-
5
-
-
0034364125
-
Toward a Sociology of the Network Society
-
Castells, M. 2000. Toward a Sociology of the Network Society. Contemporary Sociology, 29(5),693-9.
-
(2000)
Contemporary Sociology
, vol.29
, Issue.5
, pp. 693-699
-
-
Castells, M.1
-
6
-
-
84917166448
-
Bracing for Guerrilla Warfare in Cyberspace
-
6 April. [accessed: 1 August 2011]
-
Christensen, J. 1999. Bracing for Guerrilla Warfare in Cyberspace. CNN Interactive, 6 April. http://edition.cnn.com/TECH/specials/hackers/cyberterror/[accessed: 1 August 2011].
-
(1999)
CNN Interactive
-
-
Christensen, J.1
-
7
-
-
84967701397
-
The Design Philosophy of the DARPA Internet Protocols
-
Clark, D.D. 1988. The Design Philosophy of the DARPA Internet Protocols. Computer Communication Review, 18(4), 106-14.
-
(1988)
Computer Communication Review
, vol.18
, Issue.4
, pp. 106-114
-
-
Clark, D.D.1
-
9
-
-
84905951106
-
Wars of Disruption: International Competition and Information Technology-driven Military Organizations
-
Demchak, C.C. 2003. Wars of Disruption: International Competition and Information Technology-driven Military Organizations. Contemporary Security Policy, 24(1), 75-112.
-
(2003)
Contemporary Security Policy
, vol.24
, Issue.1
, pp. 75-112
-
-
Demchak, C.C.1
-
11
-
-
33746787614
-
The Information Revolution, Security and International Relations: (Ir)relevant Theory?
-
Eriksson, J. and Giacomello, G. 2006. The Information Revolution, Security and International Relations: (Ir)relevant Theory? International Political Science Review, 27(3), 221-44.
-
(2006)
International Political Science Review
, vol.27
, Issue.3
, pp. 221-244
-
-
Eriksson, J.1
Giacomello, G.2
-
12
-
-
14844282642
-
CyberInSecurity: The Cost of Monopoly, How the Dominance of Microsoft's Products Poses a Risk to Security
-
24 September. [accessed: 1 August 2011]
-
Geer, D., Bace, R., Gutman, P., Metzger, P., Pfleeger, C.P., Quarterman, J.S. and Schneier, B. 2003. CyberInSecurity: The Cost of Monopoly, How the Dominance of Microsoft's Products Poses a Risk to Security. Published by the Computer and Communications Industry Association, 24 September. http://cryptome.org/cyberinsecurity.htm [accessed: 1 August 2011].
-
(2003)
Published by the Computer and Communications Industry Association
-
-
Geer, D.1
Bace, R.2
Gutman, P.3
Metzger, P.4
Pfleeger, C.P.5
Quarterman, J.S.6
Schneier, B.7
-
13
-
-
0040442236
-
Cyber-attacks and International Law
-
Grove, G.D., Goodman, S.E. and Lukasik, S.J. 2000. Cyber-attacks and International Law.Survival, 42(3), 89-103.
-
(2000)
Survival
, vol.42
, Issue.3
, pp. 89-103
-
-
Grove, G.D.1
Goodman, S.E.2
Lukasik, S.J.3
-
14
-
-
0038891504
-
The Internet and Power in One-party East Asian States
-
Hachigian, N. 2002. The Internet and Power in One-party East Asian States. The Washington Quarterly, 25(3), 41-58.
-
(2002)
The Washington Quarterly
, vol.25
, Issue.3
, pp. 41-58
-
-
Hachigian, N.1
-
16
-
-
84937066053
-
-
December. [accessed: 1 August 2011]
-
Internet World Stats, December 2008. http://www.Internetworldstats.com/stats.htm [accessed: 1 August 2011].
-
(2008)
-
-
Internet World Stats1
-
17
-
-
0346332763
-
Understanding the Bush Doctrine
-
Jervis, R. 2003. Understanding the Bush Doctrine. Political Science Quarterly, 118(3), 365-88.
-
(2003)
Political Science Quarterly
, vol.118
, Issue.3
, pp. 365-388
-
-
Jervis, R.1
-
18
-
-
84937066054
-
-
New York Times, 8 September. [accessed: 1 August 2011]
-
Kahn, J. 2005. Yahoo Helped Chinese to Prosecute Journalist. New York Times, 8 September.Available at: http://www.nytimes.com/2005/09/07/business/worldbusiness/07iht-yahoo.html [accessed: 1 August 2011].
-
(2005)
Yahoo Helped Chinese to Prosecute Journalist
-
-
Kahn, J.1
-
19
-
-
84873112527
-
-
The Washington Post, 13 October. [accessed: 1 August 2011]
-
Krebs, B. 2007. Shadowy Russian Firm seen as Conduit for Cybercrime. The Washington Post, 13 October. http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202461.html [accessed: 1 August 2011].
