| Other1. | (20020110)。駭客組織反美攻擊以臺灣當跳板。 延伸查詢![new window](/gs32/images/newin.png) | 2. | (20010926)。投票病毒藉911散佈。 延伸查詢![new window](/gs32/images/newin.png) | 3. | (20010501)。國內首宗駭客入侵網路銀行盜領存款百餘萬元。 延伸查詢![new window](/gs32/images/newin.png) | 4. | (20010703)。駭客入侵券商網路下單遭破解。 延伸查詢![new window](/gs32/images/newin.png) | 5. | (20000525)。電信飛客新的電腦犯罪方式。 延伸查詢![new window](/gs32/images/newin.png) | 6. | (20070705)。Reuters, First ever UK conviction for internet terrorism。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 期刊論文1. | 彭慧鸞(20041100)。數位時代的國家安全與全球治理。問題與研究,43(6),29-52。 延伸查詢![new window](/gs32/images/newin.png) | 2. | Qin, J.、Zhou, Y.、Reid, E.、Lai, G.、Chen, H.(2007)。Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity。International Journal of Human-Computer Studies,65,71-84。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Pollitt, Mark M.(1997)。A Cyberterrorism Fact or Fancy?。20th National Information Systems Security Conference。Kojetínská:Czech Space Research Center。285-289。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Conway, Maura(2005)。Terrorist 'use' of the Internet and fighting back。Conference Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities。UK:Oxford University。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Watts, David(2003)。Security & Vulnerability in Electric Power Systems。35th North American Power Symposium,(會議日期: 2003/10/20-10/21)。Missouri:University of Missouri-Rolla in Rolla。559-566。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Collin, Barry C.(1996)。The Future of Cyber Terrorism: Where the Physical and Virtual Worlds Converge。11th Annual International Symposium on Criminal Justice Issues。The University of Illinois at Chicago。15-18。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書1. | Reno, Janet(20000405)。Opening Remarks of Attorney General Janet Reno at the Cybercrime Summit。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Information Analysis and Infrastructure Protection, Department of Homeland Security(20040915)。How Terrorists Might Exploit a Hurricane。Information Analysis and Infrastructure Protection, Department of Homeland Security。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Erbschloe, Michael(2001)。Information Warfare: How to Survive Cyber Attacks。McGraw-Hill Company。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | United Nations。Proposed Definitions of Terrorism,http://www.unodc.org/unodc/terrorismdefinitions.html。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 圖書論文1. | Eppright, Charles T.(1997)。Counterterrorism and Conventional Military Force: The Relationship Between Political Effect and Utility。Studies in Conflict and Terrorism。Taylor & Francis。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | O'Brien, Conor Cruise(1983)。Terrorism Under Democratic Conditions: The Case of the IRA。Terrorism, Legitimacy and Power: The Consequences of Political Violence。Manufactured:Wesleyan University。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |