D. A. Simanjuntak, H. P. Ipung and C. Lim, “Text Classification Techniques Used To Facilitate Cyber Terrorism Investigation,” Proceeding of Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT 2010), Jakarta, 2-3 December 2010, pp. 198-200. doi:10.1109/ACT.2010.40
 M. Dogrul, A. Aslan and E. Celik, “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism,” 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, pp. 1-15.
 Z. Yunos, S. H. Suid, R. Ahmad and Z. Ismail, “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework,” IEEE Sixth International Conference on Information Assurance & Security, Atlanta, 23-25 August 2010, pp. 21-27.
 P. A. H. Williams, “Information Warfare: Time for a Redefinition,” Proceedings of the 11th Australian Information Warfare & Security Conference, Perth Western, 30 November-2 December 2010, pp. 37-44.
 C. Czosseck, R. Ottis and A. M. Taliharm, “Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security,” International Journal of Cyber Warfare and Terrorism, Vol. 1, No. 1, 2011, pp. 24-34. doi:10.4018/ijcwt.2011010103
 J. Matusitz, “Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo,” Information Security Journal: A Global Perspective, Vol. 20, No. 1, 2011, pp. 34-44.
 C. Yauch and H. Steudel, “Complementary Use of Qualitative and Quantitative Cultural Assessment Methods,” Organizational Research Methods, Vol. 6, No. 4, 2003, pp. 465-481. doi:10.1177/1094428103257362
 S. C. Currall, T. H. Hammer, L. S. Baggett and G. M. Doniger, “Combining Qualitative and Quantitative Methodologies to Study Group Processes: An Illustrative Study of a Corporate Board of Directors,” Organizational Research Methods, Vol. 2, No. 1, 1999, pp. 5-36. doi:10.1177/109442819921002
 A. Tang, P. Avgeriou, A. Jansen, R. Capilla and M. Ali Babar, “A Comparative Study of Architecture Knowledge Management Tools,” Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 352-370. doi:10.1016/j.jss.2009.08.032
 R. Hoda, J. Noble and S. Marshall, “Using Grounded Theory to Study the Human Aspects of Software Engineering,” Proceeding of HAoSE 10 Human Aspects of Software Engineering, Nevada, 17-21 October 2010.
 A. A. Singh, A. Urbano, M. Haston and E. Mcmahan, “School Counselors’ Strategies for Social Justice Change: A Grounded Theory of What Works in the Real World,” American School Counselor Association, Vol. 13, No. 3, 2010, pp. 135-145.
 J. Esteves, U. Politécnica and J. Carvalho, “Use of Grounded Theory in Information Systems Area: An Exploratory Analysis,” European Conference on Research Methodology for Business and Management, 2000, pp. 129-136.