-
(2007)
Shadowy Russian Firm seen as Conduit for Cybercrime
-
-
Krebs, B.1
-
20
-
-
15244356100
-
From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements
-
Langman, L. 2005. From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movements. Sociological Theory, 23(1), 42-74.
-
(2005)
Sociological Theory
, vol.23
, Issue.1
, pp. 42-74
-
-
Langman, L.1
-
23
-
-
84937066055
-
-
The New York Times, 21 April. [accessed: 1 August 2011]
-
Markoff, J. 1991. Dutch Computer Rogues Infiltrate American Systems with Impunity. The New York Times, 21 April. http://www.nytimes.com/1991/04/21/us/dutch-computer-rogues-infiltrate-american-systems-with-impunity.html?src=pm [accessed: 1 August 2011].
-
(1991)
Dutch Computer Rogues Infiltrate American Systems with Impunity
-
-
Markoff, J.1
-
24
-
-
84916960960
-
Yahoo, Chinese Police, and a Jailed Journalist
-
9 September. [accessed: 1 August 2011]
-
Marquand, R. 2005. Yahoo, Chinese Police, and a Jailed Journalist. The Christian Science Monitor, 9 September. http://www.csmonitor.com/2005/0909/p01s03-woap.html [accessed: 1 August 2011].
-
(2005)
The Christian Science Monitor
-
-
Marquand, R.1
-
31
-
-
34248060773
-
Controlling Computer Network Operations
-
Rathmell, A. 2003. Controlling Computer Network Operations. Studies in Conflict and Terrorism, 26, 215-32.
-
(2003)
Studies in Conflict and Terrorism
, vol.26
, pp. 215-232
-
-
Rathmell, A.1
-
33
-
-
0002408713
-
Campaign 2000: Promoting the National Interest
-
Rice, C. 2000. Campaign 2000: Promoting the National Interest. Foreign Affairs, 79(1), 45-62.
-
(2000)
Foreign Affairs
, vol.79
, Issue.1
, pp. 45-62
-
-
Rice, C.1
-
36
-
-
84937269883
-
Cyberpolitik: The Changing Nature of Power in the Information Age
-
Rothkopf, D.J. 1998. Cyberpolitik: The Changing Nature of Power in the Information Age. Journal of International Affairs, 51(2), 325-59.
-
(1998)
Journal of International Affairs
, vol.51
, Issue.2
, pp. 325-359
-
-
Rothkopf, D.J.1
-
39
-
-
33846055775
-
Countering Cyber War
-
Shimeall, T., Williams, P. and Dunlevy, C. 2001. Countering Cyber War. NATO Review, 49(4),16-18.
-
(2001)
NATO Review
, vol.49
, Issue.4
, pp. 16-18
-
-
Shimeall, T.1
Williams, P.2
Dunlevy, C.3
-
40
-
-
84937066060
-
NSA must Examine all Internet Traffic to Prevent Cyber Nine-eleven, Top Spy Says
-
15 January. [accessed: 1 August 2011]
-
Singel, R. 2008. NSA must Examine all Internet Traffic to Prevent Cyber Nine-eleven, Top Spy Says. Wired Magazine, 15 January. http://www.wired.com/threatlevel/2008/01/feds-must-exami/[accessed: 1 August 2011].
-
(2008)
Wired Magazine
-
-
Singel, R.1
-
41
-
-
2542629197
-
-
Princeton, NJ: Princeton University Press
-
Slaughter, A.M. 2004. A New World Order. Princeton, NJ: Princeton University Press.
-
(2004)
A New World Order
-
-
Slaughter, A.M.1
-
43
-
-
84937032079
-
Buccaneer.Com: Infosec Privateering as a Solution to Cyberspace Threats
-
Tanji, M. 2007. Buccaneer.com: Infosec Privateering as a Solution to Cyberspace Threats. Journal of Cyber Conflict Studies, 1(1), 4-10.
-
(2007)
Journal of Cyber Conflict Studies
, vol.1
, Issue.1
, pp. 4-10
-
-
Tanji, M.1
-
44
-
-
0005172557
-
Technology, Philosophy and the State
-
Edited by M.E.Kraft and N.J. Vig. Durham, NC: Duke University Press
-
Vig, N. 1988. Technology, Philosophy and the State. In Technology and Politics, edited by M.E.Kraft and N.J. Vig. Durham, NC: Duke University Press, 8-32.
-
(1988)
Technology and Politics
, pp. 8-32
-
-
Vig, N.1
-
45
-
-
21644476490
-
Science, Technology and International Relations
-
Weiss, C. 2005. Science, Technology and International Relations. Technology in Society, 27(3), 295-313.
-
(2005)
Technology in Society
, vol.27
, Issue.3
, pp. 295-313
-
-
Weiss, C.1
|