References
- Avant, D., and V. Haufler. 2012. “Transnational Organisations and Security.” Global Crime 13 (4): 254–275. https://doi.org/10.1080/17440572.2012.715392.
- Backer, L. C. 2015. “Regulating Multinational Corporations: Trends, Challenges, and Opportunities.” The Brown Journal of World Affairs 22:153. http://www.jstor.org/stable/24591006.
- Bateman, J. 2019. The Antitrust Threat to National Security. The Wall Street Journal, October 22. Accessed May 18, 2023, from https://carnegieendowment.org/2019/10/22/antitrust-threat-to-national-security-pub-80404.
- Bateman, J., 2022. Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications. Carnegie Endowment for International Peace. Accessed May 21, 2023 from https://carnegieendowment.org/2022/12/16/russia-s-wartime-cyber-operations-in-ukraine-military-impacts-influences-and-implications-pub-88657.
- Baum, M. A. 2002. “The Constituent Foundations of the Rally-Round-The-Flag Phenomenon.” International Studies Quarterly 46 (2): 263–298. https://doi.org/10.1111/1468-2478.00232.
- BBC News. 5 October, 2020. US Election 2020: Who Do Russia and Iran Want to Win? Accessed June 6, 2023 from https://www.bbc.co.uk/news/election-us-2020-54293489.
- Beech, H. 2018, July 20. Singapore’s Prime Minister Among 1.5 Million Affected by Cyberattack. The New York Times. Accessed May 15, 2023, from https://www.nytimes.com/2018/07/20/world/asia/singapore-cyberattack-singhealth.html.
- Bergengruen, V. 2023. Inside the Kremlin’s Year of Ukraine Propaganda. Time, Accessed May 25, 2023 from https://time.com/6257372/russia-ukraine-war-disinformation/.
- Biden, Joseph R. 2021. Interim National Security Strategic Guidance. The White House. Accessed May 13, 2023, from https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf.
- Cabinet Office. 2010. A Strong Britain in an Age of Uncertainty: The National Security Strategy. United Kingdom. Accessed June 6, 2023, from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/61936/national-security-strategy.pdf.
- Chatagnier, J. T. 2012. “The Effect of Trust in Government on rallies’ Round the Flag.” Journal of Peace Research 49 (5): 631–645. https://doi.org/10.1177/0022343312440808.
- Coats, D. R. 2018. Worldwide Threat Assessment. US Intelligence Community. Accessed June 6, 2023, from https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA—Unclassified-SSCI.pdf.
- Corder, Mike. April 17, 2023. Dutch Intel Agency Paints Grim Picture of Multiple Threats. AP, Accessed June 6, 2023 from https://apnews.com/article/intelligence-netherlands-terrorism-threat-russia-china-dutch-cyber-attack-277fb0dc4203cbe6fbbc7ad8476b4184.
- Daalder, I. H., and I. M. Destler. 2004. “How National Security Advisers See Their Role.” In The Domestic Sources of American Foreign Policy: Insights and Evidence, edited by Eugene R. Wittkopf and James M. McCormick, 203–218. Maryland, Baltimore MD: School for Public Policy, Center for International and Security Studies.
- Darien, P. 2017. “Rethinking Espionage in the Modern Era.” Chicago Journal of International Law 18 (1): 353.
- Department of Defense (DoD). 2022. Department of Defense Information Technology and Cyberspace Activities Budget Overview. Retrieved June 6,2023 from https://www.cape.osd.mil/content/SNAPIT/files/FY23/DoD_PB23_IT_Budget_Overview_Finalv2_revised.pdf.
- Department of Homeland Security. 2022. Cybersecurity and Infrastructure Security Agency. Washington DC: Department of Homeland Security.
- Dobák, I. 2021. “Thoughts on the Evolution of National Security in Cyberspace.” Security and Defence Quarterly 33 (1): 75–85. https://doi.org/10.35467/sdq/133154.
- Dwoskin, E., G. De Vynck, and T. Marh Telford 11, 2022. Silicon Valley Companies Have Been Rewriting Their Rules During the War in Ukraine. Russia is Retaliating. The New York Times. Accessed May 26, 2023 from https://www.washingtonpost.com/technology/2022/03/11/russian-prosecutor-general-seeks-ban-instagram-declare-meta-an-extremist-organization/.
- Egloff, F. J. 2022. Semi-State Actors in Cybersecurity. Oxford, UK: Oxford University Press.
- Eichensehr, K. E. 2016. “Public-private cybersecurity.” Texas Law Review 95:467–538.
- Farrell, H. 2003. “Constructing the International Foundations of E-Commerce—the EU-US Safe Harbor Arrangement.” International Organization 57 (2): 277–306. https://doi.org/10.1017/S0020818303572022.
- Farwell, J. P. 2012. “Industry’s Vital Role in National Cyber Security.” Strategic Studies Quarterly 6 (4): 10–41.
- Fedorov, Mykhailo.July62022344 a.m. Twitter posthttps://twitter.com/FedorovMykhailo/.
- Fischerkeller, M. P., E. O. Goldman, and R. J. Harknett. 2022. Cyber Persistence Theory: Redefining National Security in Cyberspace. Oxford University Press.
- Fischerkeller, M. P., and R. J. Harknett. 2017. “Deterrence is Not a Credible Strategy for Cyberspace.” Orbis 61 (3): 381–393.
- Ford, M., and A. Hoskins. 2022. Radical War: Data, Attention and Control in the Twenty-First Century. Oxford, UK: Oxford University Press.
- Gartzke, E. 2013. “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth.” International Security 38 (2): 41–73. https://doi.org/10.1162/ISEC_a_00136.
- Gasser, U., N. Gertner, J. L. Goldsmith, S. Landau, J. S. Nye, D. O’Brien, M. G. Olsen, et al. 2016. Don’t Panic: Making Progress on the “Going Dark” Debate. Berkman Center for Internet and Society at Harvard University. Accessed May 13, 2023, from https://dash.harvard.edu/handle/1/28552576.
- Geers, K. 2009. “The Cyber Threat to National Critical Infrastructures: Beyond Theory.” Information Security Journal: A Global Perspective 18 (1): 1–7. https://doi.org/10.1080/19393550802676097.
- Gershkovich, E. 2020. The Uneasy Coexistence of Yandex and the Kremlin. MIT Technology Review. Accessed May 12, 2023, from https://www.technologyreview.com/2020/08/19/1006438/yandex-putin-arkady-volozh-kremlin/.
- Goldman, E. O., and M. Warner. 2021. “The Military Instrument in Cyber Strategy.” SAIS Review of International Affairs 41 (2): 51–60. https://doi.org/10.1353/sais.2021.0017.
- Government Resolution 3611. 2011. Advancing National Cyberspace Capabilities. Israel: The State of Israel. (7 August).
- Gu, H. 2023. “Data, Big Tech, and the New Concept of Sovereignty.” Journal of Chinese Political Science 1–22. https://doi.org/10.1007/s11366-023-09855-1.
- Halabi, B., S. Halabi, and D. McPherson. 2000. Internet Routing Architectures. Cisco press.
- Hansen, I., and J. L. Darren. 2019. “Doxing Democracy: Influencing Elections via Cyber Voter Interference.” Contemporary Politics 25 (2): 150–171. https://doi.org/10.1080/13569775.2018.1493629.
- Heim, J. L. 2009. “Tapping the Power of Structural Change: Power Cycle Theory as an Instrument in the Toolbox of National Security Decision-Making.” SAIS Review of International Affairs 29 (2): 113–127. https://www.jstor.org/stable/27000195.
- Helberg, J. 2022. “The Wires of War Technology and the Global Struggle for Power.”
- House of Representatives. (n.d.). Exposing Russia’s Effort to Sow Discord Online: The Internet Research Agency and Advertisements. Permanent Select Committee on Intelligence. Accessed June 6, 2023, from https://democrats-intelligence.house.gov/social-media-content/.
- Hsueh. 2016. “ASEAN and Southeast Asian Peace: Nation Building, Economic Performance, and Asean’s Security Management.” International Relations of the Asia-Pacific 16 (1): 27–66. https://doi.org/10.1093/irap/lcv012.
- Information Commissioner’s Office. n.d. The Role of the National Cyber Security Centre (NCSC). Accessed June 6, 2023 from https://ico.org.uk/for-organisations/the-guide-to-nis/the-role-of-the-national-cyber-security-centre-ncsc/#:~:text=The%20NCSC%20is%20the%20UK’s%20‘technical%20authority’%20for%20cyber%20incidents,national%20response%20to%20cyber%20threats.
- International Crisis Group. 2011. Security Cooperation: Theory and Practice. Central Africa. International CrisisGroup.
- International Institute for Strategic Studies. 2015. “Evolution of the Cyber Domain.” The Implications for National and Global Security, Chapter 10: “Military Cyber Affairs”, IISS 159–188.
- ITU (International Telecommunication Union). 2022. Global Connectivity Report. Accessed May 16, 2023 from https://www.itu.int/itu-d/reports/statistics/global-connectivity-report-2022/.
- Kayali, Laura. February 28, 2022. Facebook’s Parent Company Restricts EU Access to Russia’s RT, Sputnik. Politico. Accessed May 25, 2023 from https://www.politico.eu/article/facebook-parent-company-restricts-eu-access-to-russia-rt-sputnik/.
- Kello, L. 2017. “The Virtual Weapon and International Order”. Perspectives on Politics 18((2)). Yale University Press. https://doi.org/10.1017/S1537592720000511.
- Kello, L. 2021. “Cyber Legalism: Why It Fails and What to Do About It.” Journal of Cybersecurity 7 (1): 1–15. https://doi.org/10.1093/cybsec/tyab014.
- Kinne, B. J. 2018. “Defense Cooperation Agreements and the Emergence of a Global Security Network.” International Organization 72 (4): 799–837. https://doi.org/10.1017/S0020818318000218.
- Kostyuk, N., and C. Wayne. 2021. “The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public.” Journal of Global Security Studies 6 (2). https://doi.org/10.1093/jogss/ogz077.
- Krahmann, E. 2010. States, Citizens and the Privatisation of Security. Cambridge University Press.
- Krebs, R. R. 2015. “How Dominant Narratives Rise and Fall: Military Conflict, Politics, and the Cold War Consensus.” International Organization 69 (4): 809–845. https://doi.org/10.1017/S0020818315000181.
- Kushner, D. 2013. The Real Story of Stuxnet. IEEE Spectrum. Accessed June 10, 2023, from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet.
- Levin, D. H. 2016. “When the Great Power Gets a Vote: The Effects of Great Power Electoral Interventions on Election Results.” International Studies Quarterly 60 (2): 189–202. https://doi.org/10.1093/isq/sqv016.
- Lewis, J. A. 2006. “Critical Infrastructure Protection and Cyber Terrorism: Mass Destruction or Mass Annoyance?” In Transatlantic Homeland Security? Protecting Society in the Age of Catastrophic Terrorism, edited by Adja Dalgaard-Nielsen, and Daniel Hamilton. New York NY: Routledge.
- Lindsay, J. R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22 (3): 365–404. https://doi.org/10.1080/09636412.2013.816122.
- Lindsay, J. R. 2015. “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence Against Cyberattack.” Journal of Cybersecurity 1 (1): 53–67. https://doi.org/10.1093/cybsec/tyv003.
- Lindsay, J. R. 2021. “Cyber Espionage.” The Oxford Handbook on Cyber Security 223–238.
- Mac, R., M. Isaac, and S. Frenkel March 30, 2022. How war in Ukraine roiled Facebook and Instagram. The New York Times. Accessed July 28, 2022, from https://www.nytimes.com/2022/03/30/technology/ukraine-russia-facebook-instagram.html.
- Mackintosh, E., and E. Kiernan. 2019. Finland is Winning the War on Fake News. What It’s Learned May Be Crucial to Western Democracy. CNN. Accessed June 10, 2023. from https://edition.cnn.com/interactive/2019/05/europe/finland-fake-news-intl/.
- Makinda, S. M. 1998. “Sovereignty and Global Security.” Security Dialogue 29 (3): 281–292. https://doi.org/10.1177/0967010698029003003.
- Mandel, R. 2009. “On Estimating Post-Cold War Enemy Intentions.” Intelligence & National Security 24 (2): 194–215. https://doi.org/10.1080/02684520902819610.
- Markusen, A. R. 2003. “The Case Against Privatizing National Security.” Governance 16 (4): 471–501. https://doi.org/10.1111/1468-0491.00225.
- Maschmeyer, L. 2021. “The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations.” International Security 46 (2): 51–90. https://doi.org/10.1162/isec_a_00418.
- Matania, E., and A. Rapaport. 2021. Cybermania – How Israel Became a Global Powerhouse in the Domain That is Revolutionizing the Future of Humanity. Israel 2021. Cybertech—Arromedia Ltd.
- Matania, E., and E. Tel-Shir. 2020. “Continuous Terrain Remodelling: Gaining the Upper Hand in Cyber Defence.” Journal of Cyber Policy 5 (2): 285–301. https://doi.org/10.1080/23738871.2020.1778761.
- Matania, E., L. Yoffe, and T. Goldstein. 2017. “Structuring the National Cyber Defence: In Evolution Towards a Central Cyber Authority.” Journal of Cyber Policy 2 (1): 16–25. https://doi.org/10.1080/23738871.2017.1299193.
- Matania, E., L. Yoffe, and M. Mashkautsan. 2016. “A Three-Layer Framework for a Comprehensive National Cyber-Security Strategy Eviatar Matania , Lior Yoffe , Michael Mashkautsan.” Georgetown Journal of International Affairs Georgetown University Press 17 (3): 77–84. https://doi.org/10.1353/gia.2016.0038.
- Meta. n.d.-a. Best Practices for Local Government. Accessed July 28, 2022, from https://www.facebook.com/gpa/best-practices/local-government#consideradvertising.
- Meta. n.d.-b. Hard Questions: Where Do We Draw the Line on Free Expression?. Accessed July 28, 2022, from https://about.fb.com/news/2018/08/hard-questions-free-expression/.
- Meta. n.d.-c. Meta political engagement. Accessed July 28, 2022, from https://about.facebook.com/facebook-political-engagement/.
- Meta. n.d.-d. Meta’s Ongoing Efforts Regarding Russia’s Invasion of Ukraine. Accessed July 28, 2022, from https://about.fb.com/news/2022/02/metas-ongoing-efforts-regarding-russias-invasion-of-ukraine/#russian-translation.
- Meta. n.d.-e. Offices. Accessed July 28, 2022, from https://about.facebook.com/media-gallery/offices-around-the-world/.
- Meta. n.d.-f, Promoting Safety and Expressions. Accessed July 28, 2022, from https://about.meta.com/actions/promoting-safety-and-expression/.
- Meta. n.d.-g. .Social Metaverse Company. Accessed July 28, 2022, from https://about.facebook.com/.
- Milburn, John. 24 August 2022. How to Close the Value Gap in Today’s Security Tooling. Forbes. Accessed June 6, 2023, from https://www.forbes.com/sites/forbestechcouncil/2022/08/24/how-to-close-the-value-gap-in-todays-security-tooling/?sh=4383a80567bc.
- Mintz, A., and K. DeRouen Jr. 2010. Understanding Foreign Policy Decision Making. New York, NY: Cambridge University Press.
- Mintz, A., S. Mishal, and N. Morag. 2005. Victims of Polythink? The Israeli Delegation to Camp David 2000. New Haven CT: UN studies, Yale University.
- Morabito, D. 2021. “National Security and the Third-Road Threat: Toward a Comprehensive Theory of Information Warfare.” Air & Space Power Journal 35 (3): 19–39.
- Nye, J. S., Jr. 2010. Cyber Power. Cambridge, MA: Harvard University.
- Rakov, D., and S. Fainberg 2023. The Growing Impact of the Civilian Population on the Modern Battlefield. Elrom Center for Air and Space Studies. Research Report (0123E), Elrom Center for Air and Space Studies Tel Aviv University. Accessed May 25, 2023 from https://social-sciences.tau.ac.il/sites/socsci.tau.ac.il/files/media_server/social/poli-eng/0123e2023.pdf.
- Redd, S. B., and A. Mintz. 2013. “Policy Perspectives on National Security and Foreign Policy Decision Making.” Policy Studies Journal 41 (S1): S11–S37. https://doi.org/10.1111/psj.12010.
- Rid, T. 2020. “Active Measures: The Secret History of Disinformation and Political Warfare.”
- Russian Embassy in the US. March 11, 2022, 5: 33 A.M. Twitter Post, https://twitter.com/RusEmbUSA/status/1502125428655501316.
- Shallcross, N. J. 2017. “Social Media and Information Operations in the 21st Century.” Journal of Information Warfare 16 (1): 1–12.
- Shandler, R., and M. A. Gomez. 2022. “The Hidden Threat of Cyber-Attacks–undermining Public Confidence in Government.” Journal of Information Technology & Politics 20 (4): 1–16. https://doi.org/10.1080/19331681.2022.2112796.
- Shifrinson, J. 2020. “The Rise of China, Balance of Power Theory and US National Security: Reasons for Optimism?” Journal of Strategic Studies 43 (2): 175–216. https://doi.org/10.1080/01402390.2018.1558056.
- Singer, P. W. 2017. Corporate Warriors: The Rise of the Privatized Military Industry. Ithaca, NY: Cornell University Press.
- Slayton, R. 2017. “What is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security 41 (3): 72–109. https://doi.org/10.1162/ISEC_a_00267.
- Statista 2023b. Spending on Cybersecurity Worldwide from 2017 to 2022. https://www.statista.com/statistics/991304/worldwide-cybersecurity-spending/.
- Tham, I. July 20, 2018. “Personal Info of 1.5m SingHealth Patients, Including PM Lee, Stolen in Singapore’s Worst Cyberattack.” The Straits Times. Accessed June 9, 2023, from https://www.straitstimes.com/singapore/personal-info-of15m-singhealth-patients-including-pm-lee-stolen-in-singapores-most.
- Tieku. 2014. “A Curious Case of Hybrid Paternalism: Conceptualizing the Relationship Between the UN and AU on Peace and Security.” African Conflict and Peacebuilding Review 4 (2): 129–156. https://doi.org/10.2979/africonfpeacrevi.4.2.129.
- US Chamber of Commerce Technology Engagement Center. n.d. How Tech is Supporting Ukraine. Accessed May 14, 2023, from https://americaninnovators.com/news/how-tech-is-supporting-ukraine/.
- US Cyber Command. n.d. Our History. Accessed June 6, 2023, from https://www.cybercom.mil/About/History/.
- Van den Herik, L., and J. Letnar Černič. 2010. “Regulating Corporations Under International Law: From Human Rights to International Criminal Law and Back Again.” Journal of International Criminal Justice 8 (3): 725–743. https://doi.org/10.1093/jicj/mqq031.
- Vengattil, M., and E. Culliford. 2022. Facebook Allows War Posts Urging Violence Against Russian Invaders. Reuters 11 March from. Accessed May 25, 2023. https://www.reuters.com/world/europe/exclusive-facebook-instagram-temporarily-allow-calls-violence-against-russians-2022-03-10/.
- Way, L., and A. Casey. 2018. “Russian Foreign Election Interventions Since 1991.” PONARS Eurasia Policy Memo520. from. https://www.ponarseurasia.org/wp-content/uploads/attachments/Pepm520_Way-Casey_March2018.pdf.Accessed May 13, 2023
- Zandt, F., and F. Richter 2022, January 25. Infographic: Big Tech Goes Big on Lobbying Efforts. Statista Infographics. Accessed July 28, 2022, from https://www.statista.com/chart/26673/highest-lobbying-spending-in-the-tech-industry-in-the-us/.
- Zetter, K. 2014a. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown Publishers.
- Zetter, K. 11 March 2014b An Unprecedented Look at Stuxnet, the World’s First Digital Weapon. Wired, Accessed June 6, 2023 from https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.