hacking","author":"Harris S.","year":"2007","unstructured":"Harris , S. , Harper , A. , Eagle , C. and Ness , J. 2007 . Gray Hat Hacking , Boston : McGraw-Hill ."},{"key":"e_1_3_2_62_1","volume-title":"Ten Steps for Securing Electronic Health Care Systems","author":"Cyber Security Industry Alliance","year":"2005","unstructured":"Cyber Security Industry Alliance . 2005 . Ten Steps for Securing Electronic Health Care Systems , Washington, DC : CSIA ."},{"key":"e_1_3_2_63_1","volume-title":"Social Work in Schools: Principles and Practice (Social Work Practice with Children and Families)","author":"Openshaw L.","year":"2007","unstructured":"Openshaw , L. 2007 . Social Work in Schools: Principles and Practice (Social Work Practice with Children and Families) , New York : Guilford ."},{"key":"e_1_3_2_64_1","volume-title":"Analysis, Fate and Removal of Pharmaceuticals in the Water Cycle","author":"Petrovic M.","year":"2007","unstructured":"Petrovic , M. and Barcelo , D. 2007 . Analysis, Fate and Removal of Pharmaceuticals in the Water Cycle , St. Louis, MO : Elsevier Science . Vol. 50"},{"key":"e_1_3_2_65_1","volume-title":"Computer Security: ESORICS 2007: 12th European Symposium on Research in Computer Security, Dresden, Germany (September 24\u201326, 2007)","author":"Biskup J.","year":"2007","unstructured":"Biskup , J. and Lopez , J. 2007 . Computer Security: ESORICS 2007: 12th European Symposium on Research in Computer Security, Dresden, Germany (September 24\u201326, 2007) , New York : Springer ."},{"key":"e_1_3_2_66_1","volume-title":"The Power of Mobility: How Your Business Can Compete and Win in the Next Technology Revolution","author":"McGuire R.","year":"2007","unstructured":"McGuire , R. 2007 . The Power of Mobility: How Your Business Can Compete and Win in the Next Technology Revolution , New York : Wiley & Sons ."}],"container-title":["Journal of Digital Forensic Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/15567280802678657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T01:07:20Z","timestamp":1770944840000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/15567280802678657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,9]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,9,9]]}},"alternative-id":["10.1080\/15567280802678657"],"URL":"https:\/\/doi.org\/10.1080\/15567280802678657","relation":{},"ISSN":["1556-7281","1556-7346"],"issn-type":[{"value":"1556-7281","type":"print"},{"value":"1556-7346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,9]]}}}