-
2
-
-
71649112289
-
US Warns Cyber-Attacks Will Increase
-
May 18
-
Anderson Robert, Dombey Daniel, Fidler Stephen, Gorst Isabel, Palmer Maija. US Warns Cyber-Attacks Will Increase. Financial Times 2007, May 18
-
(2007)
Financial Times
-
-
Anderson, R.1
Dombey, D.2
Fidler, S.3
Gorst, I.4
Palmer, M.5
-
3
-
-
33847333250
-
Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future
-
Aradau Claudia, van Munster Rens. Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future. European Journal of International Relations 2007, 13(1):89-115.
-
(2007)
European Journal of International Relations
, vol.13
, Issue.1
, pp. 89-115
-
-
Aradau, C.1
van Munster, R.2
-
4
-
-
34248236985
-
Cyberwar is Coming!
-
Reprinted in , edited by, Santa Monica, RAND
-
Arquilla John, Ronfeldt David, Arquilla John, Ronfeldt David. Cyberwar is Coming!. Comparative Strategy 1993, 12(2):141-165. Reprinted in , edited by, Santa Monica, RAND
-
(1993)
Comparative Strategy
, vol.12
, Issue.2
, pp. 141-165
-
-
Arquilla, J.1
Ronfeldt, D.2
Arquilla, J.3
Ronfeldt, D.4
-
6
-
-
0003968659
-
-
Eds, Santa Monica, RAND
-
Arquilla John, Ronfeldt David. Networks and Netwars: The Future of Terror, Crime, and Militancy 2001, Eds, Santa Monica, RAND
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Arquilla, J.1
Ronfeldt, D.2
-
8
-
-
20744450463
-
The Three Faces of Securitization: Political Agency, Audience and Context
-
Balzacq Thierry. The Three Faces of Securitization: Political Agency, Audience and Context. European Journal of International Relations 2005, 11(2):171-201.
-
(2005)
European Journal of International Relations
, vol.11
, Issue.2
, pp. 171-201
-
-
Balzacq, T.1
-
10
-
-
0036344063
-
Security and Immigration: Toward a Critique of the Governmentality of Unease
-
Bigo Didier. Security and Immigration: Toward a Critique of the Governmentality of Unease. Alternatives 2002, 27(Suppl.):63-92.
-
(2002)
Alternatives
, vol.27
, Issue.SUPPL.
, pp. 63-92
-
-
Bigo, D.1
-
11
-
-
71649101974
-
Estonia Calls For a NATO Strategy on 'Cyber-Terrorists' After Coming Under Attack
-
May 18
-
Blomfield Adrian. Estonia Calls For a NATO Strategy on 'Cyber-Terrorists' After Coming Under Attack. The Daily Telegraph 2007, May 18
-
(2007)
The Daily Telegraph
-
-
Blomfield, A.1
-
12
-
-
27144507479
-
Vernacular Security
-
Bubandt Niels. Vernacular Security. Security Dialogue 2005, 36(3):275-296.
-
(2005)
Security Dialogue
, vol.36
, Issue.3
, pp. 275-296
-
-
Bubandt, N.1
-
19
-
-
71649112640
-
Circuits of Power: Security in the Internet Environment
-
edited by, Albany, State University of New York
-
Deibert Ronald J, Rosenau James N, Singh J P. Circuits of Power: Security in the Internet Environment. Information Technologies and Global Politics: The Changing Scope of Power and Governance 2002, In, edited by, Albany, State University of New York
-
(2002)
Information Technologies and Global Politics: The Changing Scope of Power and Governance
-
-
Deibert, R.J.1
Rosenau, J.N.2
Singh J., P.3
-
20
-
-
4644260248
-
Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace
-
Deibert Ronald J. Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace. Millennium 2003, 32(3):501-530.
-
(2003)
Millennium
, vol.32
, Issue.3
, pp. 501-530
-
-
Deibert, R.J.1
-
21
-
-
26444591159
-
Hacking Networks of Terror
-
Deibert Ronald J, Stein Janice Gross. Hacking Networks of Terror. Dialog-IO 2002, 1(1):1-14.
