-
3
-
-
3042745793
-
The Weakest Link Revisited
-
Arce, I. (2003) 'The Weakest Link Revisited', IEEE Security and Privacy 1(2), pp. 72-76.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 72-76
-
-
Arce, I.1
-
4
-
-
84887052156
-
-
'Cyberwar is Coming!' RAND Corporation RP-223
-
Arquilla, J. and Ronfeldt, D. (1993) 'Cyberwar is Coming!' RAND Corporation RP-223.
-
(1993)
-
-
Arquilla, J.1
Ronfeldt, D.2
-
5
-
-
84887028499
-
-
BIS 'Cyber Security Guidance for Business', September. Available from: [Accessed 2 September 2013]
-
BIS (2011) 'Cyber Security Guidance for Business', September. Available from: http://www.bis.gov.uk/assets/biscore/business-sectors/docs/0-9/12-1120-10-steps-to-cyber-security-executive [Accessed 2 September 2013].
-
(2011)
-
-
-
6
-
-
10444279589
-
Cryptography and Democracy: Dilemmas of Freedom
-
Liberty (ed.), London: Pluto Press
-
Bowden, C. and Akdeniz, Y. (1999) 'Cryptography and Democracy: Dilemmas of Freedom' in Liberty (ed.), Liberating Cyberspace: Civil Liberties, Human Rights, and the Internet, London: Pluto Press, pp. 81-125.
-
(1999)
Liberating Cyberspace: Civil Liberties, Human Rights, and the Internet
, pp. 81-125
-
-
Bowden, C.1
Akdeniz, Y.2
-
8
-
-
84887080292
-
David Brin Rebuts Schneier in Defense of a Transparent Society
-
Wired News, 12 March
-
Brin, D. (2008) 'David Brin Rebuts Schneier in Defense of a Transparent Society', Wired News, 12 March.
-
(2008)
-
-
Brin, D.1
-
9
-
-
32144436898
-
EU Counterterrorism Policy: A Paper Tiger? Terrorism and Political
-
Bures, O. (2006) 'EU Counterterrorism Policy: A Paper Tiger? Terrorism and Political', Violence 18(1), pp. 57-78.
-
(2006)
Violence
, vol.18
, Issue.1
, pp. 57-78
-
-
Bures, O.1
-
10
-
-
84887100595
-
Government Cyber Crime Report Debunked
-
Tecweek Europe, 22 February
-
Curtis, S. (2011) 'Government Cyber Crime Report Debunked', Tecweek Europe, 22 February.
-
(2011)
-
-
Curtis, S.1
-
11
-
-
84857207287
-
Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War
-
Deibert, R.J., Rohozinski, R. and Crete-Nishihata, M. (2012) 'Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War', Security Dialogue 43(1), pp. 3-24.
-
(2012)
Security Dialogue
, vol.43
, Issue.1
, pp. 3-24
-
-
Deibert, R.J.1
Rohozinski, R.2
Crete-Nishihata, M.3
-
12
-
-
84901532492
-
The (S)pace of International Relations: Simulation, Surveillance, and Speed
-
Der Derian, J. (1990) 'The (S)pace of International Relations: Simulation, Surveillance, and Speed', International Studies Quarterly 34(3), pp. 295-310.
-
(1990)
International Studies Quarterly
, vol.34
, Issue.3
, pp. 295-310
-
-
Der Derian, J.1
-
13
-
-
84887120838
-
-
Detica , The Cost of Cyber Crime: A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Available from: [Accessed 2 September 2013]
-
Detica (2011) The Cost of Cyber Crime: A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf [Accessed 2 September 2013].
-
(2011)
-
-
-
14
-
-
34548835360
-
-
Cambridge, MA: MIT Press
-
Dornhege, G., Millan, J., Hinterberger, T., McFarland, D. and Müller, K. (2007) Toward Brain-Computer Interfacing, Cambridge, MA: MIT Press.
-
(2007)
Toward Brain-Computer Interfacing
-
-
Dornhege, G.1
Millan, J.2
Hinterberger, T.3
McFarland, D.4
Müller, K.5
-
15
-
-
84887030154
-
-
ENISA United Kingdom Country Report. Available from: [Accessed 23 June 2012]
-
ENISA (2012) United Kingdom Country Report. Available from: http://www.enisa.europa.eu/activities/stakeholder-relations/files/country-reports/UK.pdf [Accessed 23 June 2012].
-
(2012)
-
-
-
16
-
-
84887076821
-
Differing Views on Privacy Shape Europe's Response to US Surveillance Program
-
New York Times, 14 June
-
Erlanger, S. and Ewing, J. (2013) 'Differing Views on Privacy Shape Europe's Response to US Surveillance Program', New York Times, 14 June.
-
(2013)
-
-
Erlanger, S.1
Ewing, J.2
-
17
-
-
84887034727
-
Cybercrime Cost Estimate is "Sales Exercise", Say Experts
-
Znet, 18 February. Available from: [Accessed 2 September 2013]
-
Espiner, T. (2011) 'Cybercrime Cost Estimate is "Sales Exercise", Say Experts', Znet, 18 February. Available from: http://www.zdnet.com/cybercrime-cost-estimate-is-sales-exercise-say-experts-3040091866/ [Accessed 2 September 2013].
