-
2
-
-
0031232154
-
Seizing the middle ground: Constructivism in world politics
-
Adler, E. (1997) 'Seizing the middle ground: Constructivism in world politics', European Journal of International Relations, 3, 3, pp. 319-63.
-
(1997)
European Journal of International Relations
, vol.3
, Issue.3
, pp. 319-363
-
-
Adler, E.1
-
4
-
-
84972279328
-
Conclusion: Epistemic communities, world order, and the creation of a reflective research program
-
Adler, E. and Haas, P.M. (1992) 'Conclusion: Epistemic communities, world order, and the creation of a reflective research program', International Organization, 46, 1, pp. 367-90.
-
(1992)
International Organization
, vol.46
, Issue.1
, pp. 367-390
-
-
Adler, E.1
Haas, P.M.2
-
5
-
-
84911048110
-
-
Kelly Air Force Base, Texas: US Government Printing Office
-
Air Force Information Warfare Center (1995) A Technical Analysis of the Rome Laboratory Attacks, Kelly Air Force Base, Texas: US Government Printing Office.
-
(1995)
A Technical Analysis of the Rome Laboratory Attacks
-
-
-
6
-
-
14244270586
-
The regulation of internet content in europe: Governance control versus self-responsibility
-
Akdeniz, Yaman (1999) 'The regulation of Internet content in Europe: Governance control versus self-responsibility', Swiss Political Science Review, 5, 2, pp. 123-31.
-
(1999)
Swiss Political Science Review
, vol.5
, Issue.2
, pp. 123-131
-
-
Akdeniz, Y.1
-
10
-
-
84861145051
-
The technologies of the information revolution
-
Alberts, D.S. and Papp, D.S, Washington, DC: National Defense University Press
-
Alberts, D.S., Papp, D.S. and Kemp III, W.T. (1997) 'The technologies of the information revolution', in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences (Vol. I), Washington, DC: National Defense University Press, pp. 36-50.
-
(1997)
The Information Age: An Anthology of Its Impacts and Consequences
, vol.1
, pp. 36-50
-
-
Alberts, D.S.1
Papp, D.S.2
Kemp, I.3
-
11
-
-
84911048106
-
Out of the info loop: Why information networks are crucial to modern warfare’
-
June 2004, (accessed 14 May 2007)
-
Alexander, B. (2004) 'Out of the info loop: Why information networks are crucial to modern warfare', Reason, June 2004. Available online at www.reason.com/0406/cr.ba.out.shtml (accessed 14 May 2007).
-
(2004)
Reason
-
-
Alexander, B.1
-
13
-
-
84925838576
-
Why information security is hard: An economic perspective
-
IEEE Computer Society (ed.), Washington, DC: IEEE Computer Society
-
Andersson, R. (2001) 'Why information security is hard: An economic perspective', in IEEE Computer Society (ed.), Proceedings of the 17th Annual Computer Security Applications Conference, Washington, DC: IEEE Computer Society, pp. 358-65.
-
(2001)
Proceedings of the 17Th Annual Computer Security Applications Conference
, pp. 358-365
-
-
Andersson, R.1
-
14
-
-
0035672321
-
From war fighting to crime fighting: Transforming the american national security state
-
Andreas, P. and Price, R. (2001) 'From war fighting to crime fighting: Transforming the American national security state', International Studies Review, 3, 3, pp. 31-52.
-
(2001)
International Studies Review
, vol.3
, Issue.3
, pp. 31-52
-
-
Andreas, P.1
Price, R.2
-
15
-
-
12244306014
-
-
Indiana: Sams Publishing
-
Anonymous (2003) Maximum Security, Indiana: Sams Publishing.
-
(2003)
Maximum Security
-
-
Anonymous1
-
16
-
-
28344435231
-
Epistemic communities, epistemes and the construction of (World) politics
-
Antoniades, A. (2003) 'Epistemic communities, epistemes and the construction of (world) politics', Global Society, 17, 1, pp. 21-38.
-
(2003)
Global Society
, vol.17
, Issue.1
, pp. 21-38
-
-
Antoniades, A.1
-
17
-
-
31144455232
-
Migration: The spiral of (in)security’
-
March 2001, (accessed 14 May 2007)
-
Aradau, C. (2001a), 'Migration: The spiral of (in)security', Rubikon, March 2001. Available online at http://venus.ci.uw.edu.pl/~rubikon/forum/claudia1.htm (accessed 14 May 2007).
-
(2001)
Rubikon
-
-
Aradau, C.1
-
18
-
-
84861178583
-
Beyond good and evil: Ethics and securitization/desecuritization techniques
-
December 2001, (accessed 14 May 2007)
-
Aradau, C. (2001b) 'Beyond good and evil: Ethics and securitization/desecuritization techniques', Rubikon, December 2001. Available online at http://venus.ci.uw.edu.pl/~rubikon/forum/claudia2.htm (accessed 14 May 2007).
-
(2001)
Rubikon
-
-
Aradau, C.1
-
23
-
-
0012658669
-
Cyberwar is coming!
-
Arquilla, J. and Ronfeldt, D.F, Santa Monica: RAND
-
Arquilla, J. and Ronfeldt, D.F. (1997b) 'Cyberwar is coming!', in Arquilla, J. and Ronfeldt, D.F. (eds) In Athena'sCamp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 23-60.
-
(1997)
In Athena’s
, pp. 23-60
-
-
Arquilla, J.1
Ronfeldt, D.F.2
-
30
-
-
0009892346
-
-
Monday, 29 March 1999. Presenter: Mr. Kenneth H. Bacon, ASD PA, Washington, DC, Department of Defense, (accessed 14 May 2007)
-
Bacon, K.H. (1999) 'DoD news briefing', Monday, 29 March 1999. Presenter: Mr. Kenneth H. Bacon, ASD PA, Washington, DC, Department of Defense. Available online at www.defenselink.mil/transcripts/transcript.aspx?transcriptid=645 (accessed 14 May 2007).
-
(1999)
Dod News briefing’
-
-
Bacon, K.H.1
-
31
-
-
0021201312
-
Attacks on computers: Congressional hearings and pending legislation
-
Oakland: IEEE Computer Society Press
-
Bailey, D. (1984) 'Attacks on computers: Congressional hearings and pending legislation', in Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland: IEEE Computer Society Press, pp. 180-7.
-
(1984)
Proceedings of the 1984 IEEE Symposium on Security and Privacy
, pp. 180-187
-
-
Bailey, D.1
-
32
-
-
0036845060
-
Governing the internet: Engaging government, business, and nonprofits
-
Baird, Z. (2002) 'Governing the Internet: Engaging government, business, and nonprofits', Foreign Affairs, 81, 6, pp. 15-20.
-
(2002)
Foreign Affairs
, vol.81
, Issue.6
, pp. 15-20
-
-
Baird, Z.1
-
33
-
-
84894915732
-
Counterforce targeting: How new?, how viable?
-
Ball, D. (1981) 'Counterforce targeting: How new?, How viable?' Arms Control Today, 2, 2, pp. 1-6.
-
(1981)
Arms Control Today
, vol.2
, Issue.2
, pp. 1-6
-
-
Ball, D.1
-
34
-
-
54949135829
-
The man who sold the war: Meet john rendon, bush’s general in the propaganda war
-
17 November 2005, (accessed 14 May 2007)
-
Bamford, J. (2005), 'The man who sold the war: Meet John Rendon, Bush's General in the propaganda war', Rolling Stone, 17 November 2005. Available online at www.rollingstone.com/politics/store/_/id/8798997 (accessed 14 May 2007).
-
(2005)
Rolling Stone
-
-
Bamford, J.1
-
35
-
-
0007346550
-
The californian ideology
-
Barbrook, R. and Cameron, A. (1995) 'The Californian ideology', Science as Culture, 26, 6, pp. 44-72.
-
(1995)
Science as Culture
, vol.26
, Issue.6
, pp. 44-72
-
-
Barbrook, R.1
Cameron, A.2
-
36
-
-
0039248599
-
The economy of ideas: Selling wine without bottles on the global net’
-
2.03, March 1994, (accessed 14 May 2007)
-
Barlow, J.P. (1994) 'The Economy of ideas: Selling wine without bottles on the global net', Wired Magazine, 2.03, March 1994. Available online at www.wired.com/wired/archive/2.03/economy.ideas.html (accessed 14 May 2007).
-
(1994)
Wired Magazine
-
-
Barlow, J.P.1
-
37
-
-
33645758831
-
-
Electronic Frontier Foundation Website, (accessed 14 May 2007)
-
Barlow, J.P. (1996) A Declaration of the Independence of Cyberspace, Electronic Frontier Foundation Website, available at http://homes.eff.org/~barlow/Declaration-Final.html (accessed 14 May 2007).
-
(1996)
A Declaration of the Independence of Cyberspace
-
-
Barlow, J.P.1
-
41
-
-
0001320762
-
Risk society revisited: Theory, politics and research programmes
-
Adam, Barbara, Beck, Ulrich and Loon, Joost van, London: Sage
-
Beck, U. (2001) 'Risk society revisited: Theory, politics and research programmes', in Adam, Barbara, Beck, Ulrich and Loon, Joost van (eds) The Risk Society and Beyond: Critical Issues for Social Theory, London: Sage, pp. 211-29.
-
(2001)
The Risk Society and Beyond: Critical Issues for Social Theory
, pp. 211-229
-
-
Beck, U.1
-
42
-
-
84908391974
-
-
Studies in Functional and Structural Linguistics 55, Amsterdam & Philadelphia: John Benjamins
-
Beedham, C. (2005) Language and Meaning: The Structural Creation of Reality, Studies in Functional and Structural Linguistics 55, Amsterdam & Philadelphia: John Benjamins.
-
(2005)
Language and Meaning: The Structural Creation of Reality
-
-
Beedham, C.1
-
45
-
-
84911048099
-
Der kosovo-krieg im cyberspace. Cracker, info war und medienkrieg
-
19 July 1999, (accessed 14 May 2007)
-
Bendrath, R. (1999) 'Der Kosovo-Krieg im cyberspace. Cracker, info war und medienkrieg', Telepolis, 19 July 1999. Available online at www.heise.de/tp/r4/artikeL6/6449/1.html (accessed 14 May 2007).
-
(1999)
Telepolis
-
-
Bendrath, R.1
-
46
-
-
21244432672
-
The cyberwar debate: Perception and politics in us critical infrastructure protection
-
Bendrath, R. (2001) 'The cyberwar debate: Perception and politics in US critical infrastructure protection', Information & Security: An International Journal, Volume 7, pp. 80-103.
-
(2001)
Information & Security: An International Journal
, vol.7
, pp. 80-103
-
-
Bendrath, R.1
-
47
-
-
27944476171
-
The american cyber-angst and the real world - any link?
-
Latham, R. Bendrath, R. (ed.), New York: The New Press
-
Bendrath, R. (2003) 'The American Cyber-Angst and the real world - Any link?' in Latham, R. Bendrath, R. (ed.) Bombs and Bandwidth: The Emerging Relationship between IT and Security, New York: The New Press, pp. 49-73.
-
(2003)
Bombs and Bandwidth: The Emerging Relationship between IT and Security
, pp. 49-73
-
-
Bendrath, R.1
-
48
-
-
80051578519
-
Cyberterrorism to cyberwar, back and forth: How the united states securitized cyberspace
-
Eriksson, J. and Gia-comello, G, London: Routledge
-
Bendrath, R., Eriksson J. and Giacomello G. (2007) 'Cyberterrorism to cyberwar, back and forth: How the United States securitized cyberspace', in Eriksson, J. and Gia-comello, G. (eds) International Relations and Security in the Digital Age, London: Routledge, pp. 57-82.
-
(2007)
International Relations and Security in the Digital Age
, pp. 57-82
-
-
Bendrath, R.1
Eriksson, J.2
Giacomello, G.3
-
51
-
-
84861163515
-
Warfare in the information age
-
Arquilla, J. and Ronfeldt, D, Santa Monica, RAND
-
Berkowitz, B.D. (1997) 'Warfare in the information age', in Arquilla, J. and Ronfeldt, D. (eds) In Athena's Camp: Preparing for Conflict in the Information Age, Santa Monica, RAND, pp. 175-90.
-
(1997)
In Athena’s Camp: Preparing for Conflict in the Information Age
, pp. 175-190
-
-
Berkowitz, B.D.1
-
53
-
-
0037867708
-
Cybersecurity - who is watching the store
-
19, 3, Spring
-
Berkowitz, B.D. and Hahn, R.W. (2003) 'Cybersecurity - who is watching the store', Issues in Science and Technology, 19, 3, Spring, pp. 55-62.
-
(2003)
Issues in Science and Technology
, pp. 55-62
-
-
Berkowitz, B.D.1
Hahn, R.W.2
-
54
-
-
84911048097
-
National security vs. Access to computer databases: A new threat to freedom of information
-
3, June
-
Berman, J.J. (1987) 'National security vs. access to computer databases: A new threat to freedom of information', First Principles, 12, 3, June 1987.
-
(1987)
First Principles
, vol.12
-
-
Berman, J.J.1
-
58
-
-
0037744155
-
-
Lecture Notes in Computer Science, No. 578, New York: Springer-Verlag
-
Beth, T., Frisch, M. and Simmons, G. (eds) (1992) Public Key Cryptography: State of the Art and Future Directions, Lecture Notes in Computer Science, No. 578, New York: Springer-Verlag.
-
(1992)
Public Key Cryptography: State of the Art and Future Directions
-
-
Beth, T.1
Frisch, M.2
Simmons, G.3
-
59
-
-
0030490236
-
Victory misunderstood: What the gulf war tells us about the future of conflict
-
Biddle, S. (1996) 'Victory misunderstood: What the Gulf War tells us about the future of conflict', International Security, 21, 2, pp. 139-79.
-
(1996)
International Security
, vol.21
, Issue.2
, pp. 139-179
-
-
Biddle, S.1
-
60
-
-
26044442950
-
Sources of complexity in human systems
-
Biggiero, L. (2001) 'Sources of complexity in human systems', Nonlinear Dynamics, Psychology, and Life Sciences, 5, 1, pp. 3-19.
-
(2001)
Nonlinear Dynamics, Psychology, and Life Sciences
, vol.5
, Issue.1
, pp. 3-19
-
-
Biggiero, L.1
-
61
-
-
0011130099
-
The european internal security field: Stakes and rivalries in a newly developing area of police intervention
-
Anderson, M. and den Boer, M, London: Pinter
-
Bigo, D. (1994) 'The European internal security field: Stakes and rivalries in a newly developing area of police intervention', in Anderson, M. and den Boer, M. (eds) Policing Across National Boundaries, London: Pinter, pp. 161-73.
-
(1994)
Policing across National Boundaries
, pp. 161-173
-
-
Bigo, D.1
-
62
-
-
7444219651
-
Sécurité et immigration: Vers une gouvernementalité par linquiétude?’
-
Bigo, D. (1998), 'Sécurité et immigration: vers une gouvernementalité par l'inquiétude?' Cultures et Conflits, 31-2, pp. 13-38.
-
(1998)
Cultures Et Conflits
, vol.31-2
, pp. 13-38
-
-
Bigo, D.1
-
63
-
-
84992319900
-
When two becomes one: Internal and external securitisation in europe
-
Kelstrup, M. and Williams, M.C, London: Routledge
-
Bigo, D. (2000) 'When two becomes one: Internal and external securitisation in Europe', in Kelstrup, M. and Williams, M.C. (eds) International Relations Theory and the Politics of European Integration: Power, Security and Community, London: Routledge, pp. 171-205.
-
(2000)
International Relations Theory and the Politics of European Integration: Power, Security and Community
, pp. 171-205
-
-
Bigo, D.1
-
64
-
-
54549106367
-
-
Carlisle: Carlisle Strategic Studies Institute
-
Blank, S.J. (2003) Rethinking Asymmetric Threats, Carlisle: Carlisle Strategic Studies Institute.
-
(2003)
Rethinking Asymmetric Threats
-
-
Blank, S.J.1
-
66
-
-
84911048093
-
-
PAFE-Arbeitspapier Nr. 1, Universität Trier
-
Boekle, H., Nadoll, J. and Stahl, B. (2000) Identität, Diskurs und vergleichende Analyse europäischer Außenpolitiken. Theoretische Grundlegung und methodische Vorgehensweise, PAFE-Arbeitspapier Nr. 1, Universität Trier.
-
(2000)
Identität, Diskurs Und Vergleichende Analyse europäischer Außenpolitiken. Theoretische Grundlegung Und Methodische Vorgehensweise
-
-
Boekle, H.1
Nadoll, J.2
Stahl, B.3
-
67
-
-
84911129173
-
-
PAFE-Arbeitspapier Nr. 4, Universität Trier
-
Boekle, H., Nadoll, J. and Stahl, B. (2001) Nationale Identität, Diskursanalyse und Außenpolitikforschung: Herausforderungen und Hypothesen, PAFE-Arbeitspapier Nr. 4, Universität Trier.
-
(2001)
Nationale Identität, Diskursanalyse Und Außenpolitikforschung: Herausforderungen Und Hypothesen
-
-
Boekle, H.1
Nadoll, J.2
Stahl, B.3
-
68
-
-
84900053454
-
Pentagon kept the lid on cyberwar in kosovo’
-
9 November 1999, (accessed 14 May 2007)
-
Borger, J. (1999) 'Pentagon Kept the lid on cyberwar in Kosovo', The Guardian, 9 November 1999. Available online at www.guardian.co.uk/Kosovo/Story/0,2763,197391.00.html (accessed 14 May 2007).
