-
2
-
-
0031232154
-
Seizing the middle ground: Constructivism in world politics
-
Adler, E. (1997). Seizing the middle ground: Constructivism in world politics. European Journal of International Relations, 3, 319-363.
-
(1997)
European Journal of International Relations
, vol.3
, pp. 319-363
-
-
Adler, E.1
-
3
-
-
84972279328
-
Conclusion: Epistemic communities, world order, and the creation of a reflective research program
-
Adler, E., & Haas, P. M. (1992). Conclusion: Epistemic communities, world order, and the creation of a reflective research program. International Organization, 46, 367-390.
-
(1992)
International Organization
, vol.46
, pp. 367-390
-
-
Adler, E.1
Haas, P.M.2
-
5
-
-
84861145051
-
The technologies of the information revolution
-
D. S. Alberts & D. S. Papp (Eds.), Washington DC: National Defense University
-
Alberts, D. S., Papp, D. S., & Kemp, W. T., III. (1997). The technologies of the information revolution. In D. S. Alberts & D. S. Papp (Eds.), The information age: An anthology of its impacts and consequences (pp. 83-116). Washington DC: National Defense University.
-
(1997)
The Information Age: An Anthology of Its Impacts and Consequences
, pp. 83-116
-
-
Alberts, D.S.1
Papp, D.S.2
Kemp III., W.T.3
-
6
-
-
84925838576
-
Why Information Security is Hard: An Economic Perspective
-
IEEE Computer Society (Ed.), Washington, DC: IEEE Computer Society
-
Andersson, R. (2001).Why Information Security is Hard: An Economic Perspective. In IEEE Computer Society (Ed.), Proceedings of the 17th Annual Computer Security Applications Conference (pp. 358-365). Washington, DC: IEEE Computer Society.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 358-365
-
-
Andersson, R.1
-
7
-
-
84861178583
-
Beyond good and evil: Ethics and securitization/desecuritization techniques
-
December, Retrieved May 1, 2007 from
-
Aradau, C. (2001, December). Beyond good and evil: Ethics and securitization/desecuritization techniques. Rubikon, Retrieved May 1, 2007 from http://venus.ci.uw.edu.pl/~rubikon/forum/claudia2.htm
-
(2001)
Rubikon
-
-
Aradau, C.1
-
8
-
-
0012753054
-
The great cyberwar of 2002: A WIRED scenario
-
February 6
-
Arquilla, J. (1998, February 6). The great cyberwar of 2002: A WIRED Scenario. WIRED, 122-127, 160-170.
-
(1998)
WIRED
, vol.122-127
, pp. 160-170
-
-
Arquilla, J.1
-
9
-
-
0003968659
-
-
(Eds.), Santa Monica, CA: RAND
-
Arquilla, J., & Ronfeldt, D. (Eds.). (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.
-
(2001)
Networks and Netwars: The Future of Terror, Crime and Militancy
-
-
Arquilla, J.1
Ronfeldt, D.2
-
12
-
-
84861110780
-
Between violence and 'e-jihad': Middle Eastern terror organizations in the information age
-
L. Nicander &M. Ranstorp (Eds.), Stockholm: Swedish National Defence College
-
Barak, S. (2004). Between violence and 'e-jihad': Middle Eastern terror organizations in the information age. In L. Nicander &M. Ranstorp (Eds.), Terrorism in the information age-new frontiers? (pp. 83-96). Stockholm: Swedish National Defence College.
-
(2004)
Terrorism in the Information Age-new Frontiers?
, pp. 83-96
-
-
Barak, S.1
-
13
-
-
21244432672
-
The cyberwar debate: Perception and politics in US critical infrastructure protection
-
Bendrath, R. (2001). The cyberwar debate: Perception and politics in US critical infrastructure protection. Information&Security: An International Journal, 7, 80-103.
-
(2001)
Information&Security: An International Journal
, vol.7
, pp. 80-103
-
-
Bendrath, R.1
-
15
-
-
80051578519
-
Cyberterrorism to cyberwar, back and forth: How the United States securitized cyberspace
-
J. Eriksson & G. Giacomello (Eds.), London: Routledge
-
Bendrath, R., Eriksson J., & Giacomello G. (2006). Cyberterrorism to cyberwar, back and forth: How the United States securitized cyberspace. In J. Eriksson & G. Giacomello (Eds.), International relations and security in the digital age (pp. 57-82). London: Routledge.
-
(2006)
International Relations and Security in the Digital Age
, pp. 57-82
-
-
Bendrath, R.1
Eriksson, J.2
Giacomello, G.3
-
16
-
-
84861163515
-
Warfare in the information age
-
J. Arquilla & D. Ronfeldt (Eds.), Santa Monica, CA: RAND
-
Berkowitz, B. D. (1997). Warfare in the information age. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp: Preparing for conflict in the information age (pp. 175-189). Santa Monica, CA: RAND.
-
(1997)
Athena's Camp: Preparing For Conflict In the Information Age
, pp. 175-189
-
-
Berkowitz, B.D.1
-
18
-
-
0003578254
-
-
Boulder, CO: Rienner
-
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Rienner.
-
(1998)
Security: A New Framework For Analysis
-
-
Buzan, B.1
Wæver, O.2
de Wilde, J.3
-
20
-
-
84861178585
-
-
(Congressional Research Service Documents, CRS RL32331). Washington, DC: Congressional Research Service
-
Cashell, B., Jackson, W. D., Jickling, M., & Webel, B. (2004). The economic impact of cyber-attacks (Congressional Research Service Documents, CRS RL32331). Washington, DC: Congressional Research Service.
-
(2004)
The Economic Impact of Cyber-attacks
-
-
Cashell, B.1
Jackson, W.D.2
Jickling, M.3
Webel, B.4
-
22
-
-
84861124863
-
White House officials debating rules for cyberwarfare
-
August 22
-
Cha, A. E., & Krim, J. (2002, August 22). White House officials debating rules for cyberwarfare. The Washington Post, p. A02.
-
(2002)
The Washington Post
-
-
Cha, A.E.1
Krim, J.2
-
23
-
-
84861178586
-
-
July 14, Retrieved May 2, 2007 from
-
Chertoff, M. (2005, July 14). Statement of Secretary Michael Chertoff, U.S. Department of Homeland Security, before the United States Senate Committee on Homeland Security and Government Affairs, Washington, DC. Retrieved May 2, 2007 from http://www.homelandsecurity.ms.gov/docs/ChertoffTestimony_Senate_07142005.pdf
-
(2005)
Statement of Secretary Michael Chertoff, U.S. Department of Homeland Security, Before the United States Senate Committee On Homeland Security and Government Affairs, Washington, DC
-
-
Chertoff, M.1
-
25
-
-
84936823975
-
Sex and death in the rational world of defense intellectuals
-
Cohn, C. (1987). Sex and death in the rational world of defense intellectuals. Signs: Journal of Women in Culture and Society, 12, 687-718.
-
(1987)
Signs: Journal of Women In Culture and Society
, vol.12
, pp. 687-718
-
-
Cohn, C.1
-
26
-
-
84859596962
-
The future of cyberterrorism: Where physical and virtual worlds converge
-
Collin, B. C. (1997). The future of cyberterrorism: Where physical and virtual worlds converge. Crime & Justice International, 13, 15-18.
-
(1997)
Crime & Justice International
, vol.13
, pp. 15-18
-
-
Collin, B.C.1
-
27
-
-
0012422098
-
Reality bytes: Cyberterrorism and terrorist 'use' of the Internet
-
November 4, Retrieved May 2, 2007 from
-
Conway, M. (2002, November 4). Reality bytes: Cyberterrorism and terrorist 'use' of the Internet. Firstmonday, 7. Retrieved May 2, 2007 from http://firstmonday.org/issues/issue7_11/Conway
-
(2002)
Firstmonday
, vol.7
-
-
Conway, M.1
-
28
-
-
0040731563
-
Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of Ibn Khaldun
-
J. N. Rosenau & E. Czempiel (Eds.), Cambridge Studies in International Relations Nr. 20, Cambridge, England: Cambridge University Press
-
Cox, R. W. (1992). Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of Ibn Khaldun. In J. N. Rosenau & E. Czempiel (Eds.), Governance without government: Order and change in world politics, Cambridge Studies in International Relations Nr. 20 (pp. 132-158). Cambridge, England: Cambridge University Press.
-
(1992)
Governance Without Government: Order and Change In World Politics
, pp. 132-158
-
-
Cox, R.W.1
-
29
-
-
84861120178
-
-
DCI Center for Security Evaluation Standards Group, September 15, 7th annual edition. Retrieved May 2, 2007 from
-
DCI Center for Security Evaluation Standards Group. (1995, September 15). An inventory of standards affecting security, 7th annual edition. Retrieved May 2, 2007 from http://www.fas.org/sgp/othergov/inventory.html
-
(1995)
An Inventory of Standards Affecting Security
-
-
-
34
-
-
0242440508
-
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
-
J. Arquilla & D. Ronfeldt (Eds.), Santa Monica, CA: RAND
-
Denning, D. E. (2001b). Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 239-288). Santa Monica, CA: RAND.
-
(2001)
Networks and Netwars: The Future of Terror, Crime and Militancy
, pp. 239-288
-
-
Denning, D.E.1
-
35
-
-
81455158615
-
-
Department of Homeland Security (DHS)., September 12, Washington, DC. Retrieved May 3, 2007 from
-
Department of Homeland Security (DHS). (2006, September 12). Cyber storm: Exercise report. Washington, DC. Retrieved May 3, 2007 from http://www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf
-
(2006)
Cyber Storm: Exercise Report
-
-
-
37
-
-
0040655217
-
-
Unpublished master's thesis, University of Vermont, Burlington. Retrieved May 7, 2007 from
-
Devost, M. G. (1995). National security in the information age. Unpublished master's thesis, University of Vermont, Burlington. Retrieved May 7, 2007 from http://www.devost.net/papers/national_security_in_the_information_age.html
-
(1995)
National Security In the Information Age
-
-
Devost, M.G.1
-
38
-
-
0031315433
-
Information terrorism: Political violence in the information age
-
Devost, M. G., Houghton, B. K., & Pollard, N. A. (1997). Information terrorism: Political violence in the information age. Terrorism and Political Violence, 9, 72-83.
-
(1997)
Terrorism and Political Violence
, vol.9
, pp. 72-83
-
-
Devost, M.G.1
Houghton, B.K.2
Pollard, N.A.3
-
40
-
-
84911212445
-
Concluding remarks: The role of the state in securing the information age-challenges and prospects
-
in press, M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.), Aldershot, England: Ashgate
-
Dunn Cavelty, M. & Mauer, V. (in press). Concluding remarks: The role of the state in securing the information age-challenges and prospects. In M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.). Power and security in the information age: Investigating the role of the state in cyberspace. Aldershot, England: Ashgate.
-
Power and Security In the Information Age: Investigating the Role of the State In Cyberspace
-
-
Dunn, C.M.1
Mauer, V.2
-
44
-
-
0003449736
-
-
November, Technical Report. CMU/SEI-97-TR-013. ESC-TR-97-013). Pittsburgh, PA: Carnegie Mellon University, Software Engineering Institute. Retrieved May 2, 2007 from
-
Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff T & Mead, N. R. (1997, November). Survivable network systems: An emerging discipline. (Technical Report. CMU/SEI-97-TR-013. ESC-TR-97-013). Pittsburgh, PA: Carnegie Mellon University, Software Engineering Institute. Retrieved May 2, 2007 from http://www.cert.org/research/97tr013.pdf
-
(1997)
Survivable Network Systems: An Emerging Discipline
-
-
Ellison, R.J.1
Fisher, D.A.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.5
Mead, N.R.6
-
45
-
-
84888859417
-
Information warfare: Hype or reality?
-
Eriksson, A. E. (1999). Information warfare: Hype or reality? The Non-Proliferation Review, 6, 57-64.
-
(1999)
The Non-Proliferation Review
, vol.6
, pp. 57-64
-
-
Eriksson, A.E.1
-
47
-
-
0035193419
-
Cyberplagues, IT, and security: Threat politics in the information age
-
Eriksson, J. (2001b). Cyberplagues, IT, and security: Threat politics in the information age. Journal of Contingencies and Crisis Management, 9, 211-222.
-
(2001)
Journal of Contingencies and Crisis Management
, vol.9
, pp. 211-222
-
-
Eriksson, J.1
-
48
-
-
33746787614
-
The information revolution, security, and international relations: (IR)relevant theory?
-
Eriksson, J. & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27, 221-244.
-
(2006)
International Political Science Review
, vol.27
, pp. 221-244
-
-
Eriksson, J.1
Giacomello, G.2
-
49
-
-
60449096384
-
-
(Uppsala Peace Research Papers, 6). Uppsala, Sweden: Uppsala Universitet. Retrieved May 2, 2007 from
-
Eriksson, J., & Noreen, E. (2002). Setting the agenda of threats: An explanatory model (Uppsala Peace Research Papers, 6). Uppsala, Sweden: Uppsala Universitet. Retrieved May 2, 2007 from http://www.pcr.uu.se/publications/UPRP_pdf/uprp_no_6.pdf
-
(2002)
Setting the Agenda of Threats: An Explanatory Model
-
-
Eriksson, J.1
Noreen, E.2
-
50
-
-
84861178588
-
-
Exec. Order No. 13,228, 3 C.F.R. 796
-
Exec. Order No. 13,228, 3 C.F.R. 796 (2001).
-
(2001)
-
-
-
51
-
-
84861120179
-
-
Exec. Order No. 13,231, 66 Fed. Reg. 53,063
-
Exec. Order No. 13,231, 66 Fed. Reg. 53,063 (2001).
-
(2001)
-
-
-
52
-
-
84861251379
-
Information age state security: New threats to old boundaries
-
November, Retrieved May 2, 2007 from
-
Fisher, U. (2001, November). Information age state security: New threats to old boundaries. Journal for Homeland Security. Retrieved May 2, 2007 from http://www.homelandsecurity.org/journal/articles/fisher.htm
-
(2001)
Journal For Homeland Security
-
-
Fisher, U.1
-
53
-
-
84861178587
-
Statement of Louis J. Freeh, Director, Federal Bureau of Investigation
-
May 13, Department of Justice, U.S. Senate Committee on Appropriations, Retrieved May 2, 2007 from
-
Freeh, L. J. (1997, May 13). Statement of Louis J. Freeh, Director, Federal Bureau of Investigation, Department of Justice. In U.S. Senate Committee on Appropriations, Counterterrorism: Hearing before the Committee on Appropriations, United States Senate, One Hundred Fifth Congress, first session: Special Hearing. Retrieved May 2, 2007 from http://www.fas.org/irp/congress/1997_hr/sh105-383.htm
-
(1997)
Counterterrorism: Hearing Before the Committee On Appropriations, United States Senate, One Hundred Fifth Congress, First Session: Special Hearing
-
-
Freeh, L.J.1
-
54
-
-
84861178591
-
Shunning the frumious bandersnatch: Current literature on information warfare and deterrence
-
Retrieved May 2, 2007 from
-
French, G. S. (2000). Shunning the frumious bandersnatch: Current literature on information warfare and deterrence. The Terrorism Research Center, Inc. Retrieved May 2, 2007 from http://www.terrorism.com
-
(2000)
The Terrorism Research Center, Inc
-
-
French, G.S.1
-
55
-
-
0004218798
-
-
Cambridge, England: Cambridge University Press
-
Gamson, W. A. (1992). Talking politics. Cambridge, England: Cambridge University Press.
-
(1992)
Talking Politics
-
-
Gamson, W.A.1
-
57
-
-
84861108106
-
-
September, Leeds, UK: Cyber-Rights & Cyber-Liberties (UK). Retrieved May 2, 2007 from
-
Gladman, B. (1998, September). Wassenaar controls, cyber-crime and information terrorism. Leeds, UK: Cyber-Rights & Cyber-Liberties (UK). Retrieved May 2, 2007 from http://www.cyber-rights.org/crypto/wassenaar.htm
-
(1998)
Wassenaar Controls, Cyber-crime and Information Terrorism
-
-
Gladman, B.1
-
58
-
-
84861178590
-
U.S. cybersecurity chief resigns: Amit Yoran, said to be frustrated with progress, gives one-day notice
-
October 1, Retrieved May 2, 2007 from
-
Gross, G. (2004, October 1). U.S. cybersecurity chief resigns: Amit Yoran, said to be frustrated with progress, gives one-day notice. IDG News Service. Retrieved May 2, 2007 from http://www.infoworld.com/article/04/10/01/HNchiefresigns_1.html?DISASTER%20RECOVERY
-
(2004)
IDG News Service
-
-
Gross, G.1
-
59
-
-
0003428657
-
-
Buckingham, England: Open University Press
-
Howarth, D. (2000). Discourse. Buckingham, England: Open University Press.
-
(2000)
Discourse
-
-
Howarth, D.1
-
60
-
-
0007836321
-
Emerging challenge: Security and safety in cyberspace
-
J. Arquilla & D. Ronfeldt (Eds.), Santa Monica, CA: RAND
-
Hundley, R. O. & Anderson, R. H. (1997). Emerging challenge: Security and safety in cyberspace. In J. Arquilla & D. Ronfeldt (Eds.), In Athena's camp: Preparing for conflict in the information age (pp. 231-252). Santa Monica, CA: RAND.
-
(1997)
Athena's Camp: Preparing For Conflict In the Information Age
, pp. 231-252
-
-
Hundley, R.O.1
Anderson, R.H.2
-
61
-
-
84861178589
-
Cyberterrorism hype
-
October 21, Retrieved May 3, 2007 from
-
Ingles-le Nobel, J. J. (1999, October 21). Cyberterrorism hype. Jane's Intelligence Review. Retrieved May 3, 2007 from http://212.111.49.124/cyberterror/resources/janes/jir0525.htm
-
(1999)
Jane's Intelligence Review
-
-
Ingles-Lenobel, J.J.1
-
62
-
-
84861109203
-
Statement for the record of Vice Admiral Lowell E. Jacoby, USN, Director, Defense Intelligence Agency before the Senate Select Committee on Intelligence
-
February 11, Washington, DC: Government Printing Office. Retrieved May 3, 2007 from
-
Jacoby, L. (2003, February 11). Statement for the record of Vice Admiral Lowell E. Jacoby, USN, Director, Defense Intelligence Agency before the Senate Select Committee on Intelligence. In Current and projected national security threats to the United States: Hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eighth Congress, First Session (pp. 48-67). Washington, DC: Government Printing Office. Retrieved May 3, 2007 from http://purl.access.gpo.gov/GPO/LPS42906
-
(2003)
Current and Projected National Security Threats to the United States: Hearing Before the Select Committee On Intelligence of the United States Senate, One Hundred Eighth Congress, First Session
, pp. 48-67
-
-
Jacoby, L.1
-
64
-
-
84937338220
-
Asymmetric threats to the United States
-
Kolet, K. S. (2001). Asymmetric threats to the United States. Comparative Strategy, 20, 277-292.
-
(2001)
Comparative Strategy
, vol.20
, pp. 277-292
-
-
Kolet, K.S.1
-
65
-
-
79961041598
-
'The absolute protection of our citizens': Critical infrastructure protection and the practice of Security
-
in press, M. Dunn Cavelty & K. S. Kristensen (Eds.), London: Routledge
-
Kristensen, K. S. (in press). 'The absolute protection of our citizens': Critical infrastructure protection and the practice of Security. In M. Dunn Cavelty & K. S. Kristensen (Eds.), The politics of securing the homeland: Critical infrastructure, risk and securitisation. London: Routledge.
-
The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation
-
-
Kristensen, K.S.1
-
66
-
-
84911047943
-
Clinton gives a final foreign policy speech
-
December 9
-
Lacey, M. (2000, December 9). Clinton gives a final foreign policy speech. The New York Times.
-
(2000)
The New York Times
-
-
Lacey, M.1
-
68
-
-
14844325969
-
-
December, Washington, DC: Center for Strategic and International Studies. Retrieved May 3, 2007 from
-
Lewis, J. A. (2002, December). Assessing the risks of cyber-terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic and International Studies. Retrieved May 3, 2007 from http://www.csis.org/media/csis/pubs/021101_risks_of_cyberterror.pdf
-
(2002)
Assessing the Risks of Cyber-terrorism, Cyber War and Other Cyber Threats
-
-
Lewis, J.A.1
-
69
-
-
0002353043
-
The governance of cyberspace: Politics, technology, and global restructuring
-
B. D. Loader (Ed.), London and New York: Routledge
-
Loader, B. D. (1997). The governance of cyberspace: Politics, technology, and global restructuring. In B. D. Loader (Ed.), The governance of cyberspace (pp. 1-19). London and New York: Routledge.
-
(1997)
The Governance of Cyberspace
, pp. 1-19
-
-
Loader, B.D.1
-
70
-
-
84861124865
-
U.S. cybersecurity chief resigns
-
October 1, Retrieved May 3, 2007 from
-
Mark, R. (2004, October 1). U.S. cybersecurity chief resigns. eSecurity Planet. Retrieved May 3, 2007 from http://www.esecurityplanet.com/trends/article.php/3416161
-
(2004)
ESecurity Planet
-
-
Mark, R.1
-
71
-
-
0003813389
-
-
Santa Monica, CA: RAND
-
Molander, R. C., Riddle, A. S, & Wilson, P. A. (1996). Strategic information warfare: A new face of war. Santa Monica, CA: RAND.
-
(1996)
Strategic Information Warfare: A New Face of War
-
-
Molander, R.C.1
Riddle, A.S.2
Wilson, P.A.3
-
72
-
-
84861124866
-
-
September 14, (CRS Report for Congress, RL33648). Washington, DC: Congressional Research Service
-
Moteff, J. (2006, September 14). Critical infrastructure: The national asset database. (CRS Report for Congress, RL33648). Washington, DC: Congressional Research Service.
-
(2006)
Critical Infrastructure: The National Asset Database
-
-
Moteff, J.1
-
73
-
-
84861170650
-
-
March 13), (Congressional Research Report for Congress, RL30153). Washington, DC: Congressional Research Service
-
Moteff, J. (2007, March 13). Critical infrastructures: Background, policy, and implementation (Congressional Research Report for Congress, RL30153). Washington, DC: Congressional Research Service.
-
(2007)
Critical Infrastructures: Background, Policy and Implementation
-
-
Moteff, J.1
-
74
-
-
84861108111
-
Testimony of Robert S. Mueller, III, Director, Federal Bureau of Investigation before the Select Committee on Intelligence of the United States Senate Washington
-
February 11, Washington, DC: Government Printing Office. Retrieved May 3, 2007 from
-
Mueller, R. S. (2003, February 11). Testimony of Robert S. Mueller, III, Director, Federal Bureau of Investigation before the Select Committee on Intelligence of the United States Senate Washington. In Current and projected national security threats to the United States: Hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eighth Congress, First Session (pp. 31-47). Washington, DC: Government Printing Office. Retrieved May 3, 2007 from http://purl.access.gpo.gov/GPO/LPS42906
-
Current and Projected National Security Threats to the United States: Hearing Before the Select Committee On Intelligence of the United States Senate, One Hundred Eighth Congress, First Session
, pp. 31-47
-
-
Mueller, R.S.1
-
75
-
-
0004184890
-
-
National Academy of Sciences (NAS), Computer Science and Telecommunications Board, Washington, DC: National Academy Press
-
National Academy of Sciences (NAS), Computer Science and Telecommunications Board (1991). Computers at risk: Safe computing in the information age. Washington, DC: National Academy Press.
-
(1991)
Computers At Risk: Safe Computing In the Information Age
-
-
-
76
-
-
84917168540
-
Terrorist interest in water supply and SCADA systems
-
National Infrastructure Protection Center (NIPC), 30 January
-
National Infrastructure Protection Center (NIPC). (2002, 30 January). Terrorist interest in water supply and SCADA systems. Information Bulletin 02-001.
-
(2002)
Information Bulletin 02-001
-
-
-
77
-
-
84861176909
-
-
White Paper prepared for the Defense Intelligence Agency Office for Counterterrorism Analysis. Monterey, CA: Center for the Study of Terrorism and Irregular Warfare (CSTIW)
-
Nelson, B., Choi, R., Iacobucci, M., Mitchell, M., & Gagnon, G. (1999). Cyberterror: Prospects and implications. White Paper prepared for the Defense Intelligence Agency Office for Counterterrorism Analysis. Monterey, CA: Center for the Study of Terrorism and Irregular Warfare (CSTIW).
-
(1999)
Cyberterror: Prospects and Implications
-
-
Nelson, B.1
Choi, R.2
Iacobucci, M.3
Mitchell, M.4
Gagnon, G.5
-
79
-
-
84876196984
-
What a good idea: Frames and ideologies in social movements research
-
Oliver, P. E. & Johnston, H. (2000). What a good idea: Frames and ideologies in social movements research. Mobilization, 5, 37-54.
-
(2000)
Mobilization
, vol.5
, pp. 37-54
-
-
Oliver, P.E.1
Johnston, H.2
-
81
-
-
84861124878
-
Info war or electronic sabre rattling?
-
September 8, Retrieved May 3, 2007 from
-
Poulsen, K. (1999, September 8). Info war or electronic sabre rattling? ZDNet. Retrieved May 3, 2007 from http://news.zdnet.com/2100-9595_22-515631.html?legacy=zdnn
-
(1999)
ZDNet
-
-
Poulsen, K.1
-
82
-
-
0003994024
-
-
President's Commission on Critical Infrastructure Protection (PCCIP), Washington, DC: Government Printing Office
-
President's Commission on Critical Infrastructure Protection (PCCIP). (1997). Critical foundations: Protecting America's infrastructures. Washington, DC: Government Printing Office.
