-
1
-
-
84900739966
-
-
Cambridge: Polity
-
John Urry, Global Complexity (Cambridge: Polity, 2003), p. 12.
-
(2003)
Global Complexity
, pp. 12
-
-
Urry, J.1
-
3
-
-
84859935697
-
-
For an historical account of this process
-
For an historical account of this process.
-
-
-
-
5
-
-
79952872689
-
The Fourth Wave in Deterrence Research
-
April 2010
-
Jeffrey W. Knopf, 'The Fourth Wave in Deterrence Research', Contemporary Security Policy, Vol. 31, No. 1 (April 2010), p. 2.
-
Contemporary Security Policy
, vol.31
, Issue.1
, pp. 2
-
-
Knopf, J.W.1
-
6
-
-
33745941624
-
The More You Know, The Less You Understand: The Problem with Information Warfare
-
June 2006
-
David Betz, 'The More You Know, The Less You Understand: The Problem with Information Warfare', Journal of Strategic Studies, Vol. 29, No. 3 (June 2006), p. 509.
-
Journal of Strategic Studies
, vol.29
, Issue.3
, pp. 509
-
-
Betz, D.1
-
7
-
-
34248236985
-
Cyberwar is Coming!
-
Spring 1993
-
John Arquilla and David Ronfeldt, 'Cyberwar is Coming!', Comparative Strategy, Vol. 12, No. 2 (Spring 1993), pp. 141-165.
-
Comparative Strategy
, vol.12
, Issue.2
, pp. 141-165
-
-
Arquilla, J.1
Ronfeldt, D.2
-
8
-
-
84859935699
-
-
Note
-
Although this need not necessarily be hi-tech, as their example of 13th-century Mongol 'cyberwar' attests: Ibid., pp. 148-150. The original use of the term 'cyber deterrence' occurs in the battlefield context.
-
-
-
-
9
-
-
0003331964
-
Cyber-Deterrence
-
September 1994
-
James Der Derian, 'Cyber-Deterrence', Wired, Vol. 2, No. 9 (September 1994), www.wired.com/wired/archive/2.09/cyber.deter_pr.html
-
Wired
, vol.2
, Issue.9
-
-
der Derian, J.1
-
10
-
-
84905946589
-
The Strategy and Tactics of Information Warfare
-
June 2003
-
Matt Bishop and Emily O. Goldman, 'The Strategy and Tactics of Information Warfare', Contemporary Security Policy, Vol. 24, No. 1 (June 2003), pp. 113-139.
-
Contemporary Security Policy
, vol.24
, Issue.1
, pp. 113-139
-
-
Bishop, M.1
Goldman, E.O.2
-
11
-
-
0003801986
-
War and Anti-War: Survival at the Dawn of the 21st Century
-
Boston, MA: Little, Brown and Company
-
Alvin Toffler and Heidi Toffler, War and Anti-War: Survival at the Dawn of the 21st Century (Boston, MA: Little, Brown and Company, 1993), p. 140.
-
(1993)
, pp. 140
-
-
Toffler, A.1
Toffler, H.2
-
12
-
-
84859936221
-
Information Warfare at the Crossroads
-
Summer 1997
-
Brian E. Fredericks, 'Information Warfare at the Crossroads', Joint Force Quarterly, Vol. 17 (Summer 1997), p. 98.
-
Joint Force Quarterly
, vol.17
, pp. 98
-
-
Fredericks, B.E.1
-
18
-
-
0042428228
-
Information Warfare and Deterrence
-
Autumn 1996
-
Richard J. Harknett, 'Information Warfare and Deterrence', Parameters, Vol. 26, No. 3 (Autumn 1996), pp. 93-107.
-
Parameters
, vol.26
, Issue.3
, pp. 93-107
-
-
Harknett Richard, J.1
-
19
-
-
0042428228
-
Information Warfare and Deterrence
-
Autumn 1996
-
Richard J. Harknett, 'Information Warfare and Deterrence', Parameters, Vol. 26, No. 3 (Autumn 1996)., p. 107.
-
Parameters
, vol.26
, Issue.3
, pp. 107
-
-
Harknett Richard, J.1
-
21
-
-
84908912505
-
America's Information Edge
-
March/April 1996
-
William T. Owens and Joseph Nye, 'America's Information Edge', Foreign Affairs, Vol. 74, No. 2 (March/April 1996), pp. 20-36.
-
Foreign Affairs
, vol.74
, Issue.2
, pp. 20-36
-
-
Owens, W.T.1
Nye, J.2
-
22
-
-
0013064329
-
The Emerging Primacy of Information
-
Spring 1996
-
Martin C. Libicki, 'The Emerging Primacy of Information', Orbis, Vol. 40, No. 2 (Spring 1996), pp. 261-274.
-
Orbis
, vol.40
, Issue.2
, pp. 261-274
-
-
Libicki, M.C.1
-
23
-
-
84859931798
-
Deterring Information Warfare: A New Strategic Challenge
-
Winter 1996/1997
-
Timothy L. Thomas, 'Deterring Information Warfare: A New Strategic Challenge', Parameters, Vol. 26, No. 4 (Winter 1996/1997), pp. 81-91.
-
Parameters
, vol.26
, Issue.4
, pp. 81-91
-
-
Thomas, T.L.1
-
24
-
-
0041927163
-
Blowback: Information Warfare and the Dynamics of Coercion
-
Summer 1998
-
Peter D. Feaver, 'Blowback: Information Warfare and the Dynamics of Coercion', Security Studies, Vol. 7, No. 4 (Summer 1998), pp. 88-120.
-
Security Studies
, vol.7
, Issue.4
, pp. 88-120
-
-
Feaver, P.D.1
-
25
-
-
84937340618
-
Can Information Warfare Be Deterred?
-
Summer 2001
-
Stephen Blank, 'Can Information Warfare Be Deterred?', Defense & Security Analysis, Vol. 17, No. 2 (Summer 2001), pp. 121-138.
-
Defense & Security Analysis
, vol.17
, Issue.2
, pp. 121-138
-
-
Blank, S.1
-
26
-
-
84859930482
-
-
Note
-
A curious parallel can be found in the writings of French urbanist and critical theorist Paul Virilio, who has repeatedly noted the advent of a 'second deterrence' based upon strategic information control.
-
-
-
-
28
-
-
69849123189
-
Web War I: Is Europe's First Information War a New Kind of War?
-
May 2008
-
Stephen Blank, 'Web War I: Is Europe's First Information War a New Kind of War?', Comparative Strategy, Vol. 27, No. 3 (May 2008), pp. 227-247.
-
Comparative Strategy
, vol.27
, Issue.3
, pp. 227-247
-
-
Blank, S.1
-
31
-
-
85037626648
-
Deterrence of Cyber Attacks
-
in Franklin D. Kramer, Stuart H. Starr and Larry K. Wentz (eds), Dulles, VA: Potomac Books Inc., with National Defense University Press, Washington, DC
-
Richard L. Kugler, 'Deterrence of Cyber Attacks', in Franklin D. Kramer, Stuart H. Starr and Larry K. Wentz (eds), Cyberpower and National Security (Dulles, VA: Potomac Books Inc., with National Defense University Press, Washington, DC, 2009), pp. 309-340.
-
(2009)
Cyberpower and National Security
, pp. 309-340
-
-
Kugler, R.L.1
-
32
-
-
85014668156
-
Applying Deterrence in Cyberspace
-
February 2010
-
Kevin R. Beeker, Robert F. Mills and Michael R. Grimala, 'Applying Deterrence in Cyberspace', IO Journal, Vol. 1, No. 4 (February 2010), pp. 21-27.
-
IO Journal
, vol.1
, Issue.4
, pp. 21-27
-
-
Beeker, K.R.1
Mills, R.F.2
Grimala, M.R.3
-
33
-
-
77955582072
-
The Challenge of Cyber Attack Deterrence
-
May 2010
-
Kenneth Geers, 'The Challenge of Cyber Attack Deterrence', Computer Law & Security Review, Vol. 26, No. 3 (May 2010), pp. 298-303.
-
Computer Law & Security Review
, vol.26
, Issue.3
, pp. 298-303
-
-
Geers, K.1
-
34
-
-
84859928156
-
Cyber Deterrence: Tougher in Theory than in Practice?
