메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-182

Cyber-Security and Threat Politics: US Efforts to Secure the Information Age

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84911064938     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4324/9780203937419     Document Type: Book
Times cited : (49)

References (565)
  • 2
    • 0031232154 scopus 로고    scopus 로고
    • Seizing the middle ground: Constructivism in world politics
    • Adler, E. (1997) 'Seizing the middle ground: Constructivism in world politics', European Journal of International Relations, 3, 3, pp. 319-63.
    • (1997) European Journal of International Relations , vol.3 , Issue.3 , pp. 319-363
    • Adler, E.1
  • 4
    • 84972279328 scopus 로고
    • Conclusion: Epistemic communities, world order, and the creation of a reflective research program
    • Adler, E. and Haas, P.M. (1992) 'Conclusion: Epistemic communities, world order, and the creation of a reflective research program', International Organization, 46, 1, pp. 367-90.
    • (1992) International Organization , vol.46 , Issue.1 , pp. 367-390
    • Adler, E.1    Haas, P.M.2
  • 5
    • 84911048110 scopus 로고
    • Kelly Air Force Base, Texas: US Government Printing Office
    • Air Force Information Warfare Center (1995) A Technical Analysis of the Rome Laboratory Attacks, Kelly Air Force Base, Texas: US Government Printing Office.
    • (1995) A Technical Analysis of the Rome Laboratory Attacks
  • 6
    • 14244270586 scopus 로고    scopus 로고
    • The regulation of internet content in europe: Governance control versus self-responsibility
    • Akdeniz, Yaman (1999) 'The regulation of Internet content in Europe: Governance control versus self-responsibility', Swiss Political Science Review, 5, 2, pp. 123-31.
    • (1999) Swiss Political Science Review , vol.5 , Issue.2 , pp. 123-131
    • Akdeniz, Y.1
  • 10
    • 84861145051 scopus 로고    scopus 로고
    • The technologies of the information revolution
    • Alberts, D.S. and Papp, D.S, Washington, DC: National Defense University Press
    • Alberts, D.S., Papp, D.S. and Kemp III, W.T. (1997) 'The technologies of the information revolution', in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences (Vol. I), Washington, DC: National Defense University Press, pp. 36-50.
    • (1997) The Information Age: An Anthology of Its Impacts and Consequences , vol.1 , pp. 36-50
    • Alberts, D.S.1    Papp, D.S.2    Kemp, I.3
  • 11
    • 84911048106 scopus 로고    scopus 로고
    • Out of the info loop: Why information networks are crucial to modern warfare’
    • June 2004, (accessed 14 May 2007)
    • Alexander, B. (2004) 'Out of the info loop: Why information networks are crucial to modern warfare', Reason, June 2004. Available online at www.reason.com/0406/cr.ba.out.shtml (accessed 14 May 2007).
    • (2004) Reason
    • Alexander, B.1
  • 13
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard: An economic perspective
    • IEEE Computer Society (ed.), Washington, DC: IEEE Computer Society
    • Andersson, R. (2001) 'Why information security is hard: An economic perspective', in IEEE Computer Society (ed.), Proceedings of the 17th Annual Computer Security Applications Conference, Washington, DC: IEEE Computer Society, pp. 358-65.
    • (2001) Proceedings of the 17Th Annual Computer Security Applications Conference , pp. 358-365
    • Andersson, R.1
  • 14
    • 0035672321 scopus 로고    scopus 로고
    • From war fighting to crime fighting: Transforming the american national security state
    • Andreas, P. and Price, R. (2001) 'From war fighting to crime fighting: Transforming the American national security state', International Studies Review, 3, 3, pp. 31-52.
    • (2001) International Studies Review , vol.3 , Issue.3 , pp. 31-52
    • Andreas, P.1    Price, R.2
  • 15
    • 12244306014 scopus 로고    scopus 로고
    • Indiana: Sams Publishing
    • Anonymous (2003) Maximum Security, Indiana: Sams Publishing.
    • (2003) Maximum Security
    • Anonymous1
  • 16
    • 28344435231 scopus 로고    scopus 로고
    • Epistemic communities, epistemes and the construction of (World) politics
    • Antoniades, A. (2003) 'Epistemic communities, epistemes and the construction of (world) politics', Global Society, 17, 1, pp. 21-38.
    • (2003) Global Society , vol.17 , Issue.1 , pp. 21-38
    • Antoniades, A.1
  • 17
    • 31144455232 scopus 로고    scopus 로고
    • Migration: The spiral of (in)security’
    • March 2001, (accessed 14 May 2007)
    • Aradau, C. (2001a), 'Migration: The spiral of (in)security', Rubikon, March 2001. Available online at http://venus.ci.uw.edu.pl/~rubikon/forum/claudia1.htm (accessed 14 May 2007).
    • (2001) Rubikon
    • Aradau, C.1
  • 18
    • 84861178583 scopus 로고    scopus 로고
    • Beyond good and evil: Ethics and securitization/desecuritization techniques
    • December 2001, (accessed 14 May 2007)
    • Aradau, C. (2001b) 'Beyond good and evil: Ethics and securitization/desecuritization techniques', Rubikon, December 2001. Available online at http://venus.ci.uw.edu.pl/~rubikon/forum/claudia2.htm (accessed 14 May 2007).
    • (2001) Rubikon
    • Aradau, C.1
  • 23
    • 0012658669 scopus 로고    scopus 로고
    • Cyberwar is coming!
    • Arquilla, J. and Ronfeldt, D.F, Santa Monica: RAND
    • Arquilla, J. and Ronfeldt, D.F. (1997b) 'Cyberwar is coming!', in Arquilla, J. and Ronfeldt, D.F. (eds) In Athena'sCamp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 23-60.
    • (1997) In Athena’s , pp. 23-60
    • Arquilla, J.1    Ronfeldt, D.F.2
  • 30
    • 0009892346 scopus 로고    scopus 로고
    • Monday, 29 March 1999. Presenter: Mr. Kenneth H. Bacon, ASD PA, Washington, DC, Department of Defense, (accessed 14 May 2007)
    • Bacon, K.H. (1999) 'DoD news briefing', Monday, 29 March 1999. Presenter: Mr. Kenneth H. Bacon, ASD PA, Washington, DC, Department of Defense. Available online at www.defenselink.mil/transcripts/transcript.aspx?transcriptid=645 (accessed 14 May 2007).
    • (1999) Dod News briefing’
    • Bacon, K.H.1
  • 31
    • 0021201312 scopus 로고
    • Attacks on computers: Congressional hearings and pending legislation
    • Oakland: IEEE Computer Society Press
    • Bailey, D. (1984) 'Attacks on computers: Congressional hearings and pending legislation', in Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland: IEEE Computer Society Press, pp. 180-7.
    • (1984) Proceedings of the 1984 IEEE Symposium on Security and Privacy , pp. 180-187
    • Bailey, D.1
  • 32
    • 0036845060 scopus 로고    scopus 로고
    • Governing the internet: Engaging government, business, and nonprofits
    • Baird, Z. (2002) 'Governing the Internet: Engaging government, business, and nonprofits', Foreign Affairs, 81, 6, pp. 15-20.
    • (2002) Foreign Affairs , vol.81 , Issue.6 , pp. 15-20
    • Baird, Z.1
  • 33
    • 84894915732 scopus 로고
    • Counterforce targeting: How new?, how viable?
    • Ball, D. (1981) 'Counterforce targeting: How new?, How viable?' Arms Control Today, 2, 2, pp. 1-6.
    • (1981) Arms Control Today , vol.2 , Issue.2 , pp. 1-6
    • Ball, D.1
  • 34
    • 54949135829 scopus 로고    scopus 로고
    • The man who sold the war: Meet john rendon, bush’s general in the propaganda war
    • 17 November 2005, (accessed 14 May 2007)
    • Bamford, J. (2005), 'The man who sold the war: Meet John Rendon, Bush's General in the propaganda war', Rolling Stone, 17 November 2005. Available online at www.rollingstone.com/politics/store/_/id/8798997 (accessed 14 May 2007).
    • (2005) Rolling Stone
    • Bamford, J.1
  • 35
    • 0007346550 scopus 로고
    • The californian ideology
    • Barbrook, R. and Cameron, A. (1995) 'The Californian ideology', Science as Culture, 26, 6, pp. 44-72.
    • (1995) Science as Culture , vol.26 , Issue.6 , pp. 44-72
    • Barbrook, R.1    Cameron, A.2
  • 36
    • 0039248599 scopus 로고
    • The economy of ideas: Selling wine without bottles on the global net’
    • 2.03, March 1994, (accessed 14 May 2007)
    • Barlow, J.P. (1994) 'The Economy of ideas: Selling wine without bottles on the global net', Wired Magazine, 2.03, March 1994. Available online at www.wired.com/wired/archive/2.03/economy.ideas.html (accessed 14 May 2007).
    • (1994) Wired Magazine
    • Barlow, J.P.1
  • 37
    • 33645758831 scopus 로고    scopus 로고
    • Electronic Frontier Foundation Website, (accessed 14 May 2007)
    • Barlow, J.P. (1996) A Declaration of the Independence of Cyberspace, Electronic Frontier Foundation Website, available at http://homes.eff.org/~barlow/Declaration-Final.html (accessed 14 May 2007).
    • (1996) A Declaration of the Independence of Cyberspace
    • Barlow, J.P.1
  • 41
    • 0001320762 scopus 로고    scopus 로고
    • Risk society revisited: Theory, politics and research programmes
    • Adam, Barbara, Beck, Ulrich and Loon, Joost van, London: Sage
    • Beck, U. (2001) 'Risk society revisited: Theory, politics and research programmes', in Adam, Barbara, Beck, Ulrich and Loon, Joost van (eds) The Risk Society and Beyond: Critical Issues for Social Theory, London: Sage, pp. 211-29.
    • (2001) The Risk Society and Beyond: Critical Issues for Social Theory , pp. 211-229
    • Beck, U.1
  • 42
    • 84908391974 scopus 로고    scopus 로고
    • Studies in Functional and Structural Linguistics 55, Amsterdam & Philadelphia: John Benjamins
    • Beedham, C. (2005) Language and Meaning: The Structural Creation of Reality, Studies in Functional and Structural Linguistics 55, Amsterdam & Philadelphia: John Benjamins.
    • (2005) Language and Meaning: The Structural Creation of Reality
    • Beedham, C.1
  • 45
    • 84911048099 scopus 로고    scopus 로고
    • Der kosovo-krieg im cyberspace. Cracker, info war und medienkrieg
    • 19 July 1999, (accessed 14 May 2007)
    • Bendrath, R. (1999) 'Der Kosovo-Krieg im cyberspace. Cracker, info war und medienkrieg', Telepolis, 19 July 1999. Available online at www.heise.de/tp/r4/artikeL6/6449/1.html (accessed 14 May 2007).
    • (1999) Telepolis
    • Bendrath, R.1
  • 46
    • 21244432672 scopus 로고    scopus 로고
    • The cyberwar debate: Perception and politics in us critical infrastructure protection
    • Bendrath, R. (2001) 'The cyberwar debate: Perception and politics in US critical infrastructure protection', Information & Security: An International Journal, Volume 7, pp. 80-103.
    • (2001) Information & Security: An International Journal , vol.7 , pp. 80-103
    • Bendrath, R.1
  • 47
    • 27944476171 scopus 로고    scopus 로고
    • The american cyber-angst and the real world - any link?
    • Latham, R. Bendrath, R. (ed.), New York: The New Press
    • Bendrath, R. (2003) 'The American Cyber-Angst and the real world - Any link?' in Latham, R. Bendrath, R. (ed.) Bombs and Bandwidth: The Emerging Relationship between IT and Security, New York: The New Press, pp. 49-73.
    • (2003) Bombs and Bandwidth: The Emerging Relationship between IT and Security , pp. 49-73
    • Bendrath, R.1
  • 48
    • 80051578519 scopus 로고    scopus 로고
    • Cyberterrorism to cyberwar, back and forth: How the united states securitized cyberspace
    • Eriksson, J. and Gia-comello, G, London: Routledge
    • Bendrath, R., Eriksson J. and Giacomello G. (2007) 'Cyberterrorism to cyberwar, back and forth: How the United States securitized cyberspace', in Eriksson, J. and Gia-comello, G. (eds) International Relations and Security in the Digital Age, London: Routledge, pp. 57-82.
    • (2007) International Relations and Security in the Digital Age , pp. 57-82
    • Bendrath, R.1    Eriksson, J.2    Giacomello, G.3
  • 53
  • 54
    • 84911048097 scopus 로고
    • National security vs. Access to computer databases: A new threat to freedom of information
    • 3, June
    • Berman, J.J. (1987) 'National security vs. access to computer databases: A new threat to freedom of information', First Principles, 12, 3, June 1987.
    • (1987) First Principles , vol.12
    • Berman, J.J.1
  • 59
    • 0030490236 scopus 로고    scopus 로고
    • Victory misunderstood: What the gulf war tells us about the future of conflict
    • Biddle, S. (1996) 'Victory misunderstood: What the Gulf War tells us about the future of conflict', International Security, 21, 2, pp. 139-79.
    • (1996) International Security , vol.21 , Issue.2 , pp. 139-179
    • Biddle, S.1
  • 61
    • 0011130099 scopus 로고
    • The european internal security field: Stakes and rivalries in a newly developing area of police intervention
    • Anderson, M. and den Boer, M, London: Pinter
    • Bigo, D. (1994) 'The European internal security field: Stakes and rivalries in a newly developing area of police intervention', in Anderson, M. and den Boer, M. (eds) Policing Across National Boundaries, London: Pinter, pp. 161-73.
    • (1994) Policing across National Boundaries , pp. 161-173
    • Bigo, D.1
  • 62
    • 7444219651 scopus 로고    scopus 로고
    • Sécurité et immigration: Vers une gouvernementalité par linquiétude?’
    • Bigo, D. (1998), 'Sécurité et immigration: vers une gouvernementalité par l'inquiétude?' Cultures et Conflits, 31-2, pp. 13-38.
    • (1998) Cultures Et Conflits , vol.31-2 , pp. 13-38
    • Bigo, D.1
  • 64
  • 68
    • 84900053454 scopus 로고    scopus 로고
    • Pentagon kept the lid on cyberwar in kosovo’
    • 9 November 1999, (accessed 14 May 2007)
    • Borger, J. (1999) 'Pentagon Kept the lid on cyberwar in Kosovo', The Guardian, 9 November 1999. Available online at www.guardian.co.uk/Kosovo/Story/0,2763,197391.00.html (accessed 14 May 2007).
    • (1999) The Guardian
    • Borger, J.1
  • 70
    • 85145541783 scopus 로고    scopus 로고
    • unpublished paper, presented at the ITU Workshop on creating trust in critical network infrastructures, Seoul, 20-22 May 2002
    • Bosch, O. (2002) 'Cyber terrorism and private sector efforts for information infrastructure protection', unpublished paper, presented at the ITU Workshop on creating trust in critical network infrastructures, Seoul, 20-22 May 2002.
    • (2002) Cyber Terrorism and Private Sector Efforts for Information Infrastructure Protection
    • Bosch, O.1
  • 71
    • 34250060253 scopus 로고
    • How to be universal: Some cybernetic strategies 1943-1970
    • Bowker, G. (1993) 'How to be universal: Some cybernetic strategies 1943-1970', Social Studies of Science, 23, 1, pp. 107-28.
    • (1993) Social Studies of Science , vol.23 , Issue.1 , pp. 107-128
    • Bowker, G.1
  • 72
    • 84911048089 scopus 로고    scopus 로고
    • Cybercrime fighters: The feds want you!
    • 11 December 2000, (accessed 14 May 2007)
    • Bowman, L.M. (2000) 'Cybercrime fighters: The feds want you!', ZDNet News, 11 December 2000. Available online at www.zdnet.com/zdnn/stories/news/0,4586,2663288.00.html (accessed 14 May 2007).
    • (2000) Zdnet News
    • Bowman, L.M.1
  • 73
    • 84866585879 scopus 로고
    • Infowar and disinformation: From the pentagon to the net’
    • 11, October-December 1995, (accessed 14 May 2007)
    • Brandt, D. (1995) 'Infowar and disinformation: From the Pentagon to the net', NameBase NewsLine, 11, October-December 1995. Available online at www.namebase.org/news11.html (accessed 14 May 2007).
    • (1995) Namebase Newsline
    • Brandt, D.1
  • 74
    • 84911048087 scopus 로고    scopus 로고
    • Cyberattacks against nato traced to china’
    • 2 September 1999, (accessed 14 May 2007)
    • Brewin, B. (1999) 'Cyberattacks against NATO traced to China', Federal Computer Week, 2 September 1999. Available online at www.cnn.com/TECH/comput-ing/9909/02/chinahack.idg/index.html (accessed 14 May 2007).
    • (1999) Federal Computer Week
    • Brewin, B.1
  • 76
  • 77
    • 0012753057 scopus 로고    scopus 로고
    • Commission on the Roles and Capabilities of the United States Intelligence Community, Washington, DC: US Government Printing Office
    • Brown Report (1996) Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Commission on the Roles and Capabilities of the United States Intelligence Community, Washington, DC: US Government Printing Office.
    • (1996) Preparing for the 21St Century: An Appraisal of U.S. Intelligence
  • 78
    • 84911048084 scopus 로고    scopus 로고
    • The expanding importance of the computer fraud and abuse act’
    • January 2001, (accessed 14 May 2007)
    • Burke, E.B. (2001) 'The expanding importance of the computer fraud and abuse act', GigaLaw.com, January 2001. Available online at www.gigalaw.com/articles/2001-all/-burke-2001-01-all.html (accessed 14 May 2007).
    • (2001) Gigalaw.Com
    • Burke, E.B.1
  • 79
    • 84900293992 scopus 로고    scopus 로고
    • Computer warfare used in yugoslavia
    • 7 October
    • Burns, R. (1999) 'Computer warfare used in Yugoslavia', Associated Press, 7 October
    • (1999) Associated Press
    • Burns, R.1
  • 80
    • 85145522537 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • Burns, R. 1999. Available online at http://transnational.org/SAJT/features/computerwarfare.html (accessed 14 May 2007).
    • (1999)
    • Burns, R.1
  • 86
    • 84911112606 scopus 로고    scopus 로고
    • Norfolk Naval Air Station, Norfolk, Virginia, 13 February 2001, accessed 14 May 2007
    • Bush, G.W. (2001c) Remarks by the President to the Troops and Personnel, Norfolk Naval Air Station, Norfolk, Virginia, 13 February 2001. Available online at www.whitehouse.gov/news/releases/20010213-1.html (accessed 14 May 2007).
    • (2001) Remarks by the President to the Troops and Personnel
    • Bush, G.W.1
  • 91
    • 0011087922 scopus 로고    scopus 로고
    • The complexity of social networks: Theoretical and empirical findings
    • Butts, C.T. (2001) 'The complexity of social networks: Theoretical and empirical findings', Social Networks, 23, pp. 31-71.
    • (2001) Social Networks , vol.23 , pp. 31-71
    • Butts, C.T.1
  • 100
    • 85145523678 scopus 로고    scopus 로고
    • Congressional Research Service Documents, CRS RL32331, 1 April 2004, Washington, DC: Congressional Research Service
    • Cashell, B., Jackson, W.D., Jickling, M., and Webel, B. (2004) The Economic Impact of Cyber-Attacks, Congressional Research Service Documents, CRS RL32331, 1 April 2004, Washington, DC: Congressional Research Service.
    • (2004) The Economic Impact of Cyber-Attacks
    • Cashell, B.1    Jackson, W.D.2    Jickling, M.3    Webel, B.4
  • 104
    • 0039935326 scopus 로고    scopus 로고
    • Robert F. McMormich Tribune Foundation Report, Washington, DC: Center for Strategic and International Studies
    • Center for Strategic and International Studies CSIS (1996) The Information Revolution and International Security, Robert F. McMormich Tribune Foundation Report, Washington, DC: Center for Strategic and International Studies.
    • (1996) The Information Revolution and International Security
  • 105
    • 84861176909 scopus 로고    scopus 로고
    • White paper, Monterey: Center on terrorism and irregular warfare., (accessed 14 May 2007)
    • Center for the Study of Terrorism and Irregular Warfare (1999) Cyberterror: Prospects and Implications, White paper, Monterey: Center on terrorism and irregular warfare. Available online at www.nps.navy.mil/ctiw/files/Cyberterror%20Prospects%20and%20Implications.pdf (accessed 14 May 2007).
    • (1999) Cyberterror: Prospects and Implications
  • 107
    • 84861124863 scopus 로고    scopus 로고
    • White house officials debating rules for cyberwarfare’
    • 22 August 2002, (accessed 14 May 2007)
    • Cha, A.E. and Krim, J. (2002) 'White House officials debating rules for cyberwarfare', Washington Post, 22 August 2002. Available online at www.landfield.com/isn/mail-archive/2002/Aug/0088.html (accessed 14 May 2007).
    • (2002) Washington Post
    • Cha, A.E.1    Krim, J.2
  • 108
    • 85145515286 scopus 로고    scopus 로고
    • unpublished paper, presented at the Annual Convention of the Internet Society, Geneva, July 1998, (accessed 14 May 2007)
    • Chapman, G. (1998) 'National security and the Internet', unpublished paper, presented at the Annual Convention of the Internet Society, Geneva, July 1998. Available online at www.utexas.edu/lbj/21cp/isoc.htm (accessed 14 May 2007).
    • (1998) National security and the internet
    • Chapman, G.1
  • 112
    • 84911215792 scopus 로고    scopus 로고
    • Beyond the moat: New strategies for cyber-security
    • 27 January 2004, (accessed 14 May 2007)
    • Clarke, R. and Zeichner, L. (2004) 'Beyond the moat: New strategies for cyber-security', Bank Systems & Technology, 27 January 2004. Available online at www.banktech.com/showArticle.jhtml?articleID=17501355 (accessed 14 May 2007).
    • (2004) Bank Systems & Technology
    • Clarke, R.1    Zeichner, L.2
  • 114
    • 84911048073 scopus 로고
    • Presidential Decision Directive 29, Washington, DC, 16 September 1994
    • Clinton, W.J. (1994b) Security Policy Coordination, Presidential Decision Directive 29, Washington, DC, 16 September 1994.
    • (1994) Security Policy Coordination
    • Clinton, W.J.1
  • 116
    • 0242534842 scopus 로고
    • Presidential Decision Directive 39, Washington, DC, 21 June 1995
    • Clinton, W.J. (1995b) US Policy on Counterterrorism, Presidential Decision Directive 39, Washington, DC, 21 June 1995.
    • (1995) US Policy on Counterterrorism
    • Clinton, W.J.1
  • 125
    • 0010723892 scopus 로고    scopus 로고
    • A revolution in military affairs
    • Cohen, E. (1996) 'A revolution in military affairs', Foreign Affairs, 75, 2, pp. 37-54.
    • (1996) Foreign Affairs , vol.75 , Issue.2 , pp. 37-54
    • Cohen, E.1
  • 126
    • 84863139644 scopus 로고    scopus 로고
    • ),, presented by Secretary of Defense William S. Cohen and Gen. Henry H. Shelton, Chairman of the Joint Chiefs of Staff, before the Senate Armed Services Committee, 14 October 1999, (accessed 14 May 2007)
    • Cohen, W.S. and Shelton, H.H. (1999) Joint Statement on the Kosovo After Action Review (initial assessment), presented by Secretary of Defense William S. Cohen and Gen. Henry H. Shelton, Chairman of the Joint Chiefs of Staff, before the Senate Armed Services Committee, 14 October 1999. Available online at www.defenselink.mil/releases/release.aspx?releaseid=2220 (accessed 14 May 2007).
    • (1999) Joint Statement on the Kosovo after Action Review (Initial Assessment
    • Cohen, W.S.1    Shelton, H.H.2
  • 127
    • 84936823975 scopus 로고
    • Sex and death in the rational world of defense intellectuals
    • Cohn, C. (1987) 'Sex and death in the rational world of defense intellectuals', Signs: Journal of Women in Culture and Society 12, 4, pp. 687-718.
    • (1987) Signs: Journal of Women in Culture And , vol.12 , Issue.4 , pp. 687-718
    • Cohn, C.1
  • 128
    • 0003494388 scopus 로고
    • Washington, DC: National Academy Press
    • Committee on Science, Engineering, and Public Policy (1982) Scientific Communication and National Security, Washington, DC: National Academy Press.
    • (1982) Scientific Communication and National Security
  • 129
    • 84911048071 scopus 로고
    • Darpa establishes computer emergency response team’
    • 13 December 1988, (accessed 14 May 2007)
    • Computer Emergency Response Team CERT (1988) 'Darpa establishes computer emergency response team' Computer Emergency Response Team Press Release, 13 December 1988. Available online at www.cert.org/about/1988press-rel.html (accessed 14 May 2007).
    • (1988) Computer Emergency Response Team Press Release
  • 130
    • 33744821759 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • Computer Emergency Response Team CERT (2005) CERT/CC Statistics 1988-2005. Available online at www.cert.org/stats/cert_stats.html#incidents (accessed 14 May 2007).
    • (2005) CERT/CC Statistics 1988-2005
  • 134
    • 84890937650 scopus 로고    scopus 로고
    • The media and cyberterrorism: A study in the construction of ‘reality
    • Dunn Cavelty, M. and Kristensen, K.S, London: Routledge
    • Conway, M. (2008) 'The media and cyberterrorism: A study in the construction of 'reality', in Dunn Cavelty, M. and Kristensen, K.S. (eds) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, London: Routledge.
    • (2008) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation
    • Conway, M.1
  • 135
    • 0007735829 scopus 로고    scopus 로고
    • Another view of the revolution in military affairs
    • Arquilla, J. and Ronfeldt, D, Santa Monica: RAND
    • Cooper, J.R. (1997) 'Another view of the revolution in military affairs', in Arquilla, J. and Ronfeldt, D. (eds) In Athena's Camp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 99-140.
    • (1997) In Athena’s Camp: Preparing for Conflict in the Information Age , pp. 99-140
    • Cooper, J.R.1
  • 138
    • 84911048065 scopus 로고
    • Seven curious teenagers wreak havoc via computer
    • 28 August 1983, Section: WWL
    • Covert, C. (1983) 'Seven curious teenagers wreak havoc via computer', Detroit Free Press, 28 August 1983, Section: WWL, p. 1F.
    • (1983) Detroit Free Press , pp. 1F
    • Covert, C.1
  • 139
    • 0040731563 scopus 로고
    • Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of ibn khaldun
    • Rosenau, J.N. and Czempiel E.-O, Cambridge Studies in International Relations Nr. 20, Cambridge: (Cambridge University Press
    • Cox, R. W. (1992) 'Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of ibn khaldun', in Rosenau, J.N. and Czempiel E.-O. (eds) Governance Without Government: Order and Change in World Politics, Cambridge Studies in International Relations Nr. 20, Cambridge: (Cambridge University Press) pp. 132-58.
    • (1992) Governance without Government: Order and Change in World Politics , pp. 132-158
    • Cox, R.W.1
  • 142
    • 0001664276 scopus 로고
    • Is anything ever new? Considering emergence
    • Cowan, G., Pines, D. and Melzner, D, SFI Series in the Sciences of Complexity XIX, Redwood City: Addison-Wesley
    • Crutchfield, J.P. (1994) 'Is anything ever new? Considering emergence', in Cowan, G., Pines, D. and Melzner, D. (eds) Complexity: Metaphors, Models, and Reality, SFI Series in the Sciences of Complexity XIX, Redwood City: Addison-Wesley, pp. 479-97.
    • (1994) Complexity: Metaphors, Models, and Reality , pp. 479-497
    • Crutchfield, J.P.1
  • 143
    • 84884461517 scopus 로고    scopus 로고
    • What lies between order and chaos?
    • Casti, J.L. and Karlqvist, A, Oxford: Oxford University Press
    • Crutchfield, J.P. (2002) 'What lies between order and chaos?' in Casti, J.L. and Karlqvist, A. (eds) Art and Complexity, Oxford: Oxford University Press.
    • (2002) Art and Complexity
    • Crutchfield, J.P.1
  • 144
    • 84900093532 scopus 로고    scopus 로고
    • Internet governance and the ancien regime
    • Cukier, K.N. (1999) 'Internet governance and the ancien regime', Swiss Political Science Review, 5, 1, pp. 127-33.
    • (1999) Swiss Political Science Review , vol.5 , Issue.1 , pp. 127-133
    • Cukier, K.N.1
  • 149
    • 0013138120 scopus 로고    scopus 로고
    • Pentagon readies efforts to sway sentiment abroad’
    • 19 February 2002, (accessed 14 May 2007)
    • Dao, J. and Schmitt, E. (2002) 'Pentagon readies efforts to sway sentiment abroad', New York Times, 19 February 2002. Available online at www.commondreams.org/head-lines02/0219-01.htm (accessed 14 May 2007).
    • (2002) New York Times
    • Dao, J.1    Schmitt, E.2
  • 150
    • 0007781198 scopus 로고    scopus 로고
    • An information-based revolution in military affairs
    • Arquilla, John and Ronfeldt, David, Santa Monica: RAND
    • David, N.C. (1997) 'An information-based revolution in military affairs', in Arquilla, John and Ronfeldt, David (eds) In Athena's Camp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 79-98.
    • (1997) In Athena’s Camp: Preparing for Conflict in the Information Age , pp. 79-98
    • David, N.C.1
  • 151
    • 33644691011 scopus 로고    scopus 로고
    • Improving cia analytic performance: Strategic warning’
    • 1, 1, September 2002., (accessed 14 May 2007)
    • Davis, J. (2002) 'Improving CIA analytic performance: Strategic warning', The Sherman Kent Center for Intelligence Analysis Occasional Papers, 1, 1, September 2002. Available online at www.au.af.mil/au/awc/awcgate/cia/strategic_warning_kent.htm (accessed 14 May 2007).
    • (2002) The Sherman Kent Center for Intelligence Analysis Occasional Papers
    • Davis, J.1
  • 152
    • 84937339440 scopus 로고    scopus 로고
    • Cyberterror and media-induced fears: The production of emergency culture
    • May
    • Debrix, F. (2001) 'Cyberterror and media-induced fears: The production of emergency culture', Strategies: Journal of Theory, Culture & Politics, 14, 1, May, pp. 149-68.
    • (2001) Strategies: Journal of Theory, Culture & Politics , vol.14 , Issue.1 , pp. 149-168
    • Debrix, F.1
  • 155
    • 84861161916 scopus 로고    scopus 로고
    • 2000 Summer Study Volume II, Washington, DC: Department of Defense
    • Defense Science Board (2001) Protecting the Homeland. Report of the Defense Science Board Task Forceon Defensive Information Operations. 2000 Summer Study Volume II, Washington, DC: Department of Defense.
    • (2001) Protecting the Homeland. Report of the Defense Science Board Task Force
  • 157
    • 0005238259 scopus 로고    scopus 로고
    • Security of the internet’
    • 15, New York, (accessed 14 May 2007)
    • Dekker, M. (1997) 'Security of the Internet', in The Froehlich/Kent Encyclopedia of Telecommunications, 15, New York, pp. 231-55. Available online at www.cert.org/encyc_article/tocencyc.html (accessed 14 May 2007).
    • (1997) The Froehlich/Kent Encyclopedia of Telecommunications , pp. 231-255
    • Dekker, M.1
  • 158
    • 0006845513 scopus 로고    scopus 로고
    • New security in cyberspace: Emerging intersection between military and civilian contingencies’
    • Demchak, C.C. (1999) '"New Security" in cyberspace: Emerging intersection between military and civilian contingencies', Journal of Contingencies and Crisis Management, 7, 4, pp. 181-98.
    • (1999) Journal of Contingencies and Crisis Management , vol.7 , Issue.4 , pp. 181-198
    • Demchak, C.C.1
  • 160
    • 27944466951 scopus 로고    scopus 로고
    • essay for the social science research council, after September 11, (accessed 14 May 2007)
    • Denning, D. (2001a) 'Is Cyber-terror Next?' essay for the social science research council, after September 11. Available online at www.ssrc.org/sept11/essays/denning.htm (accessed 14 May 2007).
    • (2001) Is Cyber-Terror Next?’
    • Denning, D.1
  • 161
    • 0242440508 scopus 로고    scopus 로고
    • Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy
    • Arquilla, J. and Ronfeldt, D, Santa Monica: RAND
    • Denning, D. (2001b) 'Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy', in Arquilla, J. and Ronfeldt, D. (eds) Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica: RAND, pp. 239-88.
    • (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy , pp. 239-288
    • Denning, D.1
  • 163
    • 36049041763 scopus 로고    scopus 로고
    • The internet after thirty years
    • Denning, Dorothy E. and Denning, Peter J, New York: ACM Press
    • Denning, P. (ed.) (1997) 'The Internet after thirty years', in Denning, Dorothy E. and Denning, Peter J. (eds) Internet Besieged: Countering Cyberspace Scofflaws, New York: ACM Press, pp. 15-27.
    • (1997) Internet Besieged: Countering Cyberspace Scofflaws , pp. 15-27
    • Denning, P.1
  • 165
    • 81455158615 scopus 로고    scopus 로고
    • 12 September 2006, Washington, DC, (accessed 14 May 2007)
    • Department of Homeland Security (DHS) (2006) Cyber Storm: Exercise Report, 12 September 2006, Washington, DC. Available online at www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf (accessed 14 May 2007).
    • (2006) Cyber Storm: Exercise Report
  • 166
    • 84911125318 scopus 로고    scopus 로고
    • Washington, DC, Department of the United States Air Force: August
    • Department of the Air Force (1998), Air Force Doctrine Document 2-5, Information Operations, Washington, DC, Department of the United States Air Force: August 1998.
    • (1998) Air Force Doctrine Document 2-5, Information Operations , pp. 1998
  • 169
    • 84900205201 scopus 로고    scopus 로고
    • Revision One, October 2001, (accessed 14 May 2007)
    • Department of Defense (2001a) Directive Number 3600.1, Information Operations, Revision One, October 2001. Available online at www.iwar.org.uk/iwar/resources/doctrine/DoD36001.pdf (accessed 14 May 2007).
    • (2001) Directive Number 3600.1, Information Operations
  • 170
    • 84911048059 scopus 로고    scopus 로고
    • June 2001. (accessed 14 May 2007)
    • Department of Defense (2001b) FY2001 Defense Supplemental Request, June 2001. Available online at www.dod.mil/comptroller/defbudget/fy2001/fy2001_supp.pdf (accessed 14 May 2007).
    • (2001) FY2001 Defense Supplemental Request
  • 171
    • 27844612263 scopus 로고    scopus 로고
    • Joint Publication 1-02, 12 April 2001 (As Amended Through 14 April 2006), (accessed 14 May 2007)
    • Department of Defense (2001c) Department of Defense Dictionary of Military and Associated Terms, Joint Publication 1-02, 12 April 2001 (As Amended Through 14 April 2006). Available online at www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf (accessed 14 May 2007).
    • (2001) Department of Defense Dictionary of Military and Associated Terms
  • 173
    • 0010160253 scopus 로고
    • The value of security: Hobbes, marx, nietzsche, and baudrillard
    • Lipschutz, Ronnie (ed.), New York: Columbia University Press
    • Der Derian, J. (1995) 'The value of security: Hobbes, Marx, Nietzsche, and Baudrillard', in Lipschutz, Ronnie (ed.) On Security, New York: Columbia University Press, pp. 24-45.
    • (1995) On Security , pp. 24-45
    • Der Derian, J.1
  • 175
    • 0039768088 scopus 로고
    • Mass communications and the loss of freedom in national decision-making: A possible research approach to interstate conflicts
    • Deutsch, K.W. (1957) 'Mass communications and the loss of freedom in national decision-making: A possible research approach to interstate conflicts', Journal of Conflict Resolution, 1, 2, pp. 200-11.
    • (1957) Journal of Conflict Resolution , vol.1 , Issue.2 , pp. 200-211
    • Deutsch, K.W.1
  • 176
    • 0040655217 scopus 로고
    • unpublished Master Thesis, University of Vermont, Burlington, (accessed 14 May 2007)
    • Devost, M.G. (1995) National Security in the Information Age, unpublished Master Thesis, University of Vermont, Burlington. Available online at www.devost.net/papers/national_security_in_the_information_age.html (accessed 14 May 2007).
    • (1995) National Security in the Information Age
    • Devost, M.G.1
  • 177
    • 0031315433 scopus 로고    scopus 로고
    • Information terrorism: Political violence in the information age
    • Devost, M.G., Houghton, B.K. and Pollard, N.A. (1997) 'Information terrorism: Political violence in the information age', Terrorism and Political Violence, 9, 1, pp. 72-83.
    • (1997) Terrorism and Political Violence , vol.9 , Issue.1 , pp. 72-83
    • Devost, M.G.1    Houghton, B.K.2    Pollard, N.A.3
  • 180
    • 0002287411 scopus 로고
    • Political discourse analysis
    • Diani, M. and Ron E, London: Sage
    • Donati, P. (1992) 'Political discourse analysis', in Diani, M. and Ron E. (eds) Studying Collective Action, London: Sage, pp. 136-67.
    • (1992) Studying Collective Action , pp. 136-167
    • Donati, P.1
  • 181
    • 0346375310 scopus 로고    scopus 로고
    • Hamre to hill: “were in a cyberwar”’
    • 1 March 1999
    • Donnelly, J. and Crawley, V. (1999) 'Hamre to hill: "We're in a cyberwar"', Defense Week, 1 March 1999, p. 1.
    • (1999) Defense Week , pp. 1
    • Donnelly, J.1    Crawley, V.2
  • 185
    • 84911131575 scopus 로고    scopus 로고
    • Cybercrime-alternative models for dealing with unauthorized use and abuse of computer networks’
    • September., (accessed 14 May 2007)
    • Drummond, N. and McClendon, D.J. (2001) 'Cybercrime-alternative models for dealing with unauthorized use and abuse of computer networks', Law and Internet, September. Available online at http://gsulaw.gsu.edu/lawand/papers/su01/drummond_mcclendon/ (accessed 14 May 2007).
    • (2001) Law and Internet
    • Drummond, N.1    McClendon, D.J.2
  • 186
    • 84911212445 scopus 로고    scopus 로고
    • Concluding remarks: The role of the state in securing the information age - challenges and prospects
    • Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F, Aldershot: Ashgate
    • Dunn Cavelty, M. and Mauer, V. (2007) 'Concluding remarks: The role of the state in securing the information age - challenges and prospects', in Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F. (eds) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, Aldershot: Ashgate.
    • (2007) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
    • Dunn Cavelty, M.1    Mauer, V.2
  • 189
    • 14844300090 scopus 로고    scopus 로고
    • The socio-political dimensions of critical information infrastructure protection (Ciip)
    • Dunn, M. (2005) 'The socio-political dimensions of critical information infrastructure protection (CIIP)', International Journal for Critical Infrastructure Protection, 1, 2/3, pp. 58-68.
    • (2005) International Journal for Critical Infrastructure Protection , vol.1 , Issue.2-3 , pp. 58-68
    • Dunn, M.1
  • 190
    • 53349138328 scopus 로고    scopus 로고
    • Securing the digital age: Ir theory and the twin-forces of complexity and change
    • Eriksson, J. and Giacomello, G, London: Routledge
    • Dunn, M. (2007a) 'Securing the digital age: IR theory and the twin-forces of complexity and change', in Eriksson, J. and Giacomello, G. (eds) International Relations and Security in the Digital Age, London: Routledge, pp. 85-105.
    • (2007) International Relations and Security in the Digital Age , pp. 85-105
    • Dunn, M.1
  • 191
    • 84874528133 scopus 로고    scopus 로고
    • Cyber-terror - looming threat or phantom menace? The framing of the us cyber-threat debate
    • Dunn, M. (2007b) 'Cyber-terror - looming threat or phantom menace? The framing of the US Cyber-Threat debate', Journal of Information Technology and Politics, 4, 1.
    • (2007) Journal of Information Technology and Politics , vol.4 , pp. 1
    • Dunn, M.1
  • 195
    • 3142537645 scopus 로고    scopus 로고
    • Washington, DC: Electronic Privacy Information Center
    • Electronic Privacy Information Center EPIC (1998b) Critical Infrastructure Protection and the Endangerment of Civil LibertiesAn Assessment of the President's Commission on Critical Infrastructure Protection (PCCIP), Washington, DC: Electronic Privacy Information Center.
    • (1998) Critical Infrastructure Protection and the Endangerment of Civil Liberties
  • 196
    • 84911110960 scopus 로고    scopus 로고
    • Washington, DC: Electronic Privacy Information Center, (accessed 14 May 2007)
    • Electronic Privacy Information Center EPIC (1999) Cryptography and Liberty: An International Survey of Encryption Policy, Washington, DC: Electronic Privacy Information Center. Available online at www.gilc.org/crypto/crypto-survey-99.html (accessed 14 May 2007)
    • (1999) Cryptography and Liberty: An International Survey of Encryption Policy
  • 197
    • 84861292488 scopus 로고    scopus 로고
    • Washington, DC: Electronic Privacy Information Center, 24 May 2005, (accessed 14 May 2007)
    • Electronic Privacy Information Center EPIC (2005) The USA PATRIOT Act, Washington, DC: Electronic Privacy Information Center, 24 May 2005. Available online at www.epic.org/privacy/terrorism/usapatriot/ (accessed 14 May 2007).
    • (2005) The USA PATRIOT Act
  • 200
    • 84911048057 scopus 로고
    • The 414 gang strikes again
    • 29 August 1983
    • Elmer-Dewitt, P. (1983) 'The 414 Gang Strikes Again', Time Magazine, 29 August 1983.
    • (1983) Time Magazine
    • Elmer-Dewitt, P.1
  • 202
    • 84888859417 scopus 로고    scopus 로고
    • Information warfare: Hype or reality?
    • Eriksson, A.E. (1999) 'Information warfare: Hype or reality?' The Non-Proliferation Review, 6, 3, pp. 57-64.
    • (1999) The Non-Proliferation Review , vol.6 , Issue.3 , pp. 57-64
    • Eriksson, A.E.1
  • 204
    • 28344455175 scopus 로고    scopus 로고
    • Observers or advocates? On the political role of security analysts
    • Eriksson, J. (1999b) 'Observers or advocates? On the political role of security analysts', Cooperation and Conflict, 34, 4, pp. 311-30.
    • (1999) Cooperation and Conflict , vol.34 , Issue.4 , pp. 311-330
    • Eriksson, J.1
  • 206
    • 0035193419 scopus 로고    scopus 로고
    • Cyberplagues, it, and security: Threat politics in the information age
    • Eriksson, J. (2001b) 'Cyberplagues, IT, and security: Threat politics in the information age', Journal of Contingencies and Crisis Management, 9, 4, pp. 211-22.
    • (2001) Journal of Contingencies and Crisis Management , vol.9 , Issue.4 , pp. 211-222
    • Eriksson, J.1
  • 207
    • 33746787614 scopus 로고    scopus 로고
    • The information revolution, security, and international relations: (ir) relevant theory?
    • Eriksson, J. and Giacomello, G. (2006) 'The information revolution, security, and international relations: (IR) Relevant Theory?' International Political Science Review, 27, 3, pp. 221-44.
    • (2006) International Political Science Review , vol.27 , Issue.3 , pp. 221-244
    • Eriksson, J.1    Giacomello, G.2
  • 208
  • 209
    • 0034283429 scopus 로고    scopus 로고
    • Infrastructure risk analysis of municipal water distribution system
    • Ezell, B.C., Farr, J.V. and Wiese, I. (2000) 'Infrastructure risk analysis of municipal water distribution system', Journal of Infrastructure Systems, 6, 3, pp. 118-22.
    • (2000) Journal of Infrastructure Systems , vol.6 , Issue.3 , pp. 118-122
    • Ezell, B.C.1    Farr, J.V.2    Wiese, I.3
  • 212
    • 0005841141 scopus 로고    scopus 로고
    • Locating frames in the discursive universe’
    • (accessed 14 May 2007)
    • Fisher, K. (1997) 'Locating frames in the discursive universe', Sociological Research Online, 3, 2. Available online at www.socresonline.org.uk/socresonline/2/3/4.html(accessed 14 May 2007).
    • (1997) Sociological Research Online , vol.3 , pp. 2
    • Fisher, K.1
  • 213
    • 84861251379 scopus 로고    scopus 로고
    • Information age state security: New threats to old boundaries’
    • November 2001, (accessed 14 May 2007)
    • Fisher, U. (2001) 'Information age state security: New threats to old boundaries', Journal for Homeland Security, November 2001. Available online at www.homelandsecurity.org/journal/articles/fisher.htm (accessed 14 May 2007).
    • (2001) Journal for Homeland Security
    • Fisher, U.1
  • 214
    • 84911048051 scopus 로고    scopus 로고
    • Cybersecurity expert warns of post-9/11 vulnerability’
    • 9 September 2003, (accessed 14 May 2007)
    • Fitzpatrick, D. (2003) 'Cybersecurity Expert Warns of Post-9/11 Vulnerability', Pittsburgh Post-Gazette, 9 September 2003. Available online at www.post-gazette.com/pg/03252/219578.stm (accessed 14 May 2007).
    • (2003) Pittsburgh Post-Gazette
    • Fitzpatrick, D.1
  • 218
    • 0141940614 scopus 로고    scopus 로고
    • Prevention, not preemption
    • Freedman, L. (2003) 'Prevention, not preemption', The Washington Quarterly, 26, 2, pp. 105-14.
    • (2003) The Washington Quarterly , vol.26 , Issue.2 , pp. 105-114
    • Freedman, L.1
  • 222
    • 84911048045 scopus 로고    scopus 로고
    • Computer viruses: Making the time fit the crime’
    • (accessed 14 May 2007)
    • Froehlich, J.N., Pinter, E.M., and Witmeyer III, J.J. (1997) 'Computer viruses: Making the time fit the crime', Legal Column Archives. Available online at www.fmew.com/archive/ (accessed 14 May 2007).
    • (1997) Legal Column Archives
    • Froehlich, J.N.1    Pinter, E.M.2    Witmeyer, J.J.3
  • 223
    • 84900329757 scopus 로고
    • The metaphor is the key: Cryptography, the clipper chip, and the constitution
    • Froomkin, A.M. (1995) 'The metaphor is the key: Cryptography, the clipper chip, and the constitution', University of Pennsylvania Law Review, 143, pp. 709-897.
    • (1995) University of Pennsylvania Law Review , vol.143 , pp. 709-897
    • Froomkin, A.M.1
  • 226
    • 85145532789 scopus 로고    scopus 로고
    • Security leaks and unknown bedeviled kosovo commanders’
    • 1 November 1999
    • Fulghum, D. (1999), 'Security leaks and unknown bedeviled Kosovo commanders', Aviation Week and Space Technology, 151, 18, 1 November 1999, pp. 33-6.
    • (1999) Aviation Week and Space Technology , vol.151 , Issue.18 , pp. 33-36
    • Fulghum, D.1
  • 229
    • 0004218798 scopus 로고
    • Cambridge: Cambridge University Press
    • Gamson, W.A. (1992) Talking Politics, Cambridge: Cambridge University Press.
    • (1992) Talking Politics
    • Gamson, W.A.1
  • 230
    • 84911048044 scopus 로고
    • United states general accounting office
    • Report to the Honorable Jack Brooks, Chairman, Committee on the Judiciary, House of Representatives, GAO/OSI-94-2, 4 November 1993, Washington, DC: General Accounting Office
    • GAO (1985) United States General Accounting Office, Communications Privacy: Federal Policy and Actions, Report to the Honorable Jack Brooks, Chairman, Committee on the Judiciary, House of Representatives, GAO/OSI-94-2, 4 November 1993, Washington, DC: General Accounting Office.
    • (1985) Communications Privacy: Federal Policy and Actions
  • 231
    • 84911047973 scopus 로고
    • United states general accounting office
    • Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce House of Representatives, GAO/IMTEC-89-57, June 1989, Washington, DC: General Accounting Office
    • GAO (1989) United States General Accounting Office, Computer Security Virus Highlights Need for Improved Internet Management, Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce House of Representatives, GAO/IMTEC-89-57, June 1989, Washington, DC: General Accounting Office.
    • (1989) Computer Security Virus Highlights Need for Improved Internet Management
  • 232
    • 84911047972 scopus 로고
    • United states general accounting office
    • GAO/T-IMTEC-92-5, 20 November 1991, Washington, DC: General Accounting Office
    • GAO (1991) United States General Accounting Office, Computer Security: Hackers Penetrate DoD Computer Systems, GAO/T-IMTEC-92-5, 20 November 1991, Washington, DC: General Accounting Office.
    • (1991) Computer Security: Hackers Penetrate Dod Computer Systems
  • 233
    • 85145537846 scopus 로고
    • United states general accounting office
    • Warren G. Reed before the Subcommittee on Transportation, Aviation, and Materials, Committee on Science and Technology, 17 June 1985, Washington, DC: General Accounting Office
    • GAO (1995) United States General Accounting Office, The Potential Impact of NationalSecurity Decision Directive (NSDD) 145 on Civil Agencies, Warren G. Reed before the Subcommittee on Transportation, Aviation, and Materials, Committee on Science and Technology, 17 June 1985, Washington, DC: General Accounting Office.
    • (1995) The Potential Impact of National
  • 234
    • 84911047970 scopus 로고    scopus 로고
    • United states general accounting office
    • GAO/AIMD-96-84, 22 May 1996, Washington, DC: General Accounting Office
    • GAO (1996) United States General Accounting Office, Information Security: Computer attacks at Department of Defense Pose Increasing Risk, GAO/AIMD-96-84, 22 May 1996, Washington, DC: General Accounting Office.
    • (1996) Information Security: Computer Attacks at Department of Defense Pose Increasing Risk
  • 235
    • 85145545408 scopus 로고    scopus 로고
    • United states general accounting office
    • GAO/AIMD-00-1, 1 October 1999, Washington, DC: General Accounting Office
    • GAO (1999) United States General Accounting Office, Critical Infrastructure Protection:Comprehensive Strategy Can Draw on Year 2000 Experiences, GAO/AIMD-00-1, 1 October 1999, Washington, DC: General Accounting Office.
    • (1999) Critical Infrastructure Protection:
  • 236
    • 85145546520 scopus 로고    scopus 로고
    • United states general accounting office
    • GAO-01-323, 25 April 2001, Washington, DC: General Accounting Office
    • GAO (2001) United States General Accounting Office, Critical Infrastructure Protection:Significant Challenges in Developing Analysis, Warning, and Response Capabilities, GAO-01-323, 25 April 2001, Washington, DC: General Accounting Office.
    • (2001) Critical Infrastructure Protection:
  • 239
    • 0011016060 scopus 로고    scopus 로고
    • Cyber-attacks by al qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say
    • 27 June 2002
    • Gellman, B. (2002) 'Cyber-attacks by Al qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, Experts say', Washington Post, 27 June 2002, p. A01.
    • (2002) Washington Post , pp. A01
    • Gellman, B.1
  • 241
    • 84911047965 scopus 로고    scopus 로고
    • Nsas operation eligible receiver’
    • 16 April 1998
    • Gertz, B. (1998) 'NSA's operation eligible receiver', The Washington Times, 16 April 1998.
    • (1998) The Washington Times
    • Gertz, B.1
  • 242
    • 84937188344 scopus 로고    scopus 로고
    • Taming the net? The issue of government control on the internet
    • Giacomello, G. (1999) 'Taming the net? The issue of government control on the Internet', Swiss Political Science Review, 5, 2, pp. 116-22.
    • (1999) Swiss Political Science Review , vol.5 , Issue.2 , pp. 116-122
    • Giacomello, G.1
  • 245
    • 84911047964 scopus 로고    scopus 로고
    • Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 1st report
    • 15 December1999, Washington, DC: RAND
    • Gilmore (1999) Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 1st Report, Assessing the Threat, 15 December 1999, Washington, DC: RAND.
    • (1999) Assessing the Threat
  • 246
    • 84908658294 scopus 로고    scopus 로고
    • Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 2nd report
    • 15 December 2000, Washington, DC: RAND
    • Gilmore (2000) Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 2nd Report, Toward a National Strategy for Combating Terrorism, 15 December 2000, Washington, DC: RAND.
    • (2000) Toward a National Strategy for Combating Terrorism
  • 247
    • 84911047962 scopus 로고    scopus 로고
    • Rumsfeld to nato: Prepare now for emerging threats
    • 7 June 2001
    • Gilmore, G. J. (2001) 'Rumsfeld to NATO: Prepare now for emerging threats', American Forces Press Service, 7 June 2001.
    • (2001) American Forces Press Service
    • Gilmore, G.J.1
  • 248
    • 0002177243 scopus 로고    scopus 로고
    • Vienna: The International Press Institute
    • Goff, P. (ed.) (1999) Kosovo News and Propaganda War, Vienna: The International Press Institute.
    • (1999) Kosovo News and Propaganda War
    • Goff, P.1
  • 249
    • 0035642633 scopus 로고    scopus 로고
    • New threats, new identities and new ways of war: The sources of change in national security doctrine
    • Goldman, E.O. (2001) 'New threats, new identities and new ways of war: The sources of change in national security doctrine', Journal of Strategic Studies, 24, 3, pp. 12-42.
    • (2001) Journal of Strategic Studies , vol.24 , Issue.3 , pp. 12-42
    • Goldman, E.O.1
  • 251
    • 84899413556 scopus 로고    scopus 로고
    • The emerging consensus on criminal conduct in cyberspace
    • Goodman, M.D. and Brenner, S.W. (2002) 'The emerging consensus on criminal conduct in cyberspace', UCLA Journal of Law and Technology, 10, 2, pp. 139-223.
    • (2002) UCLA Journal of Law and Technology , vol.10 , Issue.2 , pp. 139-223
    • Goodman, M.D.1    Brenner, S.W.2
  • 252
    • 85145542810 scopus 로고    scopus 로고
    • Document CNI/04, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures, Seoul, 20-2 May 2002, (accessed 14 May 2007)
    • Goodman, S.E., Hassebroek, P.B., King, D. and Azment, A. (2002) International Coordination to Increase the Security of Critical Network Infrastructures, Document CNI/04, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures, Seoul, 20-2 May 2002. Available online at www.itu.int/osg/spu/ni/security/docs/cni.04.pdf (accessed 14 May 2007).
    • (2002) International Coordination to Increase the Security of Critical Network Infrastructures
    • Goodman, S.E.1    Hassebroek, P.B.2    King, D.3    Azment, A.4
  • 253
    • 44949162596 scopus 로고    scopus 로고
    • Bush orders guidelines for cyber-warfare: Rules for attacking enemy computers prepared as U.S. Weighs iraq options
    • Graham, B. (2003) 'Bush orders guidelines for cyber-warfare: Rules for attacking enemy computers prepared as U.S. weighs Iraq options', Washington Post, 7 February 2003, p. A01.
    • (2003) Washington Post, 7 February , vol.2003 , pp. A01
    • Graham, B.1
  • 254
    • 27944455431 scopus 로고    scopus 로고
    • The myth of cyberterrorism’
    • November 2002, (accessed 14 May 2007)
    • Green, J. (2002) 'The myth of cyberterrorism', Washington Monthly, November 2002. Available online at www.washingtonmonthly.com/features/2001/0211.green.html (accessed 14 May 2007).
    • (2002) Washington Monthly
    • Green, J.1
  • 255
    • 84861178590 scopus 로고    scopus 로고
    • U.S. Cybersecurity chief resigns: Amit yoran, said to be frustrated with progress, gives one-day notice’
    • 01 October 2004, (accessed 14 May 2007)
    • Gross, G. (2004) 'U.S. Cybersecurity chief resigns: Amit Yoran, said to be Frustrated with progress, gives one-day notice', IDG News Service, 01 October 2004. Available online at www.infoworld.com/infoworld/article/04/10/01/HNchiefresigns_1.html (accessed 14 May 2007).
    • (2004) IDG News Service
    • Gross, G.1
  • 256
    • 84911047960 scopus 로고    scopus 로고
    • Constructivism and the role of institutions in international relations
    • Copenhagen: Copenhagen Peace Research Institute
    • Guzzini, S. (2002) 'Constructivism and the role of institutions in international relations', Copenhagen Peace Research Institute Working Papers, 38, Copenhagen: Copenhagen Peace Research Institute.
    • (2002) Copenhagen Peace Research Institute Working Papers , pp. 38
    • Guzzini, S.1
  • 257
    • 84972264695 scopus 로고
    • Introduction: Epistemic communities and international policy coordination
    • Haas, P.M. (1992) 'Introduction: Epistemic communities and international policy coordination', International Organization, 46, 1, pp. 1-35.
    • (1992) International Organization , vol.46 , Issue.1 , pp. 1-35
    • Haas, P.M.1
  • 258
    • 0002329486 scopus 로고
    • Epistemic communities and the dynamics of international environmental co-operation
    • Rittberger, V. (ed.), Oxford: Clarendon Press
    • Haas, P.M. (1993) 'Epistemic communities and the dynamics of international environmental co-operation', in Rittberger, V. (ed.) Regime Theory and International Relations, Oxford: Clarendon Press, pp. 168-201.
    • (1993) Regime Theory and International Relations , pp. 168-201
    • Haas, P.M.1
  • 260
    • 85145534314 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • Hack FAQ (2004) Available online at www.nmrc.org/pub/faq/hackfaq/index.html (accessed 14 May 2007).
    • (2004)
    • Hack, F.1
  • 262
    • 0035281847 scopus 로고    scopus 로고
    • Leontief-based model of risk in complex interconnected infrastructures
    • Haimes, Y.Y. and Jiang, P. (2001) 'Leontief-based model of risk in complex interconnected infrastructures', Journal of Infrastructure Systems, 7, 1, pp. 1-12.
    • (2001) Journal of Infrastructure Systems , vol.7 , Issue.1 , pp. 1-12
    • Haimes, Y.Y.1    Jiang, P.2
  • 263
    • 84900127683 scopus 로고    scopus 로고
    • The internet and national security: Emerging issues
    • Alberts, D.S. and Papp, D.S, Washington, DC: National Defense University Press
    • Halperin, D. (2000) 'The Internet and national security: Emerging issues', in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences (Vol. II), Washington, DC: National Defense University Press, pp. 137-73.
    • (2000) The Information Age: An Anthology of Its Impacts and Consequences , vol.2 , pp. 137-173
    • Halperin, D.1
  • 264
    • 84911047958 scopus 로고    scopus 로고
    • Critical infrastructure protection - information assurance’
    • [accompanied by Mr. Linton Wells, II, Principal Deputy, Assistant Secretary of Defense for Command, Control, Communications & Intelligence, Department of Defense and Brigadier General John H. Campbell, USAF, Deputy Director for Information Operations (J-39), Department of Defense] 11 June 1998, House Military Procurement and Military Research & Development Subcommittees, (accessed 14 May 2007)
    • Hamre, J.J. (1998) 'Critical infrastructure protection - Information Assurance', Hearing on Intelligence and Security, Testimony of the Deputy Secretary of Defense[accompanied by Mr. Linton Wells, II, Principal Deputy, Assistant Secretary of Defense for Command, Control, Communications & Intelligence, Department of Defense and Brigadier General John H. Campbell, USAF, Deputy Director for Information Operations (J-39), Department of Defense] 11 June 1998, House Military Procurement and Military Research & Development Subcommittees. Available online at www.fas.org/irp/congress/1998_hr/98-06-11hamre.htm (accessed 14 May 2007).
    • (1998) Hearing on Intelligence and Security, Testimony of the Deputy Secretary of Defense
    • Hamre, J.J.1
  • 265
    • 85145532008 scopus 로고    scopus 로고
    • 18 February 2003, (accessed 14 May 2007)
    • Hamre, J.J. (2003) Frontline Interview with John Hamre, 18 February 2003. Available online at www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html (accessed 14 May 2007).
    • (2003) Frontline Interview with John Hamre
    • Hamre, J.J.1
  • 267
    • 84895677832 scopus 로고    scopus 로고
    • Media use backfires on u.S.; many ask if pentagon altered information to make case for war
    • 11 December 2005
    • Hedges, S.J. (2005), 'Media use backfires on U.S.; many ask if pentagon altered information to make case for war', Chicago Tribune, 11 December 2005.
    • (2005) Chicago Tribune
    • Hedges, S.J.1
  • 268
    • 33749831917 scopus 로고
    • Social perception and phenomenal causality
    • Heider, F. (1944) 'Social perception and phenomenal causality', Psychological Review, 51, pp. 358-74.
    • (1944) Psychological Review , vol.51 , pp. 358-374
    • Heider, F.1
  • 271
    • 84937185992 scopus 로고    scopus 로고
    • Military theory and information warfare
    • Henry, R. and Peartree, E.C. (eds) (1998b) 'Military theory and information warfare', Parameters, XXVIII, 3, pp. 121-35.
    • (1998) Parameters , vol.28 , Issue.3 , pp. 121-135
    • Henry, R.1    Peartree, E.C.2
  • 272
    • 4644334739 scopus 로고    scopus 로고
    • Technology and international systems
    • Herrera, G. (2003) 'Technology and international systems', Millennium, 32, 3, pp. 559-94.
    • (2003) Millennium , vol.32 , Issue.3 , pp. 559-594
    • Herrera, G.1
  • 273
    • 84940930822 scopus 로고    scopus 로고
    • Cyberspace and sovereignty: Thoughts on physical space and digital space
    • Dunn Cavelty, M., Mauer, V. and Krishna-Hensel S.-F, Aldershot: Ashgate
    • Herrera, G. (2007) 'Cyberspace and sovereignty: Thoughts on physical space and digital space', in Dunn Cavelty, M., Mauer, V. and Krishna-Hensel S.-F. (eds) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, Aldershot: Ashgate.
    • (2007) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
    • Herrera, G.1
  • 274
    • 85145545182 scopus 로고    scopus 로고
    • Congressional Research Report for Congress, RL30735, 19 June 2001, Washington, DC: Congressional Research Service
    • Hildreth, S.A. (2001) Cyberwarfare, Congressional Research Report for Congress, RL30735, 19 June 2001, Washington, DC: Congressional Research Service.
    • (2001) Cyberwarfare
    • Hildreth, S.A.1
  • 277
    • 84900203812 scopus 로고    scopus 로고
    • U.S. Opened cyber-war during kosovo fight’
    • October 1999
    • Hoffmann, L. (1999) 'U.S. opened cyber-war during Kosovo fight', Washington Times, 24 October 1999, p. C1.
    • (1999) Washington Times , vol.24 , pp. C1
    • Hoffmann, L.1
  • 278
    • 84911047955 scopus 로고    scopus 로고
    • The functional security agenda in the nordic states
    • Opublicerad rapport, Utrikespolitiska Institutet, Sweden: University of Uppsala
    • Holmgren, J. and Softa, J. (2003) 'The functional security agenda in the Nordic States', Threat Politics Project, Opublicerad rapport, Utrikespolitiska Institutet, Sweden: University of Uppsala.
    • (2003) Threat Politics Project
    • Holmgren, J.1    Softa, J.2
  • 279
    • 50649088086 scopus 로고    scopus 로고
    • Institute of International Relations, The University of British Columbia, Working Paper No. 26, December, (accessed 14 May 2007)
    • Holsti, K.J. (1998) The Problem of Change in International Relations Theory, Institute of International Relations, The University of British Columbia, Working Paper No. 26, December. Available online at www.iir.ubc.ca/site_template/workingpapers/webwp26.pdf (accessed 14 May 2007).
    • (1998) The Problem of Change in International Relations Theory
    • Holsti, K.J.1
  • 286
    • 0032093986 scopus 로고    scopus 로고
    • Security! what do you mean? From concept to thick signifier
    • Huysmans, J. (1998a) 'Security! What do you mean? From concept to thick signifier', European Journal of International Relations, 4, 2, pp. 226-55.
    • (1998) European Journal of International Relations , vol.4 , Issue.2 , pp. 226-255
    • Huysmans, J.1
  • 287
    • 0032341575 scopus 로고    scopus 로고
    • Revisiting copenhagen: Or, on the creative development of a security studies agenda in europe
    • Huysmans, J. (1998b) 'Revisiting Copenhagen: Or, on the creative development of a security studies agenda in Europe', European Journal of International Relations, 4, 4, pp. 479-506.
    • (1998) European Journal of International Relations , vol.4 , Issue.4 , pp. 479-506
    • Huysmans, J.1
  • 288
    • 0007219152 scopus 로고    scopus 로고
    • The question of the limit: Desecuritization and the aesthetics of terrorism in political realism
    • Huysmans, J. (1998c) 'The question of the limit: Desecuritization and the aesthetics of terrorism in political realism', Millenium, 27, 3, pp. 569-89.
    • (1998) Millenium , vol.27 , Issue.3 , pp. 569-589
    • Huysmans, J.1
  • 289
    • 84911139602 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • ICSA Labs (2003) ICSA Labs 2002 Virus Prevalence Survey. Available online at www.icsalabs.com/icsa/docs/html/library/whitepapers/VPS2002.pdf (accessed 14 May 2007).
    • (2003) ICSA Labs 2002 Virus Prevalence Survey
  • 290
    • 85145535155 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • ICSA Labs (2004) ICSA Labs 2003 Virus Prevalence Survey. Available online at www.icsal- abs.com/icsa/docs/html/library/whitepapers/VPS2003.pdf (accessed 14 May 2007).
    • ICSA Labs 2003 Virus Prevalence Survey
  • 291
    • 84911161999 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • ICSA Labs (2005) ICSA Labs 2004 Virus Prevalence Survey. Available online at www.icsal- abs.com/icsa/docs/html/library/whitepapers/VPS2004.pdf (accessed 14 May 2007).
    • (2005) ICSA Labs 2004 Virus Prevalence Survey
  • 293
    • 84911047952 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • Ignatieff, M. (2004) Virus Report Status for 2004. Available online at www.ipa.go.jp/security/english/virus/press/200412/virus2004.html (accessed 14 May 2007).
    • (2004) Virus Report Status for 2004
    • Ignatieff, M.1
  • 294
    • 84911144697 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • Information Technology Promotion Agency IPA (2005) Virus Report Status for 2005. Available online at www.ipa.go.jp/security/english/virus/press/200512/virus2005.html (accessed 14 May 2007).
    • (2005) Virus Report Status for 2005
  • 296
    • 27944484713 scopus 로고    scopus 로고
    • Statement for the Record of Vice Admiral Lowell E. Jacoby, USN, Director, Defense Intelligence Agency before the Senate Select Committee on Intelligence, 11 February 2003
    • Jacoby, L. (2003) 'Current and Projected National Security Threats to the United States', Statement for the Record of Vice Admiral Lowell E. Jacoby, USN, Director, Defense Intelligence Agency before the Senate Select Committee on Intelligence, 11 February 2003.
    • (2003) Current and Projected National Security Threats to the United States
    • Jacoby, L.1
  • 298
    • 85145544507 scopus 로고    scopus 로고
    • NATO Spokesman and Major General Walter Jertz, SHAPE, 28 May 1999, updated 28 May 1999, NATO HQ, Brussels
    • Jertz, W. (1999) Major General Jertz at the Press Conference by Mr Jamie Shea, NATO Spokesman and Major General Walter Jertz, SHAPE, 28 May 1999, updated 28 May 1999, NATO HQ, Brussels.
    • (1999) Major General Jertz at the Press Conference by Mr Jamie Shea
    • Jertz, W.1
  • 301
    • 0000479685 scopus 로고
    • A methodology for frame analysis: From discourse to cognitive schemata
    • Johnston, H. and Klandermans, B, London: UCL Press
    • Johnston, H. (1995) 'A methodology for frame analysis: From discourse to cognitive schemata', in Johnston, H. and Klandermans, B. (eds) Social Movements and Culture, London: UCL Press.
    • (1995) Social Movements and Culture
    • Johnston, H.1
  • 302
    • 0003422576 scopus 로고    scopus 로고
    • Washington, DC: U.S. Department of Defense
    • Joint Chiefs of Staff (1996) Joint Vision 2010, Washington, DC: U.S. Department of Defense.
    • (1996) Joint Vision 2010
  • 305
    • 85145539770 scopus 로고
    • C4 architecture & integration division
    • Washington, DC: Joint Staff, 12 June 1992
    • Joint Staff (1992) C4 Architecture & Integration Division, C4I for the Warrior, Washington, DC: Joint Staff, 12 June 1992.
    • (1992) C4I for the Warrior
  • 312
    • 84911047950 scopus 로고
    • Presidential Memorandum, Washington, DC, 21 August 1963
    • Kennedy, J.F. (1963) National Communications System, Presidential Memorandum, Washington, DC, 21 August 1963.
    • (1963) National Communications System
    • Kennedy, J.F.1
  • 313
    • 11544251159 scopus 로고    scopus 로고
    • Power and interdependence in the information age
    • (September/October)
    • Keohane, R.O. and Nye, J.S. (1998) 'Power and interdependence in the information age', Foreign Affairs 77, 5 (September/October) pp. 81-94.
    • (1998) Foreign Affairs , vol.77 , Issue.5 , pp. 81-94
    • Keohane, R.O.1    Nye, J.S.2
  • 314
    • 84911047949 scopus 로고    scopus 로고
    • National security and information technology’
    • Senate, 12 October 1998, (accessed 14 May 2007)
    • Kerrey, B. (1998) 'National security and information technology', 1998 Congressional Debate, Senate, 12 October 1998. Available online at www.fas.org/irp/con-gress/1998_cr/s981012-info.htm (accessed 14 May 2007).
    • (1998) 1998 Congressional Debate
    • Kerrey, B.1
  • 318
    • 84937338220 scopus 로고    scopus 로고
    • Asymmetric threats to the united states
    • Kolet, K.S. (2001) 'Asymmetric Threats to the United States', Comparative Strategy, 20, 3, pp. 277-92.
    • (2001) Comparative Strategy , vol.20 , Issue.3 , pp. 277-292
    • Kolet, K.S.1
  • 320
    • 84911047947 scopus 로고    scopus 로고
    • Top cyber-security post is filled’
    • 18 September 2006, accessed 14 May 2007
    • Krebs, B. (2006) 'Top cyber-security post is filled', washingtonpost.com, 18 September 2006. Available online at www.washingtonpost.com/wp-dyn/content/article/2006/09/18/AR2006091800928.html (accessed 14 May 2007).
    • (2006) Washingtonpost.Com
    • Krebs, B.1
  • 321
    • 0002019292 scopus 로고
    • Cavalry to computer: The pattern of military revolutions
    • Krepinevich, A. (1994) 'Cavalry to computer: The pattern of military revolutions', The National Interest, 37, pp. 30-42.
    • (1994) The National Interest , vol.37 , pp. 30-42
    • Krepinevich, A.1
  • 322
    • 84911047946 scopus 로고    scopus 로고
    • The bush administration’s call for defense transformation: A congressional guide’
    • 19 Juni 2001. (accessed 14 May 2007)
    • Krepinevich, A. (2001) 'The Bush administration's call for defense transformation: A congressional guide', Center for Strategic and Budgetary Assessments, 19 Juni 2001. Available online at www.csbaonline.org/4Publications/Archive/H.20010619.The_Bush_Admin-istr/H.20010619.The_Bush_Administr.htm (accessed 14 May 2007).
    • (2001) Center for Strategic and Budgetary Assessments
    • Krepinevich, A.1
  • 323
    • 79961041598 scopus 로고    scopus 로고
    • The absolute protection of our citizens: Critical infrastructure protection and the practice of security’
    • Dunn Cavelty, M. and Kristensen, K.S, London: Routledge
    • Kristensen, K.S. (forthcoming 2008) '"The Absolute Protection of our Citizens": Critical Infrastructure Protection and the Practice of Security', in Dunn Cavelty, M. and Kristensen, K.S. (eds), The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, London: Routledge.
    • (2008) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation
    • Kristensen, K.S.1
  • 324
    • 84900155995 scopus 로고    scopus 로고
    • Information challenges to security
    • Krutskikh, A. (1999) 'Information challenges to security', International Affairs, 45, 2, pp. 29-37.
    • (1999) International Affairs , vol.45 , Issue.2 , pp. 29-37
    • Krutskikh, A.1
  • 326
    • 85145542003 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • Kuehl, D. 2000. Available online at www.iwar.org.uk/cip/resources/senate/economy/kuehl~1.htm (accessed 14 May 2007).
    • (2000)
    • Kuehl, D.1
  • 327
    • 84911047944 scopus 로고    scopus 로고
    • The information component of power and the national security strategy
    • Campen, A.D. and Dearth, D.H, Fairfax: AFCEA International Press
    • Kuehl, D. (2000b) 'The information component of power and the national security strategy', in Campen, A.D. and Dearth, D.H. (eds) Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, Fairfax: AFCEA International Press.
    • (2000) Cyberwar 3.0: Human Factors in Information Operations and Future Conflict
    • Kuehl, D.1
  • 330
    • 84911047943 scopus 로고    scopus 로고
    • Clinton gives a final foreign policy speech’
    • 9 December 2000
    • Lacey, M. (2000) 'Clinton gives a final foreign policy speech', New York Times, 9 December 2000.
    • (2000) New York Times
    • Lacey, M.1
  • 338
    • 84908962054 scopus 로고    scopus 로고
    • The small and the many
    • Arquilla, J. and Ronfeldt, D, Santa Monica, RAND
    • Libicki, M. (1997a) 'The small and the many', in Arquilla, J. and Ronfeldt, D. (eds) In Athena'sCamp: Preparing for Conflict in the Information Age, Santa Monica, RAND, pp. 191-216.
    • (1997) In Athena’s , pp. 191-216
    • Libicki, M.1
  • 339
    • 84911047942 scopus 로고    scopus 로고
    • Strategic Forum No. 132, Washington, DC, National Defense University
    • Libicki, M. (1997b) Information Dominance, Strategic Forum No. 132, Washington, DC, National Defense University.
    • (1997) Information Dominance
    • Libicki, M.1
  • 340
    • 41849110061 scopus 로고    scopus 로고
    • Mc Nair Paper 61, Washington, DC, National Defense University
    • Libicki, M. (1999) Illuminating Tomorrow's War, Mc Nair Paper 61, Washington, DC, National Defense University.
    • (1999) Illuminating Tomorrow’s War
    • Libicki, M.1
  • 342
    • 0012239890 scopus 로고    scopus 로고
    • Virtual risks in an age of cybernetic reproduction
    • Adam, B., Beck, U. and Loon, J. van, London: Sage
    • Loon, J. van (2000) 'Virtual risks in an age of cybernetic reproduction', in Adam, B., Beck, U. and Loon, J. van (eds) The Risk Society and Beyond: Critical Issues for Social Theory, London: Sage, pp. 165-82.
    • (2000) The Risk Society and Beyond: Critical Issues for Social Theory , pp. 165-182
    • Loon Van, J.1
  • 345
    • 0041927162 scopus 로고
    • War in the information age
    • Mahnken, T.G. (1995) 'War in the information age', Joint Force Quarterly, 10, pp. 39-43.
    • (1995) Joint Force Quarterly , vol.10 , pp. 39-43
    • Mahnken, T.G.1
  • 346
    • 84861124865 scopus 로고    scopus 로고
    • U.S. Cybersecurity chief resigns
    • Mark, R. (2004) 'U.S. cybersecurity chief resigns', eSecurity Planet, 1 October 2004.
    • (2004) Esecurity Planet
    • Mark, R.1
  • 347
    • 21244453393 scopus 로고    scopus 로고
    • Interdependencies with the information infrastructure: Dependability and complexity issues’
    • Ispra, 26-9 June 2001., (accessed 14 May 2007)
    • Masera, M. and Wilikens, M. (2001), 'Interdependencies with the information infrastructure: Dependability and complexity issues', unpublished paper, given at the 5th Inter-national Conference on Technology, Policy, and Innovation, Ispra, 26-9 June 2001. Available online at www.delft2001.tudelft.nl/paper%20files/paper1168.doc (accessed 14 May 2007).
    • (2001) Unpublished Paper, Given at the 5Th Inter-National Conference on Technology, Policy, and Innovation
    • Masera, M.1    Wilikens, M.2
  • 348
    • 84873710190 scopus 로고    scopus 로고
    • The security of information and communication systems and the e+i paradigm
    • Gheorghe, A.V., Masera, M., Weijnen, M.P.C. and de Vries, L.J, Dodrecht: Springer
    • Masera, M., Stefanini, A. and Dondossola, G. (2006) 'The security of information and communication systems and the E+I paradigm', in Gheorghe, A.V., Masera, M., Weijnen, M.P.C. and de Vries, L.J. (eds) Critical Infrastructures at Risk: Securing the European Electric Power System, Dodrecht: Springer, pp. 85-116.
    • (2006) Critical Infrastructures at Risk: Securing the European Electric Power System , pp. 85-116
    • Masera, M.1    Stefanini, A.2    Dondossola, G.3
  • 352
    • 0030546131 scopus 로고    scopus 로고
    • Identity and security: Buzan and the copenhagen school
    • McSweeney, B. (1996) 'Identity and security: Buzan and the Copenhagen school', Review of International Studies, 22, 1, pp. 81-93.
    • (1996) Review of International Studies , vol.22 , Issue.1 , pp. 81-93
    • McSweeney, B.1
  • 353
    • 21944452032 scopus 로고    scopus 로고
    • Durkheim and the copenhagen school: A response to buzan and wsver
    • McSweeney, B. (1998) 'Durkheim and the Copenhagen school: A response to Buzan and Wsver', Review of International Studies, 24, 1, pp. 137-40.
    • (1998) Review of International Studies , vol.24 , Issue.1 , pp. 137-140
    • McSweeney, B.1
  • 355
    • 84911047938 scopus 로고    scopus 로고
    • Suspect claims al qaeda hacked microsoft - expert
    • 17 December 2001
    • McWilliams, B. (2001) 'Suspect claims Al Qaeda hacked Microsoft - expert', Newsbytes, 17 December 2001.
    • (2001) Newsbytes
    • McWilliams, B.1
  • 356
    • 28844482932 scopus 로고
    • Metcalfes law: A network becomes more valuable as it reaches more users’
    • 2 October 1995
    • Metcalfe, B. (1995) 'Metcalfe's law: A network becomes more valuable as it reaches more users', Infoworld, 2 October 1995, p. 53.
    • (1995) Infoworld , pp. 53
    • Metcalfe, B.1
  • 357
    • 84911047937 scopus 로고    scopus 로고
    • Lessons from the military experience: The U.S. Military and the ir: The pitfalls of uneven adaptation
    • Copeland, Thomas E. (ed.), Carlisle: Strategic Studies Institute
    • Metz, S. (2000a) 'Lessons from the military experience: The U.S. military and the IR: The pitfalls of uneven adaptation', in Copeland, Thomas E. (ed.) The Information Revolution and National Security, Carlisle: Strategic Studies Institute, pp. 56-61.
    • (2000) The Information Revolution and National Security , pp. 56-61
    • Metz, S.1
  • 358
    • 84895207765 scopus 로고    scopus 로고
    • The next twist of the rma
    • Autumn
    • Metz, S. (2000b) 'The Next Twist of the RMA', Parameters, XXX, 3, Autumn, pp. 40-53.
    • (2000) Parameters , vol.30 , Issue.3 , pp. 40-53
    • Metz, S.1
  • 361
    • 14844333987 scopus 로고    scopus 로고
    • The concept of critical infrastructure protection (Cip)
    • Bailes, A. J. K. and Frommelt, I, Oxford University Press: Oxford
    • Metzger, J. (2004) 'The concept of critical infrastructure protection (CIP)', in Bailes, A. J. K. and Frommelt, I. (eds) Business and Security: Public-Private Sector Relationships in a New Security Environment, Oxford University Press: Oxford, pp. 197-209.
    • (2004) Business and Security: Public-Private Sector Relationships in a New Security Environment , pp. 197-209
    • Metzger, J.1
  • 362
    • 0007196466 scopus 로고    scopus 로고
    • The persistence of ‘emergence
    • Eve, R.A., Horsfall, S. and Lee, M.E, Thousand Oaks: Sage Publications
    • Mihata, K. (1997) 'The persistence of 'emergence', in Eve, R.A., Horsfall, S. and Lee, M.E. (eds) Chaos, Complexity, and Sociology: Myths, Models, and Theories, Thousand Oaks: Sage Publications, pp. 30-8.
    • (1997) Chaos, Complexity, and Sociology: Myths, Models, and Theories , pp. 30-38
    • Mihata, K.1
  • 364
    • 84911047936 scopus 로고    scopus 로고
    • Neuerausforderung für die rüstungskontrolle
    • 31 May 2000
    • Minkwitz, O. and Schöfbänker, G. (2000) 'Neuerausforderung für die Rüstungskontrolle', telepolis, 31 May 2000.
    • (2000) Telepolis
    • Minkwitz, O.1    Schöfbänker, G.2
  • 367
    • 0000793139 scopus 로고
    • Cramming more components onto integrated circuits
    • Moore, G.E. (1965) 'Cramming more components onto integrated circuits', Electronics, 38, 8, pp. 114-17.
    • (1965) Electronics , vol.38 , Issue.8 , pp. 114-117
    • Moore, G.E.1
  • 368
    • 85145520833 scopus 로고    scopus 로고
    • Congressional Research Report for Congress, RL30153, 10 February 2003, Washington, DC: Congressional Research Service
    • Moteff, J.D. (2003) Critical Infrastructures: Background, Policy, and Implementation, Congressional Research Report for Congress, RL30153, 10 February 2003, Washington, DC: Congressional Research Service.
    • (2003) Critical Infrastructures: Background, Policy, and Implementation
    • Moteff, J.D.1
  • 369
    • 85145535969 scopus 로고    scopus 로고
    • Congressional Research Report for Congress, RL33648, 14 September 2006, Washington, DC: Congressional Research Service
    • Moteff, J.D. (2006) Critical Infrastructure: The National Asset Database, Congressional Research Report for Congress, RL33648, 14 September 2006, Washington, DC: Congressional Research Service.
    • (2006) Critical Infrastructure: The National Asset Database
    • Moteff, J.D.1
  • 370
    • 85145512773 scopus 로고    scopus 로고
    • Congressional Research Report for Congress, RL30153, 13 March 2007, Washington, DC: Congressional Research Service
    • Moteff, J.D. (2007) Critical Infrastructures: Background, Policy, and Implementation, Congressional Research Report for Congress, RL30153, 13 March 2007, Washington, DC: Congressional Research Service.
    • (2007) Critical Infrastructures: Background, Policy, and Implementation
    • Moteff, J.D.1
  • 376
    • 14844288574 scopus 로고    scopus 로고
    • Ubiquitous insecurity? How to ‘hack it systems’
    • Näf, M. (2001) 'Ubiquitous insecurity? How to 'hack' IT systems', Information & Security: An International Journal, Volume 7, 2001, pp. 104-18.
    • (2001) Information & Security: An International Journal , vol.7 , Issue.2001 , pp. 104-118
    • Näf, M.1
  • 378
    • 79959545196 scopus 로고
    • Computer science and telecommunications board
    • Washington, DC: National Academy Press
    • National Academy of Sciences (1991) Computer science and telecommunications board, Computers at Risk: Safe Computing in the Information Age, Washington, DC: National Academy Press.
    • (1991) Computers at Risk: Safe Computing in the Information Age
  • 379
    • 85120390454 scopus 로고    scopus 로고
    • Rumsfeld’s roadmap to propaganda’
    • Posted 26 January 2006, (accessed 14 May 2007)
    • National Security Archive (2006) 'Rumsfeld's roadmap to propaganda', National Security Archive Electronic Briefing Book No. 177, Posted 26 January 2006. Available online at www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/index.htm (accessed 14 May 2007).
    • (2006) National Security Archive Electronic Briefing Book No. 177
  • 381
    • 84861109957 scopus 로고    scopus 로고
    • The crime of ‘interruption of computer services to authorized users’ have you ever heard of it?
    • (accessed 14 May 2007)
    • Nemerofsky, J. (2000) 'The crime of 'interruption of computer services to authorized users' Have you ever heard of it?' The Richmond Journal for Law and Technology, 6, 5. Available online at www.richmond.edu/jolt/v6i5/article2.html (accessed 14 May 2007).
    • (2000) The Richmond Journal for Law and Technology , vol.6 , Issue.5
    • Nemerofsky, J.1
  • 382
    • 84911148569 scopus 로고    scopus 로고
    • National infrastructure protection center, ‘terrorist interest in water supply and scada systems’
    • 30 January 2002
    • NIPC (2002) National infrastructure protection center, 'terrorist interest in water supply and SCADA systems', Information Bulletin 02-001, 30 January 2002.
    • (2002) Information Bulletin 02-001
  • 384
    • 0000692234 scopus 로고
    • Soft power
    • Nye, J.S. (1990) 'Soft power', Foreign Policy, 80, pp. 153-71.
    • (1990) Foreign Policy , vol.80 , pp. 153-171
    • Nye, J.S.1
  • 387
    • 84908912505 scopus 로고    scopus 로고
    • Americas information edge’
    • (March/April)
    • Nye, J.S. Jr. and Owens, W.A. (1996) 'America's information edge', Foreign Affairs (March/April), pp. 20-36.
    • (1996) Foreign Affairs , pp. 20-36
    • Nye, J.S.1    Owens, W.A.2
  • 389
    • 0039677161 scopus 로고
    • OTA-TCT-606, Washington, DC: US Government Printing Office
    • Office of Technology Assessment (1994) Information Security and Privacy in Network Environments, OTA-TCT-606, Washington, DC: US Government Printing Office.
    • (1994) Information Security and Privacy in Network Environments
  • 391
    • 0040081732 scopus 로고    scopus 로고
    • Rumsfelds defense vision’
    • O'Hanlon, M.E. (2002) 'Rumsfeld's defense vision', Survival, 44, 2, pp. 103-17.
    • (2002) Survival , vol.44 , Issue.2 , pp. 103-117
    • O’Hanlon, M.E.1
  • 392
    • 85145520240 scopus 로고    scopus 로고
    • Office of critical infrastructure protection and emergency preparedness, ‘al-qaida cyber capability’
    • 20 December 2001
    • OCIPEP (2001) Office of critical infrastructure protection and emergency preparedness, 'Al-Qaida cyber capability', Threat Analysis TA01-001, 20 December 2001.
    • (2001) Threat Analysis TA01-001
  • 393
    • 85145516877 scopus 로고    scopus 로고
    • Office of critical infrastructure protection and emergency preparedness, ‘threats to canada’s critical infrastructure’
    • 12 March 2003
    • OCIPEP (2003) Office of critical infrastructure protection and emergency preparedness, 'Threats to Canada's critical infrastructure', Threat Analysis TA03-001, 12 March 2003.
    • (2003) Threat Analysis TA03-001
  • 394
    • 84876196984 scopus 로고    scopus 로고
    • What a good idea: Frames and ideologies in social movements research
    • Oliver, P.E. and Johnston, H. (2000) 'What a good idea: Frames and ideologies in social movements research', Mobilization, 5, 1, pp. 37-54.
    • (2000) Mobilization , vol.5 , Issue.1 , pp. 37-54
    • Oliver, P.E.1    Johnston, H.2
  • 395
    • 0010559850 scopus 로고    scopus 로고
    • Executive orders and national emergencies: How presidents have come to “run the country by usurping legislative power’
    • No. 358, 28 October 1999., (accessed 14 May 2007)
    • Olson, W.J. and Woll, A. (1999) 'Executive orders and national emergencies: How presidents have come to "run the country" by usurping legislative power', Cato Policy Analysis, No. 358, 28 October 1999. Available online at www.cato.org/pubs/pas/pa-358es.html (accessed 14 May 2007).
    • (1999) Cato Policy Analysis
    • Olson, W.J.1    Woll, A.2
  • 396
    • 0004134327 scopus 로고
    • 2nd edn, New York: Alfred A. Knopf
    • Organski, A.F.K. (1968) World Politics, 2nd edn, New York: Alfred A. Knopf.
    • (1968) World Politics
    • Organski, A.F.K.1
  • 397
    • 0003777591 scopus 로고
    • The emerging system of systems
    • Owens, W.A. (1995) 'The emerging system of systems', Naval Institute Proceedings121, 5, pp. 35-9.
    • (1995) Naval Institute Proceedings , vol.121 , Issue.5 , pp. 35-39
    • Owens, W.A.1
  • 398
    • 84900040855 scopus 로고    scopus 로고
    • Historical impacts of information technologies: An overview
    • Alberts, D.S. and Papp, D.S, Washington, DC, National Defense University
    • Papp, D.S., Alberts, D.S., and Tuyahov, A. (1997) 'Historical impacts of information technologies: An overview', in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences, Washington, DC, National Defense University, pp. 13-35.
    • (1997) The Information Age: An Anthology of Its Impacts and Consequences , pp. 13-35
    • Papp, D.S.1    Alberts, D.S.2    Tuyahov, A.3
  • 399
    • 34249866520 scopus 로고
    • New York: Charles Scribner’s Sons
    • Parker, D.B. (1976) Crime by Computer, New York: Charles Scribner's Sons.
    • (1976) Crime by Computer
    • Parker, D.B.1
  • 401
    • 84888435925 scopus 로고
    • Computer-related white collar crime
    • Geis, G. and Stotland, E, Beverly Hills: Sage
    • Parker, D.B. (1980b) 'Computer-related white collar crime', in Geis, G. and Stotland, E. (eds) White Collar Crime: Theory and Research, Beverly Hills: Sage, pp. 199-220.
    • (1980) White Collar Crime: Theory and Research , pp. 199-220
    • Parker, D.B.1
  • 403
    • 0003994024 scopus 로고    scopus 로고
    • Washington, DC: US Government Printing Office
    • PCCIP, President's Commission on Critical Infrastructure Protection (1997) Critical Foundations: Protecting America's Infrastructures, Washington, DC: US Government Printing Office.
    • (1997) Critical Foundations: Protecting America’s Infrastructures
  • 406
    • 84911047926 scopus 로고    scopus 로고
    • Homeland defense: Threats and policies in transition’
    • 15 July 1998
    • Pollard, N.A. (1998) 'Homeland defense: Threats and policies in transition', Terrorism Research Center Newsletter, 15 July 1998.
    • (1998) Terrorism Research Center Newsletter
    • Pollard, N.A.1
  • 408
    • 84911047925 scopus 로고    scopus 로고
    • Feds still need to define role in tackling cyberterror, panelists say’
    • 15 May 2001, (accessed 14 May 2007)
    • Porteus, L. (2001) 'Feds still need to define role in tackling cyberterror, Panelists Say', govexec.com, 15 May 2001. Available online at www.govexec.com/dai-lyfed/0501/051501td.htm (accessed 14 May 2007).
    • (2001) Govexec.Com
    • Porteus, L.1
  • 409
    • 84861124878 scopus 로고    scopus 로고
    • Info war or electronic sabre rattling?
    • 8 September 1999, (accessed 14 May 2007)
    • Poulsen, K. (1999) 'Info war or electronic sabre rattling?' ZDNet, 8 September 1999. Available online at http://news.zdnet.com/2100-9595_22-515631.html?legacy=zdnn (accessed 14 May 2007).
    • (1999) Zdnet
    • Poulsen, K.1
  • 410
    • 84911047924 scopus 로고    scopus 로고
    • Official: Cyberterror fears missed real threat’
    • 31 July 2003, (accessed 14 May 2007)
    • Poulsen, K. (2003) 'Official: Cyberterror fears missed real threat', SecurityFocus.com, 31 July 2003. Available online at www.securityfocus.com/news/6589 (accessed 14 May 2007).
    • (2003) Securityfocus.Com
    • Poulsen, K.1
  • 411
    • 84911047923 scopus 로고    scopus 로고
    • Hack the hackers
    • 19 December 2000
    • Prasad, R.V. (2000) 'Hack the hackers', Hindustan Times, 19 December 2000.
    • (2000) Hindustan Times
    • Prasad, R.V.1
  • 412
    • 84911047922 scopus 로고    scopus 로고
    • Generation gap
    • 24 December 2001
    • Prasad, R.V. (2001) 'Generation gap', Hindustan Times, 24 December 2001.
    • (2001) Hindustan Times
    • Prasad, R.V.1
  • 418
    • 25844509285 scopus 로고    scopus 로고
    • Reflexive security: Nato and international risk society
    • Rasmussen, M.V. (2001) 'Reflexive security: Nato and international risk society', Millennium: Journal of International Studies, 30, 2, pp. 285-309.
    • (2001) Millennium: Journal of International Studies , vol.30 , Issue.2 , pp. 285-309
    • Rasmussen, M.V.1
  • 421
    • 84992931716 scopus 로고
    • Expected bank plot to fail’
    • 23 February 1979
    • Rawitch, R. (1979) 'Expected bank plot to fail', Los Angeles Times, 23 February 1979.
    • (1979) Los Angeles Times
    • Rawitch, R.1
  • 423
    • 24544447706 scopus 로고
    • Executive Order 12356, Washington, DC, 2 April 1982
    • Reagan, R. (1982a) National Security Information, Executive Order 12356, Washington, DC, 2 April 1982.
    • (1982) National Security Information
    • Reagan, R.1
  • 429
    • 84911055161 scopus 로고    scopus 로고
    • A mission to build on common challenges
    • 11 June 2001
    • Rice, C. (2001) 'A mission to build on common challenges', The Washington Times, 11 June 2001, p. A15.
    • (2001) The Washington Times , pp. A15
    • Rice, C.1
  • 431
    • 84911090389 scopus 로고    scopus 로고
    • National Security Archive Electronic Briefing Book No. 55, (accessed 14 May 2007)
    • Richelson, J. and Evans, M.L. (2001) Volume I: Terrorism and US Policy, National Security Archive Electronic Briefing Book No. 55, Available online at www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB55/index1.html (accessed 14 May 2007).
    • (2001) Volume I: Terrorism and US Policy
    • Richelson, J.1    Evans, M.L.2
  • 433
  • 434
    • 84911204000 scopus 로고    scopus 로고
    • Information warfare: An age old concept with new insights
    • Rona, T.P. (1996) 'Information warfare: An age old concept with new insights', Defense Intelligence Journal, 5, pp. 53-67.
    • (1996) Defense Intelligence Journal , vol.5 , pp. 53-67
    • Rona, T.P.1
  • 438
    • 0000242461 scopus 로고
    • Hacking away at the counterculture
    • Penley, C. and Ross, A, Minneapolis: University of Minnesotta Press
    • Ross, A. (1990) 'Hacking away at the counterculture', in Penley, C. and Ross, A. (eds) Technoculture, Minneapolis: University of Minnesotta Press, pp. 107-34.
    • (1990) Technoculture , pp. 107-134
    • Ross, A.1
  • 440
    • 84909012961 scopus 로고    scopus 로고
    • Comparing policy design across countries: What accounts for variation in art policy?
    • Bleiklie, I., Goggin, M. and Rothmayr, C, London: Routledge
    • Rothmayr, C., Varone, F., Serdult, U., Timmermans, A. and Bleiklie, I. (2003) 'Comparing policy design across countries: What accounts for variation in art policy?' in Bleiklie, I., Goggin, M. and Rothmayr, C. (eds) Comparative Biomedical Policy: A Cross-Country Comparison, London: Routledge, pp. 228-53.
    • (2003) Comparative Biomedical Policy: A Cross-Country Comparison , pp. 228-253
    • Rothmayr, C.1    Varone, F.2    Serdult, U.3    Timmermans, A.4    Bleiklie, I.5
  • 441
    • 0000804210 scopus 로고
    • Collective goods and future international collaboration
    • Ruggie, J. (1972) 'Collective goods and future international collaboration', American Political Science Review, 66, pp. 874-93.
    • (1972) American Political Science Review , vol.66 , pp. 874-893
    • Ruggie, J.1
  • 444
    • 0036563265 scopus 로고    scopus 로고
    • Transforming the military
    • Rumsfeld, D.H. (2002b) 'Transforming the military', Foreign Affairs, 81, 3, pp. 20-32.
    • (2002) Foreign Affairs , vol.81 , Issue.3 , pp. 20-32
    • Rumsfeld, D.H.1
  • 445
    • 54949083144 scopus 로고    scopus 로고
    • 30 October 2003, (accessed 14 May 2007)
    • Rumsfeld, D.H. (2003) (Original signed), Information Operations Roadmap, 30 October 2003. Available online at www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf (accessed 14 May 2007).
    • (2003) Information Operations Roadmap
    • Rumsfeld, D.H.1
  • 447
    • 0039983490 scopus 로고
    • An advocacy coalition framework of policy change and the role of policy-oriented learning therein
    • Sabatier, P. (1988) 'An advocacy coalition framework of policy change and the role of policy-oriented learning therein', Policy Sciences, 21, pp. 129-68.
    • (1988) Policy Sciences , vol.21 , pp. 129-168
    • Sabatier, P.1
  • 449
    • 0000816622 scopus 로고    scopus 로고
    • The advocacy coalition framework: An assessment
    • Sabatier, P.A. (ed.), Boulder: Westview Press
    • Sabatier, P.A. and Jenkins-Smith, H.C. (eds) (1999) 'The advocacy coalition framework: An assessment' in Sabatier, P.A. (ed.) Theories of the Policy Process, Boulder: Westview Press, pp. 117-68.
    • (1999) Theories of the Policy Process , pp. 117-168
    • Sabatier, P.A.1    Jenkins-Smith, H.C.2
  • 450
    • 0343576284 scopus 로고    scopus 로고
    • Colonizing cyberspace: ‘national security and the internet’
    • Weldes, J., Laffey, M., Gusterson, H. and Duvall, R, Minneapolis: University of Minnesota Press
    • Saco, D. (1999) 'Colonizing cyberspace: 'National Security' and the Internet', in Weldes, J., Laffey, M., Gusterson, H. and Duvall, R. (eds) Cultures of Insecurity. States, Communities, and the Production of Danger, Minneapolis: University of Minnesota Press, pp. 261-91.
    • (1999) Cultures of Insecurity. States, Communities, and the Production of Danger , pp. 261-291
    • Saco, D.1
  • 451
    • 84911047916 scopus 로고    scopus 로고
    • Captain dragans serbian cybercops. How milosevic took the internet battlefield’
    • 10 May 1999
    • Satchell, M. (1999) 'Captain Dragan's serbian cybercops. How Milosevic took the Internet battlefield', U.S. News, 10 May 1999.
    • (1999) U.S. News
    • Satchell, M.1
  • 453
    • 0033422567 scopus 로고    scopus 로고
    • Framing as a theory of media effects
    • Scheufele, D.A. (1999) 'Framing as a theory of media effects', Journal of Communication, 49, 1, pp. 103-22.
    • (1999) Journal of Communication , vol.49 , Issue.1 , pp. 103-122
    • Scheufele, D.A.1
  • 455
    • 84911047915 scopus 로고
    • An overview of executive order 12356
    • 3, June 1982
    • Schroeder, G.A. (1982) 'An overview of executive order 12356', FOIA Update, III, 3, June 1982.
    • (1982) FOIA Update , vol.3
    • Schroeder, G.A.1
  • 459
    • 84911047913 scopus 로고    scopus 로고
    • Computer network system at risk for terrorism
    • 13 September 2001
    • Schwartz, J. (2001) 'Computer network system at risk for terrorism', USA Today, 13 September 2001.
    • (2001) USA Today
    • Schwartz, J.1
  • 462
    • 84900256974 scopus 로고    scopus 로고
    • Infowar part of nato arsenal?
    • 25 March 1999, (accessed 14 May 2007)
    • Seminerio, M. (1999) 'Infowar part of NATO arsenal?' ZDNet, 25 March 1999. Available online at www.zdnet.com/zdnn/stories/news/0,4586,2231976,00.html (accessed 14 May 2007).
    • (1999) Zdnet
    • Seminerio, M.1
  • 466
    • 85145531092 scopus 로고    scopus 로고
    • Congressional Research Report for Congress, RL31534, 21 February 2003, Washington, DC: Congressional Research Service
    • Shea, D.A. (2003) Critical Infrastructure: Control Systems and the Terrorist Threat.Congressional Research Report for Congress, RL31534, 21 February 2003, Washington, DC: Congressional Research Service.
    • (2003) Critical Infrastructure: Control Systems and the Terrorist Threat
    • Shea, D.A.1
  • 472
    • 0346131469 scopus 로고    scopus 로고
    • COMCRIME-study prepared for the European Commission, 1 January 1998, (accessed 14 May 2007)
    • Sieber, U. (1998) Legal Aspects of Computer Related Crime in the Information Society, COMCRIME-study prepared for the European Commission, 1 January 1998. Available online at http://europa.eu.int/ISPO/legal/en/comcrime/sieber.doc (accessed 14 May 2007).
    • (1998) Legal Aspects of Computer Related Crime in the Information Society
    • Sieber, U.1
  • 473
    • 0001792116 scopus 로고
    • Capability distribution, uncertainty, and major power war, 1820-1965
    • Russett, B. (ed.), Beverly Hills, Sage Publications
    • Singer, D.J., Bremer, S. and Stuckey, J. (1972) 'Capability distribution, uncertainty, and major power war, 1820-1965', in Russett, B. (ed.) Peace, War, and Numbers, Beverly Hills, Sage Publications, pp. 21-7.
    • (1972) Peace, War, and Numbers , pp. 21-27
    • Singer, D.J.1    Bremer, S.2    Stuckey, J.3
  • 475
    • 34248055443 scopus 로고    scopus 로고
    • Changes to european security in a communicative perspective
    • Sjursen, H. (2004). "Changes to European security in a communicative perspective," Cooperation and Conflict, 39, 2: 107-128.
    • (2004) Cooperation and Conflict , vol.39 , Issue.2 , pp. 107-128
    • Sjursen, H.1
  • 476
    • 3142674166 scopus 로고    scopus 로고
    • Force, pre-emption and legitimacy
    • Slocombe, W.B. (2003) 'Force, pre-emption and legitimacy', Survival, 45, 1, pp. 117-30.
    • (2003) Survival , vol.45 , Issue.1 , pp. 117-130
    • Slocombe, W.B.1
  • 477
    • 0032148572 scopus 로고    scopus 로고
    • An electronic pearl harbor? Not likely
    • 15, Fall 1998
    • Smith, G. (1998) 'An electronic Pearl Harbor? Not likely', Issues in Science and Technology, 15, Fall 1998.
    • (1998) Issues in Science and Technology
    • Smith, G.1
  • 478
    • 84911047907 scopus 로고    scopus 로고
    • Electronic pearl harbor: A slogan for U.S. Info-Warriors’
    • (accessed 14 May 2007)
    • Smith, G. (1999a) 'Electronic Pearl Harbor: A slogan for U.S. info-warriors', Crypt Newsletter. Available online at www.soci.niu.edu/~crypt/other/harbor.htm (accessed 14 May 2007).
    • (1999) Crypt Newsletter
    • Smith, G.1
  • 479
    • 84911047906 scopus 로고    scopus 로고
    • The meaning of eligible receiver’
    • (accessed 14 May 2007)
    • Smith, G. (1999b) 'The meaning of eligible receiver', Crypt Newsletter. Available online at www.soci.niu.edu/~crypt/other/eligib.htm (accessed 14 May 2007).
    • (1999) Crypt Newsletter
    • Smith, G.1
  • 480
    • 84861116751 scopus 로고    scopus 로고
    • How vulnerable is our interlinked infrastructure?
    • Alberts, D.S. and Papp, D.S, Washington, DC: National Defense University Press
    • Smith, G. (2000) 'How vulnerable is our interlinked infrastructure?' in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences(Vol. II), Washington, DC: National Defense University Press, pp. 507-23.
    • (2000) The Information Age: An Anthology of Its Impacts and Consequences , vol.2 , pp. 507-523
    • Smith, G.1
  • 484
    • 84936824416 scopus 로고
    • Ideology, frame resonance, and participant mobilization
    • Snow, D.A. and Benford, R.D. (1988) 'Ideology, frame resonance, and participant mobilization', Social Movement Research 1, pp. 197-217.
    • (1988) Social Movement Research , vol.1 , pp. 197-217
    • Snow, D.A.1    Benford, R.D.2
  • 485
    • 0002266033 scopus 로고
    • Master frames and cycles of protest
    • Morris, A.D. and McClurg Mueller, C, New Haven: Yale University Press
    • Snow, D.A. and Benford, R.D. (1992) 'Master frames and cycles of protest', in Morris, A.D. and McClurg Mueller, C. (eds) Frontiers in Social Movement Theory, New Haven: Yale University Press, pp. 133-55.
    • (1992) Frontiers in Social Movement Theory , pp. 133-155
    • Snow, D.A.1    Benford, R.D.2
  • 486
    • 84936823726 scopus 로고
    • Frame alignment processes, micromobilization and movement participation
    • Snow, D.A., Rocheford, E.B., Worden, S.K., and Benford, R.D. (1986), 'Frame alignment processes, micromobilization and movement participation', American Sociological Review, 51, 4, pp. 464-81.
    • (1986) American Sociological Review , vol.51 , Issue.4 , pp. 464-481
    • Snow, D.A.1    Rocheford, E.B.2    Worden, S.K.3    Benford, R.D.4
  • 487
    • 84911180124 scopus 로고    scopus 로고
    • The information revolution and international conflict management’
    • Keynote address from the virtual diplomacy conference, June 1997, (accessed 14 May 2007)
    • Solomon, R.H. (1997) 'The information revolution and international conflict management', USIP Peaceworks, Keynote address from the virtual diplomacy conference, June 1997. Available online at www.usip.org/pubs/peaceworks/virtual18/ inforev_18.html (accessed 14 May 2007).
    • (1997) USIP Peaceworks
    • Solomon, R.H.1
  • 493
    • 0035826155 scopus 로고    scopus 로고
    • Exploring complex networks
    • 8 March, 2001
    • Strogatz, S.H. (2001) 'Exploring complex networks', Nature, 410, 8 March, 2001, pp. 268-76.
    • (2001) Nature , vol.410 , pp. 268-276
    • Strogatz, S.H.1
  • 494
    • 9244265858 scopus 로고
    • Coping with structural security threats
    • Holl, O. (ed.), Wien: Braumuller
    • Sundelius, B. (1983) 'Coping with structural security threats', in Holl, O. (ed.) Small States in Europe and Dependence, Wien: Braumuller.
    • (1983) Small States in Europe and Dependence
    • Sundelius, B.1
  • 495
    • 60449116450 scopus 로고    scopus 로고
    • Improving information security in companies: How to meet the need for threat information
    • Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F, Aldershot: Ashgate
    • Suter, M. (2007), 'Improving information security in companies: How to meet the need for threat information', in Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F. (eds) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, Aldershot: Ashgate.