-
(1999)
The Guardian
-
-
Borger, J.1
-
70
-
-
85145541783
-
-
unpublished paper, presented at the ITU Workshop on creating trust in critical network infrastructures, Seoul, 20-22 May 2002
-
Bosch, O. (2002) 'Cyber terrorism and private sector efforts for information infrastructure protection', unpublished paper, presented at the ITU Workshop on creating trust in critical network infrastructures, Seoul, 20-22 May 2002.
-
(2002)
Cyber Terrorism and Private Sector Efforts for Information Infrastructure Protection
-
-
Bosch, O.1
-
71
-
-
34250060253
-
How to be universal: Some cybernetic strategies 1943-1970
-
Bowker, G. (1993) 'How to be universal: Some cybernetic strategies 1943-1970', Social Studies of Science, 23, 1, pp. 107-28.
-
(1993)
Social Studies of Science
, vol.23
, Issue.1
, pp. 107-128
-
-
Bowker, G.1
-
72
-
-
84911048089
-
Cybercrime fighters: The feds want you!
-
11 December 2000, (accessed 14 May 2007)
-
Bowman, L.M. (2000) 'Cybercrime fighters: The feds want you!', ZDNet News, 11 December 2000. Available online at www.zdnet.com/zdnn/stories/news/0,4586,2663288.00.html (accessed 14 May 2007).
-
(2000)
Zdnet News
-
-
Bowman, L.M.1
-
73
-
-
84866585879
-
Infowar and disinformation: From the pentagon to the net’
-
11, October-December 1995, (accessed 14 May 2007)
-
Brandt, D. (1995) 'Infowar and disinformation: From the Pentagon to the net', NameBase NewsLine, 11, October-December 1995. Available online at www.namebase.org/news11.html (accessed 14 May 2007).
-
(1995)
Namebase Newsline
-
-
Brandt, D.1
-
74
-
-
84911048087
-
Cyberattacks against nato traced to china’
-
2 September 1999, (accessed 14 May 2007)
-
Brewin, B. (1999) 'Cyberattacks against NATO traced to China', Federal Computer Week, 2 September 1999. Available online at www.cnn.com/TECH/comput-ing/9909/02/chinahack.idg/index.html (accessed 14 May 2007).
-
(1999)
Federal Computer Week
-
-
Brewin, B.1
-
75
-
-
84911048085
-
Computer security, hackers penetrate dod computer systems statement’
-
20 November 1991, (accessed 14 May 2007)
-
Brock, J.L. (1991) 'Computer security, hackers penetrate DOD computer systems statement', Testimony of the Director Government Information and Financial Management Information Management and Technology Division Before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate, 20 November 1991. Available online at www.globalsecurity.org/secur-ity/library/report/gao/145327.pdf (accessed 14 May 2007).
-
(1991)
Testimony of the Director Government Information and Financial Management Information Management and Technology Division before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate
-
-
Brock, J.L.1
-
76
-
-
0003972389
-
-
New York: MacMillan Press
-
Brodie, B. (1973) War and Politics, New York: MacMillan Press.
-
(1973)
War and Politics
-
-
Brodie, B.1
-
77
-
-
0012753057
-
-
Commission on the Roles and Capabilities of the United States Intelligence Community, Washington, DC: US Government Printing Office
-
Brown Report (1996) Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Commission on the Roles and Capabilities of the United States Intelligence Community, Washington, DC: US Government Printing Office.
-
(1996)
Preparing for the 21St Century: An Appraisal of U.S. Intelligence
-
-
-
78
-
-
84911048084
-
The expanding importance of the computer fraud and abuse act’
-
January 2001, (accessed 14 May 2007)
-
Burke, E.B. (2001) 'The expanding importance of the computer fraud and abuse act', GigaLaw.com, January 2001. Available online at www.gigalaw.com/articles/2001-all/-burke-2001-01-all.html (accessed 14 May 2007).
-
(2001)
Gigalaw.Com
-
-
Burke, E.B.1
-
79
-
-
84900293992
-
Computer warfare used in yugoslavia
-
7 October
-
Burns, R. (1999) 'Computer warfare used in Yugoslavia', Associated Press, 7 October
-
(1999)
Associated Press
-
-
Burns, R.1
-
80
-
-
85145522537
-
-
(accessed 14 May 2007)
-
Burns, R. 1999. Available online at http://transnational.org/SAJT/features/computerwarfare.html (accessed 14 May 2007).
-
(1999)
-
-
Burns, R.1
-
86
-
-
84911112606
-
-
Norfolk Naval Air Station, Norfolk, Virginia, 13 February 2001, accessed 14 May 2007
-
Bush, G.W. (2001c) Remarks by the President to the Troops and Personnel, Norfolk Naval Air Station, Norfolk, Virginia, 13 February 2001. Available online at www.whitehouse.gov/news/releases/20010213-1.html (accessed 14 May 2007).
-
(2001)
Remarks by the President to the Troops and Personnel
-
-
Bush, G.W.1
-
91
-
-
0011087922
-
The complexity of social networks: Theoretical and empirical findings
-
Butts, C.T. (2001) 'The complexity of social networks: Theoretical and empirical findings', Social Networks, 23, pp. 31-71.
-
(2001)
Social Networks
, vol.23
, pp. 31-71
-
-
Butts, C.T.1
-
99
-
-
0012704777
-
-
Fairfax, AFCEA International Press
-
Campen, A.D., Dearth, D.H. and Goodden, T. (eds) (1996) Cyberwar: Security, Strategy and Conflict in the Information Age, Fairfax, AFCEA International Press.
-
(1996)
Cyberwar: Security, Strategy and Conflict in the Information Age
-
-
Campen, A.D.1
Dearth, D.H.2
Goodden, T.3
-
100
-
-
85145523678
-
-
Congressional Research Service Documents, CRS RL32331, 1 April 2004, Washington, DC: Congressional Research Service
-
Cashell, B., Jackson, W.D., Jickling, M., and Webel, B. (2004) The Economic Impact of Cyber-Attacks, Congressional Research Service Documents, CRS RL32331, 1 April 2004, Washington, DC: Congressional Research Service.
-
(2004)
The Economic Impact of Cyber-Attacks
-
-
Cashell, B.1
Jackson, W.D.2
Jickling, M.3
Webel, B.4
-
103
-
-
0001888939
-
‘network-centric warfare: Its origin and future
-
Cebrowski, A.K. and Garstka, J.J. (1998) 'Network-centric warfare: Its origin and future, in Proceedings of the Naval Institute, 124, 1, pp. 28-35.
-
(1998)
Proceedings of the Naval Institute
, Issue.1
, pp. 28-35
-
-
Cebrowski, A.K.1
Garstka, J.J.2
-
104
-
-
0039935326
-
-
Robert F. McMormich Tribune Foundation Report, Washington, DC: Center for Strategic and International Studies
-
Center for Strategic and International Studies CSIS (1996) The Information Revolution and International Security, Robert F. McMormich Tribune Foundation Report, Washington, DC: Center for Strategic and International Studies.
-
(1996)
The Information Revolution and International Security
-
-
-
105
-
-
84861176909
-
-
White paper, Monterey: Center on terrorism and irregular warfare., (accessed 14 May 2007)
-
Center for the Study of Terrorism and Irregular Warfare (1999) Cyberterror: Prospects and Implications, White paper, Monterey: Center on terrorism and irregular warfare. Available online at www.nps.navy.mil/ctiw/files/Cyberterror%20Prospects%20and%20Implications.pdf (accessed 14 May 2007).
-
(1999)
Cyberterror: Prospects and Implications
-
-
-
107
-
-
84861124863
-
White house officials debating rules for cyberwarfare’
-
22 August 2002, (accessed 14 May 2007)
-
Cha, A.E. and Krim, J. (2002) 'White House officials debating rules for cyberwarfare', Washington Post, 22 August 2002. Available online at www.landfield.com/isn/mail-archive/2002/Aug/0088.html (accessed 14 May 2007).
-
(2002)
Washington Post
-
-
Cha, A.E.1
Krim, J.2
-
108
-
-
85145515286
-
-
unpublished paper, presented at the Annual Convention of the Internet Society, Geneva, July 1998, (accessed 14 May 2007)
-
Chapman, G. (1998) 'National security and the Internet', unpublished paper, presented at the Annual Convention of the Internet Society, Geneva, July 1998. Available online at www.utexas.edu/lbj/21cp/isoc.htm (accessed 14 May 2007).
-
(1998)
National security and the internet
-
-
Chapman, G.1
-
112
-
-
84911215792
-
Beyond the moat: New strategies for cyber-security
-
27 January 2004, (accessed 14 May 2007)
-
Clarke, R. and Zeichner, L. (2004) 'Beyond the moat: New strategies for cyber-security', Bank Systems & Technology, 27 January 2004. Available online at www.banktech.com/showArticle.jhtml?articleID=17501355 (accessed 14 May 2007).
-
(2004)
Bank Systems & Technology
-
-
Clarke, R.1
Zeichner, L.2
-
114
-
-
84911048073
-
-
Presidential Decision Directive 29, Washington, DC, 16 September 1994
-
Clinton, W.J. (1994b) Security Policy Coordination, Presidential Decision Directive 29, Washington, DC, 16 September 1994.
-
(1994)
Security Policy Coordination
-
-
Clinton, W.J.1
-
116
-
-
0242534842
-
-
Presidential Decision Directive 39, Washington, DC, 21 June 1995
-
Clinton, W.J. (1995b) US Policy on Counterterrorism, Presidential Decision Directive 39, Washington, DC, 21 June 1995.
-
(1995)
US Policy on Counterterrorism
-
-
Clinton, W.J.1
-
120
-
-
85145535558
-
-
Presidential Decision Directive, Washington, DC, 22 May 1998
-
Clinton, W.J. (1998a) Protection Against Unconventional Threats to the Homeland and Americans Overseas, Presidential Decision Directive 62, Washington, DC, 22 May 1998.
-
(1998)
Protection against Unconventional Threats to the Homeland and Americans Overseas
, vol.62
-
-
Clinton, W.J.1
-
125
-
-
0010723892
-
A revolution in military affairs
-
Cohen, E. (1996) 'A revolution in military affairs', Foreign Affairs, 75, 2, pp. 37-54.
-
(1996)
Foreign Affairs
, vol.75
, Issue.2
, pp. 37-54
-
-
Cohen, E.1
-
126
-
-
84863139644
-
-
),, presented by Secretary of Defense William S. Cohen and Gen. Henry H. Shelton, Chairman of the Joint Chiefs of Staff, before the Senate Armed Services Committee, 14 October 1999, (accessed 14 May 2007)
-
Cohen, W.S. and Shelton, H.H. (1999) Joint Statement on the Kosovo After Action Review (initial assessment), presented by Secretary of Defense William S. Cohen and Gen. Henry H. Shelton, Chairman of the Joint Chiefs of Staff, before the Senate Armed Services Committee, 14 October 1999. Available online at www.defenselink.mil/releases/release.aspx?releaseid=2220 (accessed 14 May 2007).
-
(1999)
Joint Statement on the Kosovo after Action Review (Initial Assessment
-
-
Cohen, W.S.1
Shelton, H.H.2
-
127
-
-
84936823975
-
Sex and death in the rational world of defense intellectuals
-
Cohn, C. (1987) 'Sex and death in the rational world of defense intellectuals', Signs: Journal of Women in Culture and Society 12, 4, pp. 687-718.
-
(1987)
Signs: Journal of Women in Culture And
, vol.12
, Issue.4
, pp. 687-718
-
-
Cohn, C.1
-
128
-
-
0003494388
-
-
Washington, DC: National Academy Press
-
Committee on Science, Engineering, and Public Policy (1982) Scientific Communication and National Security, Washington, DC: National Academy Press.
-
(1982)
Scientific Communication and National Security
-
-
-
129
-
-
84911048071
-
Darpa establishes computer emergency response team’
-
13 December 1988, (accessed 14 May 2007)
-
Computer Emergency Response Team CERT (1988) 'Darpa establishes computer emergency response team' Computer Emergency Response Team Press Release, 13 December 1988. Available online at www.cert.org/about/1988press-rel.html (accessed 14 May 2007).
-
(1988)
Computer Emergency Response Team Press Release
-
-
-
130
-
-
33744821759
-
-
(accessed 14 May 2007)
-
Computer Emergency Response Team CERT (2005) CERT/CC Statistics 1988-2005. Available online at www.cert.org/stats/cert_stats.html#incidents (accessed 14 May 2007).
-
(2005)
CERT/CC Statistics 1988-2005
-
-
-
134
-
-
84890937650
-
The media and cyberterrorism: A study in the construction of ‘reality
-
Dunn Cavelty, M. and Kristensen, K.S, London: Routledge
-
Conway, M. (2008) 'The media and cyberterrorism: A study in the construction of 'reality', in Dunn Cavelty, M. and Kristensen, K.S. (eds) The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, London: Routledge.
-
(2008)
The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation
-
-
Conway, M.1
-
135
-
-
0007735829
-
Another view of the revolution in military affairs
-
Arquilla, J. and Ronfeldt, D, Santa Monica: RAND
-
Cooper, J.R. (1997) 'Another view of the revolution in military affairs', in Arquilla, J. and Ronfeldt, D. (eds) In Athena's Camp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 99-140.
-
(1997)
In Athena’s Camp: Preparing for Conflict in the Information Age
, pp. 99-140
-
-
Cooper, J.R.1
-
138
-
-
84911048065
-
Seven curious teenagers wreak havoc via computer
-
28 August 1983, Section: WWL
-
Covert, C. (1983) 'Seven curious teenagers wreak havoc via computer', Detroit Free Press, 28 August 1983, Section: WWL, p. 1F.
-
(1983)
Detroit Free Press
, pp. 1F
-
-
Covert, C.1
-
139
-
-
0040731563
-
Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of ibn khaldun
-
Rosenau, J.N. and Czempiel E.-O, Cambridge Studies in International Relations Nr. 20, Cambridge: (Cambridge University Press
-
Cox, R. W. (1992) 'Towards a post-hegemonic conceptualization of world order: Reflections on the relevancy of ibn khaldun', in Rosenau, J.N. and Czempiel E.-O. (eds) Governance Without Government: Order and Change in World Politics, Cambridge Studies in International Relations Nr. 20, Cambridge: (Cambridge University Press) pp. 132-58.
-
(1992)
Governance without Government: Order and Change in World Politics
, pp. 132-158
-
-
Cox, R.W.1
-
142
-
-
0001664276
-
Is anything ever new? Considering emergence
-
Cowan, G., Pines, D. and Melzner, D, SFI Series in the Sciences of Complexity XIX, Redwood City: Addison-Wesley
-
Crutchfield, J.P. (1994) 'Is anything ever new? Considering emergence', in Cowan, G., Pines, D. and Melzner, D. (eds) Complexity: Metaphors, Models, and Reality, SFI Series in the Sciences of Complexity XIX, Redwood City: Addison-Wesley, pp. 479-97.
-
(1994)
Complexity: Metaphors, Models, and Reality
, pp. 479-497
-
-
Crutchfield, J.P.1
-
143
-
-
84884461517
-
What lies between order and chaos?
-
Casti, J.L. and Karlqvist, A, Oxford: Oxford University Press
-
Crutchfield, J.P. (2002) 'What lies between order and chaos?' in Casti, J.L. and Karlqvist, A. (eds) Art and Complexity, Oxford: Oxford University Press.
-
(2002)
Art and Complexity
-
-
Crutchfield, J.P.1
-
144
-
-
84900093532
-
Internet governance and the ancien regime
-
Cukier, K.N. (1999) 'Internet governance and the ancien regime', Swiss Political Science Review, 5, 1, pp. 127-33.
-
(1999)
Swiss Political Science Review
, vol.5
, Issue.1
, pp. 127-133
-
-
Cukier, K.N.1
-
149
-
-
0013138120
-
Pentagon readies efforts to sway sentiment abroad’
-
19 February 2002, (accessed 14 May 2007)
-
Dao, J. and Schmitt, E. (2002) 'Pentagon readies efforts to sway sentiment abroad', New York Times, 19 February 2002. Available online at www.commondreams.org/head-lines02/0219-01.htm (accessed 14 May 2007).
-
(2002)
New York Times
-
-
Dao, J.1
Schmitt, E.2
-
150
-
-
0007781198
-
An information-based revolution in military affairs
-
Arquilla, John and Ronfeldt, David, Santa Monica: RAND
-
David, N.C. (1997) 'An information-based revolution in military affairs', in Arquilla, John and Ronfeldt, David (eds) In Athena's Camp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 79-98.
-
(1997)
In Athena’s Camp: Preparing for Conflict in the Information Age
, pp. 79-98
-
-
David, N.C.1
-
151
-
-
33644691011
-
Improving cia analytic performance: Strategic warning’
-
1, 1, September 2002., (accessed 14 May 2007)
-
Davis, J. (2002) 'Improving CIA analytic performance: Strategic warning', The Sherman Kent Center for Intelligence Analysis Occasional Papers, 1, 1, September 2002. Available online at www.au.af.mil/au/awc/awcgate/cia/strategic_warning_kent.htm (accessed 14 May 2007).
-
(2002)
The Sherman Kent Center for Intelligence Analysis Occasional Papers
-
-
Davis, J.1
-
152
-
-
84937339440
-
Cyberterror and media-induced fears: The production of emergency culture
-
May
-
Debrix, F. (2001) 'Cyberterror and media-induced fears: The production of emergency culture', Strategies: Journal of Theory, Culture & Politics, 14, 1, May, pp. 149-68.