-
Fall 2010
-
Will Goodman, 'Cyber Deterrence: Tougher in Theory than in Practice?', Strategic Studies Quarterly, Vol. 4, No. 3 (Fall 2010), pp. 102-135.
-
Strategic Studies Quarterly
, vol.4
, Issue.3
, pp. 102-135
-
-
Goodman, W.1
-
35
-
-
84859931801
-
-
Note
-
This is distinct from compellence, which aims to make an adversary 'perform', either by making it do something against its will or by changing the course of action upon which it has already embarked.
-
-
-
-
36
-
-
0003472355
-
-
New Haven, CT: Yale University Press
-
Thomas Schelling, Arms and Influence (New Haven, CT: Yale University Press, 1966), pp. 69-70.
-
(1966)
Arms and Influence
, pp. 69-70
-
-
Schelling, T.1
-
40
-
-
5644297173
-
-
Cambridge: Cambridge University Press
-
Patrick M. Morgan, Deterrence Now (Cambridge: Cambridge University Press, 2003), p. 8.
-
(2003)
Deterrence Now
, pp. 8
-
-
Morgan, P.M.1
-
41
-
-
84859931799
-
-
The most coherent exposition of this thesis
-
The most coherent exposition of this thesis.
-
-
-
-
44
-
-
77956419278
-
The Emerging Fourth Wave of Deterrence Theory - Toward a New Research Agenda
-
September 2010
-
Amir Lupovici, 'The Emerging Fourth Wave of Deterrence Theory - Toward a New Research Agenda', International Studies Quarterly, Vol. 54, No. 3 (September 2010), pp. 705-732.
-
International Studies Quarterly
, vol.54
, Issue.3
, pp. 705-732
-
-
Lupovici, A.1
-
45
-
-
84859933103
-
-
A conscious attempt to redress this imbalance is provided by Goodman, 'Cyber Deterrence' (note 25)
-
A conscious attempt to redress this imbalance is provided by Goodman, 'Cyber Deterrence' (note 25).
-
-
-
-
46
-
-
77949317300
-
Complex Deterrence: An Introduction
-
in T.V. Paul, Patrick M. Morgan and James J. Wirtz (eds), Chicago, IL: University of Chicago Press
-
T.V. Paul, 'Complex Deterrence: An Introduction', in T.V. Paul, Patrick M. Morgan and James J. Wirtz (eds), Complex Deterrence: Strategy in the Global Age (Chicago, IL: University of Chicago Press, 2009), pp. 1-27.
-
(2009)
Complex Deterrence: Strategy In the Global Age
, pp. 1-27
-
-
Paul, T.V.1
-
47
-
-
84859930486
-
-
Working Paper 11-01, January 2011, Mercatus Center, George Mason University, Arlington, VA
-
Sean Lawson, 'Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History', Working Paper 11-01, January 2011, Mercatus Center, George Mason University, Arlington, VA.
-
Beyond Cyber-Doom: Cyberattack Scenarios and The Evidence of History
-
-
Lawson, S.1
-
49
-
-
84859931802
-
-
On pre- and post-event deterrence by denial
-
On pre- and post-event deterrence by denial.
-
-
-
-
50
-
-
85050783348
-
Deterrence and Asymmetry: Non- State Actors and Mass Casualty Terrorism
-
April 2004
-
Wyn Q. Bowen, 'Deterrence and Asymmetry: Non- State Actors and Mass Casualty Terrorism', Contemporary Security Policy, Vol. 25, No. 1 (April 2004), pp. 54-70.
-
Contemporary Security Policy
, vol.25
, Issue.1
, pp. 54-70
-
-
Bowen, W.Q.1
-
51
-
-
79952471637
-
Leaving Deterrence Behind: War-Fighting and National Cybersecurity
-
Article 22
-
Richard J. Harknett, John P. Callaghan and Rudi Kauffman, 'Leaving Deterrence Behind: War-Fighting and National Cybersecurity', Journal of Homeland Security & Emergency Management, Vol. 7, No. 1 (2010), Article 22, p. 17.
-
(2010)
Journal of Homeland Security & Emergency Management
, vol.7
, Issue.1
, pp. 17
-
-
Harknett, R.J.1
Callaghan, J.P.2
Kauffman, R.3
-
54
-
-
79951993435
-
Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism
-
February 2011
-
Alex S. Wilner, 'Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism', Journal of Strategic Studies, Vol. 34, No. 1 (February 2011), pp. 3-37.
-
Journal of Strategic Studies
, vol.34
, Issue.1
, pp. 3-37
-
-
Wilner, A.S.1
-
60
-
-
84916914631
-
Cyberwar Plan Has New Focus on Deterrence
-
15 July 2011
-
Julian E. Barnes and Siobhan Gorman, 'Cyberwar Plan Has New Focus on Deterrence', The Wall Street Journal, 15 July 2011.
-
The Wall Street Journal
-
-
Barnes, J.E.1
Gorman, S.2
-
62
-
-
84859813903
-
-
The New York Times, 26 January 2010
-
John Markoff, David E. Sanger and Thom Shanker, 'In Digital Combat, U.S. Finds No Easy Deterrent', The New York Times, 26 January 2010.
-
In Digital Combat, U.S. Finds No Easy Deterrent
-
-
Markoff, J.1
Sanger, D.E.2
Shanker, T.3
-
64
-
-
84859928162
-
-
Washington, DC, Center for Strategic and International Studies
-
James A. Lewis, 'Cross-Domain Deterrence and Credible Threats', Washington, DC, Center for Strategic and International Studies, 2010, p. 4.
-
(2010)
Cross-Domain Deterrence and Credible Threats
, pp. 4
-
-
Lewis, J.A.1
-
66
-
-
79251624074
-
-
Cambridge, MA, Belfer Center for Science and International Affairs, Harvard Kennedy School
-
Joseph S. Nye Jr., 'Cyber Power', Cambridge, MA, Belfer Center for Science and International Affairs, Harvard Kennedy School, 2010, pp. 16-17.
-
(2010)
Cyber Power
, pp. 16-17
-
-
Joseph Jr., S.N.1
-
68
-
-
84859931805
-
Constructing International Politics
-
Summer 1995
-
Alexander Wendt, 'Constructing International Politics', International Security, Vol. 20, No. 1 (Summer 1995), pp. 73-74.
-
International Security
, vol.20
, Issue.1
, pp. 73-74
-
-
Wendt, A.1
-
70
-
-
0031462850
-
Problems and Prospects in the Study of International Norms
-
November 1997
-
Gregory A. Raymond, 'Problems and Prospects in the Study of International Norms', Mershon International Studies Review, Vol. 41, No. 2 (November 1997), p. 214.
-
Mershon International Studies Review
, vol.41
, Issue.2
, pp. 214
-
-
Raymond, G.A.1
-
71
-
-
0037801321
-
"Let's Argue!": Communicative Action in World Politics
-
Winter 2000
-
Thomas Risse, '"Let's Argue!": Communicative Action in World Politics', International Organization, Vol. 54, No. 1 (Winter 2000), p. 4.
-
International Organization
, vol.54
, Issue.1
, pp. 4
-
-
Risse, T.1
-
76
-
-
84879987163
-
-
Cambridge: Polity
-
Lawrence Freedman, Deterrence (Cambridge: Polity, 2004), p. 5.
-
(2004)
Deterrence
, pp. 5
-
-
Freedman, L.1
-
77
-
-
84879987163
-
-
Cambridge: Polity
-
Lawrence Freedman, Deterrence (Cambridge: Polity, 2004)., p. 4.
-
(2004)
Deterrence
, pp. 4
-
-
Freedman, L.1
-
78
-
-
84879987163
-
-
Cambridge: Polity
-
Lawrence Freedman, Deterrence (Cambridge: Polity, 2004).
-
(2004)
Deterrence
-
-
Freedman, L.1
-
79
-
-
77949323795
-
Complex Deterrence in the Asymmetric-Warfare Era
-
in Paul et al, note 34
-
Emanuel Adler, 'Complex Deterrence in the Asymmetric-Warfare Era', in Paul et al., Complex Deterrence (note 34), p. 88.
-
Complex Deterrence
, pp. 88
-
-
Adler, E.1
-
80
-
-
77949323795
-
Complex Deterrence in the Asymmetric-Warfare Era
-
in Paul et al, note 34
-
Emanuel Adler, 'Complex Deterrence in the Asymmetric-Warfare Era', in Paul et al., Complex Deterrence (note 34).