-
(2011)
-
-
Espiner, T.1
-
18
-
-
79251616434
-
Stuxnet and the Future of Cyber War
-
Farwell, J.P. and Rohozinski, R. (2011) 'Stuxnet and the Future of Cyber War', Survival 53(1), 23-40.
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.P.1
Rohozinski, R.2
-
19
-
-
84887114433
-
UK Perspectives on Security in an Age of "Shock and Aftershock"
-
Feakin, T. (2011) 'UK Perspectives on Security in an Age of "Shock and Aftershock"', European Perspectives on Security Research 1, pp. 45-45.
-
(2011)
European Perspectives on Security Research
, vol.1
, pp. 45-45
-
-
Feakin, T.1
-
20
-
-
84887082249
-
GCHQ Leading Fight against Cyber Crime
-
Gloucestershire Echo , 6 September
-
Gloucestershire Echo (2012) 'GCHQ Leading Fight against Cyber Crime', 6 September.
-
(2012)
-
-
-
21
-
-
33747876221
-
Brain-Machine Interfaces: Past, Present and Future
-
Lebedev, M.A. and Nicolelis, M.A. (2006) 'Brain-Machine Interfaces: Past, Present and Future', Trends in Neuroscience 29(9), pp. 536-546.
-
(2006)
Trends in Neuroscience
, vol.29
, Issue.9
, pp. 536-546
-
-
Lebedev, M.A.1
Nicolelis, M.A.2
-
22
-
-
33845501377
-
Microchipping People: The Rise of the Electrophorus
-
Michael, K. and Michael, M.G. (2005) 'Microchipping People: The Rise of the Electrophorus', Quadrant 49(3), pp. 22-33.
-
(2005)
Quadrant
, vol.49
, Issue.3
, pp. 22-33
-
-
Michael, K.1
Michael, M.G.2
-
23
-
-
84887076117
-
-
Ministry of Defence 'Working Group on Testing of Computer Security', 1976/7 (D/DCCIS/56/8/5/4), DEFE68/287, TNA
-
Ministry of Defence (1976) 'Working Group on Testing of Computer Security', 1976/7 (D/DCCIS/56/8/5/4), DEFE68/287, TNA.
-
(1976)
-
-
-
25
-
-
84887109871
-
-
Why the Cabinet Office's £27bn Cyber Crime Cost Estimate is Meaningless'. Available from: [Accessed October 2011]
-
Moore, T. (2011) 'Why the Cabinet Office's £27bn Cyber Crime Cost Estimate is Meaningless'. Available from: http://www.lightbluetouchpaper.org/2011/02/17/why-the-cabinet-offices-27bn-cyber-crime-cost-estimate-is-meaningless/ [Accessed October 2011].
-
(2011)
-
-
Moore, T.1
-
26
-
-
84887103089
-
-
National Audit Office 'Cabinet Office Performance Briefing: Briefing for the House of Commons Public Administration Select Committee', October. Available from: [Accessed 2 September 2013]
-
National Audit Office (2009) 'Cabinet Office Performance Briefing: Briefing for the House of Commons Public Administration Select Committee', October. Available from: http://www.parliament.uk/documents/upload/cabinetofficeperform20091.pdf [Accessed 2 September 2013].
-
(2009)
-
-
-
27
-
-
84887087077
-
-
National Audit Office , 11 February, London: The Stationery Office. Available from: [Accessed 2 September 2013]
-
National Audit Office (2013) The UK Cyber Security Strategy: Landscape Review, Report by the Comptroller and Auditor General, 11 February, London: The Stationery Office. Available from: http://www.nao.org.uk/wp-content/uploads/2013/03/Cyber-security-Full-report.pdf [Accessed 2 September 2013].
-
(2013)
The UK Cyber Security Strategy: Landscape Review, Report by the Comptroller and Auditor General
-
-
-
28
-
-
84887029162
-
Titan Rain: How Chinese Hackers Targeted Whitehall
-
The Guardian, 5 September
-
Norton-Taylor, R. (2010) 'Titan Rain: How Chinese Hackers Targeted Whitehall', The Guardian, 5 September.
-
(2010)
-
-
Norton-Taylor, R.1
-
29
-
-
84887057257
-
-
The State of the Internet in Cuba', unpublished research paper, som.csudh.edu/fac/lpress/cuba/chapters/lpdraft2.docx?.
-
Press, L. (2011) 'The State of the Internet in Cuba', unpublished research paper, som.csudh.edu/fac/lpress/cuba/chapters/lpdraft2.docx?.
-
(2011)
-
-
Press, L.1
-
30
-
-
84981636215
-
The Hollowing Out of the State: The Changing Nature of the Public Service in Britain
-
Rhodes, R.A.W. (1994) 'The Hollowing Out of the State: The Changing Nature of the Public Service in Britain', Political Quarterly 65, pp. 138-151.
-
(1994)
Political Quarterly
, vol.65
, pp. 138-151
-
-
Rhodes, R.A.W.1
-
31
-
-
84858221367
-
Cyber War Will Not Take Place
-
Rid, T. (2012) 'Cyber War Will Not Take Place', Journal of Strategic Studies 35(1), pp. 5-32.
-
(2012)
Journal of Strategic Studies
, vol.35
, Issue.1
, pp. 5-32
-
-
Rid, T.1
-
32
-
-
84887063717
-
The Myth of the "Transparent Society"
-
Wired News, 6 March. Available from: [Accessed 2 September 2013]
-
Schneier, B. (2008) 'The Myth of the "Transparent Society"', Wired News, 6 March. Available from: http://bakerinstitute.org/publications/ITP-pub-PlanksOfUSInternationalCyberPolicy-052112.pdf [Accessed 2 September 2013].
-
(2008)
-
-
Schneier, B.1
-
33
-
-
79958715204
-
Reducing Systemic Cybersecurity Risk
-
OECD/IFP Project on 'Future Global Shocks', 14 January. Available from: [Accessed 2 September 2013]
-
Sommer, P. and Brown, I. (2011) 'Reducing Systemic Cybersecurity Risk', OECD/IFP Project on 'Future Global Shocks', 14 January. Available from: http://www.oecd.org/internet/46894657.pdf [Accessed 2 September 2013].
-
(2011)
-
-
Sommer, P.1
Brown, I.2
-
35
-
-
84887036998
-
First Humans to Receive ID Chips; Technology: Device Injected under the Skin Will Provide Identification and Medical Information
-
Los Angeles Times, 9 May
-
Streitfield, D. (2002) 'First Humans to Receive ID Chips; Technology: Device Injected under the Skin Will Provide Identification and Medical Information', Los Angeles Times, 9 May.
-
(2002)
-
-
Streitfield, D.1
-
38
-
-
84887061894
-
-
UK Cabinet Office 'The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World', November. Available from: [Accessed 29 January 2012].
-
UK Cabinet Office (2011) 'The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World', November. Available from: http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf [Accessed 29 January 2012].
-
(2011)
-
-
-
39
-
-
84887107547
-
-
UK House of Commons 'Supplementary Written Evidence from the Ministry of Defence, Following the Private Evidence Session on 18 April 2012', HC106, Defence and Cyber-security, DCS 001a
-
UK House of Commons (2012) 'Supplementary Written Evidence from the Ministry of Defence, Following the Private Evidence Session on 18 April 2012', HC106, Defence and Cyber-security, DCS 001a.
-
(2012)
-
-
-
40
-
-
84867297056
-
Cybersecurity: A Pre-history
-
Warner, M. (2012) 'Cybersecurity: A Pre-history', Intelligence and National Security 27(5), pp. 781-799.
-
(2012)
Intelligence and National Security
, vol.27
, Issue.5
, pp. 781-799
-
-
Warner, M.1
-
41
-
-
84887033021
-
National Database Dropped but All Our Communications Will Still be Monitored
-
The Telegraph, 29 April
-
Whitehead, T. (2009) 'National Database Dropped but All Our Communications Will Still be Monitored', The Telegraph, 29 April.
-
(2009)
-
-
Whitehead, T.1
-
42
-
-
84887111154
-
-
Oral Statement to Parliament, UUK Conference: "A World without Boundaries" (BIS)', 13 September. Available from: [Accessed 2 September 2013]
-
Willetts, D. (2012) 'Oral Statement to Parliament, UUK Conference: "A World without Boundaries" (BIS)', 13 September. Available from: https://www.gov.uk/government/speeches/uuk-conference-a-world-without-boundaries [Accessed 2 September 2013].
-
(2012)
-
-
Willetts, D.1
-
43
-
-
84887058434
-
BT's Secret Phorm Trials Open Door to Corporate Eavesdropping: Government Bumbling Exposes Oversight Gap
-
The Register, 17 April. Available from: [Accessed 24 August 2012]
-
Williams, C. (2008) 'BT's Secret Phorm Trials Open Door to Corporate Eavesdropping: Government Bumbling Exposes Oversight Gap', The Register, 17 April. Available from: http://www.theregister.co.uk/2008/04/17/ripa_phorm_shambles/ [Accessed 24 August 2012].
-
(2008)
-
-
Williams, C.1
-
44
-
-
80053241335
-
-
Integrating Cyber Security into Nuclear Digital I&C Safety Systems', ASME Conference Proceedings 18th International Conference on Nuclear Engineering: Vol. 1/Instrumentation and Controls (ICONE18)
-
Zhang, D.J. (2010) 'Integrating Cyber Security into Nuclear Digital I&C Safety Systems', ASME Conference Proceedings 18th International Conference on Nuclear Engineering: Vol. 1/Instrumentation and Controls (ICONE18).
-
(2010)
-
-
Zhang, D.J.1
|