13,856
Views
82
CrossRef citations to date
0
Altmetric
Original Articles

Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War

Pages 401-428 | Published online: 15 May 2012

Bibliography

  • Baker , Stewart , Shaun , Waterman and George , Ivanov . 2010 . In the Crossfire: Critical Infrastructure in the Age of Cyber War , Santa Clara , CA : McAfee .
  • Baldor , Lolita. 2010 . ‘US largely ruling out N. Korea in 2009 cyberattacks’ . Associated Press , 3 July
  • Blainey , Geoffrey . 1988 . The Causes of War, , 3rd ed. , New York : Simon and Schuster .
  • Broad , William J. 2011 . ‘Stuxnet worm used against Iran was tested in Israel’ . New York Times , 15 Jan
  • Brodie , Bernard. 1946 . The Absolute Weapon: Atomic Power and World Order , New York : Ayer .
  • Clarke , Richard and Robert , Knake . 2010 . Cyber War: The Next Threat to National Security and What to Do About It , New York: Ecco
  • Clausewitz , Carl von . 1982 . On War , Harmondsworth , , UK : Penguin .
  • Courville , Lt. Col. and Shane , P. 2007 . Air Force and the Cyberspace Mission: Defending the Air Force’s Computer Network in the Future . Occasional Paper, Maxwell Air Force Base, Alabama: Air War College, Center for Strategy and Technology . December 2007 .
  • Derene , Glenn . ‘The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back’ . Popularmechanics.com , nd, <www.popularmechanics.com/technology/military/4277463>
  • Falliere , Nicolas . 2011 . W32.Stuxnet Dossier , CA : Symantec Security Response . <www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf>
  • Fearon , James D. 1995 . ‘Rationalist Explanations for War’ . International Organization , 49/3 Summer : 379 – 414 .
  • Fulghum , David A. 2007 . ‘Israel shows electronic prowess’ . Aviation Week & Space Technology , 25 Nov
  • Hayes , Richard and Gary , Wheatley . 1996 . Information Warfare and Deterrence. NDU Press Book , Washington , DC : National Defense University .
  • Jervis , Robert . 1978 . ‘Cooperation Under the Security Dilemma’ . World Politics , 30/2 Jan : 167 – 214 .
  • Jervis , Robert . 1990 . The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon , Ithaca , NY : Cornell UP .
  • JP 1-02, DOD Dictionary of Military and Associated Terms, US Department of Defense, April 2010, <www.dtic.mil/doctrine/dod_dictionary/>
  • Kramer, Franklin, Stuart Starr and Larry Wentz (eds), Cyberpower and National Security (Dulles, VA: Potomac Books 2009)
  • Krepinevich , Andrew . 2009 . ‘The Pentagon's Wasting Assets’ . Foreign Affairs , 88/4 Aug : 18 – 33 .
  • Kugler , Richard . ‘Deterrence of Cyber Attacks’, in Franklin Kramer, Stuart Starr and Larry Wentz (eds) . Cyberpower and National Security (Dulles, VA: Potomac Books 2009) , 317 – 20 .
  • Lachow , Irving . ‘Cyber Terrorism: Menace or Myth’, in Franklin Kramer, Stuart Starr and Larry Wentz (eds) . Cyberpower and National Security (Dulles, VA: Potomac Books 2009) , 441 – 8 .
  • Lewis , James . 2010 . ‘A Note on the Laws of War in Cyberspace’, CSIS . 25 April <http://csis.org/publication/note-laws-war-cyberspace>
  • Lewis , James . 2010 . ‘Cross-Domain Deterrence and Credible Threats’, CSIS . July
  • Libicki , Martin . 2009 . Cyberdeterrence and Cyberwar , Santa Monica, CA : RAND Corporation .
  • Lord, Kristin M., and Travis Sharp (eds) America’s Cyber Future: Security and Prosperity in the Information Age (CNAS 2011), <www.cnas.org/node/6405>
  • McCullough , Vice Admiral Bernard . 2010 . ‘Positioning the Navy for Cyber Warfare: US Fleet Cyber Command’, Center for Strategic and International Studies . 5 April <http://csis.org/event/cyber-warfare>
  • Northrop Grumman Corporation, Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Prepared for US–China Economic and Security Review Commission, 16 Oct. 2009
  • Rattray , Gregory . 2001 . Strategic Warfare in Cyberspace , Cambridge , MA : MIT Press .
  • Rid , Thomas . ‘Cyber War Will Not Take Place’ . Journal of Strategic Studies , 35/1 (Feb. 2012) 5 – 32 . <www.tandfonline.com/doi/abs/10.1080/01402390.2011.608939>
  • Schelling , Thomas . 1966 . Arms and Influence , New Haven, CT : Yale UP .
  • Sharma , Amit . 2010 . ‘Cyber Wars: A Paradigm Shift from Means to Ends’ . Strategic Analysis , 34/1 : 62
  • Snyder , Glenn . 1961 . Deterrence and Defense: Toward a Theory of National Security Princeton , UP
  • The White House . 2009 . ‘Remarks by the President on Securing Our Nation's Cyber Infrastructure’ . 29 May <www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/>
  • Thomas , Timothy . 2001 . Testimony Before the US–China Commission (Transcript) . <www.uscc.gov/textonly/transcriptstx/testho.htm>
  • US Department of Defense, Quadrennial Defense Review (QDR) Report, Feb. 2010
  • Van Evera , Stephen . 1984 . ‘The Cult of the Offensive and the Origins of the First World War’ . International Security , 9/1 Summer : 58 – 107 .
  • Van Tol , Jan . AirSea Battle: A Point-of-Departure Operational Concept (Center for Strategic and Budgetary Assessments 2010)
  • Zetter , Kim . 2009 . ‘Lawmaker wants ‘show of force’ against North Korea for website attacks’ . Wired.com , 10 July

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.