-
(2002)
Dialog-IO
, vol.1
, Issue.1
, pp. 1-14
-
-
Deibert, R.J.1
Stein, J.G.2
-
23
-
-
0242440508
-
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
-
edited by, Santa Monica, RAND
-
Denning Dorothy E, Arquilla John, Ronfeldt David. Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Networks and Netwars: The Future of Terror, Crime, and Militancy 2001, In, edited by, Santa Monica, RAND
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Denning, D.E.1
Arquilla, J.2
Ronfeldt, D.3
-
24
-
-
0004155887
-
-
Oxford, Basil Blackwell
-
Der Derian James. Antidiplomacy: Spies, Terror, Speed, and War 1992, Oxford, Basil Blackwell
-
(1992)
Antidiplomacy: Spies, Terror, Speed, and War
-
-
Der Derian, J.1
-
25
-
-
4644372122
-
The Question of Information Technology in International Relations
-
Der Derian James. The Question of Information Technology in International Relations. Millennium 2003, 32(3):441-456.
-
(2003)
Millennium
, vol.32
, Issue.3
, pp. 441-456
-
-
Der Derian, J.1
-
26
-
-
84970243036
-
The Case Against Linking Environmental Degradation and National Security
-
Deudney Daniel. The Case Against Linking Environmental Degradation and National Security. Millennium 1990, 19(3):461-476.
-
(1990)
Millennium
, vol.19
, Issue.3
, pp. 461-476
-
-
Deudney, D.1
-
28
-
-
85055358743
-
Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security
-
Elbe Stefan. Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security. International Studies Quarterly 2006, 50(1):119-144.
-
(2006)
International Studies Quarterly
, vol.50
, Issue.1
, pp. 119-144
-
-
Elbe, S.1
-
29
-
-
28344455175
-
Observers or Advocates? On the Political Role of Security Analysts
-
Erikson Johan. Observers or Advocates? On the Political Role of Security Analysts. Cooperation and Conflict 1999, 34(3):311-333.
-
(1999)
Cooperation and Conflict
, vol.34
, Issue.3
, pp. 311-333
-
-
Erikson, J.1
-
30
-
-
70549098788
-
Cyber Assaults on Estonia Typify a New Battle Tactic
-
May 19
-
Finn Peter. Cyber Assaults on Estonia Typify a New Battle Tactic. The Washington Post 2007, May 19
-
(2007)
The Washington Post
-
-
Finn, P.1
-
32
-
-
0007985969
-
The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School
-
Hansen Lene. The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School. Millennium 2000, 29(2):285-306.
-
(2000)
Millennium
, vol.29
, Issue.2
, pp. 285-306
-
-
Hansen, L.1
-
33
-
-
71649098624
-
Visual Securitization: Taking Discourse Analysis from the Word to the Image
-
Paper presented at the 49th International Studies Convention, San Francisco
-
Hansen Lene. Visual Securitization: Taking Discourse Analysis from the Word to the Image. 2008, Paper presented at the 49th International Studies Convention, San Francisco
-
(2008)
-
-
Hansen, L.1
-
34
-
-
0029491415
-
Emerging Challenge: Security and Safety in Cyberspace
-
Reprinted in , edited by, Santa Monica, RAND
-
Hundley Richard O, Anderson Robert H, Arquilla John, Ronfeldt David. Emerging Challenge: Security and Safety in Cyberspace. IEEE Technology and Society 1995/1996, Reprinted in , edited by, Santa Monica, RAND
-
(1995)
IEEE Technology and Society
-
-
Hundley, R.O.1
Anderson, R.H.2
Arquilla, J.3
Ronfeldt, D.4
-
35
-
-
0032341575
-
Revisiting Copenhagen: Or, On the Creative Development of a Security Studies Agenda in Europe
-
Huysmans Jef. Revisiting Copenhagen: Or, On the Creative Development of a Security Studies Agenda in Europe. European Journal of International Relations 1998, 4(4):479-505.
-
(1998)
European Journal of International Relations
, vol.4
, Issue.4
, pp. 479-505
-
-
Huysmans, J.1
-
37
-
-
71649087457
-
NATO - Cyber-Crime and Cyber-Security
-
Invitation to Panel Discussion on July 19
-
NATO - Cyber-Crime and Cyber-Security. 2007, Invitation to Panel Discussion on July 19
-
(2007)
-
-
-
38
-
-
33748108031
-
International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework
-
Jackson Nicole J. International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework. Security Dialogue 2006, 37(3):299-317.
-
(2006)
Security Dialogue
, vol.37
, Issue.3
, pp. 299-317
-
-
Jackson, N.J.1
-
39
-
-
33748132953
-
Reconfiguring Security: Buddhism and Moral Legitimacy in Cambodia
-
Kent Alexandra. Reconfiguring Security: Buddhism and Moral Legitimacy in Cambodia. Security Dialogue 2006, 37(3):343-361.