-
(2001)
Strategies: Journal of Theory, Culture & Politics
, vol.14
, Issue.1
, pp. 149-168
-
-
Debrix, F.1
-
155
-
-
84861161916
-
-
2000 Summer Study Volume II, Washington, DC: Department of Defense
-
Defense Science Board (2001) Protecting the Homeland. Report of the Defense Science Board Task Forceon Defensive Information Operations. 2000 Summer Study Volume II, Washington, DC: Department of Defense.
-
(2001)
Protecting the Homeland. Report of the Defense Science Board Task Force
-
-
-
157
-
-
0005238259
-
Security of the internet’
-
15, New York, (accessed 14 May 2007)
-
Dekker, M. (1997) 'Security of the Internet', in The Froehlich/Kent Encyclopedia of Telecommunications, 15, New York, pp. 231-55. Available online at www.cert.org/encyc_article/tocencyc.html (accessed 14 May 2007).
-
(1997)
The Froehlich/Kent Encyclopedia of Telecommunications
, pp. 231-255
-
-
Dekker, M.1
-
158
-
-
0006845513
-
New security in cyberspace: Emerging intersection between military and civilian contingencies’
-
Demchak, C.C. (1999) '"New Security" in cyberspace: Emerging intersection between military and civilian contingencies', Journal of Contingencies and Crisis Management, 7, 4, pp. 181-98.
-
(1999)
Journal of Contingencies and Crisis Management
, vol.7
, Issue.4
, pp. 181-198
-
-
Demchak, C.C.1
-
160
-
-
27944466951
-
-
essay for the social science research council, after September 11, (accessed 14 May 2007)
-
Denning, D. (2001a) 'Is Cyber-terror Next?' essay for the social science research council, after September 11. Available online at www.ssrc.org/sept11/essays/denning.htm (accessed 14 May 2007).
-
(2001)
Is Cyber-Terror Next?’
-
-
Denning, D.1
-
161
-
-
0242440508
-
Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy
-
Arquilla, J. and Ronfeldt, D, Santa Monica: RAND
-
Denning, D. (2001b) 'Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy', in Arquilla, J. and Ronfeldt, D. (eds) Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica: RAND, pp. 239-88.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
, pp. 239-288
-
-
Denning, D.1
-
163
-
-
36049041763
-
The internet after thirty years
-
Denning, Dorothy E. and Denning, Peter J, New York: ACM Press
-
Denning, P. (ed.) (1997) 'The Internet after thirty years', in Denning, Dorothy E. and Denning, Peter J. (eds) Internet Besieged: Countering Cyberspace Scofflaws, New York: ACM Press, pp. 15-27.
-
(1997)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 15-27
-
-
Denning, P.1
-
165
-
-
81455158615
-
-
12 September 2006, Washington, DC, (accessed 14 May 2007)
-
Department of Homeland Security (DHS) (2006) Cyber Storm: Exercise Report, 12 September 2006, Washington, DC. Available online at www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf (accessed 14 May 2007).
-
(2006)
Cyber Storm: Exercise Report
-
-
-
166
-
-
84911125318
-
-
Washington, DC, Department of the United States Air Force: August
-
Department of the Air Force (1998), Air Force Doctrine Document 2-5, Information Operations, Washington, DC, Department of the United States Air Force: August 1998.
-
(1998)
Air Force Doctrine Document 2-5, Information Operations
, pp. 1998
-
-
-
169
-
-
84900205201
-
-
Revision One, October 2001, (accessed 14 May 2007)
-
Department of Defense (2001a) Directive Number 3600.1, Information Operations, Revision One, October 2001. Available online at www.iwar.org.uk/iwar/resources/doctrine/DoD36001.pdf (accessed 14 May 2007).
-
(2001)
Directive Number 3600.1, Information Operations
-
-
-
170
-
-
84911048059
-
-
June 2001. (accessed 14 May 2007)
-
Department of Defense (2001b) FY2001 Defense Supplemental Request, June 2001. Available online at www.dod.mil/comptroller/defbudget/fy2001/fy2001_supp.pdf (accessed 14 May 2007).
-
(2001)
FY2001 Defense Supplemental Request
-
-
-
171
-
-
27844612263
-
-
Joint Publication 1-02, 12 April 2001 (As Amended Through 14 April 2006), (accessed 14 May 2007)
-
Department of Defense (2001c) Department of Defense Dictionary of Military and Associated Terms, Joint Publication 1-02, 12 April 2001 (As Amended Through 14 April 2006). Available online at www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf (accessed 14 May 2007).
-
(2001)
Department of Defense Dictionary of Military and Associated Terms
-
-
-
173
-
-
0010160253
-
The value of security: Hobbes, marx, nietzsche, and baudrillard
-
Lipschutz, Ronnie (ed.), New York: Columbia University Press
-
Der Derian, J. (1995) 'The value of security: Hobbes, Marx, Nietzsche, and Baudrillard', in Lipschutz, Ronnie (ed.) On Security, New York: Columbia University Press, pp. 24-45.
-
(1995)
On Security
, pp. 24-45
-
-
Der Derian, J.1
-
175
-
-
0039768088
-
Mass communications and the loss of freedom in national decision-making: A possible research approach to interstate conflicts
-
Deutsch, K.W. (1957) 'Mass communications and the loss of freedom in national decision-making: A possible research approach to interstate conflicts', Journal of Conflict Resolution, 1, 2, pp. 200-11.
-
(1957)
Journal of Conflict Resolution
, vol.1
, Issue.2
, pp. 200-211
-
-
Deutsch, K.W.1
-
176
-
-
0040655217
-
-
unpublished Master Thesis, University of Vermont, Burlington, (accessed 14 May 2007)
-
Devost, M.G. (1995) National Security in the Information Age, unpublished Master Thesis, University of Vermont, Burlington. Available online at www.devost.net/papers/national_security_in_the_information_age.html (accessed 14 May 2007).
-
(1995)
National Security in the Information Age
-
-
Devost, M.G.1
-
177
-
-
0031315433
-
Information terrorism: Political violence in the information age
-
Devost, M.G., Houghton, B.K. and Pollard, N.A. (1997) 'Information terrorism: Political violence in the information age', Terrorism and Political Violence, 9, 1, pp. 72-83.
-
(1997)
Terrorism and Political Violence
, vol.9
, Issue.1
, pp. 72-83
-
-
Devost, M.G.1
Houghton, B.K.2
Pollard, N.A.3
-
178
-
-
0017018484
-
New directions in cryptography
-
Diffie, W. and Hellman, M.E. (1976) 'New directions in cryptography', IEEE Transactions on Information Theory, 22, 6, pp. 644-54.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
180
-
-
0002287411
-
Political discourse analysis
-
Diani, M. and Ron E, London: Sage
-
Donati, P. (1992) 'Political discourse analysis', in Diani, M. and Ron E. (eds) Studying Collective Action, London: Sage, pp. 136-67.
-
(1992)
Studying Collective Action
, pp. 136-167
-
-
Donati, P.1
-
181
-
-
0346375310
-
Hamre to hill: “were in a cyberwar”’
-
1 March 1999
-
Donnelly, J. and Crawley, V. (1999) 'Hamre to hill: "We're in a cyberwar"', Defense Week, 1 March 1999, p. 1.
-
(1999)
Defense Week
, pp. 1
-
-
Donnelly, J.1
Crawley, V.2
-
183
-
-
0003835251
-
-
Cambridge, MA: Harvard Business School Press
-
Downes, L., Mui, C. and Negroponte, N. (1998) Unleashing the Killer App: Digital Strategies for Market Dominance, Cambridge, MA: Harvard Business School Press.
-
(1998)
Unleashing the Killer App: Digital Strategies for Market Dominance
-
-
Downes, L.1
Mui, C.2
Negroponte, N.3
-
185
-
-
84911131575
-
Cybercrime-alternative models for dealing with unauthorized use and abuse of computer networks’
-
September., (accessed 14 May 2007)
-
Drummond, N. and McClendon, D.J. (2001) 'Cybercrime-alternative models for dealing with unauthorized use and abuse of computer networks', Law and Internet, September. Available online at http://gsulaw.gsu.edu/lawand/papers/su01/drummond_mcclendon/ (accessed 14 May 2007).
-
(2001)
Law and Internet
-
-
Drummond, N.1
McClendon, D.J.2
-
186
-
-
84911212445
-
Concluding remarks: The role of the state in securing the information age - challenges and prospects
-
Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F, Aldershot: Ashgate
-
Dunn Cavelty, M. and Mauer, V. (2007) 'Concluding remarks: The role of the state in securing the information age - challenges and prospects', in Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F. (eds) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, Aldershot: Ashgate.
-
(2007)
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
-
-
Dunn Cavelty, M.1
Mauer, V.2
-
188
-
-
84877589762
-
Analysis of methods and models for cii assessment
-
Dunn, M. and Wigert, I. Zurich: Center for Security Studies
-
Dunn, M. (2004) 'Analysis of Methods and Models for CII Assessment', in Dunn, M. and Wigert, I. (2004) The International CIIP Handbook 2004: An Inventory of Protection Policies in Fourteen Countries, Zurich: Center for Security Studies, pp. 219-98.
-
(2004)
The International CIIP Handbook 2004: An Inventory of Protection Policies in Fourteen Countries
, pp. 219-298
-
-
Dunn, M.1
-
189
-
-
14844300090
-
The socio-political dimensions of critical information infrastructure protection (Ciip)
-
Dunn, M. (2005) 'The socio-political dimensions of critical information infrastructure protection (CIIP)', International Journal for Critical Infrastructure Protection, 1, 2/3, pp. 58-68.
-
(2005)
International Journal for Critical Infrastructure Protection
, vol.1
, Issue.2-3
, pp. 58-68
-
-
Dunn, M.1
-
190
-
-
53349138328
-
Securing the digital age: Ir theory and the twin-forces of complexity and change
-
Eriksson, J. and Giacomello, G, London: Routledge
-
Dunn, M. (2007a) 'Securing the digital age: IR theory and the twin-forces of complexity and change', in Eriksson, J. and Giacomello, G. (eds) International Relations and Security in the Digital Age, London: Routledge, pp. 85-105.
-
(2007)
International Relations and Security in the Digital Age
, pp. 85-105
-
-
Dunn, M.1
-
191
-
-
84874528133
-
Cyber-terror - looming threat or phantom menace? The framing of the us cyber-threat debate
-
Dunn, M. (2007b) 'Cyber-terror - looming threat or phantom menace? The framing of the US Cyber-Threat debate', Journal of Information Technology and Politics, 4, 1.
-
(2007)
Journal of Information Technology and Politics
, vol.4
, pp. 1
-
-
Dunn, M.1
-
195
-
-
3142537645
-
-
Washington, DC: Electronic Privacy Information Center
-
Electronic Privacy Information Center EPIC (1998b) Critical Infrastructure Protection and the Endangerment of Civil LibertiesAn Assessment of the President's Commission on Critical Infrastructure Protection (PCCIP), Washington, DC: Electronic Privacy Information Center.
-
(1998)
Critical Infrastructure Protection and the Endangerment of Civil Liberties
-
-
-
196
-
-
84911110960
-
-
Washington, DC: Electronic Privacy Information Center, (accessed 14 May 2007)
-
Electronic Privacy Information Center EPIC (1999) Cryptography and Liberty: An International Survey of Encryption Policy, Washington, DC: Electronic Privacy Information Center. Available online at www.gilc.org/crypto/crypto-survey-99.html (accessed 14 May 2007)
-
(1999)
Cryptography and Liberty: An International Survey of Encryption Policy
-
-
-
197
-
-
84861292488
-
-
Washington, DC: Electronic Privacy Information Center, 24 May 2005, (accessed 14 May 2007)
-
Electronic Privacy Information Center EPIC (2005) The USA PATRIOT Act, Washington, DC: Electronic Privacy Information Center, 24 May 2005. Available online at www.epic.org/privacy/terrorism/usapatriot/ (accessed 14 May 2007).
-
(2005)
The USA PATRIOT Act
-
-
-
198
-
-
0003449736
-
-
Technical Report, CMU/SEI-97-TR-013, ESC-TR-97-013, November 1997, (accessed 14 May 2007)
-
Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff T. and Mead, N.R. (1997) Survivable Network Systems: An Emerging Discipline, Technical Report, CMU/SEI-97-TR-013, ESC-TR-97-013, November 1997. Available online at www.cert.org/research/97tr013.pdf (accessed 14 May 2007).
-
(1997)
Survivable Network Systems: An Emerging Discipline
-
-
Ellison, R.J.1
Fisher, D.A.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.5
Mead, N.R.6
-
200
-
-
84911048057
-
The 414 gang strikes again
-
29 August 1983
-
Elmer-Dewitt, P. (1983) 'The 414 Gang Strikes Again', Time Magazine, 29 August 1983.
-
(1983)
Time Magazine
-
-
Elmer-Dewitt, P.1
-
202
-
-
84888859417
-
Information warfare: Hype or reality?
-
Eriksson, A.E. (1999) 'Information warfare: Hype or reality?' The Non-Proliferation Review, 6, 3, pp. 57-64.
-
(1999)
The Non-Proliferation Review
, vol.6
, Issue.3
, pp. 57-64
-
-
Eriksson, A.E.1
-
203
-
-
85145522142
-
-
Mannheim, 26-31 March
-
Eriksson, J. (1999a) 'Agendas, threats, and politics. Securitization in Sweden', paper presented at the ECPR Joint Sesssions, workshop 'Redefining Security', Mannheim, 26-31 March 1999.
-
(1999)
Agendas, Threats, and Politics. Securitization in Sweden, Paper Presented at the ECPR Joint Sesssions, Workshop ‘Redefining Security’
, pp. 1999
-
-
Eriksson, J.1
-
204
-
-
28344455175
-
Observers or advocates? On the political role of security analysts
-
Eriksson, J. (1999b) 'Observers or advocates? On the political role of security analysts', Cooperation and Conflict, 34, 4, pp. 311-30.
-
(1999)
Cooperation and Conflict
, vol.34
, Issue.4
, pp. 311-330
-
-
Eriksson, J.1
-
206
-
-
0035193419
-
Cyberplagues, it, and security: Threat politics in the information age
-
Eriksson, J. (2001b) 'Cyberplagues, IT, and security: Threat politics in the information age', Journal of Contingencies and Crisis Management, 9, 4, pp. 211-22.
-
(2001)
Journal of Contingencies and Crisis Management
, vol.9
, Issue.4
, pp. 211-222
-
-
Eriksson, J.1
-
207
-
-
33746787614
-
The information revolution, security, and international relations: (ir) relevant theory?
-
Eriksson, J. and Giacomello, G. (2006) 'The information revolution, security, and international relations: (IR) Relevant Theory?' International Political Science Review, 27, 3, pp. 221-44.
-
(2006)
International Political Science Review
, vol.27
, Issue.3
, pp. 221-244
-
-
Eriksson, J.1
Giacomello, G.2
-
209
-
-
0034283429
-
Infrastructure risk analysis of municipal water distribution system
-
Ezell, B.C., Farr, J.V. and Wiese, I. (2000) 'Infrastructure risk analysis of municipal water distribution system', Journal of Infrastructure Systems, 6, 3, pp. 118-22.
-
(2000)
Journal of Infrastructure Systems
, vol.6
, Issue.3
, pp. 118-122
-
-
Ezell, B.C.1
Farr, J.V.2
Wiese, I.3
-
211
-
-
84911048053
-
Office of the inspector general united states department of justice
-
28 March 2007, (accessed 14 May 2007)
-
Fine, G. (2007) Office of the Inspector General United States Department of Justice, Statement of Glenn A. Fine, Inspector General, U.S. Department of Justice, Before the Permanent Select Committee on Intelligence U.S. House of Representatives concerning The FBI's Use of National Security Letters and Section 215 Requests for Business Records, 28 March 2007. Available online at www.usdoj.gov/oig/testimony/0703b/final.pdf (accessed 14 May 2007).
-
(2007)
Statement of Glenn A. Fine, Inspector General, U.S. Department of Justice, before the Permanent Select Committee on Intelligence U.S. House of Representatives concerning the FBI’s Use of National Security Letters and Section 215 Requests for Business Records
-
-
Fine, G.1
-
212
-
-
0005841141
-
Locating frames in the discursive universe’
-
(accessed 14 May 2007)
-
Fisher, K. (1997) 'Locating frames in the discursive universe', Sociological Research Online, 3, 2. Available online at www.socresonline.org.uk/socresonline/2/3/4.html(accessed 14 May 2007).
-
(1997)
Sociological Research Online
, vol.3
, pp. 2
-
-
Fisher, K.1
-
213
-
-
84861251379
-
Information age state security: New threats to old boundaries’
-
November 2001, (accessed 14 May 2007)
-
Fisher, U. (2001) 'Information age state security: New threats to old boundaries', Journal for Homeland Security, November 2001. Available online at www.homelandsecurity.org/journal/articles/fisher.htm (accessed 14 May 2007).
-
(2001)
Journal for Homeland Security
-
-
Fisher, U.1
-
214
-
-
84911048051
-
Cybersecurity expert warns of post-9/11 vulnerability’
-
9 September 2003, (accessed 14 May 2007)
-
Fitzpatrick, D. (2003) 'Cybersecurity Expert Warns of Post-9/11 Vulnerability', Pittsburgh Post-Gazette, 9 September 2003. Available online at www.post-gazette.com/pg/03252/219578.stm (accessed 14 May 2007).
-
(2003)
Pittsburgh Post-Gazette
-
-
Fitzpatrick, D.1
-
217
-
-
84911208670
-
Information warfare: The organizational dimension
-
Neilson, B. (ed.), Washington, DC: National Defense University Press
-
Fredericks, B. (1997) 'Information warfare: The organizational dimension', in Neilson, B. (ed.) Sun Tzu and the Art of War in Information Warfare: A Collection of Winning Papers from the Sun Tzu Art of War in Information Warfare Competition, Washington, DC: National Defense University Press, pp. 79-102.
-
(1997)
Sun Tzu and the Art of War in Information Warfare: A Collection of Winning Papers from the Sun Tzu Art of War in Information Warfare Competition
, pp. 79-102
-
-
Fredericks, B.1
-
218
-
-
0141940614
-
Prevention, not preemption
-
Freedman, L. (2003) 'Prevention, not preemption', The Washington Quarterly, 26, 2, pp. 105-14.
-
(2003)
The Washington Quarterly
, vol.26
, Issue.2
, pp. 105-114
-
-
Freedman, L.1
-
220
-
-
85145535658
-
-
16 February 2000., (accessed 14 May 2007)
-
Freeh, L.J. (2000) Statement of Louis J. Freeh, Director Federal Bureau of Investigation Before the Senate Committee on Appropriations Subcommittee for the Departments of Commerce, Justice, State, the Judiciary, and Related Agencies, 16 February 2000. Available online at www.milnet.com/infowar/cyber021600.htm (accessed 14 May 2007).
-
(2000)
Statement of Louis J. Freeh, Director Federal Bureau of Investigation before the Senate Committee on Appropriations Subcommittee for the Departments of Commerce, Justice, State, the Judiciary, and Related Agencies
-
-
Freeh, L.J.1
-
222
-
-
84911048045
-
Computer viruses: Making the time fit the crime’
-
(accessed 14 May 2007)
-
Froehlich, J.N., Pinter, E.M., and Witmeyer III, J.J. (1997) 'Computer viruses: Making the time fit the crime', Legal Column Archives. Available online at www.fmew.com/archive/ (accessed 14 May 2007).
-
(1997)
Legal Column Archives
-
-
Froehlich, J.N.1
Pinter, E.M.2
Witmeyer, J.J.3
-
223
-
-
84900329757
-
The metaphor is the key: Cryptography, the clipper chip, and the constitution
-
Froomkin, A.M. (1995) 'The metaphor is the key: Cryptography, the clipper chip, and the constitution', University of Pennsylvania Law Review, 143, pp. 709-897.
-
(1995)
University of Pennsylvania Law Review
, vol.143
, pp. 709-897
-
-
Froomkin, A.M.1
-
226
-
-
85145532789
-
Security leaks and unknown bedeviled kosovo commanders’
-
1 November 1999
-
Fulghum, D. (1999), 'Security leaks and unknown bedeviled Kosovo commanders', Aviation Week and Space Technology, 151, 18, 1 November 1999, pp. 33-6.
-
(1999)
Aviation Week and Space Technology
, vol.151
, Issue.18
, pp. 33-36
-
-
Fulghum, D.1
-
227
-
-
0003588252
-
-
New York: W W Norton & Co
-
Fursenko, A. and Naftali, T. (1997) One Hell of a Gamble: Khrushchev, Castro, and Kennedy, 1958-1964, New York: W W Norton & Co.
-
(1997)
One Hell of a Gamble: Khrushchev, Castro, and Kennedy, 1958-1964
-
-
Fursenko, A.1
Naftali, T.2
-
229
-
-
0004218798
-
-
Cambridge: Cambridge University Press
-
Gamson, W.A. (1992) Talking Politics, Cambridge: Cambridge University Press.
-
(1992)
Talking Politics
-
-
Gamson, W.A.1
-
230
-
-
84911048044
-
United states general accounting office
-
Report to the Honorable Jack Brooks, Chairman, Committee on the Judiciary, House of Representatives, GAO/OSI-94-2, 4 November 1993, Washington, DC: General Accounting Office
-
GAO (1985) United States General Accounting Office, Communications Privacy: Federal Policy and Actions, Report to the Honorable Jack Brooks, Chairman, Committee on the Judiciary, House of Representatives, GAO/OSI-94-2, 4 November 1993, Washington, DC: General Accounting Office.
-
(1985)
Communications Privacy: Federal Policy and Actions
-
-
-
231
-
-
84911047973
-
United states general accounting office
-
Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce House of Representatives, GAO/IMTEC-89-57, June 1989, Washington, DC: General Accounting Office
-
GAO (1989) United States General Accounting Office, Computer Security Virus Highlights Need for Improved Internet Management, Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce House of Representatives, GAO/IMTEC-89-57, June 1989, Washington, DC: General Accounting Office.
-
(1989)
Computer Security Virus Highlights Need for Improved Internet Management
-
-
-
232
-
-
84911047972
-
United states general accounting office
-
GAO/T-IMTEC-92-5, 20 November 1991, Washington, DC: General Accounting Office
-
GAO (1991) United States General Accounting Office, Computer Security: Hackers Penetrate DoD Computer Systems, GAO/T-IMTEC-92-5, 20 November 1991, Washington, DC: General Accounting Office.
-
(1991)
Computer Security: Hackers Penetrate Dod Computer Systems
-
-
-
233
-
-
85145537846
-
United states general accounting office
-
Warren G. Reed before the Subcommittee on Transportation, Aviation, and Materials, Committee on Science and Technology, 17 June 1985, Washington, DC: General Accounting Office
-
GAO (1995) United States General Accounting Office, The Potential Impact of NationalSecurity Decision Directive (NSDD) 145 on Civil Agencies, Warren G. Reed before the Subcommittee on Transportation, Aviation, and Materials, Committee on Science and Technology, 17 June 1985, Washington, DC: General Accounting Office.
-
(1995)
The Potential Impact of National
-
-
-
234
-
-
84911047970
-
United states general accounting office
-
GAO/AIMD-96-84, 22 May 1996, Washington, DC: General Accounting Office
-
GAO (1996) United States General Accounting Office, Information Security: Computer attacks at Department of Defense Pose Increasing Risk, GAO/AIMD-96-84, 22 May 1996, Washington, DC: General Accounting Office.
-
(1996)
Information Security: Computer Attacks at Department of Defense Pose Increasing Risk
-
-
-
235
-
-
85145545408
-
United states general accounting office
-
GAO/AIMD-00-1, 1 October 1999, Washington, DC: General Accounting Office
-
GAO (1999) United States General Accounting Office, Critical Infrastructure Protection:Comprehensive Strategy Can Draw on Year 2000 Experiences, GAO/AIMD-00-1, 1 October 1999, Washington, DC: General Accounting Office.
-
(1999)
Critical Infrastructure Protection:
-
-
-
236
-
-
85145546520
-
United states general accounting office
-
GAO-01-323, 25 April 2001, Washington, DC: General Accounting Office
-
GAO (2001) United States General Accounting Office, Critical Infrastructure Protection:Significant Challenges in Developing Analysis, Warning, and Response Capabilities, GAO-01-323, 25 April 2001, Washington, DC: General Accounting Office.
-
(2001)
Critical Infrastructure Protection:
-
-
-
239
-
-
0011016060
-
Cyber-attacks by al qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, experts say
-
27 June 2002
-
Gellman, B. (2002) 'Cyber-attacks by Al qaeda feared: Terrorists at threshold of using internet as tool of bloodshed, Experts say', Washington Post, 27 June 2002, p. A01.
-
(2002)
Washington Post
, pp. A01
-
-
Gellman, B.1
-
241
-
-
84911047965
-
Nsas operation eligible receiver’
-
16 April 1998
-
Gertz, B. (1998) 'NSA's operation eligible receiver', The Washington Times, 16 April 1998.
-
(1998)
The Washington Times
-
-
Gertz, B.1
-
242
-
-
84937188344
-
Taming the net? The issue of government control on the internet
-
Giacomello, G. (1999) 'Taming the net? The issue of government control on the Internet', Swiss Political Science Review, 5, 2, pp. 116-22.
-
(1999)
Swiss Political Science Review
, vol.5
, Issue.2
, pp. 116-122
-
-
Giacomello, G.1
-
245
-
-
84911047964
-
Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 1st report
-
15 December1999, Washington, DC: RAND
-
Gilmore (1999) Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 1st Report, Assessing the Threat, 15 December 1999, Washington, DC: RAND.
-
(1999)
Assessing the Threat
-
-
-
246
-
-
84908658294
-
Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 2nd report
-
15 December 2000, Washington, DC: RAND
-
Gilmore (2000) Advisory panel to assess domestic response capabilities for terrorism involving weapons of mass destruction, 2nd Report, Toward a National Strategy for Combating Terrorism, 15 December 2000, Washington, DC: RAND.
-
(2000)
Toward a National Strategy for Combating Terrorism
-
-
-
247
-
-
84911047962
-
Rumsfeld to nato: Prepare now for emerging threats
-
7 June 2001
-
Gilmore, G. J. (2001) 'Rumsfeld to NATO: Prepare now for emerging threats', American Forces Press Service, 7 June 2001.
-
(2001)
American Forces Press Service
-
-
Gilmore, G.J.1
-
248
-
-
0002177243
-
-
Vienna: The International Press Institute
-
Goff, P. (ed.) (1999) Kosovo News and Propaganda War, Vienna: The International Press Institute.
-
(1999)
Kosovo News and Propaganda War
-
-
Goff, P.1
-
249
-
-
0035642633
-
New threats, new identities and new ways of war: The sources of change in national security doctrine
-
Goldman, E.O. (2001) 'New threats, new identities and new ways of war: The sources of change in national security doctrine', Journal of Strategic Studies, 24, 3, pp. 12-42.
-
(2001)
Journal of Strategic Studies
, vol.24
, Issue.3
, pp. 12-42
-
-
Goldman, E.O.1
-
250
-
-
84911066007
-
Vom umgang mit komplexität: Denkfallen und entscheidungshilfen
-
Mey, H. and Lehmann Pollheimer, D, Zürich: Vdf Hochschulverlag AG
-
Gomez, P. (2001) 'Vom Umgang mit Komplexität: Denkfallen und Entscheidungshilfen', in Mey, H. and Lehmann Pollheimer, D. (eds) Absturz im freien Fall - Anlauf zu neuen Höhenflügen: Gutes Entscheiden in Wirtschaft, Politik und Gesellschaft, Zürich: Vdf Hochschulverlag AG, pp. 151-66.
-
(2001)
Absturz Im Freien Fall - Anlauf Zu Neuen Höhenflügen: Gutes Entscheiden in Wirtschaft, Politik Und Gesellschaft
, pp. 151-166
-
-
Gomez, P.1
-
251
-
-
84899413556
-
The emerging consensus on criminal conduct in cyberspace
-
Goodman, M.D. and Brenner, S.W. (2002) 'The emerging consensus on criminal conduct in cyberspace', UCLA Journal of Law and Technology, 10, 2, pp. 139-223.
-
(2002)
UCLA Journal of Law and Technology
, vol.10
, Issue.2
, pp. 139-223
-
-
Goodman, M.D.1
Brenner, S.W.2
-
252
-
-
85145542810
-
-
Document CNI/04, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures, Seoul, 20-2 May 2002, (accessed 14 May 2007)
-
Goodman, S.E., Hassebroek, P.B., King, D. and Azment, A. (2002) International Coordination to Increase the Security of Critical Network Infrastructures, Document CNI/04, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures, Seoul, 20-2 May 2002. Available online at www.itu.int/osg/spu/ni/security/docs/cni.04.pdf (accessed 14 May 2007).
-
(2002)
International Coordination to Increase the Security of Critical Network Infrastructures
-
-
Goodman, S.E.1
Hassebroek, P.B.2
King, D.3
Azment, A.4
-
253
-
-
44949162596
-
Bush orders guidelines for cyber-warfare: Rules for attacking enemy computers prepared as U.S. Weighs iraq options
-
Graham, B. (2003) 'Bush orders guidelines for cyber-warfare: Rules for attacking enemy computers prepared as U.S. weighs Iraq options', Washington Post, 7 February 2003, p. A01.
-
(2003)
Washington Post, 7 February
, vol.2003
, pp. A01
-
-
Graham, B.1
-
254
-
-
27944455431
-
The myth of cyberterrorism’
-
November 2002, (accessed 14 May 2007)
-
Green, J. (2002) 'The myth of cyberterrorism', Washington Monthly, November 2002. Available online at www.washingtonmonthly.com/features/2001/0211.green.html (accessed 14 May 2007).
-
(2002)
Washington Monthly
-
-
Green, J.1
-
255
-
-
84861178590
-
U.S. Cybersecurity chief resigns: Amit yoran, said to be frustrated with progress, gives one-day notice’
-
01 October 2004, (accessed 14 May 2007)
-
Gross, G. (2004) 'U.S. Cybersecurity chief resigns: Amit Yoran, said to be Frustrated with progress, gives one-day notice', IDG News Service, 01 October 2004. Available online at www.infoworld.com/infoworld/article/04/10/01/HNchiefresigns_1.html (accessed 14 May 2007).
-
(2004)
IDG News Service
-
-
Gross, G.1
-
256
-
-
84911047960
-
Constructivism and the role of institutions in international relations
-
Copenhagen: Copenhagen Peace Research Institute
-
Guzzini, S. (2002) 'Constructivism and the role of institutions in international relations', Copenhagen Peace Research Institute Working Papers, 38, Copenhagen: Copenhagen Peace Research Institute.
-
(2002)
Copenhagen Peace Research Institute Working Papers
, pp. 38
-
-
Guzzini, S.1
-
257
-
-
84972264695
-
Introduction: Epistemic communities and international policy coordination
-
Haas, P.M. (1992) 'Introduction: Epistemic communities and international policy coordination', International Organization, 46, 1, pp. 1-35.
-
(1992)
International Organization
, vol.46
, Issue.1
, pp. 1-35
-
-
Haas, P.M.1
-
258
-
-
0002329486
-
Epistemic communities and the dynamics of international environmental co-operation
-
Rittberger, V. (ed.), Oxford: Clarendon Press
-
Haas, P.M. (1993) 'Epistemic communities and the dynamics of international environmental co-operation', in Rittberger, V. (ed.) Regime Theory and International Relations, Oxford: Clarendon Press, pp. 168-201.
-
(1993)
Regime Theory and International Relations
, pp. 168-201
-
-
Haas, P.M.1
-
260
-
-
85145534314
-
-
(accessed 14 May 2007)
-
Hack FAQ (2004) Available online at www.nmrc.org/pub/faq/hackfaq/index.html (accessed 14 May 2007).
-
(2004)
-
-
Hack, F.1
-
262
-
-
0035281847
-
Leontief-based model of risk in complex interconnected infrastructures
-
Haimes, Y.Y. and Jiang, P. (2001) 'Leontief-based model of risk in complex interconnected infrastructures', Journal of Infrastructure Systems, 7, 1, pp. 1-12.
-
(2001)
Journal of Infrastructure Systems
, vol.7
, Issue.1
, pp. 1-12
-
-
Haimes, Y.Y.1
Jiang, P.2
-
263
-
-
84900127683
-
The internet and national security: Emerging issues
-
Alberts, D.S. and Papp, D.S, Washington, DC: National Defense University Press
-
Halperin, D. (2000) 'The Internet and national security: Emerging issues', in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences (Vol. II), Washington, DC: National Defense University Press, pp. 137-73.
-
(2000)
The Information Age: An Anthology of Its Impacts and Consequences
, vol.2
, pp. 137-173
-
-
Halperin, D.1
-
264
-
-
84911047958
-
Critical infrastructure protection - information assurance’
-
[accompanied by Mr. Linton Wells, II, Principal Deputy, Assistant Secretary of Defense for Command, Control, Communications & Intelligence, Department of Defense and Brigadier General John H. Campbell, USAF, Deputy Director for Information Operations (J-39), Department of Defense] 11 June 1998, House Military Procurement and Military Research & Development Subcommittees, (accessed 14 May 2007)
-
Hamre, J.J. (1998) 'Critical infrastructure protection - Information Assurance', Hearing on Intelligence and Security, Testimony of the Deputy Secretary of Defense[accompanied by Mr. Linton Wells, II, Principal Deputy, Assistant Secretary of Defense for Command, Control, Communications & Intelligence, Department of Defense and Brigadier General John H. Campbell, USAF, Deputy Director for Information Operations (J-39), Department of Defense] 11 June 1998, House Military Procurement and Military Research & Development Subcommittees. Available online at www.fas.org/irp/congress/1998_hr/98-06-11hamre.htm (accessed 14 May 2007).
-
(1998)
Hearing on Intelligence and Security, Testimony of the Deputy Secretary of Defense
-
-
Hamre, J.J.1
-
265
-
-
85145532008
-
-
18 February 2003, (accessed 14 May 2007)
-
Hamre, J.J. (2003) Frontline Interview with John Hamre, 18 February 2003. Available online at www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html (accessed 14 May 2007).
-
(2003)
Frontline Interview with John Hamre
-
-
Hamre, J.J.1
-
267
-
-
84895677832
-
Media use backfires on u.S.; many ask if pentagon altered information to make case for war
-
11 December 2005
-
Hedges, S.J. (2005), 'Media use backfires on U.S.; many ask if pentagon altered information to make case for war', Chicago Tribune, 11 December 2005.
-
(2005)
Chicago Tribune
-
-
Hedges, S.J.1
-
268
-
-
33749831917
-
Social perception and phenomenal causality
-
Heider, F. (1944) 'Social perception and phenomenal causality', Psychological Review, 51, pp. 358-74.
