[1]
|
M. Crotty, “The Foundation of Social Research: Meaning and Perspective in the Research Process,” Allen and Unwin, St Leonards, 1998.
|
[2]
|
D. Levy, “Qualitative Methodology and Grounded Theory in Property Research,” Pacific Rim Property Research Journal, Vol. 12, No. 4, 2006, pp. 369-388.
|
[3]
|
J. M. Case and G. Light, “Emerging Methodologies in Engineering Education Research,” Journal of Engineering Education, Vol. 100, No. 1, 2011, pp. 186-210.
|
[4]
|
D. A. Simanjuntak, H. P. Ipung and C. Lim, “Text Classification Techniques Used To Facilitate Cyber Terrorism Investigation,” Proceeding of Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT 2010), Jakarta, 2-3 December 2010, pp. 198-200. doi:10.1109/ACT.2010.40
|
[5]
|
M. Dogrul, A. Aslan and E. Celik, “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism,” 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, pp. 1-15.
|
[6]
|
M. Conway, “Against Cyberterrorism,” Communications of the ACM, Vol. 54, No. 2, 2011, p. 26.
doi:10.1145/1897816.1897829
|
[7]
|
Z. Yunos, S. H. Suid, R. Ahmad and Z. Ismail, “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework,” IEEE Sixth International Conference on Information Assurance & Security, Atlanta, 23-25 August 2010, pp. 21-27.
|
[8]
|
P. A. H. Williams, “Information Warfare: Time for a Redefinition,” Proceedings of the 11th Australian Information Warfare & Security Conference, Perth Western, 30 November-2 December 2010, pp. 37-44.
|
[9]
|
C. Czosseck, R. Ottis and A. M. Taliharm, “Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security,” International Journal of Cyber Warfare and Terrorism, Vol. 1, No. 1, 2011, pp. 24-34. doi:10.4018/ijcwt.2011010103
|
[10]
|
J. Matusitz, “Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo,” Information Security Journal: A Global Perspective, Vol. 20, No. 1, 2011, pp. 34-44.
|
[11]
|
R. Ahmad and Z. Yunos, “A Dynamic Cyber Terrorism Framework,” International Journal of Computer Science and Information Security, Vol. 10, No. 2, 2012, pp. 149-158.
|
[12]
|
M. Q. Paton, “Qualitative Evaluation and Research Methods,” 2nd Edition, SAGE Publications, Thousand Oaks, 1991.
|
[13]
|
C. Yauch and H. Steudel, “Complementary Use of Qualitative and Quantitative Cultural Assessment Methods,” Organizational Research Methods, Vol. 6, No. 4, 2003, pp. 465-481. doi:10.1177/1094428103257362
|
[14]
|
S. C. Currall, T. H. Hammer, L. S. Baggett and G. M. Doniger, “Combining Qualitative and Quantitative Methodologies to Study Group Processes: An Illustrative Study of a Corporate Board of Directors,” Organizational Research Methods, Vol. 2, No. 1, 1999, pp. 5-36.
doi:10.1177/109442819921002
|
[15]
|
K. J. Srnka and S. T. Koeszegi, “From Words to Numbers: How to Transform Qualitative Data into Meaningful Quantitative Results,” Schmalenbach Business Review, Vol. 59, No. 1, 2007, pp. 29-57.
|
[16]
|
A. Bryman, “Integrating Quantitative and Qualitative Re- search: How Is It Done?” Qualitative Research, Vol. 6, No. 1, 2006, pp. 97-113.
|
[17]
|
R. J. Chenail, “Conducting Qualitative Data Analysis: Qualitative Data Analysis as a Metaphoric Process,” The Qualitative Report, Vol. 17, No. 1, 2012, pp. 248-253.
|
[18]
|
A. Tang, P. Avgeriou, A. Jansen, R. Capilla and M. Ali Babar, “A Comparative Study of Architecture Knowledge Management Tools,” Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 352-370.
doi:10.1016/j.jss.2009.08.032
|
[19]
|
R. Hoda, J. Noble and S. Marshall, “Using Grounded Theory to Study the Human Aspects of Software Engineering,” Proceeding of HAoSE 10 Human Aspects of Software Engineering, Nevada, 17-21 October 2010.
|
[20]
|
A. A. Singh, A. Urbano, M. Haston and E. Mcmahan, “School Counselors’ Strategies for Social Justice Change: A Grounded Theory of What Works in the Real World,” American School Counselor Association, Vol. 13, No. 3, 2010, pp. 135-145.
|
[21]
|
T. M. Egan, “Grounded Theory Research and Theory Building,” Advances in Developing Human Resources, Vol. 4, No. 3, 2002, pp. 277-295.
|
[22]
|
M. Jones and I. Alony, “Guiding the Use of Grounded Theory in Doctoral Studies—An Example from the Australian Film Industry,” International Journal of Doctoral Studies, Vol. 6, 2011, pp. 95-114.
|
[23]
|
J. Esteves, U. Politécnica and J. Carvalho, “Use of Grounded Theory in Information Systems Area: An Exploratory Analysis,” European Conference on Research Methodology for Business and Management, 2000, pp. 129-136.
|
[24]
|
J. W. Creswell, “Qualitative Inquiry and Research Design: Choose among Five Traditions,” Sage Publications, London, 1998.
|
[25]
|
J. M. Azorin and R. Cameron, “The Application of Mixed Methods in Organisational Research: A Literature Review,” Electronic Journal of Business Research Methods, Vol. 8, No. 2, 2010, pp. 95-105.
|
[26]
|
G. Walsham, “Doing Interpretive Research,” European Journal of Information Systems, Vol. 15, No. 3, 2006, pp. 320-330. doi:10.1057/palgrave.ejis.3000589
|
[27]
|
D. R. Cooper and P. S. Schindler, “Business Research Method,” McGraw-Hill Companies, Inc., New York, 2008.
|
[28]
|
R. B. Johnson and A. J. Onwuegbuzie, “Mixed Methods Research: A Research Paradigm Whose Time Has Come,” Educational Research, Vol. 33, No. 7, 2004, pp. 14-26. doi:10.3102/0013189X033007014
|
[29]
|
W. Olsen, “Triangulation in Social Research: Qualitative and Quantitative Methods Can Really Be Mixed,” In: M. Holborn, Ed., Development in Sociology, Causeway Press, Ormskirk, 2004, pp. 1-30.
|