, accessed 18 April 2007.
Bendrath, Ralf, ‘The American Cyber-Angst and the Real World – Any Link?’, in Robert Latham (ed.), Bombs and Bandwidth: The Emerging Relationship between IT and Security (New York: The New Press, 2003), pp. 49–73.
Berkowitz, Bruce D., ‘Warfare in the Information Age’, in John Arquilla and David Ronfeldt (eds), In Athena’s Camp: Preparing for Conflict in the Information Age (Santa Monica: RAND, 1997).
Berkowitz, Bruce D., The New Face of War: How War Will Be Fought in the 21st Century (New York: Simon & Schuster International, 2002).
Berners-Lee, Tim, Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web (New York: Harper Collins, 1999).
Beus, J.G. de, Shall we Make the Year 2000? (London: Sidgwick & Jackson, 1985).
Blank, Stephen J., Rethinking Asymmetric Threats (Carlisle: Strategic Studies Institute, 2003).
Borgmann, Albert, Holding on to Reality: The Nature of Information at the Turn of the Millennium (Chicago: University of Chicago Press, 1999).
Bosch, Olivia, ‘Cyber Terrorism and Private Sector Efforts for Information Infrastructure Protection’, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures (Seoul, 20-22 May 2002).
Buzan, Barry, Ole Wæver, and Jaap de Wilde, Security: A New Framework for Analysis (Boulder: Rienner, 1998).
Campen, Alan, The First Information Warfare (Fairfax, AFCEA International Press, 1992).
Campen, Alan and Douglas H. Dearth (eds), Cyberwar 2.0: Myths, Mysteries and Reality (Fairfax, AFCEA International Press: 1998).
Castells, Manuel, The Rise of the Network Society (Oxford: Blackwell, 1996).
Cerny, Philip G., ‘Globalization and the Erosion of Democracy’, European Journal of Political Research, 36/1 (1999): 1–26.
Chapman, Gary, ‘National Security and the Internet’, paper presented at the Annual Convention of the Internet Society (Geneva, July 1998).
Crutchfield, James P., ‘Is Anything Ever New? Considering Emergence’, in G. Cowan, D. Pines, and D. Melzner (eds), Complexity: Metaphors, Models, and Reality, SFI Series in the Sciences of Complexity XIX (Addison-Wesley: Redwood City, 1994), pp. 479–97.
Crutchfield, James P., ‘What Lies Between Order and Chaos?’, in John L. Casti, and A. Karlqvist, Art and Complexity (Oxford: Oxford University Press, 2002).
Center for Strategic and International Studies, The Information Revolution and International Security: Robert F. McMormich Tribune Foundation Report (Washington D.C., Center for Strategic and International Studies, 1996).
Center for the Study of Terrorism and Irregular Warfare, Cyberterror: Prospects and Implications, White Paper (Monterey: Center on Terrorism and Irregular Warfare, 1999).
Cukier, Kenneth Neil, ‘Internet Governance and the Ancient Regime’, Swiss Political Science Review, 5/1 (1999): 127–33.
Deibert, Ronald J., ‘Exorcismus Theoriae: Pragmatism, Metaphors and the Return of the Medieval in IR Theory,’ European Journal of International Relations, 3/2 (June 1997): 167–92.
Dekker, Marcel, ‘Security of the Internet’, in The Froehlich/Kent Encyclopedia of Telecommunications, vol. 15 (New York, 1997), pp. 231–55.
Demchak, Chris C., ‘“New Security” in Cyberspace: Emerging Intersection between Military and Civilian Contingencies’, Journal of Contingencies and Crisis Management, 7/4 (1999): 181–98.
Deutsch, Karl W., ‘Mass Communications and the Loss of Freedom in National Decision-Making: A Possible Research Approach to Interstate Conflicts’, Journal of Conflict Resolution, 1/2 (1957): 200–11.
Drucker, Peter F., The New Realities: In Government and Politics, in Economics and Business, in Society and World View (New York: Harper Collins Publishers, 1989).
Dunn, Myriam, Information Age Conflicts: A Study on the Information Revolution and a Changing Operating Environment, Zürcher Beiträge zur Sicherheitspolitik und Konfliktforschung, No. 64 (Zurich: Center for Security Studies, 2002).
Dunn, Myriam, ‘The Socio-Political Dimensions of Critical Information Infrastructure Protection (CIIP)’, International Journal for Critical Infrastructure Protection, 1/ 2-3 (2005): 58–68.
Dunn, Myriam and Isabelle Wigert, The International CIIP Handbook 2004: An Inventory of Protection Policies in Fourteen Countries (Zurich: Center for Security Studies, 2004).
Abele-Wigert, Isabelle and Myriam Dunn, The International CIIP Handbook 2006: An Inventory of Protection Policies in 20 Countries and 6 International Organizations (Vol. I) (Zurich: Center for Security Studies, 2006).
Ellison, R. J., D. A. Fisher, R. C. Linger, H. F. Lipson, T. Longstaff, and N. R. Mead, ‘Survivable Network Systems: An Emerging Discipline’, Technical Report, CMU/SEI-97-TR-013. ESC-TR-97-013, November 1997, , accessed 18 April 2007.