-
Complex Deterrence
-
-
Adler, E.1
-
81
-
-
77949323795
-
Complex Deterrence in the Asymmetric-Warfare Era
-
in Paul et al, note 34
-
Emanuel Adler, 'Complex Deterrence in the Asymmetric-Warfare Era', in Paul et al., Complex Deterrence (note 34)., p. 89.
-
Complex Deterrence
, pp. 89
-
-
Adler, E.1
-
85
-
-
84859933110
-
-
This has been recognized recently by senior US defence officials
-
This has been recognized recently by senior US defence officials.
-
-
-
-
87
-
-
79953318882
-
Collective-Actor Deterrence
-
in Paul et al, note 34
-
Patrick M. Morgan, 'Collective-Actor Deterrence', in Paul et al., Complex Deterrence (note 34), pp. 158-182.
-
Complex Deterrence
, pp. 158-182
-
-
Morgan, P.M.1
-
89
-
-
84859933114
-
-
www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative
-
-
-
-
100
-
-
84859930495
-
-
These remarks were reiterated and expanded
-
These remarks were reiterated and expanded.
-
-
-
-
103
-
-
77958600609
-
Defending a New Domain: The Pentagon's Cyberstrategy
-
September/October 2010
-
William J. Lynn III, 'Defending a New Domain: The Pentagon's Cyberstrategy', Foreign Affairs, Vol. 89, No. 5 (September/October 2010), p. 100.
-
Foreign Affairs
, vol.89
, Issue.5
, pp. 100
-
-
Lynn, W.J.1
-
107
-
-
84859928497
-
Beyond Denial: Introducing Next-Generation Information Access Controls
-
in Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain (eds), Cambridge, MA: The MIT Press
-
Ronald Deibert and Rafal Rohozinski, 'Beyond Denial: Introducing Next-Generation Information Access Controls', in Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain (eds), Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA: The MIT Press, 2010), pp. 3-4.
-
(2010)
Access Controlled: The Shaping of Power, Rights, and Rule In Cyberspace
, pp. 3-4
-
-
Deibert, R.1
Rohozinski, R.2
-
108
-
-
85071165440
-
Politics on the Internet: The Normalization of Cyberspace
-
in Chris Toulouse and Timothy W. Luke (eds), New York: Routledge
-
David Resnick, 'Politics on the Internet: The Normalization of Cyberspace', in Chris Toulouse and Timothy W. Luke (eds), The Politics of Cyberspace (New York: Routledge, 1997), pp. 48-68.
-
(1997)
The Politics of Cyberspace
, pp. 48-68
-
-
Resnick, D.1
-
110
-
-
84859933118
-
The Real Stake in "Free Flow of Information"
-
22 January 2010
-
'The Real Stake in "Free Flow of Information"', Global Times, 22 January 2010.
-
Global Times
-
-
-
111
-
-
84859928168
-
U.S. State Department Speaks to Twitter Over Iran
-
16 June 2009
-
'U.S. State Department Speaks to Twitter Over Iran', Reuters, 16 June 2009.
-
Reuters
-
-
-
112
-
-
77950742882
-
Iran: Downside to the "Twitter Revolution"
-
Fall 2009
-
Evgeny Morozov, 'Iran: Downside to the "Twitter Revolution"', Dissent, Vol. 56, No. 4 (Fall 2009), pp. 10-14.
-
Dissent
, vol.56
, Issue.4
, pp. 10-14
-
-
Morozov, E.1
-
114
-
-
84859931811
-
Seeing the Internet as an "Information Weapon"
-
23 September 2010
-
James Lewis, 'Seeing the Internet as an "Information Weapon"', National Public Radio, 23 September 2010, www.npr.org/templates/story/story.php?storyId=130052701
-
National Public Radio
-
-
Lewis, J.1
-
115
-
-
84859930497
-
-
Sergei Korotsov, quoted in ibid
-
Sergei Korotsov, quoted in ibid.
-
-
-
-
116
-
-
84859933119
-
-
New York, East West Institute
-
Franz-Stefan Gady and Greg Austin, 'Russia, The United States, and Cyber Diplomacy: Opening the Doors', New York, East West Institute, 2010, p. 1.
