References
- Aleksić, Ž., & Škulić, M. (2007) Kriminalistika (5. izd.). Beograd: Pravni fakultet; Službeni glasnik.
- Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141– 165.
- Brenner, S.W. (2010). Cybercrime: Criminal threats from cyberspace. Praeger.
- Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso Books.
- Conway, M. (2007). Terrorism and the internet: New media – new threats? Parliamentary Affairs, 60(2), 288–306.
- Cornish, P., Hughes, R., & Livingstone, D. (2009). Cyber space and the national security of the United Kingdom: Threats and responses. London: Chatham House (Royal Institute of International Affairs).
- Council of Europe. (2001). Convention on Cybercrime. Council of Europe (COE), 23 November 2001, https://www.coe.int/en/web/cybercrime/the-budapest-convention
- Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 239–288). RAND Corporation
- Gligorević, R. (2014). Cyber crime. Digital Economics, 163-174.
- Deutsch, Karl W. (1966). The Nerves of Government: Principles of Political Communication and Control (2nd ed). New York: Free of Glencoe.
- Gligorević, R. (2014). Cyber crime. Economics - innovative and economics research journal, 2(1), pp. 179-189. https://doi.org/10.7251/OIK1301011G
- Holt, T. J., & Bossler, A. M. (2016). Cybercrime and digital forensics: An introduction. Routledge.
- Jenkins, B. (1975). International Terrorism: A new mode of conflict. Los Angeles: Crescent Publications.
- Jordan, T., & Taylor, P. A. (2004). Hacktivism and cyberwars: Rebels with a cause? Routledge.
- Kešetović, Ž. (2008). Internet kao oruđe terorista. Revija za bezbednost, 4, pp. 37-41.
- Matijašević, J., & Spalević, Z. (2010). Specific characteristics of computer criminal offenses with regard to the law regulations. XLV International Scientific Conference on Information, Communication and Energy Systems and Technologies – ICEST 2010 CONFERENCE, 23 - 26 June 2010, Faculty of Technical Sciences, University “St. Clement Ohridski”, Ohrid, Macedonia.
- Kovačević, B. (2013). Cyberwar-American pretext for a new cold war? Polemos, 16(2), pp. 91-110.
- Krivični zakon Bosne i Hercegovine. Službeni glasnik Bosne i Hercegovine (3/2003, 32/2003, 37/2003, 54/2004, 61/2004, 30/2005, 53/2006, 55/2006, 8/2010, 47/2014, 22/2015, 40/2015, 35/2018, 46/2021, 31/2023, 47/2023).
- Krivični zakon Federacije Bosne i Hercegovine. Službene novine Federacije Bosne i Hercegovine (36/2003, 21/2004 69/2004, 18/2005, 42/2010, 42/2011, 59/2014, 76/2014, 46/2016, 75/2017, 31/2023, 58/2025).
- Krivični zakonik Republike Srpske. Službeni glasnik Republike Srpske (64/2017, 104/2018, 15/2021, 89/2021, 73/2023, 9/2024, 105/2024, 19/2025, 14/2025, 31/2025).
- Krivični zakon Brčko Distrikta BiH. Službeni glasnik BD BiH (19/2020, 3/2024, 14/2024).
- Kshetri, N. (2013). Cybercrime and cybersecurity in the global South. Springer.
- Olson, P. (2013). We are Anonymous: Inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency. Little, Brown and Company.
- Parker, D. B. (1983). Fighting computer crime. New York: Scribner.
- Petrović, S. R. (1994). Kompjuterski kriminal. Beograd: Ministarstvo unutrašnjih poslova Republike Srbije; Uredništvo časopisa “Bezebednost”.
- Porobić, M., & Bajraktarević, M. (2012). Cyber crime, pranje novca i finansijske istrage. Sarajevo: Visoko sudsko i tužilačko vijeće Bosne i Hercegovine; Swiss Agency for Development and Cooperation (SDC)
- Rid, T. (2012). Cyber war will not take place. Oxford University Press.
- Schjolberg, S. (1986). Computers and Penal Legislation: A Study of the Legal Politics of a new Technology. Universitetsforlaget.
- UN Security Council, Security Council resolution 1566 (2004) [concerning threats to international peace and security caused by terrorism], S/RES/1566 (2004), 8 October 2004.
- Votel, J. L. (2015). Statement before the Senate Armed Services Committee on the Posture of the U.S. Special Operations Command. Washington, D.C.
- Weimann, G. (2004). Cyberterrorism: how real is the threat? Washington, D.C.: United States Institute of Peace.
- Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Polity Press.
- Zirojević, M. (2008). Upotreba novih informatiĉkih i komunikacionih medija u svrhe terorizma. Revija za bezbednost, 2(11), pp. 19-21.