메뉴 건너뛰기




Volumn , Issue , 2013, Pages 173-188

The political history of the internet: A theoretical approach to the implications for U.S. power

(1)  Carr, Madeline a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84937037466     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (9)

References (46)
  • 5
    • 0034364125 scopus 로고    scopus 로고
    • Toward a Sociology of the Network Society
    • Castells, M. 2000. Toward a Sociology of the Network Society. Contemporary Sociology, 29(5),693-9.
    • (2000) Contemporary Sociology , vol.29 , Issue.5 , pp. 693-699
    • Castells, M.1
  • 6
    • 84917166448 scopus 로고    scopus 로고
    • Bracing for Guerrilla Warfare in Cyberspace
    • 6 April. [accessed: 1 August 2011]
    • Christensen, J. 1999. Bracing for Guerrilla Warfare in Cyberspace. CNN Interactive, 6 April. http://edition.cnn.com/TECH/specials/hackers/cyberterror/[accessed: 1 August 2011].
    • (1999) CNN Interactive
    • Christensen, J.1
  • 7
    • 84967701397 scopus 로고
    • The Design Philosophy of the DARPA Internet Protocols
    • Clark, D.D. 1988. The Design Philosophy of the DARPA Internet Protocols. Computer Communication Review, 18(4), 106-14.
    • (1988) Computer Communication Review , vol.18 , Issue.4 , pp. 106-114
    • Clark, D.D.1
  • 9
    • 84905951106 scopus 로고    scopus 로고
    • Wars of Disruption: International Competition and Information Technology-driven Military Organizations
    • Demchak, C.C. 2003. Wars of Disruption: International Competition and Information Technology-driven Military Organizations. Contemporary Security Policy, 24(1), 75-112.
    • (2003) Contemporary Security Policy , vol.24 , Issue.1 , pp. 75-112
    • Demchak, C.C.1
  • 11
    • 33746787614 scopus 로고    scopus 로고
    • The Information Revolution, Security and International Relations: (Ir)relevant Theory?
    • Eriksson, J. and Giacomello, G. 2006. The Information Revolution, Security and International Relations: (Ir)relevant Theory? International Political Science Review, 27(3), 221-44.
    • (2006) International Political Science Review , vol.27 , Issue.3 , pp. 221-244
    • Eriksson, J.1    Giacomello, G.2
  • 13
    • 0040442236 scopus 로고    scopus 로고
    • Cyber-attacks and International Law
    • Grove, G.D., Goodman, S.E. and Lukasik, S.J. 2000. Cyber-attacks and International Law.Survival, 42(3), 89-103.
    • (2000) Survival , vol.42 , Issue.3 , pp. 89-103
    • Grove, G.D.1    Goodman, S.E.2    Lukasik, S.J.3
  • 14
    • 0038891504 scopus 로고    scopus 로고
    • The Internet and Power in One-party East Asian States
    • Hachigian, N. 2002. The Internet and Power in One-party East Asian States. The Washington Quarterly, 25(3), 41-58.
    • (2002) The Washington Quarterly , vol.25 , Issue.3 , pp. 41-58
    • Hachigian, N.1
  • 16
    • 84937066053 scopus 로고    scopus 로고
    • December. [accessed: 1 August 2011]
    • Internet World Stats, December 2008. http://www.Internetworldstats.com/stats.htm [accessed: 1 August 2011].
    • (2008)
    • Internet World Stats1
  • 17
    • 0346332763 scopus 로고    scopus 로고
    • Understanding the Bush Doctrine
    • Jervis, R. 2003. Understanding the Bush Doctrine. Political Science Quarterly, 118(3), 365-88.
    • (2003) Political Science Quarterly , vol.118 , Issue.3 , pp. 365-388
    • Jervis, R.1
  • 18
    • 84937066054 scopus 로고    scopus 로고
    • New York Times, 8 September. [accessed: 1 August 2011]
    • Kahn, J. 2005. Yahoo Helped Chinese to Prosecute Journalist. New York Times, 8 September.Available at: http://www.nytimes.com/2005/09/07/business/worldbusiness/07iht-yahoo.html [accessed: 1 August 2011].
    • (2005) Yahoo Helped Chinese to Prosecute Journalist
    • Kahn, J.1
  • 19
    • 84873112527 scopus 로고    scopus 로고
    • The Washington Post, 13 October. [accessed: 1 August 2011]
    • Krebs, B. 2007. Shadowy Russian Firm seen as Conduit for Cybercrime. The Washington Post, 13 October. http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202461.html [accessed: 1 August 2011].