-
(1997)
Critical Foundations: Protecting America's Infrastructures
-
-
-
83
-
-
84861170657
-
-
June, Paper presented at the Third International Symposium on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, Washington, DC. Retrieved May 8, 2007 from
-
Rathmell, A., Overill, R., Valeri, L., & Gearson, J. (1997, June). The IW threat from sub-state groups: An interdisciplinary approach. Paper presented at the Third International Symposium on Command and Control Research and Technology, Institute for National Strategic Studies-National Defense University, Washington, DC. Retrieved May 8, 2007 from http://www.kcl.ac.uk/orgs/icsa/Old/terrori.html
-
(1997)
The IW Threat From Sub-state Groups: An Interdisciplinary Approach
-
-
Rathmell, A.1
Overill, R.2
Valeri, L.3
Gearson, J.4
-
88
-
-
0032148572
-
An electronic Pearl Harbor? Not likely
-
Fall, Retrieved May 3, 2007 from
-
Smith, G. (1998, Fall). An electronic Pearl Harbor? Not likely. Issues in Science and Technology, 15. Retrieved May 3, 2007 from http://www.issues.org/15.1/smith.htm
-
(1998)
Issues In Science and Technology
, vol.15
-
-
Smith, G.1
-
89
-
-
84861116751
-
How vulnerable is our interlinked infrastructure?
-
D. S. Alberts & D. S. Papp (Eds.), Washington DC: National Defense University Press
-
Smith, G. (2000). How vulnerable is our interlinked infrastructure? In D. S. Alberts & D. S. Papp (Eds.), The information age: An anthology of its impacts and consequences (Vol. II, pp. 507-523). Washington DC: National Defense University Press.
-
(2000)
The Information Age: An Anthology of Its Impacts and Consequences
, vol.2
, pp. 507-523
-
-
Smith, G.1
-
90
-
-
0002266033
-
Master Frames and Cycles of Protest
-
Morris, A. D. & Mueller, C. M. (Eds.), New Haven, CT: Yale University Press
-
Snow, D. A. & Benford, R. D. (1992). Master Frames and Cycles of Protest. In Morris, A. D. & Mueller, C. M. (Eds.), Frontiers in social movement theory (pp. 133-155). New Haven, CT: Yale University Press.
-
(1992)
Frontiers In Social Movement Theory
, pp. 133-155
-
-
Snow, D.A.1
Benford, R.D.2
-
91
-
-
84936823726
-
Frame alignment processes, micromobilization and movement participation
-
Snow, D. A., Rocheford, E. B., Jr., Worden, S. K., & Benford, R. D. (1986). Frame alignment processes, micromobilization and movement participation. American Sociological Review, 51, 464-481.
-
(1986)
American Sociological Review
, vol.51
, pp. 464-481
-
-
Snow, D.A.1
Rocheford Jr., E.B.2
Worden, S.K.3
Benford, R.D.4
-
93
-
-
60449116450
-
Improving information security in companies: How to meet the need for threat information
-
in press, M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.), Aldershot, England: Ashgate
-
Suter, M. (in press). Improving information security in companies: How to meet the need for threat information. In M. Dunn Cavelty, V. Mauer, & S. Krishna-Hensel (Eds.), Power and security in the information age: Investigating the role of the state in cyberspace. Aldershot, England: Ashgate.
-
Power and Security In the Information Age: Investigating the Role of the State In Cyberspace
-
-
Suter, M.1
-
94
-
-
34547283925
-
-
Technical Analysis Group (TAG), Institute for Security Technology Studies, Dartmouth College, November, Hanover, NH: Dartmouth College. Retrieved May 3, 2007 from
-
Technical Analysis Group (TAG), Institute for Security Technology Studies, Dartmouth College (2003, November). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Dartmouth College. Retrieved May 3, 2007 from https://www.ists.dartmouth.edu/TAG/ITB/ITB_032004.pdf
-
(2003)
Examining the Cyber Capabilities of Islamic Terrorist Groups
-
-
-
101
-
-
84861123557
-
-
The White House, Office of the Press Secretary, May 22, Washington, DC: President of the United States. Retrieved May 3, 2007 from
-
The White House, Office of the Press Secretary (1998a, May 22). Fact Sheet. Combating Terrorism: Presidential Decision Directive 62. Washington, DC: President of the United States. Retrieved May 3, 2007 from http://www.fas.org/irp/offdocs/pdd-62.htm
-
(1998)
Fact Sheet. Combating Terrorism: Presidential Decision Directive 62
-
-
-
104
-
-
85048941387
-
Al Qaeda and the internet: The danger of cyberplanning
-
Spring., (Spring)
-
Thomas, T. L. (2003, Spring). Al Qaeda and the Internet: The danger of cyberplanning. Parameters (Spring), 112-123.
-
(2003)
Parameters
, pp. 112-123
-
-
Thomas, T.L.1
-
105
-
-
34247227158
-
Does the Internet create democracy?
-
Thornton, A. (2001). Does the Internet create democracy? Ecquid Novi, 22, 126-147.
-
(2001)
Ecquid Novi
, vol.22
, pp. 126-147
-
-
Thornton, A.1
-
107
-
-
84861178606
-
-
February 10, Retrieved May 3, 2007 from
-
Vatis, M. A. (1998, February 10) Statement by Michael Vatis, deputy assistant director and chief of the Federal Bureau of Investigation's National Infrastructure Protection Center (NIPC) before the Senate Judiciary Subcommittee on Terrorism, Technology and Government Information. Retrieved May 3, 2007 from http://www.fas.org/irp/congress/1998_hr/98061101_ppo.html
-
(1998)
Statement By Michael Vatis, Deputy Assistant Director and Chief of the Federal Bureau of Investigation's National Infrastructure Protection Center (NIPC) Before the Senate Judiciary Subcommittee On Terrorism, Technology and Government Information
-
-
Vatis, M.A.1
-
108
-
-
0008783791
-
-
(Working Paper). Hanover: Institute for Security Technology Studies at Dartmouth College. Retrieved May 3, 2007 from
-
Vatis, M. A. (2001). Cyber attacks during the war on terrorism: A predictive analysis. (Working Paper). Hanover: Institute for Security Technology Studies at Dartmouth College. Retrieved May 3, 2007 from http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf
-
(2001)
Cyber Attacks During the War On Terrorism: A Predictive Analysis
-
-
Vatis, M.A.1
-
109
-
-
84911084727
-
Nation's cybersecurity chief abruptly quits DHS post: 'I'm not a long-term government kind of guy,' says Amit Yoran
-
October 1, Retrieved May 3, 2007 from
-
Verton, D. (2004, October 1). Nation's cybersecurity chief abruptly quits DHS post: 'I'm not a long-term government kind of guy,' says Amit Yoran. Computerworld. Retrieved May 3, 2007 from http://www.computerworld.com/managementtopics/management/story/0,10801,96369,00.html
-
(2004)
Computerworld
-
-
Verton, D.1
-
110
-
-
0001491868
-
Securitization and desecuritization
-
R. Lipschutz (Ed.), New York: Columbia University Press
-
Wæver, O. (1995). Securitization and desecuritization. In R. Lipschutz (Ed.), On security (pp. 46-86). New York: Columbia University Press.
-
(1995)
On Security
, pp. 46-86
-
-
Wæver, O.1
-
111
-
-
84861108117
-
Will next terror attack be electronic? Experts fear terrorists may attack through cyberspace
-
September 16, Retrieved May 3, 2007 from
-
Wallace, C. (2002, September 16). Will next terror attack be electronic? Experts fear terrorists may attack through cyberspace. ABC News.com. Retrieved May 3, 2007 from http://abcnews.go.com/WNT/story?id=130108&page=1
-
(2002)
ABC News.com
-
-
Wallace, C.1
-
112
-
-
0001475720
-
The renaissance of security studies
-
Walt, S. (1991). The renaissance of security studies. International Studies Quarterly, 35, 211-239.
-
(1991)
International Studies Quarterly
, vol.35
, pp. 211-239
-
-
Walt, S.1
-
113
-
-
33748994104
-
-
February 6, Retrieved May 3, 2007 from
-
Watson, D. L. (2002, February 6). The Terrorist Threat Confronting the United States, Statement for the Record of the Executive Assistant Director on Counterterrorism nd Counterintelligence, Federal Bureau of Investigation, before the Senate Select Committee on Intelligence, Washington, DC. Retrieved May 3, 2007 from http://www.fbi.gov/congress/congress02/watson020602.htm
-
(2002)
The Terrorist Threat Confronting the United States, Statement For the Record of the Executive Assistant Director On Counterterrorism Nd Counterintelligence, Federal Bureau of Investigation, Before the Senate Select Committee On Intelligence, Washington, DC
-
-
Watson, D.L.1
-
114
-
-
33745594976
-
-
March, (United States Institute of Peace, Special Report 116).Washington, DC: United States Institute of Peace
-
Weimann, G. (2004a, March). www.terror.net. How modern terrorism uses the Internet. (United States Institute of Peace, Special Report 116).Washington, DC: United States Institute of Peace.
-
(2004)
Www.terror.net. How Modern Terrorism Uses the Internet
-
-
Weimann, G.1
-
115
-
-
68249109477
-
-
United States Institute of Peace, Special Report 119. Washington, DC: United States Institute of Peace
-
Weimann, G. (2004b). Cyberterrorism-How real is the threat? (United States Institute of Peace, Special Report 119). Washington, DC: United States Institute of Peace.
-
(2004)
Cyberterrorism-How Real is The Threat?
-
-
Weimann, G.1
|