A. Beatty and U. S. , cybersecurity chief warns of " market " in malware, 2009.

E. Bumiller and T. Shanker, Panetta warns of dire threat of cyberattack on U.S, 2010.

R. Clarke, Situational crime prevention, in Environmental Criminology and Crime Analysis, pp.178-194, 2008.

L. Cohen and M. Felson, Social Change and Crime Rate Trends: A Routine Activity Approach, American Sociological Review, vol.44, issue.4, pp.588-609, 1979.
DOI : 10.2307/2094589

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.476.3696

A. Costello and J. Osborne, Best practices in exploratory factory analysis: Four recommendations for getting the most from your analysis, Practical Assessment, Research and Evaluation, vol.10, issue.7, pp.173-178, 2005.

A. Field, Discovering Statistics Using SPSS, 2013.

N. Grant and L. Fabrigar, Exploratory factor analysis, in Encyclopedia of Measurement and Statistics, pp.332-335, 2007.

T. Jick, Mixing Qualitative and Quantitative Methods: Triangulation in Action, Administrative Science Quarterly, vol.24, issue.4, pp.602-611, 1979.
DOI : 10.2307/2392366

. Mcafee, Advanced Persistent Threat, Santa Clara, California (blogs. mcafee.com/tag/advanced-persistent-threat)

P. Oman, E. Schweitzer, and J. Robert, Safeguarding IEDS, substations and SCADA systems against electronic intrusions, Proceedings of the Western Power Delivery Automation Conference, 2001.

E. Pedhazur and L. Schmelkin, Measurement, Design and Analysis: An Integrated Approach, 1991.

Q. International, What is Qualitative Research? Melbourne, Australia (www.qsrinternational.com/what-is-qualitative-research

A. Rege, Cybercrimes against critical infrastructures: a study of online criminal organization and techniques, Criminal Justice Studies, vol.2, issue.3, pp.261-271, 2009.
DOI : 10.1353/sais.2004.0020

A. Rege, Offender decision-making in industrial control systems cybercrime , presented at the Cyber Infrastructure Protection Conference, 2012.

S. Sloane, The U.S. needs a cybersecurity czar now, Bloomberg Businessweek, 2009.
URL : https://hal.archives-ouvertes.fr/in2p3-00012441

K. Stouffer, J. Falco, and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2012.

L. Tinnel, O. Saydjari, and D. Farrell, Cyberwar strategy and tactics: An analysis of cyber goals, strategies, tactics and techniques, Proceedings of the IEEE SMC Workshop on Information Assurance, pp.228-234, 2002.

B. Wingfield, Power-grid cyber attack seen leaving millions in dark for months, 2012.