Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by Crossref.
Matusitz, Jonathan
2008.
Similarities between terrorist networks in antiquity and present-day cyberterrorist networks.
Trends in Organized Crime,
Vol. 11,
Issue. 2,
p.
183.
Matusitz, Jonathan
2008.
Cyberterrorism: Postmodern State of Chaos.
Information Security Journal: A Global Perspective,
Vol. 17,
Issue. 4,
p.
179.
Matusitz, Jonathan
and
Minei, Elizabeth
2009.
Cyberterrorism: Its Effects on Health-Related Infrastructures.
Journal of Digital Forensic Practice,
Vol. 2,
Issue. 4,
p.
161.
Matusitz, Jonathan
2009.
A Postmodern Theory of Cyberterrorism: Game Theory.
Information Security Journal: A Global Perspective,
Vol. 18,
Issue. 6,
p.
273.
Wagner, Abraham R.
and
Fisch, Zvi
2009.
Essentials of Terror Medicine.
p.
255.
Matusitz, Jonathan
2010.
Cyberterrorism: Postmodern State of Chaos.
Journal of Digital Forensic Practice,
Vol. 3,
Issue. 2-4,
p.
115.
Matusitz, Jonathan
2011.
Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo.
Information Security Journal: A Global Perspective,
Vol. 20,
Issue. 1,
p.
34.
Minei, Elizabeth
and
Matusitz, Jonathan
2011.
Cyberterrorist Messages and Their Effects on Targets: A Qualitative Analysis.
Journal of Human Behavior in the Social Environment,
Vol. 21,
Issue. 8,
p.
995.
Ong, M.-S.
Magrabi, F.
and
Coiera, E.
2013.
Syndromic surveillance for health information system failures: a feasibility study.
Journal of the American Medical Informatics Association,
Vol. 20,
Issue. 3,
p.
506.
Harries, David
and
Yellowlees, Peter M.
2013.
Cyberterrorism: Is the U.S. Healthcare System Safe?.
Telemedicine and e-Health,
Vol. 19,
Issue. 1,
p.
61.
Barnett, Daniel J.
Sell, Tara Kirk
Lord, Robert K.
Jenkins, Curtis J.
Terbush, James W.
and
Burke, Thomas A.
2013.
Cyber Security Threats to Public Health.
World Medical & Health Policy,
Vol. 5,
Issue. 1,
p.
37.
Matusitz, Jonathan
2013.
The Networks That Fight Cyberterrorist Networks.
Journal of Human Behavior in the Social Environment,
Vol. 23,
Issue. 5,
p.
616.
Loukas, George
Gan, Diane
and
Vuong, Tuan
2013.
A Review of Cyber Threats and Defence Approaches in Emergency Management.
Future Internet,
Vol. 5,
Issue. 2,
p.
205.
Hsia, Katie L.
2021.
The Day the Computers Went Down.
Annals of Surgery,
Vol. 273,
Issue. 4,
p.
e138.
Katagiri, Nori
2024.
Defending medical facilities from cyber attacks: critical issues with the principle of due diligence in international law.
International Review of Law, Computers & Technology,
Vol. 38,
Issue. 1,
p.
1.