-
1
-
-
84972168069
-
The Emergence of Cooperation: National Epistemic Communities and the International Evolution of the Idea of Nuclear Arms Control"
-
Adler, E. (1992). "The Emergence of Cooperation: National Epistemic Communities and the International Evolution of the Idea of Nuclear Arms Control", International Organization 46 (1). 101 - 145.
-
(1992)
International Organization
, vol.46
, Issue.1
, pp. 101-145
-
-
Adler, E.1
-
2
-
-
0031232154
-
Seizing the Middle Ground: Constructivism in World Politics"
-
Adler, E. (1997). "Seizing the Middle Ground: Constructivism in World Politics", European Journal of International Relations 3 (3). 319 - 363.
-
(1997)
European Journal of International Relations
, vol.3
, Issue.3
, pp. 319-363
-
-
Adler, E.1
-
10
-
-
0040706369
-
The Accidental Superhighway. A Survey of the Internet,"
-
Anderson, C. (1995). "The Accidental Superhighway. A Survey of the Internet," The Economist, July 1.
-
(1995)
The Economist
-
-
Anderson, C.1
-
13
-
-
0003968659
-
-
Santa Monica, CA: RAND.
-
Arquilla, J. and Ronfeldt, D., eds (2001). Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Arquilla, J.1
Ronfeldt, D.2
-
18
-
-
21244432672
-
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection"
-
Bendrath, R. (2001). "The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection", Information and Security 7: 80 - 103.
-
(2001)
Information and Security
, vol.7
, pp. 80-103
-
-
Bendrath, R.1
-
24
-
-
0012704777
-
-
Fairfax, VA: AFCEA International Press.
-
Campen, A., Dearth, D. and Goodden, T. (1996). Cyberwar: Security, Strategy and Conflict in the Information Age. Fairfax, VA: AFCEA International Press.
-
(1996)
Cyberwar: Security, Strategy and Conflict in the Information Age
-
-
Campen, A.1
Dearth, D.2
Goodden, T.3
-
31
-
-
84993711368
-
Introduction: CyberPolitics in International Relations"
-
Choucri, N. (2000). "Introduction: CyberPolitics in International Relations", International Political Science Review 21 (3). 243 - 263.
-
(2000)
International Political Science Review
, vol.21
, Issue.3
, pp. 243-263
-
-
Choucri, N.1
-
34
-
-
0242351527
-
-
Washington, DC: Center for Strategic and International Studies.
-
De Borchgrave, A., Cilluffo, F.J., Cardash, S.L. and Ledgerwood, M.M. (2000). Cyber Threats and Information Security - Meeting the 21st Century Challenge. Washington, DC: Center for Strategic and International Studies.
-
(2000)
Cyber Threats and Information Security - Meeting the 21st Century Challenge
-
-
De Borchgrave, A.1
Cilluffo, F.J.2
Cardash, S.L.3
Ledgerwood, M.M.4
-
38
-
-
0242440508
-
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,"
-
Santa Monica, CA: RAND.
-
Denning, D.E. (2001a). "Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy," in J. Arquilla and J. Ronfeldt (eds), Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: RAND.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Denning, D.E.1
Arquilla, J.2
Ronfeldt, J.3
-
39
-
-
27944466951
-
-
Denning, D.E. (2001b). "Is Cyber Terror Next?" Essays on September 11, Social Science Research Council, URL (consulted July 11, 2001): http://www.ssrc.org/sept11/essays/denning.htm.
-
(2001)
Is Cyber Terror Next?
-
-
Denning, D.E.1
-
40
-
-
0003931072
-
-
October 9
-
Department of Defense (1998). Joint Doctrine for Information Operations, October 9, URL: http://www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf.
-
(1998)
Joint Doctrine for Information Operations
-
-
-
41
-
-
0039619860
-
Virtuous War/Virtual Theory"
-
Der Derian, J. (2000). "Virtuous War/Virtual Theory", International Affairs 76 (4). 771 - 788.
-
(2000)
International Affairs
, vol.76
, Issue.4
, pp. 771-788
-
-
Der Derian, J.1
-
45
-
-
33746787086
-
A survey of digital security
-
Economist, The (2002). "A Survey of Digital Security", October 26: 19-19.