-
(1944)
Psychological Review
, vol.51
, pp. 358-374
-
-
Heider, F.1
-
271
-
-
84937185992
-
Military theory and information warfare
-
Henry, R. and Peartree, E.C. (eds) (1998b) 'Military theory and information warfare', Parameters, XXVIII, 3, pp. 121-35.
-
(1998)
Parameters
, vol.28
, Issue.3
, pp. 121-135
-
-
Henry, R.1
Peartree, E.C.2
-
272
-
-
4644334739
-
Technology and international systems
-
Herrera, G. (2003) 'Technology and international systems', Millennium, 32, 3, pp. 559-94.
-
(2003)
Millennium
, vol.32
, Issue.3
, pp. 559-594
-
-
Herrera, G.1
-
273
-
-
84940930822
-
Cyberspace and sovereignty: Thoughts on physical space and digital space
-
Dunn Cavelty, M., Mauer, V. and Krishna-Hensel S.-F, Aldershot: Ashgate
-
Herrera, G. (2007) 'Cyberspace and sovereignty: Thoughts on physical space and digital space', in Dunn Cavelty, M., Mauer, V. and Krishna-Hensel S.-F. (eds) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, Aldershot: Ashgate.
-
(2007)
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
-
-
Herrera, G.1
-
274
-
-
85145545182
-
-
Congressional Research Report for Congress, RL30735, 19 June 2001, Washington, DC: Congressional Research Service
-
Hildreth, S.A. (2001) Cyberwarfare, Congressional Research Report for Congress, RL30735, 19 June 2001, Washington, DC: Congressional Research Service.
-
(2001)
Cyberwarfare
-
-
Hildreth, S.A.1
-
276
-
-
0003539823
-
-
Washington, DC: Johns Hopkins University Press
-
Hobart, M.E. and Schiffman, Z.S. (2000) Information Ages: Literacy, Numeracy, and the Computer Revolution, Washington, DC: Johns Hopkins University Press.
-
(2000)
Information Ages: Literacy, Numeracy, and the Computer Revolution
-
-
Hobart, M.E.1
Schiffman, Z.S.2
-
277
-
-
84900203812
-
U.S. Opened cyber-war during kosovo fight’
-
October 1999
-
Hoffmann, L. (1999) 'U.S. opened cyber-war during Kosovo fight', Washington Times, 24 October 1999, p. C1.
-
(1999)
Washington Times
, vol.24
, pp. C1
-
-
Hoffmann, L.1
-
278
-
-
84911047955
-
The functional security agenda in the nordic states
-
Opublicerad rapport, Utrikespolitiska Institutet, Sweden: University of Uppsala
-
Holmgren, J. and Softa, J. (2003) 'The functional security agenda in the Nordic States', Threat Politics Project, Opublicerad rapport, Utrikespolitiska Institutet, Sweden: University of Uppsala.
-
(2003)
Threat Politics Project
-
-
Holmgren, J.1
Softa, J.2
-
279
-
-
50649088086
-
-
Institute of International Relations, The University of British Columbia, Working Paper No. 26, December, (accessed 14 May 2007)
-
Holsti, K.J. (1998) The Problem of Change in International Relations Theory, Institute of International Relations, The University of British Columbia, Working Paper No. 26, December. Available online at www.iir.ubc.ca/site_template/workingpapers/webwp26.pdf (accessed 14 May 2007).
-
(1998)
The Problem of Change in International Relations Theory
-
-
Holsti, K.J.1
-
283
-
-
0007836321
-
Emerging challenge: Security and safety in cyberspace
-
Arquilla, J. and David R, Santa Monica: RAND
-
Hundley, R.O. and Anderson, R.H. (1997) 'Emerging challenge: Security and safety in cyberspace', in Arquilla, J. and David R. (eds) In Athena's Camp: Preparing for Conflict in the Information Age, Santa Monica: RAND, pp. 231-52.
-
(1997)
In Athena’s Camp: Preparing for Conflict in the Information Age
, pp. 231-252
-
-
Hundley, R.O.1
Anderson, R.H.2
-
284
-
-
85145538269
-
-
Santa Monica: RAND
-
Hundley, R.O., Anderson, R.H., Bikson, T.K., Dewar, J.A., Green, J.D., Libicki, M.C., and Neu, C.R. (2000) The Global Course of the Information Revolution: Political, Economic, and Social Consequences Proceedings of an International Conference, Santa Monica: RAND.
-
(2000)
The Global Course of the Information Revolution: Political, Economic, and Social Consequences Proceedings of an International Conference
-
-
Hundley, R.O.1
Erson, R.H.2
Bikson, T.K.3
Dewar, J.A.4
Green, J.D.5
Libicki, M.C.6
Neu, C.R.7
-
286
-
-
0032093986
-
Security! what do you mean? From concept to thick signifier
-
Huysmans, J. (1998a) 'Security! What do you mean? From concept to thick signifier', European Journal of International Relations, 4, 2, pp. 226-55.
-
(1998)
European Journal of International Relations
, vol.4
, Issue.2
, pp. 226-255
-
-
Huysmans, J.1
-
287
-
-
0032341575
-
Revisiting copenhagen: Or, on the creative development of a security studies agenda in europe
-
Huysmans, J. (1998b) 'Revisiting Copenhagen: Or, on the creative development of a security studies agenda in Europe', European Journal of International Relations, 4, 4, pp. 479-506.
-
(1998)
European Journal of International Relations
, vol.4
, Issue.4
, pp. 479-506
-
-
Huysmans, J.1
-
288
-
-
0007219152
-
The question of the limit: Desecuritization and the aesthetics of terrorism in political realism
-
Huysmans, J. (1998c) 'The question of the limit: Desecuritization and the aesthetics of terrorism in political realism', Millenium, 27, 3, pp. 569-89.
-
(1998)
Millenium
, vol.27
, Issue.3
, pp. 569-589
-
-
Huysmans, J.1
-
289
-
-
84911139602
-
-
(accessed 14 May 2007)
-
ICSA Labs (2003) ICSA Labs 2002 Virus Prevalence Survey. Available online at www.icsalabs.com/icsa/docs/html/library/whitepapers/VPS2002.pdf (accessed 14 May 2007).
-
(2003)
ICSA Labs 2002 Virus Prevalence Survey
-
-
-
290
-
-
85145535155
-
-
(accessed 14 May 2007)
-
ICSA Labs (2004) ICSA Labs 2003 Virus Prevalence Survey. Available online at www.icsal- abs.com/icsa/docs/html/library/whitepapers/VPS2003.pdf (accessed 14 May 2007).
-
ICSA Labs 2003 Virus Prevalence Survey
-
-
-
291
-
-
84911161999
-
-
(accessed 14 May 2007)
-
ICSA Labs (2005) ICSA Labs 2004 Virus Prevalence Survey. Available online at www.icsal- abs.com/icsa/docs/html/library/whitepapers/VPS2004.pdf (accessed 14 May 2007).
-
(2005)
ICSA Labs 2004 Virus Prevalence Survey
-
-
-
293
-
-
84911047952
-
-
(accessed 14 May 2007)
-
Ignatieff, M. (2004) Virus Report Status for 2004. Available online at www.ipa.go.jp/security/english/virus/press/200412/virus2004.html (accessed 14 May 2007).
-
(2004)
Virus Report Status for 2004
-
-
Ignatieff, M.1
-
294
-
-
84911144697
-
-
(accessed 14 May 2007)
-
Information Technology Promotion Agency IPA (2005) Virus Report Status for 2005. Available online at www.ipa.go.jp/security/english/virus/press/200512/virus2005.html (accessed 14 May 2007).
-
(2005)
Virus Report Status for 2005
-
-
-
296
-
-
27944484713
-
-
Statement for the Record of Vice Admiral Lowell E. Jacoby, USN, Director, Defense Intelligence Agency before the Senate Select Committee on Intelligence, 11 February 2003
-
Jacoby, L. (2003) 'Current and Projected National Security Threats to the United States', Statement for the Record of Vice Admiral Lowell E. Jacoby, USN, Director, Defense Intelligence Agency before the Senate Select Committee on Intelligence, 11 February 2003.
-
(2003)
Current and Projected National Security Threats to the United States
-
-
Jacoby, L.1
-
297
-
-
0002918450
-
Norms, identity, and culture in national security
-
Katzenstein, P.J. (ed.), New York: Columbia University Press
-
Jepperson, R.L., Wendt, A., and Katzenstein, P.J. (1996) 'Norms, identity, and culture in national security', in Katzenstein, P.J. (ed.) The Culture of National Security: Norms and Identity in World Politics, New York: Columbia University Press, pp. 33-75.
-
(1996)
The Culture of National Security: Norms and Identity in World Politics
, pp. 33-75
-
-
Jepperson, R.L.1
Wendt, A.2
Katzenstein, P.J.3
-
298
-
-
85145544507
-
-
NATO Spokesman and Major General Walter Jertz, SHAPE, 28 May 1999, updated 28 May 1999, NATO HQ, Brussels
-
Jertz, W. (1999) Major General Jertz at the Press Conference by Mr Jamie Shea, NATO Spokesman and Major General Walter Jertz, SHAPE, 28 May 1999, updated 28 May 1999, NATO HQ, Brussels.
-
(1999)
Major General Jertz at the Press Conference by Mr Jamie Shea
-
-
Jertz, W.1
-
301
-
-
0000479685
-
A methodology for frame analysis: From discourse to cognitive schemata
-
Johnston, H. and Klandermans, B, London: UCL Press
-
Johnston, H. (1995) 'A methodology for frame analysis: From discourse to cognitive schemata', in Johnston, H. and Klandermans, B. (eds) Social Movements and Culture, London: UCL Press.
-
(1995)
Social Movements and Culture
-
-
Johnston, H.1
-
302
-
-
0003422576
-
-
Washington, DC: U.S. Department of Defense
-
Joint Chiefs of Staff (1996) Joint Vision 2010, Washington, DC: U.S. Department of Defense.
-
(1996)
Joint Vision 2010
-
-
-
305
-
-
85145539770
-
C4 architecture & integration division
-
Washington, DC: Joint Staff, 12 June 1992
-
Joint Staff (1992) C4 Architecture & Integration Division, C4I for the Warrior, Washington, DC: Joint Staff, 12 June 1992.
-
(1992)
C4I for the Warrior
-
-
-
306
-
-
0003402268
-
-
Morristown: General Learning Press
-
Jones, E.E., Kannouse, D.E., Kelley, H.H., Nisbett, R.E., Valins, S. and Weiner, B. (eds) (1972) Attribution: Perceiving the Causes of Behavior, Morristown: General Learning Press.
-
(1972)
Attribution: Perceiving the Causes of Behavior
-
-
Jones, E.E.1
Kannouse, D.E.2
Kelley, H.H.3
Nisbett, R.E.4
Valins, S.5
Weiner, B.6
-
312
-
-
84911047950
-
-
Presidential Memorandum, Washington, DC, 21 August 1963
-
Kennedy, J.F. (1963) National Communications System, Presidential Memorandum, Washington, DC, 21 August 1963.
-
(1963)
National Communications System
-
-
Kennedy, J.F.1
-
313
-
-
11544251159
-
Power and interdependence in the information age
-
(September/October)
-
Keohane, R.O. and Nye, J.S. (1998) 'Power and interdependence in the information age', Foreign Affairs 77, 5 (September/October) pp. 81-94.
-
(1998)
Foreign Affairs
, vol.77
, Issue.5
, pp. 81-94
-
-
Keohane, R.O.1
Nye, J.S.2
-
314
-
-
84911047949
-
National security and information technology’
-
Senate, 12 October 1998, (accessed 14 May 2007)
-
Kerrey, B. (1998) 'National security and information technology', 1998 Congressional Debate, Senate, 12 October 1998. Available online at www.fas.org/irp/con-gress/1998_cr/s981012-info.htm (accessed 14 May 2007).
-
(1998)
1998 Congressional Debate
-
-
Kerrey, B.1
-
317
-
-
85145513975
-
-
Congressional Research Report for Congress, RL31845, 20 February 2003, Washington, DC: Congressional Research Service
-
Knezo, G. (2003) Sensitive but Unclassified' and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy, Congressional Research Report for Congress, RL31845, 20 February 2003, Washington, DC: Congressional Research Service.
-
(2003)
Sensitive but Unclassified’ and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy
-
-
Knezo, G.1
-
318
-
-
84937338220
-
Asymmetric threats to the united states
-
Kolet, K.S. (2001) 'Asymmetric Threats to the United States', Comparative Strategy, 20, 3, pp. 277-92.
-
(2001)
Comparative Strategy
, vol.20
, Issue.3
, pp. 277-292
-
-
Kolet, K.S.1
-
320
-
-
84911047947
-
Top cyber-security post is filled’
-
18 September 2006, accessed 14 May 2007
-
Krebs, B. (2006) 'Top cyber-security post is filled', washingtonpost.com, 18 September 2006. Available online at www.washingtonpost.com/wp-dyn/content/article/2006/09/18/AR2006091800928.html (accessed 14 May 2007).
-
(2006)
Washingtonpost.Com
-
-
Krebs, B.1
-
321
-
-
0002019292
-
Cavalry to computer: The pattern of military revolutions
-
Krepinevich, A. (1994) 'Cavalry to computer: The pattern of military revolutions', The National Interest, 37, pp. 30-42.
-
(1994)
The National Interest
, vol.37
, pp. 30-42
-
-
Krepinevich, A.1
-
322
-
-
84911047946
-
The bush administration’s call for defense transformation: A congressional guide’
-
19 Juni 2001. (accessed 14 May 2007)
-
Krepinevich, A. (2001) 'The Bush administration's call for defense transformation: A congressional guide', Center for Strategic and Budgetary Assessments, 19 Juni 2001. Available online at www.csbaonline.org/4Publications/Archive/H.20010619.The_Bush_Admin-istr/H.20010619.The_Bush_Administr.htm (accessed 14 May 2007).
-
(2001)
Center for Strategic and Budgetary Assessments
-
-
Krepinevich, A.1
-
323
-
-
79961041598
-
The absolute protection of our citizens: Critical infrastructure protection and the practice of security’
-
Dunn Cavelty, M. and Kristensen, K.S, London: Routledge
-
Kristensen, K.S. (forthcoming 2008) '"The Absolute Protection of our Citizens": Critical Infrastructure Protection and the Practice of Security', in Dunn Cavelty, M. and Kristensen, K.S. (eds), The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, London: Routledge.
-
(2008)
The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation
-
-
Kristensen, K.S.1
-
324
-
-
84900155995
-
Information challenges to security
-
Krutskikh, A. (1999) 'Information challenges to security', International Affairs, 45, 2, pp. 29-37.
-
(1999)
International Affairs
, vol.45
, Issue.2
, pp. 29-37
-
-
Krutskikh, A.1
-
326
-
-
85145542003
-
-
(accessed 14 May 2007)
-
Kuehl, D. 2000. Available online at www.iwar.org.uk/cip/resources/senate/economy/kuehl~1.htm (accessed 14 May 2007).
-
(2000)
-
-
Kuehl, D.1
-
327
-
-
84911047944
-
The information component of power and the national security strategy
-
Campen, A.D. and Dearth, D.H, Fairfax: AFCEA International Press
-
Kuehl, D. (2000b) 'The information component of power and the national security strategy', in Campen, A.D. and Dearth, D.H. (eds) Cyberwar 3.0: Human Factors in Information Operations and Future Conflict, Fairfax: AFCEA International Press.
-
(2000)
Cyberwar 3.0: Human Factors in Information Operations and Future Conflict
-
-
Kuehl, D.1
-
330
-
-
84911047943
-
Clinton gives a final foreign policy speech’
-
9 December 2000
-
Lacey, M. (2000) 'Clinton gives a final foreign policy speech', New York Times, 9 December 2000.
-
(2000)
New York Times
-
-
Lacey, M.1
-
338
-
-
84908962054
-
The small and the many
-
Arquilla, J. and Ronfeldt, D, Santa Monica, RAND
-
Libicki, M. (1997a) 'The small and the many', in Arquilla, J. and Ronfeldt, D. (eds) In Athena'sCamp: Preparing for Conflict in the Information Age, Santa Monica, RAND, pp. 191-216.
-
(1997)
In Athena’s
, pp. 191-216
-
-
Libicki, M.1
-
339
-
-
84911047942
-
-
Strategic Forum No. 132, Washington, DC, National Defense University
-
Libicki, M. (1997b) Information Dominance, Strategic Forum No. 132, Washington, DC, National Defense University.
-
(1997)
Information Dominance
-
-
Libicki, M.1
-
340
-
-
41849110061
-
-
Mc Nair Paper 61, Washington, DC, National Defense University
-
Libicki, M. (1999) Illuminating Tomorrow's War, Mc Nair Paper 61, Washington, DC, National Defense University.
-
(1999)
Illuminating Tomorrow’s War
-
-
Libicki, M.1
-
341
-
-
84911047941
-
-
The Force Planning Faculty, Newport: Naval War College
-
Lloyd, R. Bartlett, H.C., Denny, D., Holman G.P., Kirby, J.M., Lawler, T., Owens, M.T., Freeman, K.E., and Smith, E.F. (eds) (1990) Fundamentals of Force Planning, Vol. 1: Concepts, The Force Planning Faculty, Newport: Naval War College.
-
(1990)
Fundamentals of Force Planning, Vol. 1: Concepts
-
-
Lloyd, R.1
Bartlett, H.C.2
Denny, D.3
Holman, G.P.4
Kirby, J.M.5
Lawler, T.6
Owens, M.T.7
Freeman, K.E.8
Smith, E.F.9
-
342
-
-
0012239890
-
Virtual risks in an age of cybernetic reproduction
-
Adam, B., Beck, U. and Loon, J. van, London: Sage
-
Loon, J. van (2000) 'Virtual risks in an age of cybernetic reproduction', in Adam, B., Beck, U. and Loon, J. van (eds) The Risk Society and Beyond: Critical Issues for Social Theory, London: Sage, pp. 165-82.
