Anghelache, C., Pagliacci, M. and Prodan, L. (2013). Model for Macroeconomic- Analyses Based on the Regression Function. Romanian Statistical Review, 1/2013, 5-17.
Breach Level Index (2018). Data breach database. A centralized, global database of data breaches with calculations of their severity based on multiple factors. Retrieved from https://breachlevelindex.com/data-breach-database.
Whelan, R. (2009). A Review of: “Proceedings of the NATO Advanced Research Workshop on Responses to Cyber Terrorism, edited by Centre of Excellence”, Terrorism and Political Violence, 21(2), 347-349.10.1080/09546550902765797
Brickey, J. (2012). Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace, in CTC Sentinel, Combating Terrorism Center at West Point, August, Vol 5, Issue 8, Retrieved from https://ctc.usma.edu/august-2012/.
Pitaksantayothin, J. (2014). Cyber Terrorism Laws in the United States, the United Kingdom and Thailand : A Comparative Study . Law Journal Faculty of Law Chulalongkorn University, 32 (2),169-185.