, accessed 18 April 2007.
Metzger, Jan, ‘The Concept of Critical Infrastructure Protection (CIP)’, in A. J. K. Bailes and Isabelle Frommelt (eds), Business and Security, Public-Private Sector Relationships in a New Security Environment (Oxford: Oxford University Press, 2004), pp. 197–209.
Mihata, Kevin ‘The Persistence of ‘Emergence’, in Raymond A. Eve, Sara Horsfall, and Mary E. Lee (eds), Chaos, Complexity, and Sociology, Myths, Models, and Theories (Thousand Oaks (etc.): Sage Publications), pp 30–8.
Moteff, John D., Critical Infrastructures: Background, Policy, and Implementation, CRS (Congressional Research Service) Report for Congress, RL30153, 10 February 2003 (Washington, D.C.: Congressional Research Service, 2003).
Moteff, John, Claudia Copeland, and John Fischer, Critical Infrastructures: What Makes an Infrastructure Critical? CRS (Congressional Research Service) Report for Congress, RL31556, 30 August 2002 (Washington, D.C.: Congressional Research Service, 2002).
Näf, Michael, ‘Ubiquitous Insecurity? How to ‘Hack’ IT Systems’, Information & Security: An International Journal, Volume 7 (2001): 104–18.
Naisbitt, John, Megatrends: Ten New Directions Transforming Our Lives (New York: Warner Books, 1982).
Nicholas Negroponte, Being Digital (New York; Alfred A. Knopf, 1995).
Nichiporuk, Brian and Carl H. Builder, ‘Societal Implications’, in John Arquilla and David Ronfeldt (eds), In Athena’s Camp, Preparing for Conflict in the Information Age (Santa Monica: RAND, 1997): pp. 295–314.
The White House, A National Security Strategy for a New Century (Washington, D.C.: Government Printing Office, 1997).
Nye, Joseph S. Jr., Power in the Global Information Age: From Realism to Globalization (London: Routledge, 2004).
Nye, Joseph S. Jr, ‘Soft Power’, Foreign Policy, 80 (Fall 1990): 153–71.
Nye, Joseph S. Jr., ‘US Security Policy: Challenges for the 21st Century’, USIA Electronic Journal, 3/3 (July 1998), , accessed 18 April 2007.
O’Brien, Kevin A., Andreas Ligtvoet, Andrew Rathmell, and Douglas MacKenzie, Using Scenarios to Support Critical Infrastructure Analysis and Assessment Work, ACIP, Package 3 Deliverable D3.4 (Brussels 2003).
Office of Critical Infrastructure Protection and Emergency Preparedness, ‘Threat Analysis’, Number, TbA03-001, 12 March 2003, , accessed 18 April 2007.
Organski, A.F.K., World Politics (New York: Alfred A. Knopf, 1968).
Papp, Daniel S and David S. Alberts, ‘The Impacts of the Information Age on International Actors and the International System’, in David S. Alberts, and Daniel S. Papp (eds), The Information Age, An Anthology of Its Impacts and Consequence (Washington D.C.: National Defense University, 1997).
Papp, Daniel S, David S. Alberts, and Alissa Tuyahov, ‘Historical Impacts of Information Technologies, An Overview’, in David S. Alberts and Daniel S. Papp (eds), The Information Age, An Anthology of Its Impacts and Consequences (Washington D.C.: National Defense University, 1997).
President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructures (Washington, D.C. Government Printing Office, October 1997).
Rosenau, James, ‘Global Affairs in an Epochal Transformation’, in C. Ryan Henry and Edward C. Peartree (eds), Information Revolution and International Security (Washington D.C., Center for Strategic and International Studies Press, 1998): pp 33–57.
Rosenau, James N., Turbulence in World Politics: A Theory of Change and Continuity (Princeton: Princeton University Press, 1990).
Rosenau, James N., ‘Governance, Order, and Change in World Politics’, in James N. Rosenau and Ernst-Otto Czempiel (eds), Governance Without Government: Order and Change in World Politics, Cambridge Studies in International Relations Nr. 20. (Cambridge: Cambridge University Press, 1992): pp 1–29.
Rothkopf, David J., ‘Cyberpolitik: The Changing Nature of Power in the Information Age’, Journal of International Affairs, 51/2 (Spring 1998): 325–60.
Sarewitz, Daniel, Pielke, Roger and Kaykhah, Mojdeh, ‘Vulnerability and Risk: Some Thoughts from a Political and Policy Perspective’, Risk Analysis: An International Journal, 23/4 (2003): 805–10.
Singer, David J, Stuart Bremer and John Stuckey, ‘Capability Distribution, Uncertainty, and Major Power War, 1820-1965’, in Bruce Russett (ed.), Peace, War, and Numbers (Beverly Hills, Sage Publications, 1972): pp. 21–7.
Singer, David J., ‘Threat-Perception and the Armament-Tension Dilemma’, Journal of Conflict Resolution, Vol. II (March 1958): 90–105.
Smith, George, ‘How Vulnerable Is Our Interlinked Infrastructure?’, in David S. Alberts and Daniel S. Papp (eds), The Information Age, An Anthology of Its Impacts and Consequences, Volume II (Washington, D.C.: National Defense University Press, 2000), pp. 507–23.
Smith, Merritt Roe and Leo Marx (eds), Does Technology Drive History? The Dilemma of Technological Determinism (Cambridge: MIT Press, 1994).
Strange, Susan, The Retreat of the State: The Diffusion of Power in the World Economy (Cambridge: Cambridge University Press, 1996).
Strogatz, Steven H., ‘Exploring Complex Networks’, Nature, 410 (8 March 2001): 268–76.
Toffler, Alvin, Future Shock (New York: Bantam Books, 1970).
Toffler, Alvin, Third Wave (New York: Bantam Books, 1980).
Toffler, Alvin, Power Shift (New York: Bantam Books, 1981).
Department of the United States Air Force, Cornerstones of Information Warfare (Washington D.C.: Department of the United States Air Force, 1995).
United States Joint Forces Command (2004), United States Joint Forces Command Glossary,
Do'stlaringiz bilan baham: