-
3
-
-
12344293756
-
Is There Such a Thing as Virtual Crime?
-
Brenner Susan W. Is There Such a Thing as Virtual Crime? California Criminal Law Review 2001, 4(1):105-111.
-
(2001)
California Criminal Law Review
, vol.4
, Issue.1
, pp. 105-111
-
-
Brenner, S.W.1
-
6
-
-
56749151378
-
Webtapping: Securing the Internet to Save Us from Transnational Terror?
-
Bronk Christopher. Webtapping: Securing the Internet to Save Us from Transnational Terror? First Monday 2008, 13(11).
-
(2008)
First Monday
, vol.13
, Issue.11
-
-
Bronk, C.1
-
7
-
-
0003578254
-
-
Boulder, CO, Lynne Rienner
-
Buzan Barry, Waever Ole, de Wilde Jaap. Security: A New Framework of Analysis 1998, Boulder, CO, Lynne Rienner
-
(1998)
Security: A New Framework of Analysis
-
-
Buzan, B.1
Waever, O.2
de Wilde, J.3
-
9
-
-
77951158711
-
Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet
-
Deibert RJ, Palfrey J, Rohozinski R, Zittrain J. In, edited by, Cambridge, MA, MIT Press
-
Deibert Ronald J, Rohozinski Rafal. Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet. Access Denied: The Practice and Policy of Global Internet Filtering 2008, Deibert Ronald J, Palfrey JohnRohozinski RafalZittrain Jonathan. In, edited by, Cambridge, MA, MIT Press
-
(2008)
Access Denied: The Practice and Policy of Global Internet Filtering
-
-
Deibert, R.J.1
Rohozinski, R.2
-
11
-
-
77951184167
-
-
Deibert RJ, Palfrey J, Rohozinski R, Zittrain J. Cambridge, MA, MIT Press
-
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace 2010, Deibert Ronald JPalfrey JohnRohozinski RafalZittrain Jonathan. Cambridge, MA, MIT Press
-
(2010)
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
-
-
-
12
-
-
0034204649
-
Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy
-
Denning Dorothy E. Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. Computer Security Journal 2000, 16(3):15-35.
-
(2000)
Computer Security Journal
, vol.16
, Issue.3
, pp. 15-35
-
-
Denning, D.E.1
-
13
-
-
4644372122
-
The Question of Information Technology in International Relations
-
Der Derian James. The Question of Information Technology in International Relations. Millennium: Journal of International Studies 2003, 32(3):441-456.
-
(2003)
Millennium: Journal of International Studies
, vol.32
, Issue.3
, pp. 441-456
-
-
Der Derian, J.1
-
15
-
-
60949086554
-
The Emerging Internet Governance Mosaic: Connecting the Pieces
-
Dutton William H, Peltu Malcom. The Emerging Internet Governance Mosaic: Connecting the Pieces. Information Polity 2007, 12(1-2):63-81.
-
(2007)
Information Polity
, vol.12
, Issue.1-2
, pp. 63-81
-
-
Dutton, W.H.1
Peltu, M.2
-
16
-
-
0002930264
-
The Internet as a Source of Regulatory Arbitrage
-
Kahin B, Nesson C. In, edited by, Cambridge, MA, MIT Press
-
Froomkin Michael. The Internet as a Source of Regulatory Arbitrage. Borders in Cyberspace 1997, Kahin BrianNesson Charles. In, edited by, Cambridge, MA, MIT Press
-
(1997)
Borders in Cyberspace
-
-
Froomkin, M.1
-
17
-
-
0003954001
-
-
New York, Ace Books
-
Gibson William. Neuromancer 1984, New York, Ace Books
-
(1984)
Neuromancer
-
-
Gibson, W.1
-
20
-
-
77951146710
-
Creating Conventions: Technology Policy and International Cooperation in Criminal Matters
-
Drake WJ, Wilson EJ. In, edited by, Cambridge, MA, MIT Press
-
Hosein Ian. Creating Conventions: Technology Policy and International Cooperation in Criminal Matters. Governing Global Electronic Networks 2008, Drake William JWilson Ernest J. In, edited by, Cambridge, MA, MIT Press
-
(2008)
Governing Global Electronic Networks
-
-
Hosein, I.1
-
21
-
-
77950880711
-
Tracking Ghostnet: Investigating a Cyber Espionage Network
-
Available at (Accessed October 29, 2009)
-
Tracking Ghostnet: Investigating a Cyber Espionage Network. 2009, http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network, Available at (Accessed October 29, 2009)
-
(2009)
-
-
-
22
-
-
70349727017
-
ITU Global Cybersecurity Agenda (CGA) High-Level Experts Group (HLEG) Global Strategic Report
-
International Telecommunications Union. Available at (Accessed: January 3, 2010)
-
ITU Global Cybersecurity Agenda (CGA) High-Level Experts Group (HLEG) Global Strategic Report. 2008, http://www.itu.int/cybersecurity/gca, International Telecommunications Union. Available at (Accessed: January 3, 2010)
-
(2008)
-
-
-
24
-
-
44949208439
-
Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare
-
Kelsey Jeffrey TG. Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare. Michigan Law Review 2008, 106(7):1428-1450.
-
(2008)
Michigan Law Review
, vol.106
, Issue.7
, pp. 1428-1450
-
-
Kelsey, J.T.1
-
25
-
-
70350083640
-
-
Washington, DC, Radio Free Europe, Available at (Accessed October 28, 2009)
-
Kimmage Daniel. The Al-Qaeda Media Nexus 2008, http://docs.rferl.org/en-US/AQ_Media_Nexus.pdf, Washington, DC, Radio Free Europe, Available at (Accessed October 28, 2009)
-
(2008)
The Al-Qaeda Media Nexus
-
-
Kimmage, D.1
-
26
-
-
39749161443
-
History of the Internet and Its Flexible Future
-
Kleinrock Leonard. History of the Internet and Its Flexible Future. IEE Wireless Communications 2008, 15(1):8-18.
-
(2008)
IEE Wireless Communications
, vol.15
, Issue.1
, pp. 8-18
-
-
Kleinrock, L.1
-
29
-
-
84894845239
-
Protecting Privacy and Expression Online: Can the Global Network Initiative Embrace the Character of the Net?
-
Deibert RJ, Palfrey JG, Rohozinski R, Zittrain J. In, edited by, Cambridge, MA, MIT Press
-
Maclay Colin. Protecting Privacy and Expression Online: Can the Global Network Initiative Embrace the Character of the Net? Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace 2010, Deibert Ronald JPalfrey John GRohozinski RafalZittrain Jonathan. In, edited by, Cambridge, MA, MIT Press
-
(2010)
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
-
-
Maclay, C.1
-
30
-
-
77951176410
-
U.N. Agency Eyes Curbs on Internet Anonymity
-
Available at (Accessed October 28, 2009)
-
McCullagh Declan. U.N. Agency Eyes Curbs on Internet Anonymity. CNET 2008, http://news.cnet.com/8301-13578_3-10040152-38.html, Available at (Accessed October 28, 2009)
-
(2008)
CNET
-
-
McCullagh, D.1
-
32
-
-
0005639764
-
Contested Space: The Internet and Global Civil Society
-
Anheier H, Glasius M, Kaldor M. In, edited by, London, Sage
-
Naughton John. Contested Space: The Internet and Global Civil Society. Global Civil Society 2001, Anheier HelmutGlasius MarliesKaldor Mary. In, edited by, London, Sage
-
(2001)
Global Civil Society
-
-
Naughton, J.1
-
33
-
-
77951173029
-
2008 Special 301 Report
-
Available at (Accessed October 28, 2009)
-
2008 Special 301 Report. 2008, http://www.ustr.gov/assets/Document_Library/Reports_publications/2008/2008_Special_301_Report/asset_upload_file553_14869.pdf, Available at (Accessed October 28, 2009)
-
(2008)
-
-
-
34
-
-
77951185797
-
The 33 Day War: An Example of Psychological Warfare in the Information Age
-
Pahlavi Pierre. The 33 Day War: An Example of Psychological Warfare in the Information Age. Canadian Army Journal 2007, 10(1):12-24.
-
(2007)
Canadian Army Journal
, vol.10
, Issue.1
, pp. 12-24
-
-
Pahlavi, P.1
-
37
-
-
34547603887
-
Toward a Theory of Securitization: Copenhagen and Beyond
-
Stritzel Holger. Toward a Theory of Securitization: Copenhagen and Beyond. European Journal of International Studies 2007, 13(3):357-383.
-
(2007)
European Journal of International Studies
, vol.13
, Issue.3
, pp. 357-383
-
-
Stritzel, H.1
-
38
-
-
77951165238
-
The National Military Strategy for Cyberspace Operations
-
Available at (Accessed October 28, 2009)
-
The National Military Strategy for Cyberspace Operations. 2006, http://www.dod.mil/pubs/foi/ojcs/07-F-2105doc1.pdf, Available at (Accessed October 28, 2009)
-
(2006)
-
-
-
39
-
-
33645760451
-
The Filtering Matrix: Integrated Mechanisms of Information Control and the Demarcation of Borders in Cyberspace
-
Available at (Accessed October 28, 2009)
-
Villeneuve Nart. The Filtering Matrix: Integrated Mechanisms of Information Control and the Demarcation of Borders in Cyberspace. First Monday 2006, 11(1-2). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1307/122, Available at (Accessed October 28, 2009)
-
(2006)
First Monday
, vol.11
, Issue.1-2
-
-
Villeneuve, N.1
-
40
-
-
77955895888
-
Breaching Trust: An Analysis of Surveillance and Security Practices on China's TOM-Skype Platform. Information Warfare Monitor/ONI-Asia
-
Available at (Accessed October 28, 2009)
-
Villeneuve Nart. Breaching Trust: An Analysis of Surveillance and Security Practices on China's TOM-Skype Platform. Information Warfare Monitor/ONI-Asia. 2009, http://www.nartv.org/mirror/breachingtrust.pdf, Available at (Accessed October 28, 2009)
-
(2009)
-
-
Villeneuve, N.1
-
41
-
-
84881971939
-
Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online
-
Deibert RJ, Palfrey J, Rohozinski R, Zittrain J. In, edited by, Cambridge, MA, MIT Press
-
Villeneuve Nart. Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace 2010, Deibert Ronald JPalfrey JohnRohozinski RafalZittrain Jonathan. In, edited by, Cambridge, MA, MIT Press
-
(2010)
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
-
-
Villeneuve, N.1
-
42
-
-
24144442711
-
Digital Realism and the Governance of Spam as Cybercrime
-
Wall David S. Digital Realism and the Governance of Spam as Cybercrime. European Journal on Criminal Policy and Research 2005, 10(4):309-335.
-
(2005)
European Journal on Criminal Policy and Research
, vol.10
, Issue.4
, pp. 309-335
-
-
Wall, D.S.1
-
43
-
-
77951201601
-
Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace
-
Wall David S. Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace. Police Practice & Research 2007, 8(2):183-205.
-
(2007)
Police Practice & Research
, vol.8
, Issue.2
, pp. 183-205
-
-
Wall, D.S.1
-
44
-
-
0036012124
-
The Rise of Competitive Authoritarianism
-
Way Lucan, Levitzsky Steven. The Rise of Competitive Authoritarianism. Journal of Democracy 2002, 13(2):51-65.
-
(2002)
Journal of Democracy
, vol.13
, Issue.2
, pp. 51-65
-
-
Way, L.1
Levitzsky, S.2
-
45
-
-
77951166479
-
The Council of Europe's Convention on Cybercrime
-
Weber Amalie M. The Council of Europe's Convention on Cybercrime. Berkeley Technology Law Journal 2003, 18(1):425-446.
-
(2003)
Berkeley Technology Law Journal
, vol.18
, Issue.1
, pp. 425-446
-
-
Weber, A.M.1
-
46
-
-
84937385682
-
A Clash of Wills: Hizballah's Psychological Campaign Against Israel in South Lebanon
-
Wehrey Fredrick M. A Clash of Wills: Hizballah's Psychological Campaign Against Israel in South Lebanon. Small Wars and Insurgencies 2002, 12(3):53-74.
-
(2002)
Small Wars and Insurgencies
, vol.12
, Issue.3
, pp. 53-74
-
-
Wehrey, F.M.1
-
47
-
-
33747686518
-
Virtual Disputes: The Use of the Internet for Terrorist Debates
-
Weimann Gabriel. Virtual Disputes: The Use of the Internet for Terrorist Debates. Studies in Conflict and Terrorism 2006a, 29(7):623-639.
-
(2006)
Studies in Conflict and Terrorism
, vol.29
, Issue.7
, pp. 623-639
-
-
Weimann, G.1
|