-
(2006)
Security Dialogue
, vol.37
, Issue.3
, pp. 343-361
-
-
Kent, A.1
-
40
-
-
79954033820
-
Blogs and Military Information Strategy
-
Kinniburgh James B, Denning Dorothy E. Blogs and Military Information Strategy. IO Sphere 2006, Summer:5-13.
-
(2006)
IO Sphere
, vol.Summer
, pp. 5-13
-
-
Kinniburgh, J.B.1
Denning, D.E.2
-
43
-
-
26444447572
-
In Defence of Religion: Sacred Referent Objects for Securitization
-
Laustsen Carsten Bagge, Wæver Ole. In Defence of Religion: Sacred Referent Objects for Securitization. Millennium 2000, 29(3):705-739.
-
(2000)
Millennium
, vol.29
, Issue.3
, pp. 705-739
-
-
Laustsen, C.B.1
Wæver, O.2
-
44
-
-
0030546131
-
Identity and Security: Buzan and the Copenhagen school
-
McSweeney Bill. Identity and Security: Buzan and the Copenhagen school. Review of International Studies 1996, 22(1):81-93.
-
(1996)
Review of International Studies
, vol.22
, Issue.1
, pp. 81-93
-
-
McSweeney, B.1
-
45
-
-
71649110772
-
NATO to Study Defense Against Cyberattacks; Computer Assault Staggered Estonia
-
June 15
-
Michaels Jim. NATO to Study Defense Against Cyberattacks; Computer Assault Staggered Estonia. USA Today 2007, June 15
-
(2007)
USA Today
-
-
Michaels, J.1
-
46
-
-
71649102675
-
Defending Against Cyber Attacks
-
Available at . (Accessed July 3, 2008.)
-
Defending Against Cyber Attacks. 2008, http://www.nato.int/issues/cyber_defence/practice.html, Available at . (Accessed July 3, 2008.)
-
(2008)
-
-
-
47
-
-
33748113498
-
From Social to National Security
-
Neocleous Mark. From Social to National Security. Security Dialogue 2006, 37(3):363-384.
-
(2006)
Security Dialogue
, vol.37
, Issue.3
, pp. 363-384
-
-
Neocleous, M.1
-
48
-
-
2042434504
-
Returning Practice to the Linguistic Turn: The Case of Diplomacy
-
Neumann Iver B. Returning Practice to the Linguistic Turn: The Case of Diplomacy. Millennium 2002, 31(3):627-651.
-
(2002)
Millennium
, vol.31
, Issue.3
, pp. 627-651
-
-
Neumann, I.B.1
-
49
-
-
1842435111
-
Hackers and the Contested Ontology of Cyberspace
-
Nissenbaum Helen. Hackers and the Contested Ontology of Cyberspace. New Media & Society 2004, 6(2):195-217.
-
(2004)
New Media & Society
, vol.6
, Issue.2
, pp. 195-217
-
-
Nissenbaum, H.1
-
50
-
-
31144461818
-
Where Computer Security Meets National Security
-
Nissenbaum Helen. Where Computer Security Meets National Security. Ethics and Information Technology 2005, 7(2):61-73.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.2
, pp. 61-73
-
-
Nissenbaum, H.1
-
51
-
-
71649108888
-
Final Communique: Meeting of the North Atlantic Council in Defence Ministers Session
-
Press Release, June 14
-
Final Communique: Meeting of the North Atlantic Council in Defence Ministers Session. 2007, Press Release, June 14
-
(2007)
-
-
-
52
-
-
71649089999
-
P2P Security
-
Available at . (Accessed October 31, 2008.)
-
P2P Security. 2008, http://www.onguardonline.gov/topics/p2p-security.aspx, Available at . (Accessed October 31, 2008.)
-
(2008)
-
-
-
54
-
-
0003811515
-
-
Santa Monica, Rand Corporation
-
Ronfeldt David, Arquilla John, Fuller Graham, Fuller Melissa. The Zapatista " Social Netwar" in Mexico 1998, Santa Monica, Rand Corporation
-
(1998)
The Zapatista " Social Netwar" in Mexico
-
-
Ronfeldt, D.1
Arquilla, J.2
Fuller, G.3
Fuller, M.4
-
55
-
-
84897511858
-
What is Security?