-
(2002)
Economist, the
, pp. 19-19
-
-
-
53
-
-
0035193419
-
Cyberplagues, IT and Security: Threat Politics in the Information Age"
-
Eriksson, J. (2001b). "Cyberplagues, IT and Security: Threat Politics in the Information Age", Journal of Contingencies and Crisis Management 9 (4). 211 - 222.
-
(2001)
Journal of Contingencies and Crisis Management
, vol.9
, Issue.4
, pp. 211-222
-
-
Eriksson, J.1
-
55
-
-
0038503796
-
Rationalism and Constructivism: A Skeptical View,"
-
London: Sage.
-
Fearon, J. and Wendt, A. (2002). "Rationalism and Constructivism: A Skeptical View," in W. Carlsnaes, T. Risse and B.A. Simmons (eds), Handbook of International Relations. London: Sage.
-
(2002)
Handbook of International Relations
-
-
Fearon, J.1
Wendt, A.2
Carlsnaes, W.3
Risse, T.4
Simmons, B.A.5
-
59
-
-
33746827188
-
-
Freedman, D.H. (2000). "How to Hack a Bank," URL (consulted July 25, 2002): http://www.forbes.com/asap/2000/0403/056.html.
-
(2000)
How to Hack A Bank,"
-
-
Freedman, D.H.1
-
60
-
-
84858937753
-
-
F-secure (2003). "Iraq War and Information Security," URL (consulted March 27, 2003): http://www.f-secure.com%7Bvirus-info/iraq.shtml.
-
(2003)
Iraq War and Information Security
-
-
-
64
-
-
21444438957
-
Cuius Regio, Eius Religio, Omnium Spatio? State Sovereignty in the Age of the Internet"
-
Giacomello, G. and Mendez, F. (2001). "Cuius Regio, Eius Religio, Omnium Spatio? State Sovereignty in the Age of the Internet", Information and Security 7: 15 - 27.
-
(2001)
Information and Security
, vol.7
, pp. 15-27
-
-
Giacomello, G.1
Mendez, F.2
-
66
-
-
0003330502
-
The Richness of the Tradition of Political Realism,"
-
New York: Columbia University Press.
-
Gilpin, R. (1986). "The Richness of the Tradition of Political Realism," in R. Keohane (ed.), Neorealism and Its Critics. New York: Columbia University Press.
-
(1986)
Neorealism and Its Critics
-
-
Gilpin, R.1
Keohane, R.2
-
69
-
-
0040034263
-
Issues, Not Labels, Please!: Response to Eriksson"
-
Goldmann, K. (1999). "Issues, Not Labels, Please!: Response to Eriksson", Cooperation and Conflict 34 (3). 331 - 333.
-
(1999)
Cooperation and Conflict
, vol.34
, Issue.3
, pp. 331-333
-
-
Goldmann, K.1
-
71
-
-
84972364235
-
The Second Image Reversed: The International Sources of Domestic Politics"
-
Gourevitch, P. (1978). "The Second Image Reversed: The International Sources of Domestic Politics", International Organization 32 (4). 881 - 912.
-
(1978)
International Organization
, vol.32
, Issue.4
, pp. 881-912
-
-
Gourevitch, P.1
-
73
-
-
6244282403
-
Digitally Empowered Development"
-
Hammond, A.L. (2001). "Digitally Empowered Development", Foreign Affairs, March-April, 80: 96 - 106.
-
(2001)
Foreign Affairs
, vol.80
, pp. 96-106
-
-
Hammond, A.L.1
-
74
-
-
0006868515
-
Information and Warfare: New Opportunities for US Military,"
-
Santa Monica, CA: RAND.
-
Harshberger, E. and Ochmanek, D. (1999). "Information and Warfare: New Opportunities for US Military," in Z.M. Khalilzad and J.P. White (eds), Strategic Appraisal: The Changing Role of Information in Warfare. Santa Monica, CA: RAND.
-
(1999)
Strategic Appraisal: The Changing Role of Information in Warfare
-
-
Harshberger, E.1
Ochmanek, D.2
Khalilzad, Z.M.3
White, J.P.4
-
76
-
-
85064779503
-
The Counter-Terrorist Operation in Chechnya: Information Warfare Aspects"
-
Herd, G.P. (2000). "The Counter-Terrorist Operation in Chechnya: Information Warfare Aspects", Journal of Slavic Military Studies 13 (4). 57 - 84.