    • (2007) Shadowy Russian Firm seen as Conduit for Cybercrime
    • Krebs, B.1
  • 20
    • 15244356100 scopus 로고    scopus 로고
    • From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements
    • Langman, L. 2005. From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements. Sociological Theory, 23(1), 42-74.
    • (2005) Sociological Theory , vol.23 , Issue.1 , pp. 42-74
    • Langman, L.1
  • 23
    • 84937066055 scopus 로고
    • The New York Times, 21 April. [accessed: 1 August 2011]
    • Markoff, J. 1991. Dutch Computer Rogues Infiltrate American Systems with Impunity. The New York Times, 21 April. http://www.nytimes.com/1991/04/21/us/dutch-computer-rogues-infiltrate-american-systems-with-impunity.html?src=pm [accessed: 1 August 2011].
    • (1991) Dutch Computer Rogues Infiltrate American Systems with Impunity
    • Markoff, J.1
  • 24
    • 84916960960 scopus 로고    scopus 로고
    • Yahoo, Chinese Police, and a Jailed Journalist
    • 9 September. [accessed: 1 August 2011]
    • Marquand, R. 2005. Yahoo, Chinese Police, and a Jailed Journalist. The Christian Science Monitor, 9 September. http://www.csmonitor.com/2005/0909/p01s03-woap.html [accessed: 1 August 2011].
    • (2005) The Christian Science Monitor
    • Marquand, R.1
  • 31
    • 34248060773 scopus 로고    scopus 로고
    • Controlling Computer Network Operations
    • Rathmell, A. 2003. Controlling Computer Network Operations. Studies in Conflict and Terrorism, 26, 215-32.
    • (2003) Studies in Conflict and Terrorism , vol.26 , pp. 215-232
    • Rathmell, A.1
  • 33
    • 0002408713 scopus 로고    scopus 로고
    • Campaign 2000: Promoting the National Interest
    • Rice, C. 2000. Campaign 2000: Promoting the National Interest. Foreign Affairs, 79(1), 45-62.
    • (2000) Foreign Affairs , vol.79 , Issue.1 , pp. 45-62
    • Rice, C.1
  • 36
    • 84937269883 scopus 로고    scopus 로고
    • Cyberpolitik: The Changing Nature of Power in the Information Age
    • Rothkopf, D.J. 1998. Cyberpolitik: The Changing Nature of Power in the Information Age. Journal of International Affairs, 51(2), 325-59.
    • (1998) Journal of International Affairs , vol.51 , Issue.2 , pp. 325-359
    • Rothkopf, D.J.1
  • 40
    • 84937066060 scopus 로고    scopus 로고
    • NSA must Examine all Internet Traffic to Prevent Cyber Nine-eleven, Top Spy Says
    • 15 January. [accessed: 1 August 2011]
    • Singel, R. 2008. NSA must Examine all Internet Traffic to Prevent Cyber Nine-eleven, Top Spy Says. Wired Magazine, 15 January. http://www.wired.com/threatlevel/2008/01/feds-must-exami/[accessed: 1 August 2011].
    • (2008) Wired Magazine
    • Singel, R.1
  • 41
    • 2542629197 scopus 로고    scopus 로고
    • Princeton, NJ: Princeton University Press
    • Slaughter, A.M. 2004. A New World Order. Princeton, NJ: Princeton University Press.
    • (2004) A New World Order
    • Slaughter, A.M.1
  • 43
    • 84937032079 scopus 로고    scopus 로고
    • Buccaneer.Com: Infosec Privateering as a Solution to Cyberspace Threats
    • Tanji, M. 2007. Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats. Journal of Cyber Conflict Studies, 1(1), 4-10.
    • (2007) Journal of Cyber Conflict Studies , vol.1 , Issue.1 , pp. 4-10
    • Tanji, M.1
  • 44
    • 0005172557 scopus 로고
    • Technology, Philosophy and the State
    • Edited by M.E.Kraft and N.J. Vig. Durham, NC: Duke University Press
    • Vig, N. 1988. Technology, Philosophy and the State. In Technology and Politics, edited by M.E.Kraft and N.J. Vig. Durham, NC: Duke University Press, 8-32.
    • (1988) Technology and Politics , pp. 8-32
    • Vig, N.1
  • 45
    • 21644476490 scopus 로고    scopus 로고
    • Science, Technology and International Relations
    • Weiss, C. 2005. Science, Technology and International Relations. Technology in Society, 27(3), 295-313.
    • (2005) Technology in Society , vol.27 , Issue.3 , pp. 295-313
    • Weiss, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.