Eriksson, Johan (ed.), Threat Politics: New Perspectives on Security, Risk and Crisis Management (Ashgate: Aldershot, 2001).
Fisher, Uri, ‘Information Age State Security: New Threats to Old Boundaries’, Journal for Homeland Security, November 2001, , accessed 18 April 2007.
French, Geoffrey S., ‘Shunning the Frumious Bandersnatch, Current Literature on Information Warfare and Deterrence’, TRC Analysis (The Terrorism Research Center, 2000), , accessed 18 April 2007.
Geiger, Gebhard, Offensive Informationskriegsführung. Die ‘Joint Doctrine for Information Operations’ der US-Streitkräfte: Sicherheitspolitische Perspektiven, SWP Studie (Berlin: Stiftung Wissenschaft und Politik, 2002).
General Accounting Office, Computer Security: Hackers Penetrate DOD Computer Systems, GAO/T-IMTEC-92-5, 20 November 1991 (Washington, D.C, : Congressional Research Service, 1991).
Giacomello, Giampiero, ‘Taming the Net? The Issue of Government Control on the internet’, Swiss Political Science Review, 5/2 (1999): 116–22.
Goldman, Emily O., ‘New Threats, New Identities and New Ways of War: The Sources of Change in National Security Doctrine’, Journal of Strategic Studies, 24/3 (2001): 12–42.
Goodman, Seymour E., Pamala B. Hassebroek, Daving Kind, and Andy Azment, International Coordination to Increase the Security of Critical Network Infrastructures, Document CNI/04, paper presented at the ITU Workshop on Creating Trust in Critical Network Infrastructures (Seoul, 20-22 May 2002).
Guéhenno, Jean-Marie, The End of the Nation-State (Minneapolis: University of Minnesota Press, 1995).
Haimes, Yacov Y. and Pu Jiang, ‘Leontief-Based Model of Risk in Complex Interconnected Infrastructures’, Journal of Infrastructure Systems, 7/1 (2001): 1–12.
Halperin, David, ‘The Internet and National Security: Emerging Issues’, in David S. Alberts and Daniel S. Papp (eds), The Information Age: An Anthology of Its Impacts and Consequences, Vol. II (Washington: National Defense University Press, 2000): pp. 137–73.
Hart, Jeffrey, ‘Three Approaches to the Measurement of Power in International Relations’, International Organization, 30/2 (1976): 289–305.
Hart, Jeffrey, and Sangbae A. Kim, ‘Power in the Information Age’, in Jose V. Ciprut, (ed.), Of Fears and Foes: International Relations in an Evolving Global Political Economy (Westport CT: Praeger, 2000).
Haufler, Virginia, ‘Crossing the Boundary between Public and Private: International Regimes and Non-State Actors’, in Volker Rittberger (ed.), Regime Theory and International Relations (Oxford: Clarendon Press, 1993): pp. 94–110.
Herrera, Geoffrey, ‘Technology and International Systems’, Millennium, 32/3 (2003): 559–94.
Hobart, Michael E. and Zachary S. Schiffman, Information Ages: Literacy, Numeracy, and the Computer Revolution (Baltimore: Johns Hopkins University Press, 2000).
Holsti, K.J., ‘The Problem of Change in International Relations Theory’, Institute of International Relations, The University of British Columbia, Working Paper No. 26, December 1998.
Hundley, Richard O. and Robert H. Anderson, ‘Emerging Challenge: Security and Safety in Cyberspace’, in John Arquilla and David Ronfeldt (eds), In Athena’s Camp: Preparing for Conflict in the Information Age (Santa Monica: RAND, 1997), pp. 231–52.
Huysmans, Jef, ‘Security! What Do You Mean? From Concept to Thick Signifier’, European Journal of International Relations, 4/2 (1998): 226–55.
Keohane, Robert O. and Joseph S. Nye, ‘Power and Interdependence in the Information Age’, Foreign Affairs, 77/5 (September/October 1998): 81–94.
Kolet, Kristin S., ‘Asymmetric Threats to the United States’, Comparative Strategy, 20 (2001): 277–92.
Kushnick, Bruce, The Unauthorized Biography of the Baby Bells & Info-Scandal (New York: New Networks Institute, 1999).
LaPorte, Todd R. (ed.), Organized Social Complexity: Challenge to Politics and Policy (Princeton: Princeton University Press, 1975).
Lewis, James A., Assessing the Risks of Cyber-terrorism, Cyber War and Other Cyber Threats (Washington: Center for Strategic and International Studies, 2002).
Loon, Joost van, Risk and Technological Culture: Towards a Sociology of Virulence (London: Routledge, 2002).
Luiijf, Eric A.M., Helen H. Burger, and Marieke H.A. Klaver, ‘Critical Infrastructure Protection in The Netherlands: A Quick-scan’, in Urs E. Gattiker, Pia Pedersen and Karsten Petersen (eds), EICAR Conference Best Paper Proceedings 2003,
Do'stlaringiz bilan baham: