1,199
Views
6
CrossRef citations to date
0
Altmetric
Articles

Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures

Pages 419-433 | Received 05 Dec 2012, Accepted 02 Jun 2013, Published online: 05 Jul 2013

REFERENCES

  • Amarelo, M.2011. New Federation of American Scientists Report Demonstrates Iran Improved Enrichment in 2010. Washington, DC, USA: Federation of American Scientists.
  • Blichfeldt, B. S., and J. R.Andersen. 2006. “Creating a Wider Audience for Action Research: Learning from Case-Study Research.” Journal of Research Practice2 (1): D2.
  • Daly, M. K.2009. “The Advanced Persistent Threat (or Informationized Force Operations).” In 23rd Large Scale Installation Administration Conference. Baltimore MD: Usenix, November.
  • Dantzker, M. L., and R. D.Hunter. 2000. Research Methods For Criminology and Criminal Justice: A Primer. Woburn, MA: Butterworth-Heinemann.
  • Dash, D. P.1999. “Current Debates in Action Research.” Systemic Practice and Action Research12 (5): 457–492.
  • Dixon, S. M., and N.Theberge. 2011. “Contextual Factors Affecting Task Distribution in Two Participatory Ergonomic Interventions: A Qualitative Study.” Ergonomics54 (11): 1005–1016.
  • Economist. 2007. “A Cyber-Riot: Estonia Has Faced Down Russian Rioters. But Its Websites Are Still Under Attack.” Last Accessed December 2012. http://www.economist.com/node/9163598.
  • European Commission. 2009. Independent International Fact-Finding Mission on the Conflict in Georgia. Brussels, Belgium: Council of the European Union.
  • Falliere, N., L. O. Murchu, and E. Chien. 2011. “W32.Stuxnet Dossier.” Symantec, Cupertino, California, USA. Last Accessed December 2012. http://www.symantec.com/connect/blogs/w32stuxnet-dossier.
  • Gaycken, S.2010. “Stuxnet: Wer War's?”, “Und Wozu?” Die Zeit, November 26.
  • Glaser, B., and A. L.Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research. New York: Aldine.
  • Grey Goose Project. 2008. “Russia/Georgia Cyber-War: Findings and Analysis.” Phase I Report. Last Accessed December 2012. http://www.scribd.com/doc/6967393/Project-Grey-Goose-Phase-I-Report.
  • He, Y., and C. W.Johnson. 2012. “Generic Security Cases for Information Systems Security in Healthcare.” In Proceedings of the 7th IET Conference on Systems Safety and CyberSecurity. London: IET.
  • Henderson, S.2009. “Hunting the GhostNet Hacker.” The Dark Visitor, Last Accessed December 2012. http://www.thedarkvisitor.com/2009/04/hunting-the-ghostnet-hacker/.
  • Hughes, R. B.2008. “NATO and Global Cyber Defence.” In The Bucharest Conference Papers, edited by R.Shepherd, 41–55. London: Royal Institute of International Affairs, Chatham House.
  • Information Warfare Monitor. 2009. Tracking GhostNet: Investigating a Cyber Espionage Network. Ottawa: Munk Center for International Studies, University of Toronto, The SecDev Group, Joint Technical Report JR02-2009.
  • Information Warfare Monitor. 2010. SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0. Ottawa: Munk Center for International Studies, University of Toronto, The SecDev Group, Shadowserver Foundation, Joint Technical Report JR03-2010.
  • Johnson, C. W.2012. “Preparing for Cyber-Attacks on Air Traffic Management Infrastructures: Cyber-Safety Scenario Generation.” In Proceedings of the 7th IET Conference on Systems Safety and CyberSecurity. London: IET.
  • Johnson, C. W.In Press. “Inadequate Legal, Regulatory and Technical Guidance for the Forensic Analysis of Cyber-Attacks on Safety-Critical Software.” In Proceedings of the Workshop Interdisciplinaire sur la Sécurité Globale, edited by P.Lallement. ISTE-Wiley.
  • Kraemer, S., P.Carayon, and Clem. 2009. “Human and Organizational Factors In Computer and Information Security: Pathways To Vulnerabilities.” Computers and Security28 (7): 509–520.
  • Lewin, K.1946. “Action Research and Minority Problems.” Journal of Social Issues2 (4): 34–46.
  • Manyika, J., M. Chui, and H. Sarrazin. 2012. “Social Media's Productivity Payoff.” Harvard Business Review.
  • Markelj, B., and I.Bernik. 2012. “Mobile Devices and Corporate Data Security.” International Journal of Education and Information Technologies6 (1): 97–104.
  • Matrosov, A., E.Rodionov, D.Harley, and J.Malcho. 2010. Stuxnet Under the Microscope. Bratislava, Slovakia: ESET, Last Accessed December 2012. http://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf.
  • Nagaraja, S., and R. Anderson. 2009. “The Snooping Dragon: Social-Malware Surveillance of the Tibetan Movement.” Computer Laboratory, University of Cambridge, UK, Technical Report Number 746.
  • Nazario, J.2007. “Estonian DDoS Attacks – A summary to date.”, Arbor Networks, Chelmsford, MA. Available on: http://asert.arbornetworks.com/2007/05/estonian-ddos-attacks-a-summary-to-date/, last accessed December 2012.
  • Nazario, J.April 2008a. “Radio Free Europe DDoS.” Arbor Networks, Chelmsford, MA. Last Accessed December 2012. http://asert.arbornetworks.com/2008/04/radio-free-europe-ddos/.
  • Nazario, J.2008b. “Georgia On My Mind – Political DDoS.” Arbor Networks, Chelmsford, MA. Last Accessed December 2012. http://asert.arbornetworks.com/2008/07/georgia-on-my-mind-political-ddos/.
  • Nazario, J.2008c. “Georgia DDoS Attacks – A Quick Summary of Observations.” Arbor Networks, Chelmsford, MA. Last Accessed December 2012. http://asert.arbornetworks.com/2008/08/georgia-ddos-attacks-a-quick-summary-of-observations/.
  • Nazario, J.2009. “Malicious Google AppEngine Used as a CnC.” Arbor Networks, Chelmsford, MA. Last Accessed December 2012. http://asert.arbornetworks.com/2009/11/malicious-google-appengine-used-as-a-cnc/.
  • Pääbo, H.2008. “War of Memories: Explaining ‘Memorials War’ in Estonia.” Baltic Security & Defence Review10: 5–28.
  • Shaw, E. D.2006. “The Role of Behavioral Research and Profiling in Malicious Cyber Insider Investigations.” Digital Investigation: The International Journal of Digital Forensics & Incident Response3 (1): 20–31.
  • Tikk, E.2009. Frameworks for International Cyber Security. Tallinn, Estonia: NATO Cooperative Cyber Defence, Centre of Excellence.
  • Tikk, E., K.Kaska, K.Rünnimeri, M.Kert, A. M.Talihärm, and L.Vihul. 2008. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn, Estonia: NATO Cooperative Cyber Defence, Centre of Excellence.
  • Tikk, E., K.Kaska, and L.Vihul. 2010. International Cyber Incidents: Legal Considerations. Tallinn, Estonia: NATO Cooperative Cyber Defence, Centre of Excellence.
  • Villeneuve, N.2010. “Shadows in the Cloud.” Personal Blog. Last Accessed December 2012. http://www.nartv.org/2010/04/05/shadows-in-the-cloud/, 2010.
  • Wasserman, S., and J.Galaskiewicz. 1994. Advances in Social Network Analysis: Research in the Social and Behavioral Sciences. Thousand Oaks, CA: Sage.
  • Waterman, S.June 2007. “Security Industry Analysis: Who Cyber Smacked Estonia?” United Press International.
  • Yin, R. K.1994. Case Study Research: Design and Methods. 2nd ed.Beverly Hills, CA: Sage.
  • Zmijewski, E.2008. “Georgia Clings to the 'Net.” Renesys, Manchester, NH. Last Accessed December 2012. http://www.renesys.com/blog/2008/08/georgia_clings_to_the_net.shtml.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.