-
Rothschild Emma. What is Security? Dædalus 1995, 124(3):53-98.
-
(1995)
Dædalus
, vol.124
, Issue.3
, pp. 53-98
-
-
Rothschild, E.1
-
56
-
-
0343576284
-
Colonizing Cyberspace: " National Security" and the Internet
-
edited by, Minneapolis, University of Minnesota Press
-
Saco Diana, Weldes Jutta, Laffey Mark, Gusterson Hugh, Duvall Raymond. Colonizing Cyberspace: " National Security" and the Internet. Cultures of Insecurity: States, Communities, and the Production of Danger 1999, In, edited by, Minneapolis, University of Minnesota Press
-
(1999)
Cultures of Insecurity: States, Communities, and the Production of Danger
-
-
Saco, D.1
Weldes, J.2
Laffey, M.3
Gusterson, H.4
Duvall, R.5
-
58
-
-
71649100187
-
Attack of the Cyber Terrorists
-
May 28
-
Attack of the Cyber Terrorists. 2007, May 28
-
(2007)
-
-
-
59
-
-
71649113317
-
A Good Bot Roast; Cyber-Crime
-
June 23
-
A Good Bot Roast; Cyber-Crime. 2007a, June 23
-
(2007)
-
-
-
60
-
-
71649092445
-
Cybersecurity: Beware of the Trojan Panda
-
September 8
-
Cybersecurity: Beware of the Trojan Panda. 2007b, September 8
-
(2007)
-
-
-
61
-
-
0344559509
-
The National Strategy to Secure Cyberspace
-
Washington, DC, The White House, February
-
The National Strategy to Secure Cyberspace. 2003, Washington, DC, The White House, February
-
(2003)
-
-
-
62
-
-
71649101100
-
A Cyberblockade in Estonia
-
June 2
-
A Cyberblockade in Estonia. 2007, June 2
-
(2007)
-
-
-
63
-
-
71649099835
-
Cyberwarfare Worries
-
June 2
-
Cyberwarfare Worries. 2007, June 2
-
(2007)
-
-
-
64
-
-
71649115582
-
Cyber Mobilization: A Growing Counterinsurgency Campaign
-
Thomas Timothy L. Cyber Mobilization: A Growing Counterinsurgency Campaign. IO Sphere 2006, Summer:23-28.
-
(2006)
IO Sphere
, vol.Summer
, pp. 23-28
-
-
Thomas, T.L.1
-
65
-
-
36649032605
-
Russia Accused of Unleashing Cyberwar to Disable Estonia
-
May 17
-
Traynor Ian. Russia Accused of Unleashing Cyberwar to Disable Estonia. The Guardian 2007, May 17
-
(2007)
The Guardian
-
-
Traynor, I.1
-
66
-
-
0001491868
-
Securitization and Desecuritization
-
edited by, New York, Columbia University Press
-
Wæver Ole, Lipschutz Ronnie. Securitization and Desecuritization. On Security 1995, In, edited by, New York, Columbia University Press
-
(1995)
On Security
-
-
Wæver, O.1
Lipschutz, R.2
-
67
-
-
0003989844
-
-
London, Pinter
-
Wæver Ole, Buzan Barry, Kelstrup Morten, Lemaitre Pierre. Identity, Migration and the New Security Agenda in Europe 1993, London, Pinter
-
(1993)
Identity, Migration and the New Security Agenda in Europe
-
-
Wæver, O.1
Buzan, B.2
Kelstrup, M.3
Lemaitre, P.4
-
68
-
-
84970680617
-
Security, Sovereignty, and the Challenge of World Politics
-
Walker R B J. Security, Sovereignty, and the Challenge of World Politics. Alternatives 1990, 15(1):3-27.
-
(1990)
Alternatives
, vol.15
, Issue.1
, pp. 3-27
-
-
Walker R. B., J.1
-
69
-
-
33847755792
-
The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe?
-
Wilkinson Claire. The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe? Security Dialogue 2007, 38(1):5-25.
-
(2007)
Security Dialogue
, vol.38
, Issue.1
, pp. 5-25
-
-
Wilkinson, C.1
-
71
-
-
0348162309
-
Words, Images, Enemies: Securitization and International Politics
-
Williams Michael C. Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 2003, 47(4):511-529.
-
(2003)
International Studies Quarterly
, vol.47
, Issue.4
, pp. 511-529
-
-
Williams, M.C.1
|