-
(2000)
The Risk Society and Beyond: Critical Issues for Social Theory
, pp. 165-182
-
-
Loon Van, J.1
-
345
-
-
0041927162
-
War in the information age
-
Mahnken, T.G. (1995) 'War in the information age', Joint Force Quarterly, 10, pp. 39-43.
-
(1995)
Joint Force Quarterly
, vol.10
, pp. 39-43
-
-
Mahnken, T.G.1
-
346
-
-
84861124865
-
U.S. Cybersecurity chief resigns
-
Mark, R. (2004) 'U.S. cybersecurity chief resigns', eSecurity Planet, 1 October 2004.
-
(2004)
Esecurity Planet
-
-
Mark, R.1
-
347
-
-
21244453393
-
Interdependencies with the information infrastructure: Dependability and complexity issues’
-
Ispra, 26-9 June 2001., (accessed 14 May 2007)
-
Masera, M. and Wilikens, M. (2001), 'Interdependencies with the information infrastructure: Dependability and complexity issues', unpublished paper, given at the 5th Inter-national Conference on Technology, Policy, and Innovation, Ispra, 26-9 June 2001. Available online at www.delft2001.tudelft.nl/paper%20files/paper1168.doc (accessed 14 May 2007).
-
(2001)
Unpublished Paper, Given at the 5Th Inter-National Conference on Technology, Policy, and Innovation
-
-
Masera, M.1
Wilikens, M.2
-
348
-
-
84873710190
-
The security of information and communication systems and the e+i paradigm
-
Gheorghe, A.V., Masera, M., Weijnen, M.P.C. and de Vries, L.J, Dodrecht: Springer
-
Masera, M., Stefanini, A. and Dondossola, G. (2006) 'The security of information and communication systems and the E+I paradigm', in Gheorghe, A.V., Masera, M., Weijnen, M.P.C. and de Vries, L.J. (eds) Critical Infrastructures at Risk: Securing the European Electric Power System, Dodrecht: Springer, pp. 85-116.
-
(2006)
Critical Infrastructures at Risk: Securing the European Electric Power System
, pp. 85-116
-
-
Masera, M.1
Stefanini, A.2
Dondossola, G.3
-
352
-
-
0030546131
-
Identity and security: Buzan and the copenhagen school
-
McSweeney, B. (1996) 'Identity and security: Buzan and the Copenhagen school', Review of International Studies, 22, 1, pp. 81-93.
-
(1996)
Review of International Studies
, vol.22
, Issue.1
, pp. 81-93
-
-
McSweeney, B.1
-
353
-
-
21944452032
-
Durkheim and the copenhagen school: A response to buzan and wsver
-
McSweeney, B. (1998) 'Durkheim and the Copenhagen school: A response to Buzan and Wsver', Review of International Studies, 24, 1, pp. 137-40.
-
(1998)
Review of International Studies
, vol.24
, Issue.1
, pp. 137-140
-
-
McSweeney, B.1
-
355
-
-
84911047938
-
Suspect claims al qaeda hacked microsoft - expert
-
17 December 2001
-
McWilliams, B. (2001) 'Suspect claims Al Qaeda hacked Microsoft - expert', Newsbytes, 17 December 2001.
-
(2001)
Newsbytes
-
-
McWilliams, B.1
-
356
-
-
28844482932
-
Metcalfes law: A network becomes more valuable as it reaches more users’
-
2 October 1995
-
Metcalfe, B. (1995) 'Metcalfe's law: A network becomes more valuable as it reaches more users', Infoworld, 2 October 1995, p. 53.
-
(1995)
Infoworld
, pp. 53
-
-
Metcalfe, B.1
-
357
-
-
84911047937
-
Lessons from the military experience: The U.S. Military and the ir: The pitfalls of uneven adaptation
-
Copeland, Thomas E. (ed.), Carlisle: Strategic Studies Institute
-
Metz, S. (2000a) 'Lessons from the military experience: The U.S. military and the IR: The pitfalls of uneven adaptation', in Copeland, Thomas E. (ed.) The Information Revolution and National Security, Carlisle: Strategic Studies Institute, pp. 56-61.
-
(2000)
The Information Revolution and National Security
, pp. 56-61
-
-
Metz, S.1
-
358
-
-
84895207765
-
The next twist of the rma
-
Autumn
-
Metz, S. (2000b) 'The Next Twist of the RMA', Parameters, XXX, 3, Autumn, pp. 40-53.
-
(2000)
Parameters
, vol.30
, Issue.3
, pp. 40-53
-
-
Metz, S.1
-
361
-
-
14844333987
-
The concept of critical infrastructure protection (Cip)
-
Bailes, A. J. K. and Frommelt, I, Oxford University Press: Oxford
-
Metzger, J. (2004) 'The concept of critical infrastructure protection (CIP)', in Bailes, A. J. K. and Frommelt, I. (eds) Business and Security: Public-Private Sector Relationships in a New Security Environment, Oxford University Press: Oxford, pp. 197-209.
-
(2004)
Business and Security: Public-Private Sector Relationships in a New Security Environment
, pp. 197-209
-
-
Metzger, J.1
-
362
-
-
0007196466
-
The persistence of ‘emergence
-
Eve, R.A., Horsfall, S. and Lee, M.E, Thousand Oaks: Sage Publications
-
Mihata, K. (1997) 'The persistence of 'emergence', in Eve, R.A., Horsfall, S. and Lee, M.E. (eds) Chaos, Complexity, and Sociology: Myths, Models, and Theories, Thousand Oaks: Sage Publications, pp. 30-8.
-
(1997)
Chaos, Complexity, and Sociology: Myths, Models, and Theories
, pp. 30-38
-
-
Mihata, K.1
-
363
-
-
84911101208
-
-
24 June 1998, (accessed 14 May 2007)
-
Minihan, K. (1998) Statement of Lieutenant General Kenneth Minihan, USAF, Director, NSA to the Senate Governmental Affairs Committee Hearing on Vulnerabilities of the National Information Infrastructure, 24 June 1998. Available online at www.senate.gov/~govt-aff/62498minihan.htm (accessed 14 May 2007).
-
(1998)
Statement of Lieutenant General Kenneth Minihan, USAF, Director, NSA to the Senate Governmental Affairs Committee Hearing on Vulnerabilities of the National Information Infrastructure
-
-
Minihan, K.1
-
364
-
-
84911047936
-
Neuerausforderung für die rüstungskontrolle
-
31 May 2000
-
Minkwitz, O. and Schöfbänker, G. (2000) 'Neuerausforderung für die Rüstungskontrolle', telepolis, 31 May 2000.
-
(2000)
Telepolis
-
-
Minkwitz, O.1
Schöfbänker, G.2
-
367
-
-
0000793139
-
Cramming more components onto integrated circuits
-
Moore, G.E. (1965) 'Cramming more components onto integrated circuits', Electronics, 38, 8, pp. 114-17.
-
(1965)
Electronics
, vol.38
, Issue.8
, pp. 114-117
-
-
Moore, G.E.1
-
368
-
-
85145520833
-
-
Congressional Research Report for Congress, RL30153, 10 February 2003, Washington, DC: Congressional Research Service
-
Moteff, J.D. (2003) Critical Infrastructures: Background, Policy, and Implementation, Congressional Research Report for Congress, RL30153, 10 February 2003, Washington, DC: Congressional Research Service.
-
(2003)
Critical Infrastructures: Background, Policy, and Implementation
-
-
Moteff, J.D.1
-
369
-
-
85145535969
-
-
Congressional Research Report for Congress, RL33648, 14 September 2006, Washington, DC: Congressional Research Service
-
Moteff, J.D. (2006) Critical Infrastructure: The National Asset Database, Congressional Research Report for Congress, RL33648, 14 September 2006, Washington, DC: Congressional Research Service.
-
(2006)
Critical Infrastructure: The National Asset Database
-
-
Moteff, J.D.1
-
370
-
-
85145512773
-
-
Congressional Research Report for Congress, RL30153, 13 March 2007, Washington, DC: Congressional Research Service
-
Moteff, J.D. (2007) Critical Infrastructures: Background, Policy, and Implementation, Congressional Research Report for Congress, RL30153, 13 March 2007, Washington, DC: Congressional Research Service.
-
(2007)
Critical Infrastructures: Background, Policy, and Implementation
-
-
Moteff, J.D.1
-
371
-
-
85145528543
-
-
Congressional Research Report for Congress, RL31556, 29 January 2002, Washington, DC: Congressional Research Service
-
Moteff, J.D., Copeland, C., and Fischer, J. (2002) Critical Infrastructures: What Makes an Infrastructure Critical? Congressional Research Report for Congress, RL31556, 29 January 2002, Washington, DC: Congressional Research Service.
-
(2002)
Critical Infrastructures: What Makes an Infrastructure Critical?
-
-
Moteff, J.D.1
Copeland, C.2
Fischer, J.3
-
372
-
-
85145543446
-
War on terrorism
-
Washington, DC, 11 February 2003
-
Mueller, R.S. (2003) 'War on terrorism', Statement for the Record of Robert S. Mueller, III, Director Federal Bureau of Investigation Before the Select Committee on Intelligence of the United States Senate, Washington, DC, 11 February 2003.
-
(2003)
Statement for the Record of Robert S. Mueller, III, Director Federal Bureau of Investigation before the Select Committee on Intelligence of the United States Senate
-
-
Mueller, R.S.1
-
373
-
-
0005856609
-
-
New York: Random House
-
Mungo, P. and Clough, B. (1993) Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals, New York: Random House.
-
(1993)
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals
-
-
Mungo, P.1
Clough, B.2
-
376
-
-
14844288574
-
Ubiquitous insecurity? How to ‘hack it systems’
-
Näf, M. (2001) 'Ubiquitous insecurity? How to 'hack' IT systems', Information & Security: An International Journal, Volume 7, 2001, pp. 104-18.
-
(2001)
Information & Security: An International Journal
, vol.7
, Issue.2001
, pp. 104-118
-
-
Näf, M.1
-
378
-
-
79959545196
-
Computer science and telecommunications board
-
Washington, DC: National Academy Press
-
National Academy of Sciences (1991) Computer science and telecommunications board, Computers at Risk: Safe Computing in the Information Age, Washington, DC: National Academy Press.
-
(1991)
Computers at Risk: Safe Computing in the Information Age
-
-
-
379
-
-
85120390454
-
Rumsfeld’s roadmap to propaganda’
-
Posted 26 January 2006, (accessed 14 May 2007)
-
National Security Archive (2006) 'Rumsfeld's roadmap to propaganda', National Security Archive Electronic Briefing Book No. 177, Posted 26 January 2006. Available online at www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/index.htm (accessed 14 May 2007).
-
(2006)
National Security Archive Electronic Briefing Book No. 177
-
-
-
381
-
-
84861109957
-
The crime of ‘interruption of computer services to authorized users’ have you ever heard of it?
-
(accessed 14 May 2007)
-
Nemerofsky, J. (2000) 'The crime of 'interruption of computer services to authorized users' Have you ever heard of it?' The Richmond Journal for Law and Technology, 6, 5. Available online at www.richmond.edu/jolt/v6i5/article2.html (accessed 14 May 2007).
-
(2000)
The Richmond Journal for Law and Technology
, vol.6
, Issue.5
-
-
Nemerofsky, J.1
-
382
-
-
84911148569
-
National infrastructure protection center, ‘terrorist interest in water supply and scada systems’
-
30 January 2002
-
NIPC (2002) National infrastructure protection center, 'terrorist interest in water supply and SCADA systems', Information Bulletin 02-001, 30 January 2002.
-
(2002)
Information Bulletin 02-001
-
-
-
384
-
-
0000692234
-
Soft power
-
Nye, J.S. (1990) 'Soft power', Foreign Policy, 80, pp. 153-71.
-
(1990)
Foreign Policy
, vol.80
, pp. 153-171
-
-
Nye, J.S.1
-
387
-
-
84908912505
-
Americas information edge’
-
(March/April)
-
Nye, J.S. Jr. and Owens, W.A. (1996) 'America's information edge', Foreign Affairs (March/April), pp. 20-36.
-
(1996)
Foreign Affairs
, pp. 20-36
-
-
Nye, J.S.1
Owens, W.A.2
-
389
-
-
0039677161
-
-
OTA-TCT-606, Washington, DC: US Government Printing Office
-
Office of Technology Assessment (1994) Information Security and Privacy in Network Environments, OTA-TCT-606, Washington, DC: US Government Printing Office.
-
(1994)
Information Security and Privacy in Network Environments
-
-
-
391
-
-
0040081732
-
Rumsfelds defense vision’
-
O'Hanlon, M.E. (2002) 'Rumsfeld's defense vision', Survival, 44, 2, pp. 103-17.
-
(2002)
Survival
, vol.44
, Issue.2
, pp. 103-117
-
-
O’Hanlon, M.E.1
-
392
-
-
85145520240
-
Office of critical infrastructure protection and emergency preparedness, ‘al-qaida cyber capability’
-
20 December 2001
-
OCIPEP (2001) Office of critical infrastructure protection and emergency preparedness, 'Al-Qaida cyber capability', Threat Analysis TA01-001, 20 December 2001.
-
(2001)
Threat Analysis TA01-001
-
-
-
393
-
-
85145516877
-
Office of critical infrastructure protection and emergency preparedness, ‘threats to canada’s critical infrastructure’
-
12 March 2003
-
OCIPEP (2003) Office of critical infrastructure protection and emergency preparedness, 'Threats to Canada's critical infrastructure', Threat Analysis TA03-001, 12 March 2003.
-
(2003)
Threat Analysis TA03-001
-
-
-
394
-
-
84876196984
-
What a good idea: Frames and ideologies in social movements research
-
Oliver, P.E. and Johnston, H. (2000) 'What a good idea: Frames and ideologies in social movements research', Mobilization, 5, 1, pp. 37-54.
-
(2000)
Mobilization
, vol.5
, Issue.1
, pp. 37-54
-
-
Oliver, P.E.1
Johnston, H.2
-
395
-
-
0010559850
-
Executive orders and national emergencies: How presidents have come to “run the country by usurping legislative power’
-
No. 358, 28 October 1999., (accessed 14 May 2007)
-
Olson, W.J. and Woll, A. (1999) 'Executive orders and national emergencies: How presidents have come to "run the country" by usurping legislative power', Cato Policy Analysis, No. 358, 28 October 1999. Available online at www.cato.org/pubs/pas/pa-358es.html (accessed 14 May 2007).
-
(1999)
Cato Policy Analysis
-
-
Olson, W.J.1
Woll, A.2
-
396
-
-
0004134327
-
-
2nd edn, New York: Alfred A. Knopf
-
Organski, A.F.K. (1968) World Politics, 2nd edn, New York: Alfred A. Knopf.
-
(1968)
World Politics
-
-
Organski, A.F.K.1
-
397
-
-
0003777591
-
The emerging system of systems
-
Owens, W.A. (1995) 'The emerging system of systems', Naval Institute Proceedings121, 5, pp. 35-9.
-
(1995)
Naval Institute Proceedings
, vol.121
, Issue.5
, pp. 35-39
-
-
Owens, W.A.1
-
398
-
-
84900040855
-
Historical impacts of information technologies: An overview
-
Alberts, D.S. and Papp, D.S, Washington, DC, National Defense University
-
Papp, D.S., Alberts, D.S., and Tuyahov, A. (1997) 'Historical impacts of information technologies: An overview', in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences, Washington, DC, National Defense University, pp. 13-35.
-
(1997)
The Information Age: An Anthology of Its Impacts and Consequences
, pp. 13-35
-
-
Papp, D.S.1
Alberts, D.S.2
Tuyahov, A.3
-
399
-
-
34249866520
-
-
New York: Charles Scribner’s Sons
-
Parker, D.B. (1976) Crime by Computer, New York: Charles Scribner's Sons.
-
(1976)
Crime by Computer
-
-
Parker, D.B.1
-
401
-
-
84888435925
-
Computer-related white collar crime
-
Geis, G. and Stotland, E, Beverly Hills: Sage
-
Parker, D.B. (1980b) 'Computer-related white collar crime', in Geis, G. and Stotland, E. (eds) White Collar Crime: Theory and Research, Beverly Hills: Sage, pp. 199-220.
-
(1980)
White Collar Crime: Theory and Research
, pp. 199-220
-
-
Parker, D.B.1
-
403
-
-
0003994024
-
-
Washington, DC: US Government Printing Office
-
PCCIP, President's Commission on Critical Infrastructure Protection (1997) Critical Foundations: Protecting America's Infrastructures, Washington, DC: US Government Printing Office.
-
(1997)
Critical Foundations: Protecting America’s Infrastructures
-
-
-
405
-
-
85063453600
-
-
National telecommunications and information systems security policy (NTISSP) No. 2, Washington, DC, 29 October 1986
-
Poindexter, J. (1986) Protection of Sensitive, but Unclassified Information in Federal Government Telecommunications and Automated Information Systems, National telecommunications and information systems security policy (NTISSP) No. 2, Washington, DC, 29 October 1986.
-
(1986)
Protection of Sensitive, but Unclassified Information in Federal Government Telecommunications and Automated Information Systems
-
-
Poindexter, J.1
-
406
-
-
84911047926
-
Homeland defense: Threats and policies in transition’
-
15 July 1998
-
Pollard, N.A. (1998) 'Homeland defense: Threats and policies in transition', Terrorism Research Center Newsletter, 15 July 1998.