-
(2000)
Journal of Slavic Military Studies
, vol.13
, Issue.4
, pp. 57-84
-
-
Herd, G.P.1
-
79
-
-
0007021369
-
International Organization and the Study of World Politics"
-
Katzenstein, P., Keohane, R.O. and Krasner, S. (1998). "International Organization and the Study of World Politics", International Organization 52 (4). 645 - 685.
-
(1998)
International Organization
, vol.52
, Issue.4
, pp. 645-685
-
-
Katzenstein, P.1
Keohane, R.O.2
Krasner, S.3
-
84
-
-
11544251159
-
Power and Interdependence in the Information Age"
-
Keohane, R. and Nye, J.S. (1998). "Power and Interdependence in the Information Age", Foreign Affairs 77 (5). 81 - 94.
-
(1998)
Foreign Affairs
, vol.77
, Issue.5
, pp. 81-94
-
-
Keohane, R.1
Nye, J.S.2
-
86
-
-
84937321673
-
Symbolic Politics in the Information Age: The 1996 Presidential Campaign on the Web"
-
Klinenberg, E. and Perrin, A. (2000). "Symbolic Politics in the Information Age: The 1996 Presidential Campaign on the Web", Information, Communication and Society 3 (1). 17 - 38.
-
(2000)
Information, Communication and Society
, vol.3
, Issue.1
, pp. 17-38
-
-
Klinenberg, E.1
Perrin, A.2
-
88
-
-
0001883887
-
Power Politics: Institutions and Transnational Relations,"
-
Cambridge: Cambridge University Press.
-
Krasner, S. (1995). "Power Politics: Institutions and Transnational Relations," in T. Risse-Kappen (ed.), Bringing Transnational Relations Back In. Cambridge: Cambridge University Press.
-
(1995)
Bringing Transnational Relations Back in
-
-
Krasner, S.1
Risse-Kappen, T.2
-
89
-
-
28244444024
-
-
Washington, DC: Institute for National Strategic Studies, National Defense University.
-
Laird, R.F. (1999). Revolution in Military Affairs: Allied Perspectives. Washington, DC: Institute for National Strategic Studies, National Defense University.
-
(1999)
Revolution in Military Affairs: Allied Perspectives
-
-
Laird, R.F.1
-
93
-
-
33746782386
-
-
Washington, DC: National Defense University.
-
Libicki, M. (1997). Defending Cyberspace. Washington, DC: National Defense University.
-
(1997)
Defending Cyberspace
-
-
Libicki, M.1
-
94
-
-
9744251732
-
Information Power: Strategy, Geopolitics, and the Fifth Dimension"
-
Lonsdale, D.J. (1999). "Information Power: Strategy, Geopolitics, and the Fifth Dimension", Journal of Strategic Studies 22 (2-3). 137 - 157.
-
(1999)
Journal of Strategic Studies
, vol.22
, Issue.2-3
, pp. 137-157
-
-
Lonsdale, D.J.1
-
108
-
-
75349096537
-
-
Aldershot: Ashgate.
-
O'Day, A., ed. (2004). Cyberterrorism. Aldershot: Ashgate.
-
(2004)
Cyberterrorism
-
-
O'Day, A.1
-
110
-
-
84858938648
-
-
PBS Online (2002). "Frontline Hackers," URL (consulted July 25, 2002): http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html.
-
(2002)
Frontline Hackers,"
-
-
Online, P.1
-
111
-
-
0347384530
-
-
PCCIP (2000). "Fact Sheet," President's Commission on Critical Infrastructure Protection, URL (consulted June 20, 2002): http://www.info-sec.com/pccip/web/backgrd.html.
-
(2000)
Fact Sheet,"
-
-
-
113
-
-
33644488621
-
Future Actors in a Changing Security Environment,"
-
Washington, DC and London: Brassey's.
-
Pfaltzgraff, R.L., Jr and Shultz, R.H., Jr (1997). "Future Actors in a Changing Security Environment," in R.L. Pfaltzgraff Jr and R.H. Shultz Jr (eds), War in the Information Age: New Challenges for US Security Policy. Washington, DC and London: Brassey's.
-
(1997)
War in the Information Age: New Challenges for US Security Policy
-
-
Pfaltzgraff Jr., R.L.1
Shultz Jr., R.H.2
Pfaltzgraff Jr., R.L.3
Shultz Jr., R.H.4
-
114
-
-
0035085943
-
Usurping the Sovereignty of Sovereignty"
-
Philpott, D. (2001). "Usurping the Sovereignty of Sovereignty", World Politics, January, 53: 297 - 324.
