References
On the definition and classification of cyber crime." Journal in Computer Virology 2, no. 1 (2006): 13-20. "
Internet Security Threat Report In 2011 trends, vol. 17. Symantec, 2012.
Security threat report 2013. Sophos, 2012.
Security Annual Report. Cisco, 2012.
World Drug Report 2011. Vienna: United Nations Office on Drugs and Crime (UNODC), 2012.
Strategic Management and Information Systems: An Integrated Approach. Second ed. Essex, UK: Pearson Education Ltd., 1994.
Electronic-Supply Chain Information Security: A Framework for Information." In 7th Australian Information Security Management Conference. Perth, Western Australia, 2009. "
Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually. Mountain View, CA: Symantec Corp., 2011.
Second Annual Cost of Cyber Crime Study. Ponemon Institute, 2011.
France Country Report. European Network and Information Security Agency (ENISA), 2011.
Supply Chain Management: A Logistics Perspective. Eight ed. Mason, OH: South Western Cengage Lerning, 2009.
Cyber Attacks Against Supply Chain Management Systems: A Short Note." International Journal of Physical Distribution & Logistics Management 30, no. 7-8 (2000): 710-16. "
The Electronic Supply Chain: Its Im-pact on the Current and Future Structure of Strategic Alliances, Partnerships and Logistics Leadership." International Journal of Physical Distribution & Logistics Management 32, no. 8 (2002): 703-19. "
The State of the Law on Cyber Jurisdiction and Cybercrime on the Internet." Gonzaga Journal of International Law, no. 1 (1998). "
The United Nations Manual on the Prevention and Control of Computer Related Crime. International Review of Criminal Policy, 1995.
Managing Cyber and Information Risk." In 17th Annual Logistics Research Network Conference. Cranfield, UK, 2012. "
The Practice of Social Research. Twelfth ed. Belmont, CA: Wadsworth Cengage Learning, 2010.
"The Stuxnet Outbreak, A Worm in the Centrifuge – An Unusually Sophisticated Cyber-weapon is Mysterious but Important." Economist (2010).
Was double agent responsible for Stuxnet attack on Iran?" Defence Systems (2012). "
In a Computer Worm, a Possible Biblical Clue." The New York Times (2010). "
Cyber Spy Program Flame Compromises Key Microsoft Security System." ABC News (2012). "
Security in Physical Distribution Networks: A Survey of Swedish Transport Operators. Vol. PhD thesis. Lund, Sweden: Lund University, 2011.
Post-2001 Supply Chain Security – Impacts on the Private Sector. Lausanne, Switzerland: Université de Lausanne, 2011.
Supply Chain Security – Disclosing User’s Requirements. Helsinki: Aalto University School of Science and Technology, 2011.
Development of a Strategic Roadmap Towards a Large Scale Demonstration Project in European Logistics and Supply Chain Security. LOGSEC Deliverable, 2011.
Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles. FOCUS Deliverable 5.1, 2012.
Managing Emerging Threats in ICT Infrastructures. Forward Deliverable 3.1, 2010.
Initial Analysis of the Industrial Case Studies. Aniketos Deliverable 6.1, 2011.
Supply Chain Security: An Overview and Research Agenda." The International Journal of Logistics Management 19, no. 2 (2008): 254-81. "
Attacks on Drivers of International Heavy Goods Vehicles: Facts and Figures. International Road Transport Union, 2006.
National Threat Assessment 2008. Organised Crime. Zoetermeer, The Netherlands: KLPD–IPOL Department, Netherlands Police Agency, 2009.