-
(1998)
Terrorism Research Center Newsletter
-
-
Pollard, N.A.1
-
408
-
-
84911047925
-
Feds still need to define role in tackling cyberterror, panelists say’
-
15 May 2001, (accessed 14 May 2007)
-
Porteus, L. (2001) 'Feds still need to define role in tackling cyberterror, Panelists Say', govexec.com, 15 May 2001. Available online at www.govexec.com/dai-lyfed/0501/051501td.htm (accessed 14 May 2007).
-
(2001)
Govexec.Com
-
-
Porteus, L.1
-
409
-
-
84861124878
-
Info war or electronic sabre rattling?
-
8 September 1999, (accessed 14 May 2007)
-
Poulsen, K. (1999) 'Info war or electronic sabre rattling?' ZDNet, 8 September 1999. Available online at http://news.zdnet.com/2100-9595_22-515631.html?legacy=zdnn (accessed 14 May 2007).
-
(1999)
Zdnet
-
-
Poulsen, K.1
-
410
-
-
84911047924
-
Official: Cyberterror fears missed real threat’
-
31 July 2003, (accessed 14 May 2007)
-
Poulsen, K. (2003) 'Official: Cyberterror fears missed real threat', SecurityFocus.com, 31 July 2003. Available online at www.securityfocus.com/news/6589 (accessed 14 May 2007).
-
(2003)
Securityfocus.Com
-
-
Poulsen, K.1
-
411
-
-
84911047923
-
Hack the hackers
-
19 December 2000
-
Prasad, R.V. (2000) 'Hack the hackers', Hindustan Times, 19 December 2000.
-
(2000)
Hindustan Times
-
-
Prasad, R.V.1
-
412
-
-
84911047922
-
Generation gap
-
24 December 2001
-
Prasad, R.V. (2001) 'Generation gap', Hindustan Times, 24 December 2001.
-
(2001)
Hindustan Times
-
-
Prasad, R.V.1
-
418
-
-
25844509285
-
Reflexive security: Nato and international risk society
-
Rasmussen, M.V. (2001) 'Reflexive security: Nato and international risk society', Millennium: Journal of International Studies, 30, 2, pp. 285-309.
-
(2001)
Millennium: Journal of International Studies
, vol.30
, Issue.2
, pp. 285-309
-
-
Rasmussen, M.V.1
-
421
-
-
84992931716
-
Expected bank plot to fail’
-
23 February 1979
-
Rawitch, R. (1979) 'Expected bank plot to fail', Los Angeles Times, 23 February 1979.
-
(1979)
Los Angeles Times
-
-
Rawitch, R.1
-
423
-
-
24544447706
-
-
Executive Order 12356, Washington, DC, 2 April 1982
-
Reagan, R. (1982a) National Security Information, Executive Order 12356, Washington, DC, 2 April 1982.
-
(1982)
National Security Information
-
-
Reagan, R.1
-
429
-
-
84911055161
-
A mission to build on common challenges
-
11 June 2001
-
Rice, C. (2001) 'A mission to build on common challenges', The Washington Times, 11 June 2001, p. A15.
-
(2001)
The Washington Times
, pp. A15
-
-
Rice, C.1
-
431
-
-
84911090389
-
-
National Security Archive Electronic Briefing Book No. 55, (accessed 14 May 2007)
-
Richelson, J. and Evans, M.L. (2001) Volume I: Terrorism and US Policy, National Security Archive Electronic Briefing Book No. 55, Available online at www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB55/index1.html (accessed 14 May 2007).
-
(2001)
Volume I: Terrorism and US Policy
-
-
Richelson, J.1
Evans, M.L.2
-
433
-
-
0004182242
-
-
Boeing Aerospace Co. Research Report, Seattle: Boeing
-
Rona, T.P. (1976) Weapon Systems and Information War, Boeing Aerospace Co. Research Report, Seattle: Boeing.
-
(1976)
Weapon Systems and Information War
-
-
Rona, T.P.1
-
434
-
-
84911204000
-
Information warfare: An age old concept with new insights
-
Rona, T.P. (1996) 'Information warfare: An age old concept with new insights', Defense Intelligence Journal, 5, pp. 53-67.
-
(1996)
Defense Intelligence Journal
, vol.5
, pp. 53-67
-
-
Rona, T.P.1
-
438
-
-
0000242461
-
Hacking away at the counterculture
-
Penley, C. and Ross, A, Minneapolis: University of Minnesotta Press
-
Ross, A. (1990) 'Hacking away at the counterculture', in Penley, C. and Ross, A. (eds) Technoculture, Minneapolis: University of Minnesotta Press, pp. 107-34.
-
(1990)
Technoculture
, pp. 107-134
-
-
Ross, A.1
-
440
-
-
84909012961
-
Comparing policy design across countries: What accounts for variation in art policy?
-
Bleiklie, I., Goggin, M. and Rothmayr, C, London: Routledge
-
Rothmayr, C., Varone, F., Serdult, U., Timmermans, A. and Bleiklie, I. (2003) 'Comparing policy design across countries: What accounts for variation in art policy?' in Bleiklie, I., Goggin, M. and Rothmayr, C. (eds) Comparative Biomedical Policy: A Cross-Country Comparison, London: Routledge, pp. 228-53.
-
(2003)
Comparative Biomedical Policy: A Cross-Country Comparison
, pp. 228-253
-
-
Rothmayr, C.1
Varone, F.2
Serdult, U.3
Timmermans, A.4
Bleiklie, I.5
-
441
-
-
0000804210
-
Collective goods and future international collaboration
-
Ruggie, J. (1972) 'Collective goods and future international collaboration', American Political Science Review, 66, pp. 874-93.
-
(1972)
American Political Science Review
, vol.66
, pp. 874-893
-
-
Ruggie, J.1
-
444
-
-
0036563265
-
Transforming the military
-
Rumsfeld, D.H. (2002b) 'Transforming the military', Foreign Affairs, 81, 3, pp. 20-32.
-
(2002)
Foreign Affairs
, vol.81
, Issue.3
, pp. 20-32
-
-
Rumsfeld, D.H.1
-
445
-
-
54949083144
-
-
30 October 2003, (accessed 14 May 2007)
-
Rumsfeld, D.H. (2003) (Original signed), Information Operations Roadmap, 30 October 2003. Available online at www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf (accessed 14 May 2007).
-
(2003)
Information Operations Roadmap
-
-
Rumsfeld, D.H.1
-
447
-
-
0039983490
-
An advocacy coalition framework of policy change and the role of policy-oriented learning therein
-
Sabatier, P. (1988) 'An advocacy coalition framework of policy change and the role of policy-oriented learning therein', Policy Sciences, 21, pp. 129-68.
-
(1988)
Policy Sciences
, vol.21
, pp. 129-168
-
-
Sabatier, P.1
-
449
-
-
0000816622
-
The advocacy coalition framework: An assessment
-
Sabatier, P.A. (ed.), Boulder: Westview Press
-
Sabatier, P.A. and Jenkins-Smith, H.C. (eds) (1999) 'The advocacy coalition framework: An assessment' in Sabatier, P.A. (ed.) Theories of the Policy Process, Boulder: Westview Press, pp. 117-68.
-
(1999)
Theories of the Policy Process
, pp. 117-168
-
-
Sabatier, P.A.1
Jenkins-Smith, H.C.2
-
450
-
-
0343576284
-
Colonizing cyberspace: ‘national security and the internet’
-
Weldes, J., Laffey, M., Gusterson, H. and Duvall, R, Minneapolis: University of Minnesota Press
-
Saco, D. (1999) 'Colonizing cyberspace: 'National Security' and the Internet', in Weldes, J., Laffey, M., Gusterson, H. and Duvall, R. (eds) Cultures of Insecurity. States, Communities, and the Production of Danger, Minneapolis: University of Minnesota Press, pp. 261-91.
-
(1999)
Cultures of Insecurity. States, Communities, and the Production of Danger
, pp. 261-291
-
-
Saco, D.1
-
451
-
-
84911047916
-
Captain dragans serbian cybercops. How milosevic took the internet battlefield’
-
10 May 1999
-
Satchell, M. (1999) 'Captain Dragan's serbian cybercops. How Milosevic took the Internet battlefield', U.S. News, 10 May 1999.
-
(1999)
U.S. News
-
-
Satchell, M.1
-
452
-
-
84866620736
-
Computer emergency response
-
Denning, P. (ed.), Reading: Addison-Wesley
-
Scherlis, W.L., Squires, S.L., and Pethia, R.D. (1990) 'Computer emergency response', in Denning, P. (ed.) Computers Under Attack: Intruders, Worms, and Viruses, Reading: Addison-Wesley, pp. 495-504.
-
(1990)
Computers under Attack: Intruders, Worms, and Viruses
, pp. 495-504
-
-
Scherlis, W.L.1
Squires, S.L.2
Pethia, R.D.3
-
453
-
-
0033422567
-
Framing as a theory of media effects
-
Scheufele, D.A. (1999) 'Framing as a theory of media effects', Journal of Communication, 49, 1, pp. 103-22.
-
(1999)
Journal of Communication
, vol.49
, Issue.1
, pp. 103-122
-
-
Scheufele, D.A.1
-
455
-
-
84911047915
-
An overview of executive order 12356
-
3, June 1982
-
Schroeder, G.A. (1982) 'An overview of executive order 12356', FOIA Update, III, 3, June 1982.
-
(1982)
FOIA Update
, vol.3
-
-
Schroeder, G.A.1
-
459
-
-
84911047913
-
Computer network system at risk for terrorism
-
13 September 2001
-
Schwartz, J. (2001) 'Computer network system at risk for terrorism', USA Today, 13 September 2001.
-
(2001)
USA Today
-
-
Schwartz, J.1
-
462
-
-
84900256974
-
Infowar part of nato arsenal?
-
25 March 1999, (accessed 14 May 2007)
-
Seminerio, M. (1999) 'Infowar part of NATO arsenal?' ZDNet, 25 March 1999. Available online at www.zdnet.com/zdnn/stories/news/0,4586,2231976,00.html (accessed 14 May 2007).
-
(1999)
Zdnet
-
-
Seminerio, M.1
-
466
-
-
85145531092
-
-
Congressional Research Report for Congress, RL31534, 21 February 2003, Washington, DC: Congressional Research Service
-
Shea, D.A. (2003) Critical Infrastructure: Control Systems and the Terrorist Threat.Congressional Research Report for Congress, RL31534, 21 February 2003, Washington, DC: Congressional Research Service.
-
(2003)
Critical Infrastructure: Control Systems and the Terrorist Threat
-
-
Shea, D.A.1
-
467
-
-
85145509565
-
-
Shea, J. (1999a) Press conference by NATO spokesman, Jamie Shea and Air Commodore David Wilby, SHAPE, Transcript 31 March 1999, updated 31 March 1999, NATO HQ.
-
(1999)
Press Conference by NATO Spokesman, Jamie Shea and Air Commodore David Wilby, SHAPE, Transcript 31 March 1999, Updated 31 March 1999, NATO HQ
-
-
Shea, J.1
-
468
-
-
85145544701
-
-
Shea, J. (1999b) Morning briefing by Jamie Shea, NATO Spokesman, 3 May 1999, updated 3 May 1999, NATO HQ.
-
(1999)
Morning Briefing by Jamie Shea, NATO Spokesman, 3 May 1999, Updated 3 May 1999, NATO HQ
-
-
Shea, J.1
-
472
-
-
0346131469
-
-
COMCRIME-study prepared for the European Commission, 1 January 1998, (accessed 14 May 2007)
-
Sieber, U. (1998) Legal Aspects of Computer Related Crime in the Information Society, COMCRIME-study prepared for the European Commission, 1 January 1998. Available online at http://europa.eu.int/ISPO/legal/en/comcrime/sieber.doc (accessed 14 May 2007).
-
(1998)
Legal Aspects of Computer Related Crime in the Information Society
-
-
Sieber, U.1
-
473
-
-
0001792116
-
Capability distribution, uncertainty, and major power war, 1820-1965
-
Russett, B. (ed.), Beverly Hills, Sage Publications
-
Singer, D.J., Bremer, S. and Stuckey, J. (1972) 'Capability distribution, uncertainty, and major power war, 1820-1965', in Russett, B. (ed.) Peace, War, and Numbers, Beverly Hills, Sage Publications, pp. 21-7.
-
(1972)
Peace, War, and Numbers
, pp. 21-27
-
-
Singer, D.J.1
Bremer, S.2
Stuckey, J.3
-
474
-
-
85145529825
-
-
unpublished paper, given at the NOPSA-Conference, Aalborg, August
-
Sjursen, H. (2002) The Transformation of the Nation State: Implications for the Study of European Security, unpublished paper, given at the NOPSA-Conference, Aalborg, August 2002.
-
(2002)
The Transformation of the Nation State: Implications for the Study of European Security
, pp. 2002
-
-
Sjursen, H.1
-
475
-
-
34248055443
-
Changes to european security in a communicative perspective
-
Sjursen, H. (2004). "Changes to European security in a communicative perspective," Cooperation and Conflict, 39, 2: 107-128.
-
(2004)
Cooperation and Conflict
, vol.39
, Issue.2
, pp. 107-128
-
-
Sjursen, H.1
-
476
-
-
3142674166
-
Force, pre-emption and legitimacy
-
Slocombe, W.B. (2003) 'Force, pre-emption and legitimacy', Survival, 45, 1, pp. 117-30.
-
(2003)
Survival
, vol.45
, Issue.1
, pp. 117-130
-
-
Slocombe, W.B.1
-
477
-
-
0032148572
-
An electronic pearl harbor? Not likely
-
15, Fall 1998
-
Smith, G. (1998) 'An electronic Pearl Harbor? Not likely', Issues in Science and Technology, 15, Fall 1998.
-
(1998)
Issues in Science and Technology
-
-
Smith, G.1
-
478
-
-
84911047907
-
Electronic pearl harbor: A slogan for U.S. Info-Warriors’
-
(accessed 14 May 2007)
-
Smith, G. (1999a) 'Electronic Pearl Harbor: A slogan for U.S. info-warriors', Crypt Newsletter. Available online at www.soci.niu.edu/~crypt/other/harbor.htm (accessed 14 May 2007).
-
(1999)
Crypt Newsletter
-
-
Smith, G.1
-
479
-
-
84911047906
-
The meaning of eligible receiver’
-
(accessed 14 May 2007)
-
Smith, G. (1999b) 'The meaning of eligible receiver', Crypt Newsletter. Available online at www.soci.niu.edu/~crypt/other/eligib.htm (accessed 14 May 2007).
-
(1999)
Crypt Newsletter
-
-
Smith, G.1
-
480
-
-
84861116751
-
How vulnerable is our interlinked infrastructure?
-
Alberts, D.S. and Papp, D.S, Washington, DC: National Defense University Press
-
Smith, G. (2000) 'How vulnerable is our interlinked infrastructure?' in Alberts, D.S. and Papp, D.S. (eds) The Information Age: An Anthology of Its Impacts and Consequences(Vol. II), Washington, DC: National Defense University Press, pp. 507-23.
-
(2000)
The Information Age: An Anthology of Its Impacts and Consequences
, vol.2
, pp. 507-523
-
-
Smith, G.1
-
483
-
-
0004335487
-
-
3rd edn, Needham Heights, Prentice Hall
-
Excerpt taken from: Viotti, P.R. and Kauppi, M.V. (1999) International Relations Theory: Realism, Pluralism, Globalism, and Beyond, 3rd edn, Needham Heights, Prentice Hall, pp. 38-54.
-
(1999)
International Relations Theory: Realism, Pluralism, Globalism, and Beyond
, pp. 38-54
-
-
Viotti, P.R.1
Kauppi, M.V.2
-
484
-
-
84936824416
-
Ideology, frame resonance, and participant mobilization
-
Snow, D.A. and Benford, R.D. (1988) 'Ideology, frame resonance, and participant mobilization', Social Movement Research 1, pp. 197-217.
-
(1988)
Social Movement Research
, vol.1
, pp. 197-217
-
-
Snow, D.A.1
Benford, R.D.2
-
485
-
-
0002266033
-
Master frames and cycles of protest
-
Morris, A.D. and McClurg Mueller, C, New Haven: Yale University Press
-
Snow, D.A. and Benford, R.D. (1992) 'Master frames and cycles of protest', in Morris, A.D. and McClurg Mueller, C. (eds) Frontiers in Social Movement Theory, New Haven: Yale University Press, pp. 133-55.
-
(1992)
Frontiers in Social Movement Theory
, pp. 133-155
-
-
Snow, D.A.1
Benford, R.D.2
-
486
-
-
84936823726
-
Frame alignment processes, micromobilization and movement participation
-
Snow, D.A., Rocheford, E.B., Worden, S.K., and Benford, R.D. (1986), 'Frame alignment processes, micromobilization and movement participation', American Sociological Review, 51, 4, pp. 464-81.
-
(1986)
American Sociological Review
, vol.51
, Issue.4
, pp. 464-481
-
-
Snow, D.A.1
Rocheford, E.B.2
Worden, S.K.3
Benford, R.D.4
-
487
-
-
84911180124
-
The information revolution and international conflict management’
-
Keynote address from the virtual diplomacy conference, June 1997, (accessed 14 May 2007)
-
Solomon, R.H. (1997) 'The information revolution and international conflict management', USIP Peaceworks, Keynote address from the virtual diplomacy conference, June 1997. Available online at www.usip.org/pubs/peaceworks/virtual18/ inforev_18.html (accessed 14 May 2007).
-
(1997)
USIP Peaceworks
-
-
Solomon, R.H.1
-
493
-
-
0035826155
-
Exploring complex networks
-
8 March, 2001
-
Strogatz, S.H. (2001) 'Exploring complex networks', Nature, 410, 8 March, 2001, pp. 268-76.
-
(2001)
Nature
, vol.410
, pp. 268-276
-
-
Strogatz, S.H.1
-
494
-
-
9244265858
-
Coping with structural security threats
-
Holl, O. (ed.), Wien: Braumuller
-
Sundelius, B. (1983) 'Coping with structural security threats', in Holl, O. (ed.) Small States in Europe and Dependence, Wien: Braumuller.
-
(1983)
Small States in Europe and Dependence
-
-
Sundelius, B.1
-
495
-
-
60449116450
-
Improving information security in companies: How to meet the need for threat information
-
Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F, Aldershot: Ashgate
-
Suter, M. (2007), 'Improving information security in companies: How to meet the need for threat information', in Dunn Cavelty, M., Mauer, V. and Krishna-Hensel, S.-F. (eds) Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, Aldershot: Ashgate.
-
(2007)
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
-
-
Suter, M.1
-
496
-
-
84936823493
-
Culture in action: Symbols and strategies
-
Swidler, A. (1986) 'Culture in action: Symbols and strategies', American Sociological Review, 51, 4, pp. 273-86.
-
(1986)
American Sociological Review
, vol.51
, Issue.4
, pp. 273-286
-
-
Swidler, A.1
-
497
-
-
0002687884
-
Cultural power and social movements
-
Johnston, H. and Klandermans, B, London: UCL Press
-
Swidler, A. (1995) 'Cultural power and social movements', in Johnston, H. and Klandermans, B. (eds) Social Movements and Culture, London: UCL Press, pp. 25-40.
-
(1995)
Social Movements and Culture
, pp. 25-40
-
-
Swidler, A.1
-
499
-
-
84911047905
-
Uk: Partisans wage virtual war
-
22 April 1999
-
Taylor, R. (1999) 'UK: Partisans wage virtual war', The Guardian, 22 April 1999.
-
(1999)
The Guardian
-
-
Taylor, R.1
-
500
-
-
34547283925
-
-
Institute for Security Technology Studies, Darthmouth College, (accessed 14 May 2007)
-
Technical Analysis Group (2003) Examining the Cyber Capabilities of Islamic Terrorist Groups, Institute for Security Technology Studies, Darthmouth College. Available online at www.ists.dartmouth.edu/TAG/ITB/ITB_032004.pdf (accessed 14 May 2007).
-
(2003)
Examining the Cyber Capabilities of Islamic Terrorist Groups
-
-
-
502
-
-
84911047901
-
Vulnerabilities of the national information infrastructure
-
24 June 1998
-
Tenet, G.J. (1998) 'Vulnerabilities of the National Information Infrastructure', Testimony byDirector of Central Intelligence George J. Tenet Before the Senate Committee on Government Affairs Hearing, 24 June 1998.
-
(1998)
Testimony By
-
-
Tenet, G.J.1
-
505
-
-
22144447285
-
Worldwide threat - converging dangers in a post 9/11 world
-
19 March 2002
-
Tenet, G.J. (2002) 'Worldwide threat - Converging dangers in a post 9/11 world', Testimony ofthe Director of Central Intelligence Before the Senate Armed Services Committee, 19 March 2002.
-
(2002)
Testimony Of
-
-
Tenet, G.J.1
-
507
-
-
0003934786
-
-
New York: Bantam Books
-
Toffler, A. (1970) Future Shock, New York: Bantam Books.
-
(1970)
Future Shock
-
-
Toffler, A.1
-
508
-
-
0003973972
-
-
New York: Bantam Books
-
Toffler, A. (1980) Third Wave, New York: Bantam Books.
-
(1980)
Third Wave
-
-
Toffler, A.1
-
509
-
-
0003749035
-
-
New York: Bantam Books
-
stCentury, New York: Bantam Books.
-
(1981)
St
-
-
Toffler, A.1
-
514
-
-
0242381404
-
-
Washington, DC: Department of the United States Air Force
-
United States Air Force (1995), Cornerstones of Information Warfare, Washington, DC: Department of the United States Air Force.
-
(1995)
Cornerstones of Information Warfare
-
-
-
515
-
-
84900235142
-
-
(accessed 14 May 2007)
-
United States Joint Forces Command USJFCOM (2004) United States Joint Forces Command USJFC Glossary. Available online at www.jfcom.mil/about/glossary.htm (accessed 14 May 2007).
-
(2004)
United States Joint Forces Command USJFC Glossary
-
-
-
516
-
-
84911047893
-
Security in cyberspace’
-
5 June 1996, (accessed 14 May 2007)
-
US Senate Permanent Subcommittee on Investigations USSPSI (1996) 'Security in cyberspace', US Senate Permanent Subcommittee on Investigations, Minority Staff Statement, 5 June 1996. Available online at www.fas.org/irp/congress/1996_hr/s960605b.htm (accessed 14 May 2007).
-
(1996)
US Senate Permanent Subcommittee on Investigations, Minority Staff Statement
-
-
-
519
-
-
84911047887
-
Nipc cyber threat assessment
-
6 October 1999
-
Vatis, M.A. (1999) 'NIPC cyber threat assessment', Statement for the Record of Michael A.Vatis, Director, National Infrastructure Protection Center Federal Bureau of Investigation Before the Senate Judiciary Committee, Subcommittee on Technology and Terrorism, 6 October 1999.
-
(1999)
Statement for the Record of Michael A
-
-
Vatis, M.A.1
-
521
-
-
84911084727
-
Nation’s cybersecurity chief abruptly quits dhs post: ‘i’m not a longterm government kind of guy’, says amit yoran’
-
1 October 2004. (accessed 14 May 2007)
-
Verton, D. (2004) 'Nation's cybersecurity chief abruptly quits DHS post: 'I'm not a longterm government kind of guy', says Amit Yoran', Computerworld, 1 October 2004. Available online at www.computerworld.com/printthis/2004/0,4814,96369,00.html (accessed 14 May 2007).
-
(2004)
Computerworld
-
-
Verton, D.1
-
522
-
-
84857940178
-
Speed and information: Cyberspace alarm!
-
18 March 1995
-
Virilio, P. (1995) 'Speed and information: Cyberspace alarm!', Ctheory, 18 March 1995.
-
(1995)
Ctheory
-
-
Virilio, P.1
-
523
-
-
84886557365
-
Cyberwar and sabotage’
-
Vistica, G.L. (1999) 'Cyberwar and sabotage', Newsweek, 31 May 1999, p. 22.
-
(1999)
Newsweek
, vol.31
, pp. 22
-
-
Vistica, G.L.1
-
524
-
-
0001491868
-
Securitization and desecuritization
-
Lipschutz, Ronnie (ed.), New York: Columbia University Press
-
Wsver, O. (1995) 'Securitization and desecuritization', in Lipschutz, Ronnie (ed.) On Security, New York: Columbia University Press, pp. 46-86.
-
(1995)
On Security
, pp. 46-86
-
-
Wsver, O.1
-
525
-
-
34249984253
-
-
unpublished paper, presented at the annual meeting of the British International Studies Association in London, 16-18 December 2002
-
Wsver, O. (2002) 'Security: A conceptual history for international relations', unpublished paper, presented at the annual meeting of the British International Studies Association in London, 16-18 December 2002.
-
(2002)
Security: A Conceptual History for International Relations
-
-
Wsver, O.1
-
527
-
-
80054845569
-
-
unpublished paper, presented at the annual meeting of the International Studies Association, Montreal, 17-20 March 2004
-
Wsver, O. (2004) 'Aberystwyth, Paris, Copenhagen. New 'Schools' in security theory and their origins between core and periphery', unpublished paper, presented at the annual meeting of the International Studies Association, Montreal, 17-20 March 2004.
-
(2004)
) ‘Aberystwyth, Paris, Copenhagen. New ‘Schools’ in Security Theory and Their Origins between Core and periphery’
-
-
Wsver, O.1
-
528
-
-
84900159024
-
Is there an information revolution?
-
Henry, C.R. and Peartree, E.C, Washington, DC, Center for Strategic and International Studies Press
-
Waldrop, M.M. (1998) 'Is there an information revolution?' in Henry, C.R. and Peartree, E.C. (eds) Information Revolution and International Security, Washington, DC, Center for Strategic and International Studies Press, pp. 1-9.
-
(1998)
Information Revolution and International Security
, pp. 1-9
-
-
Waldrop, M.M.1
-
530
-
-
84911168930
-
Internet as weapon: Experts fear terrorists may attack through cyberspace
-
16 September 2002
-
Wallace, C. (2002) 'Internet as weapon: Experts fear terrorists may attack through cyberspace', ABC News.com, 16 September 2002.
-
(2002)
ABC News.Com
-
-
Wallace, C.1
-
531
-
-
0001475720
-
The renaissance of security studies
-
Walt, S.M. (1991) 'The renaissance of security studies', International Studies Quarterly, 35, 2, pp. 211-39.
-
(1991)
International Studies Quarterly
, vol.35
, Issue.2
, pp. 211-239
-
-
Walt, S.M.1
-
533
-
-
84911047885
-
The terrorist threat confronting the united states
-
Washington, DC, 6 February 2002
-
Watson, D.L. (2002) 'The terrorist threat confronting the United States', Statement for the Record of the Executive Assistant Director on Counterterrorism and Counterintelligence, Federal Bureau of Investigation, Before the Senate Select Committee on Intelligence, Washington, DC, 6 February 2002.
-
(2002)
Statement for the Record of the Executive Assistant Director on Counterterrorism and Counterintelligence, Federal Bureau of Investigation, before the Senate Select Committee on Intelligence
-
-
Watson, D.L.1
-
535
-
-
84900039059
-
What information society?
-
Papp, D.S. and Alberts, D.S, Washington, DC: National Defense University Press
-
Webster, F. (1997) 'What information society?' in Papp, D.S. and Alberts, D.S. (eds) TheInformation Age: An Anthology on Its Impact and Consequences, Vol. I, Washington, DC: National Defense University Press, pp. 51-71.
-
(1997)
The
, vol.1
, pp. 51-71
-
-
Webster, F.1
-
536
-
-
16344367669
-
Www.Terror.Net. How modern terrorism uses the internet’
-
March 2004, Washington, DC: United States Institute of Peace, (accessed 14 May 2007)
-
Weimann, G. (2004a) 'www.terror.net. How modern terrorism uses the internet', United States Institute of Peace, Special Report 116, March 2004, Washington, DC: United States Institute of Peace. Available online at www.usip.org/pubs/specialreports/sr116.pdf (accessed 14 May 2007).
-
(2004)
United States Institute of Peace, Special Report 116
-
-
Weimann, G.1
-
537
-
-
68249109477
-
-
United States Institute of Peace, special report 119, May 2004, Washington, DC: United States Institute of Peace., (accessed 14 May 2007)
-
Weimann, G. (2004b) 'Cyberterrorism - how real is the threat?' United States Institute of Peace, special report 119, May 2004, Washington, DC: United States Institute of Peace. Available online at www.usip.org/pubs/specialreports/sr119.pdf (accessed 14 May 2007).
-
(2004)
Cyberterrorism - How Real is the Threat?
-
-
Weimann, G.1
-
540
-
-
84911047884
-
Threat posed by electromagnetic pulse (Emp) to us military systems and civil infrastructure’
-
Washington, DC, 16 July 1997., (accessed 14 May 2007)
-
Weldon, C. (1997) 'Threat posed by electromagnetic pulse (EMP) to US military systems and civil infrastructure', House of Representatives, Committee on National Security, Military Research and Development Subcommittee, Washington, DC, 16 July 1997. Available online at www.fas.org/spp/starwars/congress/1997_h/has197010_1.htm (accessed 14 May 2007).
-
(1997)
House of Representatives, Committee on National Security, Military Research and Development Subcommittee
-
-
Weldon, C.1
-
541
-
-
84972442822
-
Anarchy is what states make of it: The social construction of power politics
-
Wendt, A. (1992) 'Anarchy is what states make of it: The social construction of power politics', International Organization, 46, 2, pp. 391-425.
-
(1992)
International Organization
, vol.46
, Issue.2
, pp. 391-425
-
-
Wendt, A.1
-
544
-
-
0007319392
-
-
COPRI Working Paper 27, Copenhagen: Copenhagen Peace Research Institute
-
Werner, W. (1998) Securitisation and Legal Theory, COPRI Working Paper 27, Copenhagen: Copenhagen Peace Research Institute.
-
(1998)
Securitisation and Legal Theory
-
-
Werner, W.1
-
546
-
-
84911047881
-
-
Office of the press secretary, Washington, DC: The White House, 16 September 1999
-
White House (1999) 'Fact sheet on encryption export policy', Office of the press secretary, Washington, DC: The White House, 16 September 1999.
-
(1999)
Fact Sheet on Encryption Export Policy
-
-
-
548
-
-
84911024923
-
-
Office of the press secretary, Washington, DC: The White House, 9 October 2001
-
White House (2001b) 'Fact sheet on new counter-terrorism and cyberspace positions', Office of the press secretary, Washington, DC: The White House, 9 October 2001.
-
(2001)
Fact Sheet on New Counter-Terrorism and Cyberspace Positions
-
-
-
549
-
-
0006752541
-
-
Des Moines/Iowa, Office of the press secretary, Washington, DC: The White House, 8 June 2001
-
White House (2001c) 'Remarks by the president in tax celebration event', Des Moines/Iowa, Office of the press secretary, Washington, DC: The White House, 8 June 2001.
-
(2001)
Remarks by the President in Tax Celebration Event
-
-
-
551
-
-
85145530128
-
-
Transcript 5 April, updated 5 April 1999, NATO HQ
-
Wilby, D. (1999) Press conference by NATO spokesman, Jamie Shea and Air Commodore David Wilby, SHAPE, Transcript 5 April, updated 5 April 1999, NATO HQ.
-
(1999)
Press Conference by NATO Spokesman, Jamie Shea and Air Commodore David Wilby, SHAPE
-
-
Wilby, D.1
-
552
-
-
0348162309
-
Words, images, enemies: Securitisation and international politics
-
Williams, M.C. (2003) 'Words, images, enemies: Securitisation and international politics', International Studies Quarterly, 47, 4, pp. 511-31.
-
(2003)
International Studies Quarterly
, vol.47
, Issue.4
, pp. 511-531
-
-
Williams, M.C.1
-
553
-
-
85145527761
-
-
CRS Report for Congress, Congressional research report for Congress, RL32114, 17 October 2003, Washington, DC: Congressional Research Service
-
Wilson, C. (2003) Computer Attack and Cyber-Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, Congressional research report for Congress, RL32114, 17 October 2003, Washington, DC: Congressional Research Service.
-
(2003)
Computer Attack and Cyber-Terrorism: Vulnerabilities and Policy Issues for Congress
-
-
Wilson, C.1
-
556
-
-
33746652460
-
Trust and terror: The vulnerability of complex socio-technical systems
-
June
-
Winner, L. (2004) 'Trust and terror: The vulnerability of complex socio-technical systems', Science as Culture, 13, 2, June, pp. 155-72.
-
(2004)
Science as Culture
, vol.13
, Issue.2
, pp. 155-172
-
-
Winner, L.1
-
557
-
-
0000212672
-
The delicate balance of terror
-
Wohlstetter, A. (1959) 'The delicate balance of terror', Foreign Affairs, 37, 2, pp. 211-34.
-
(1959)
Foreign Affairs
, vol.37
, Issue.2
, pp. 211-234
-
-
Wohlstetter, A.1
-
558
-
-
85044900266
-
Nuclear sharing: Nato and the n+1 country
-
Wohlstetter, A. (1961) 'Nuclear sharing: NATO and the N+1 country', Foreign Affairs, 39, 3, pp. 355-87.
-
(1961)
Foreign Affairs
, vol.39
, Issue.3
, pp. 355-387
-
-
Wohlstetter, A.1
-
559
-
-
84900173755
-
-
22 June 1999, (accessed 14 May 2007)
-
Wolfe, F. (1999) 'Pentagon analyzing serb attacks on DoD web sites', www.infowar.com, 22 June 1999. Available online at www.tla.ch/TLA/NEWS/1999sec/19990622serb.htm (accessed 14 May 2007).
-
(1999)
Pentagon Analyzing Serb Attacks on Dod Web sites’
-
-
Wolfe, F.1
-
563
-
-
0002241119
-
Values in the policy process
-
Young, K. (1977) 'Values in the policy process', Policy and Politics, 5, 3, pp. 1-22.
-
(1977)
Policy and Politics
, vol.5
, Issue.3
, pp. 1-22
-
-
Young, K.1
-
565
-
-
0002008933
-
The decaying pillars of the westphalian temple: Implications for international order and governance
-
Rosenau, J. N. and Czempiel, E.-O, Cambridge Studies in International Relations Nr. 20, Cambridge: Cambridge University Press
-
Zacher, M.W. (1992) 'The decaying pillars of the Westphalian Temple: Implications for international order and governance', in Rosenau, J. N. and Czempiel, E.-O. (eds) Governance Without Government: Order and Change in World Politics, Cambridge Studies in International Relations Nr. 20, Cambridge: Cambridge University Press, pp. 58-101.
-
(1992)
Governance without Government: Order and Change in World Politics
, pp. 58-101
-
-
Zacher, M.W.1
|