{"title":"The discursive construction of the threat of cyberterrorism to the UK","authors":"G. Mott","doi":"10.4324/9780429274480-3","DOIUrl":"https://doi.org/10.4324/9780429274480-3","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Locating the cyberterrorist","authors":"G. Mott","doi":"10.4324/9780429274480-5","DOIUrl":"https://doi.org/10.4324/9780429274480-5","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Running out of time","authors":"Gareth Mott","doi":"10.4324/9780429274480-4","DOIUrl":"https://doi.org/10.4324/9780429274480-4","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpreting the construction of hypothetical threatening actors in cyberspace","authors":"G. Mott","doi":"10.4324/9780429274480-2","DOIUrl":"https://doi.org/10.4324/9780429274480-2","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Narrating the cyberterrorist","authors":"G. Mott","doi":"10.4324/9780429274480-6","DOIUrl":"https://doi.org/10.4324/9780429274480-6","url":null,"abstract":"","PeriodicalId":147944,"journal":{"name":"Constructing the Cyberterrorist","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}