-
(2010)
Russia, the United States, and Cyber Diplomacy: Opening the Doors
, pp. 1
-
-
Gady, F.-S.1
Austin, G.2
-
117
-
-
84859931814
-
-
Note
-
United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, Note by the Secretary-General, 30 July 2010, A/65/201, www.unidir.org/pdf/activites/pdf5-act483.pdf.
-
-
-
-
118
-
-
84859930954
-
-
Organization for Security and Co-operation in Europe Joint Forum for Security Cooperation-Permanent Council, Vienna, 2 June 2010, FSCPC. DEL/30/10
-
Deborah Schneider, 'Cyber Security Keynote Address', Organization for Security and Co-operation in Europe Joint Forum for Security Cooperation-Permanent Council, Vienna, 2 June 2010, FSCPC. DEL/30/10, http://www.osce.org/documents/fsc/2010/06/44551_en.pdf
-
Cyber Security Keynote Address
-
-
Schneider, D.1
-
121
-
-
84859931816
-
-
Note
-
Agreement between the Governments of the Member States of the Shanghai Cooperation Organization on Cooperation in the Field of International Information Security, Article 2, 16 June 2009, unofficial translation.
-
-
-
-
122
-
-
78649353762
-
Sovereign Discourse on Cyber Conflict Under International Law
-
June 2010), fn. 17
-
Sean Kanuck, 'Sovereign Discourse on Cyber Conflict Under International Law', Texas Law Review, Vol. 88, No. 7 (June 2010), fn. 17.
-
Texas Law Review
, vol.88
, Issue.7
-
-
Kanuck, S.1
-
123
-
-
84859936213
-
-
'Seeing the Internet as an "Information Weapon"' (note 97)
-
'Seeing the Internet as an "Information Weapon"' (note 97).
-
-
-
-
124
-
-
84859936217
-
-
12 September 2011
-
Letter to UN Secretary-General, 12 September 2011, http://blog.internetgovernance.org/pdf/UNinfosec-code.pdf
-
Letter to UN Secretary-General
-
-
-
126
-
-
52049111419
-
-
Cambridge, MA: MIT Press
-
Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain (eds), Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA: MIT Press, 2008).
-
(2008)
Access Denied: The Practice and Policy of Global Internet Filtering
-
-
Deibert, R.1
Palfrey, J.2
Rohozinski, R.3
Zittrain, J.4
-
130
-
-
28744435032
-
-
New York: Columbia University Press
-
Régis Debray, Transmitting Culture (New York: Columbia University Press, 2000), p. 25.
-
(2000)
Transmitting Culture
, pp. 25
-
-
Debray, R.1
-
131
-
-
84859930866
-
-
On the recent US and Chinese national self-portrayals with respect to cyberspace
-
On the recent US and Chinese national self-portrayals with respect to cyberspace.
-
-
-
-
132
-
-
80053479385
-
Google and the "Twisted Cyber Spy" Affair: US-Chinese Communication in an Age of Globalization
-
November 2011
-
Stephen John Hartnett, 'Google and the "Twisted Cyber Spy" Affair: US-Chinese Communication in an Age of Globalization', Quarterly Journal of Speech, Vol. 97, No. 4 (November 2011), pp. 411-434.
-
Quarterly Journal of Speech
, vol.97
, Issue.4
, pp. 411-434
-
-
Hartnett, S.J.1
-
133
-
-
84859930864
-
-
Note
-
'UN Chief Calls for Treaty to Prevent Cyber War', Agence France-Presse, 30 January 2010. Supporting states include many regarded as media-repressive, such as Cuba, Ethiopia, Myanmar, Sudan, Vietnam and Zimbabwe.
-
-
-
-
134
-
-
84859936214
-
Toward a Cyber Security Strategy
-
March/April 2010
-
Ron Deibert, 'Toward a Cyber Security Strategy', Vanguard (March/April 2010), pp. 10-11.