    • (2007) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
    • Suter, M.1
  • 496
    • 84936823493 scopus 로고
    • Culture in action: Symbols and strategies
    • Swidler, A. (1986) 'Culture in action: Symbols and strategies', American Sociological Review, 51, 4, pp. 273-86.
    • (1986) American Sociological Review , vol.51 , Issue.4 , pp. 273-286
    • Swidler, A.1
  • 497
    • 0002687884 scopus 로고
    • Cultural power and social movements
    • Johnston, H. and Klandermans, B, London: UCL Press
    • Swidler, A. (1995) 'Cultural power and social movements', in Johnston, H. and Klandermans, B. (eds) Social Movements and Culture, London: UCL Press, pp. 25-40.
    • (1995) Social Movements and Culture , pp. 25-40
    • Swidler, A.1
  • 499
    • 84911047905 scopus 로고    scopus 로고
    • Uk: Partisans wage virtual war
    • 22 April 1999
    • Taylor, R. (1999) 'UK: Partisans wage virtual war', The Guardian, 22 April 1999.
    • (1999) The Guardian
    • Taylor, R.1
  • 500
    • 34547283925 scopus 로고    scopus 로고
    • Institute for Security Technology Studies, Darthmouth College, (accessed 14 May 2007)
    • Technical Analysis Group (2003) Examining the Cyber Capabilities of Islamic Terrorist Groups, Institute for Security Technology Studies, Darthmouth College. Available online at www.ists.dartmouth.edu/TAG/ITB/ITB_032004.pdf (accessed 14 May 2007).
    • (2003) Examining the Cyber Capabilities of Islamic Terrorist Groups
  • 502
    • 84911047901 scopus 로고    scopus 로고
    • Vulnerabilities of the national information infrastructure
    • 24 June 1998
    • Tenet, G.J. (1998) 'Vulnerabilities of the National Information Infrastructure', Testimony byDirector of Central Intelligence George J. Tenet Before the Senate Committee on Government Affairs Hearing, 24 June 1998.
    • (1998) Testimony By
    • Tenet, G.J.1
  • 505
    • 22144447285 scopus 로고    scopus 로고
    • Worldwide threat - converging dangers in a post 9/11 world
    • 19 March 2002
    • Tenet, G.J. (2002) 'Worldwide threat - Converging dangers in a post 9/11 world', Testimony ofthe Director of Central Intelligence Before the Senate Armed Services Committee, 19 March 2002.
    • (2002) Testimony Of
    • Tenet, G.J.1
  • 507
    • 0003934786 scopus 로고
    • New York: Bantam Books
    • Toffler, A. (1970) Future Shock, New York: Bantam Books.
    • (1970) Future Shock
    • Toffler, A.1
  • 508
    • 0003973972 scopus 로고
    • New York: Bantam Books
    • Toffler, A. (1980) Third Wave, New York: Bantam Books.
    • (1980) Third Wave
    • Toffler, A.1
  • 509
    • 0003749035 scopus 로고
    • New York: Bantam Books
    • stCentury, New York: Bantam Books.
    • (1981) St
    • Toffler, A.1
  • 514
    • 0242381404 scopus 로고
    • Washington, DC: Department of the United States Air Force
    • United States Air Force (1995), Cornerstones of Information Warfare, Washington, DC: Department of the United States Air Force.
    • (1995) Cornerstones of Information Warfare
  • 515
    • 84900235142 scopus 로고    scopus 로고
    • (accessed 14 May 2007)
    • United States Joint Forces Command USJFCOM (2004) United States Joint Forces Command USJFC Glossary. Available online at www.jfcom.mil/about/glossary.htm (accessed 14 May 2007).
    • (2004) United States Joint Forces Command USJFC Glossary
  • 516
    • 84911047893 scopus 로고    scopus 로고
    • Security in cyberspace’
    • 5 June 1996, (accessed 14 May 2007)
    • US Senate Permanent Subcommittee on Investigations USSPSI (1996) 'Security in cyberspace', US Senate Permanent Subcommittee on Investigations, Minority Staff Statement, 5 June 1996. Available online at www.fas.org/irp/congress/1996_hr/s960605b.htm (accessed 14 May 2007).
    • (1996) US Senate Permanent Subcommittee on Investigations, Minority Staff Statement
  • 519
    • 84911047887 scopus 로고    scopus 로고
    • Nipc cyber threat assessment
    • 6 October 1999
    • Vatis, M.A. (1999) 'NIPC cyber threat assessment', Statement for the Record of Michael A.Vatis, Director, National Infrastructure Protection Center Federal Bureau of Investigation Before the Senate Judiciary Committee, Subcommittee on Technology and Terrorism, 6 October 1999.
    • (1999) Statement for the Record of Michael A
    • Vatis, M.A.1
  • 521
    • 84911084727 scopus 로고    scopus 로고
    • Nation’s cybersecurity chief abruptly quits dhs post: ‘i’m not a longterm government kind of guy’, says amit yoran’
    • 1 October 2004. (accessed 14 May 2007)
    • Verton, D. (2004) 'Nation's cybersecurity chief abruptly quits DHS post: 'I'm not a longterm government kind of guy', says Amit Yoran', Computerworld, 1 October 2004. Available online at www.computerworld.com/printthis/2004/0,4814,96369,00.html (accessed 14 May 2007).
    • (2004) Computerworld
    • Verton, D.1
  • 522
    • 84857940178 scopus 로고
    • Speed and information: Cyberspace alarm!
    • 18 March 1995
    • Virilio, P. (1995) 'Speed and information: Cyberspace alarm!', Ctheory, 18 March 1995.
    • (1995) Ctheory
    • Virilio, P.1
  • 523
    • 84886557365 scopus 로고    scopus 로고
    • Cyberwar and sabotage’
    • Vistica, G.L. (1999) 'Cyberwar and sabotage', Newsweek, 31 May 1999, p. 22.
    • (1999) Newsweek , vol.31 , pp. 22
    • Vistica, G.L.1
  • 524
    • 0001491868 scopus 로고
    • Securitization and desecuritization
    • Lipschutz, Ronnie (ed.), New York: Columbia University Press
    • Wsver, O. (1995) 'Securitization and desecuritization', in Lipschutz, Ronnie (ed.) On Security, New York: Columbia University Press, pp. 46-86.
    • (1995) On Security , pp. 46-86
    • Wsver, O.1
  • 525
    • 34249984253 scopus 로고    scopus 로고
    • unpublished paper, presented at the annual meeting of the British International Studies Association in London, 16-18 December 2002
    • Wsver, O. (2002) 'Security: A conceptual history for international relations', unpublished paper, presented at the annual meeting of the British International Studies Association in London, 16-18 December 2002.
    • (2002) Security: A Conceptual History for International Relations
    • Wsver, O.1
  • 528
    • 84900159024 scopus 로고    scopus 로고
    • Is there an information revolution?
    • Henry, C.R. and Peartree, E.C, Washington, DC, Center for Strategic and International Studies Press
    • Waldrop, M.M. (1998) 'Is there an information revolution?' in Henry, C.R. and Peartree, E.C. (eds) Information Revolution and International Security, Washington, DC, Center for Strategic and International Studies Press, pp. 1-9.
    • (1998) Information Revolution and International Security , pp. 1-9
    • Waldrop, M.M.1
  • 530
    • 84911168930 scopus 로고    scopus 로고
    • Internet as weapon: Experts fear terrorists may attack through cyberspace
    • 16 September 2002
    • Wallace, C. (2002) 'Internet as weapon: Experts fear terrorists may attack through cyberspace', ABC News.com, 16 September 2002.
    • (2002) ABC News.Com
    • Wallace, C.1
  • 531
    • 0001475720 scopus 로고
    • The renaissance of security studies
    • Walt, S.M. (1991) 'The renaissance of security studies', International Studies Quarterly, 35, 2, pp. 211-39.
    • (1991) International Studies Quarterly , vol.35 , Issue.2 , pp. 211-239
    • Walt, S.M.1
  • 535
    • 84900039059 scopus 로고    scopus 로고
    • What information society?
    • Papp, D.S. and Alberts, D.S, Washington, DC: National Defense University Press
    • Webster, F. (1997) 'What information society?' in Papp, D.S. and Alberts, D.S. (eds) TheInformation Age: An Anthology on Its Impact and Consequences, Vol. I, Washington, DC: National Defense University Press, pp. 51-71.
    • (1997) The , vol.1 , pp. 51-71
    • Webster, F.1
  • 536
    • 16344367669 scopus 로고    scopus 로고
    • Www.Terror.Net. How modern terrorism uses the internet’
    • March 2004, Washington, DC: United States Institute of Peace, (accessed 14 May 2007)
    • Weimann, G. (2004a) 'www.terror.net. How modern terrorism uses the internet', United States Institute of Peace, Special Report 116, March 2004, Washington, DC: United States Institute of Peace. Available online at www.usip.org/pubs/specialreports/sr116.pdf (accessed 14 May 2007).
    • (2004) United States Institute of Peace, Special Report 116
    • Weimann, G.1
  • 537
    • 68249109477 scopus 로고    scopus 로고
    • United States Institute of Peace, special report 119, May 2004, Washington, DC: United States Institute of Peace., (accessed 14 May 2007)
    • Weimann, G. (2004b) 'Cyberterrorism - how real is the threat?' United States Institute of Peace, special report 119, May 2004, Washington, DC: United States Institute of Peace. Available online at www.usip.org/pubs/specialreports/sr119.pdf (accessed 14 May 2007).
    • (2004) Cyberterrorism - How Real is the Threat?
    • Weimann, G.1
  • 540
    • 84911047884 scopus 로고    scopus 로고
    • Threat posed by electromagnetic pulse (Emp) to us military systems and civil infrastructure’
    • Washington, DC, 16 July 1997., (accessed 14 May 2007)
    • Weldon, C. (1997) 'Threat posed by electromagnetic pulse (EMP) to US military systems and civil infrastructure', House of Representatives, Committee on National Security, Military Research and Development Subcommittee, Washington, DC, 16 July 1997. Available online at www.fas.org/spp/starwars/congress/1997_h/has197010_1.htm (accessed 14 May 2007).
    • (1997) House of Representatives, Committee on National Security, Military Research and Development Subcommittee
    • Weldon, C.1
  • 541
    • 84972442822 scopus 로고
    • Anarchy is what states make of it: The social construction of power politics
    • Wendt, A. (1992) 'Anarchy is what states make of it: The social construction of power politics', International Organization, 46, 2, pp. 391-425.
    • (1992) International Organization , vol.46 , Issue.2 , pp. 391-425
    • Wendt, A.1
  • 544
    • 0007319392 scopus 로고    scopus 로고
    • COPRI Working Paper 27, Copenhagen: Copenhagen Peace Research Institute
    • Werner, W. (1998) Securitisation and Legal Theory, COPRI Working Paper 27, Copenhagen: Copenhagen Peace Research Institute.
    • (1998) Securitisation and Legal Theory
    • Werner, W.1
  • 546
    • 84911047881 scopus 로고    scopus 로고
    • Office of the press secretary, Washington, DC: The White House, 16 September 1999
    • White House (1999) 'Fact sheet on encryption export policy', Office of the press secretary, Washington, DC: The White House, 16 September 1999.
    • (1999) Fact Sheet on Encryption Export Policy
  • 548
    • 84911024923 scopus 로고    scopus 로고
    • Office of the press secretary, Washington, DC: The White House, 9 October 2001
    • White House (2001b) 'Fact sheet on new counter-terrorism and cyberspace positions', Office of the press secretary, Washington, DC: The White House, 9 October 2001.
    • (2001) Fact Sheet on New Counter-Terrorism and Cyberspace Positions
  • 549
    • 0006752541 scopus 로고    scopus 로고
    • Des Moines/Iowa, Office of the press secretary, Washington, DC: The White House, 8 June 2001
    • White House (2001c) 'Remarks by the president in tax celebration event', Des Moines/Iowa, Office of the press secretary, Washington, DC: The White House, 8 June 2001.
    • (2001) Remarks by the President in Tax Celebration Event
  • 552
    • 0348162309 scopus 로고    scopus 로고
    • Words, images, enemies: Securitisation and international politics
    • Williams, M.C. (2003) 'Words, images, enemies: Securitisation and international politics', International Studies Quarterly, 47, 4, pp. 511-31.
    • (2003) International Studies Quarterly , vol.47 , Issue.4 , pp. 511-531
    • Williams, M.C.1
  • 553
    • 85145527761 scopus 로고    scopus 로고
    • CRS Report for Congress, Congressional research report for Congress, RL32114, 17 October 2003, Washington, DC: Congressional Research Service
    • Wilson, C. (2003) Computer Attack and Cyber-Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, Congressional research report for Congress, RL32114, 17 October 2003, Washington, DC: Congressional Research Service.
    • (2003) Computer Attack and Cyber-Terrorism: Vulnerabilities and Policy Issues for Congress
    • Wilson, C.1
  • 556
    • 33746652460 scopus 로고    scopus 로고
    • Trust and terror: The vulnerability of complex socio-technical systems
    • June
    • Winner, L. (2004) 'Trust and terror: The vulnerability of complex socio-technical systems', Science as Culture, 13, 2, June, pp. 155-72.
    • (2004) Science as Culture , vol.13 , Issue.2 , pp. 155-172
    • Winner, L.1
  • 557
    • 0000212672 scopus 로고
    • The delicate balance of terror
    • Wohlstetter, A. (1959) 'The delicate balance of terror', Foreign Affairs, 37, 2, pp. 211-34.
    • (1959) Foreign Affairs , vol.37 , Issue.2 , pp. 211-234
    • Wohlstetter, A.1
  • 558
    • 85044900266 scopus 로고
    • Nuclear sharing: Nato and the n+1 country
    • Wohlstetter, A. (1961) 'Nuclear sharing: NATO and the N+1 country', Foreign Affairs, 39, 3, pp. 355-87.
    • (1961) Foreign Affairs , vol.39 , Issue.3 , pp. 355-387
    • Wohlstetter, A.1
  • 559
    • 84900173755 scopus 로고    scopus 로고
    • 22 June 1999, (accessed 14 May 2007)
    • Wolfe, F. (1999) 'Pentagon analyzing serb attacks on DoD web sites', www.infowar.com, 22 June 1999. Available online at www.tla.ch/TLA/NEWS/1999sec/19990622serb.htm (accessed 14 May 2007).
    • (1999) Pentagon Analyzing Serb Attacks on Dod Web sites’
    • Wolfe, F.1
  • 563
    • 0002241119 scopus 로고
    • Values in the policy process
    • Young, K. (1977) 'Values in the policy process', Policy and Politics, 5, 3, pp. 1-22.
    • (1977) Policy and Politics , vol.5 , Issue.3 , pp. 1-22
    • Young, K.1
  • 565
    • 0002008933 scopus 로고
    • The decaying pillars of the westphalian temple: Implications for international order and governance
    • Rosenau, J. N. and Czempiel, E.-O, Cambridge Studies in International Relations Nr. 20, Cambridge: Cambridge University Press
    • Zacher, M.W. (1992) 'The decaying pillars of the Westphalian Temple: Implications for international order and governance', in Rosenau, J. N. and Czempiel, E.-O. (eds) Governance Without Government: Order and Change in World Politics, Cambridge Studies in International Relations Nr. 20, Cambridge: Cambridge University Press, pp. 58-101.
    • (1992) Governance without Government: Order and Change in World Politics , pp. 58-101
    • Zacher, M.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.