29
References
Falliere, N., O Murchu, L., Chien, E., 2010. W32.Stuxnet Dossier. Symantec, Cupertino,
USA.
http://www.symantec.com/content/en/us/enterprise/media/security_response/
whitepapers/w32_stuxnet_dossier.pdf
(accessed 15.02.14).
Geelof, A., 2007. Chantage om gegevens uit computer. The Netherlands, Telegraaf 12-01-
1977, pp. 1 and 9.
Harmon, A., 1995. Hacking Theft of $10 Million From Citibank Revealed. August 19, 1995,
Los Angeles Times, Los Angeles.
http://articles.latimes.com/1995-08-19/business/fi-
36656_1_citibank-system
(accessed 15.02.14).
Huff Post Food, 2011. British Spies Replace Terrorists' Online Bomb Instructions With
Cupcake Recipe. June 2011.
http://www.huffingtonpost.com/2011/06/03/british-spies-
terrorist-bomb-cupcake-recipe_n_870882.html
(accessed 15.02.14).
Korver, H., 2007. Met diefstal computer gegevens ICI trad tijdperk in van nieuw soort crimi-
naliteit. Telegraaf 22-01-1977, pp. 17, The Netherlands.
KrebsOnSecurity, 2012. FBI: Smart Meter Hacks Likely to Spread.
http://krebsonsecurity.
com/2012/04/fbi-smart-meter-hacks-likely-to-spread
(accessed 15.02.14).
Luiijf, H.A.M., 2010. Process Control Security in the Cybercrime Information Exchange.
NICC, The Hague, The Netherlands.
http://www.cpni.nl/publications/PCS_brochure-UK.
pdf
(accessed 15.02.14).
Luiijf, E., 2013. Why are we so unconsciously insecure? Int. J. Crit. Infrastruct. Protect. 6,
179–181.
Markoff, J., 1990. Computer Intruder is Put on Probation and Fined $10,000. New York
Times. May 5, 1990,
http://www.nytimes.com/1990/05/05/us/computer-intruder-is-put-
on-probation-and-fined-10000.html
(accessed 15.02.14).
Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., et al., 2010. Security and
Privacy Vulnerabilities of In-CarWireless Networks: A Tire Pressure Monitoring
System Case Study. USENIX'10, p. 16,
https://www.usenix.org/conference/usenix-
security10/security-and-privacy-vulnerabilities-car-wireless-networks-tire-pressure
(accessed 15.02.14).
Stigherrian, 2011. Lethal medical device hack taken to the next level. CSO Online, Australia.
http://www.cso.com.au/article/404909/lethal_medical_device_hack_taken_next_level/
(accessed 15.02.14).
TRB, 2012. TRB Special report 308: The Safety Challenge and Promise of Automotive
Electronics: Insights from Unintended Acceleration. Transportation Research Board,
National Academies Press, Washington DC.
http://www.nap.edu/catalog.php?record_
id=13342
(accessed 15.02.14).
Venkatesh, V., Morris, M., Davis, G., Davis, F., 2003. User acceptance of information technol-
ogy: toward a unified view. MIS Q 27 (3), 425–478.
Venkatesh, V., Bala, H., 2008. Technology acceptance model 3 and a research agenda on inter-
ventions. Decision Sci 39 (2), 273–315.
Wray, S., 1998. The Electronic Disturbance Theater and Electronic Civil Disobedience.
June 17, 1998,
http://www.thing.net/~rdom/ecd/EDTECD.html
(accessed 15.02.14).
Do'stlaringiz bilan baham: |