-
Vanguard
, pp. 10-11
-
-
Deibert, R.1
-
136
-
-
84859935696
-
-
Center for Strategic and International Studies, Washington, DC, 3 June 2010
-
Keith B. Alexander, 'US Cybersecurity Policy and the Role of US CYBERCOM', Center for Strategic and International Studies, Washington, DC, 3 June 2010, www.csis.org/event/cybersecuritydiscussion-general-keith-b-alexander-director-national-security-agency
-
US Cybersecurity Policy and The Role of US CYBERCOM
-
-
Alexander, K.B.1
-
139
-
-
84977457349
-
The Advent of Netwar: Analytic Background
-
July 1999
-
John Arquilla and David Ronfeldt, 'The Advent of Netwar: Analytic Background', Studies in Conflict & Terrorism, Vol. 22, No. 3 (July 1999), p. 202.
-
Studies In Conflict & Terrorism
, vol.22
, Issue.3
, pp. 202
-
-
Arquilla, J.1
Ronfeldt, D.2
-
140
-
-
33750211520
-
Human Rights, Principled Issue-Networks, and Sovereignty in Latin America
-
Summer 1993
-
Kathryn Sikkink, 'Human Rights, Principled Issue-Networks, and Sovereignty in Latin America', International Organization, Vol. 47, No. 3 (Summer 1993), pp. 411-441.
-
International Organization
, vol.47
, Issue.3
, pp. 411-441
-
-
Sikkink, K.1
-
141
-
-
28244435923
-
Pattern of Global Cyber War and Crime
-
December 2005
-
Nir Kshetri, 'Pattern of Global Cyber War and Crime', Journal of International Management, Vol. 11, No. 4 (December 2005), p. 548.
-
Journal of International Management
, vol.11
, Issue.4
, pp. 548
-
-
Kshetri, N.1
-
142
-
-
77955915834
-
Storming the Servers: A Social Psychological Analysis of the First Internet War
-
August 2010
-
Rosanna E. Guadagno, Robert B. Cialdini and Gadi Evron, 'Storming the Servers: A Social Psychological Analysis of the First Internet War', Cyberpsychology, Behavior, and Social Networking, Vol. 13, No. 4 (August 2010), pp. 447-453.
-
Cyberpsychology, Behavior, and Social Networking
, vol.13
, Issue.4
, pp. 447-453
-
-
Guadagno, R.E.1
Cialdini, R.B.2
Evron, G.3
-
143
-
-
33646558747
-
Norm Origin and Development in Cyberspace: Models of Cybernorm Evolution
-
Spring 2000
-
April Mara Major, 'Norm Origin and Development in Cyberspace: Models of Cybernorm Evolution', Washington University Law Quarterly, Vol. 78, No. 1 (Spring 2000), pp. 59-111.
-
Washington University Law Quarterly
, vol.78
, Issue.1
, pp. 59-111
-
-
Major, A.M.1
-
144
-
-
0032385271
-
Reversing the Gun Sights: Transnational Civil Society Targets Land Mines
-
Summer 1998
-
Richard Price, 'Reversing the Gun Sights: Transnational Civil Society Targets Land Mines', International Organization, Vol. 52, No. 3 (Summer 1998), pp. 613-644.
-
International Organization
, vol.52
, Issue.3
, pp. 613-644
-
-
Price, R.1
-
146
-
-
84859933430
-
-
Securing Cyberspace for the 44th Presidency (note 76)
-
Securing Cyberspace for the 44th Presidency (note 76), p. 18.
-
-
-
-
147
-
-
85044795818
-
An e-SOS for Cyberspace
-
Summer 2011
-
Duncan B. Hollis, 'An e-SOS for Cyberspace', Harvard International Law Journal, Vol. 52, No. 2 (Summer 2011), p. 28.
-
Harvard International Law Journal
, vol.52
, Issue.2
, pp. 28
-
-
Hollis, D.B.1
-
149
-
-
84859935698
-
Former CIA Director: Build a New Internet to Improve Cybersecurity
-
7 July 2011
-
Aliya Sternstein, 'Former CIA Director: Build a New Internet to Improve Cybersecurity', National Journal, 7 July 2011, http://www.nationaljournal.com/nationalsecurity/former-cia-director-build-a-new-internet-to-improvecybersecurity-20110707
-
National Journal
-
-
Sternstein, A.1
-
153
-
-
84858221367
-
Cyber War Will Not Take Place
-
forthcoming
-
Thomas Rid, 'Cyber War Will Not Take Place', Journal of Strategic Studies (forthcoming, 2012).
-
(2012)
Journal of Strategic Studies
-
-
Rid, T.1
|