-
(2001)
World Politics
, vol.53
, pp. 297-324
-
-
Philpott, D.1
-
116
-
-
33746799582
-
-
Washington, DC: White House, Office of the Press Secretary.
-
Ridge, T. (2002). Remarks by Homeland Security Director Tom Ridge to the Electronics Industry Alliance, Grand Hyatt Hotel, April 23, 2002. Washington, DC: White House, Office of the Press Secretary.
-
(2002)
Remarks by Homeland Security Director Tom Ridge to the Electronics Industry Alliance, Grand Hyatt Hotel
-
-
Ridge, T.1
-
123
-
-
0343576284
-
Colonizing Cyberspace: National Security and the Internet,"
-
Minneapolis: University of Minnesota Press.
-
Saco, D. (1999). "Colonizing Cyberspace: National Security and the Internet," in J. Weldes, M. Laffey, H. Gusterson and R. Duvall (eds), Cultures of Insecurity: States, Communities, and the Production of Danger. Minneapolis: University of Minnesota Press.
-
(1999)
Cultures of Insecurity: States, Communities, and the Production of Danger
-
-
Saco, D.1
Weldes, J.2
Laffey, M.3
Gusterson, H.4
Duvall, R.5
-
130
-
-
0004267628
-
-
Ithaca, NY: Cornell University Press.
-
Snyder, J. (1991). Myths of Empire. Ithaca, NY: Cornell University Press.
-
(1991)
Myths of Empire
-
-
Snyder, J.1
-
134
-
-
0004186420
-
-
Oxford: Oxford University Press.
-
Sun Tzu (1963). The Art of War, trans. S.B. Griffith. Oxford: Oxford University Press.
-
(1963)
The Art of War
-
-
Tzu, S.1
-
136
-
-
0002679794
-
Symbols, Rituals and Power: The Lost Dimensions of Crisis Management"
-
't Hart, P. (1993). "Symbols, Rituals and Power: The Lost Dimensions of Crisis Management", Journal of Contingencies and Crisis Management (1). 36 - 50.
-
(1993)
Journal of Contingencies and Crisis Management
, Issue.1
, pp. 36-50
-
-
'T Hart, P.1
-
137
-
-
84937330251
-
Securing Internet Society: Toward an International Regime for Information Assurance"
-
Valeri, L. (2000). "Securing Internet Society: Toward an International Regime for Information Assurance", Studies in Conflict and Terrorism 23 (2). 129 - 146.
-
(2000)
Studies in Conflict and Terrorism
, vol.23
, Issue.2
, pp. 129-146
-
-
Valeri, L.1
-
138
-
-
0004245213
-
-
New York: Free Press; Oxford: Maxwell Macmillan International.
-
Van Creveld, M. (1991). The Transformation of War. New York: Free Press; Oxford: Maxwell Macmillan International.
-
(1991)
The Transformation of War
-
-
Van Creveld, M.1
-
141
-
-
0001475720
-
The Renaissance of Security Studies"
-
Walt, S. (1994). "The Renaissance of Security Studies", International Studies Quarterly 35 (2). 211 - 239.
-
(1994)
International Studies Quarterly
, vol.35
, Issue.2
, pp. 211-239
-
-
Walt, S.1
-
143
-
-
0001491868
-
Securitization and Desecuritization,"
-
New York: Columbia University Press.
-
Waever, O. (1995). "Securitization and Desecuritization," in R.D. Lipshutz (ed.), On Security. New York: Columbia University Press.
-
(1995)
On Security
-
-
Waever, O.1
Lipshutz, R.D.2
-
145
-
-
84972442822
-
Anarchy Is What States Make of It: The Social Construction of Power Politics"
-
Wendt, A. (1992). "Anarchy Is What States Make of It: The Social Construction of Power Politics", International Organization 46: 391 - 425.
-
(1992)
International Organization
, vol.46
, pp. 391-425
-
-
Wendt, A.1
-
148
-
-
0348162309
-
Words, Images, Enemies: Securitization and International Politics"
-
Williams, M.C. (2003). "Words, Images, Enemies: Securitization and International Politics", International Studies Quarterly 47 (4). 511 - 531.
-
(2003)
International Studies Quarterly
, vol.47
, Issue.4
, pp. 511-531
-
-
Williams, M.C.1
|