Bibliography
- Adamsky, Dmitry Dima, ‘The 1983 Nuclear Crisis – Lessons for Deterrence Theory and Practice’, Journal of Strategic Studies 36/1 (2013), 4–41.
- Adamsky, Dimitry Dima and Baidatz Yossi, ‘The Development of the Israeli Approach to Deterrence: a Critical Discussion on its Theoretical and Practical Aspects’, Eshtonot (8) Israel’s National Security Collage (2014) (in Hebrew).
- Adler, Emanuel, ‘Complex Deterrence in the Asymmetric-Warfare Era’, in T.V. Paul, Patrick M. Morgan, and James, J. Wirtz (eds.), Complex Deterrence: Strategy in the Global Age (Chicago: The University of Chicago Press, 2009), 85–109.
- Agence Nationale de la Sécurité des SystèmesD’information (ANSSI), Défense et Sécurité des Systèmes D’information Stratégie de la France (February 2011).
- Albright, David, Brannan, Paul and Walrond, Christina, ‘Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Preliminary Assessment’, ISIS Report 22 December 2010.
- Albright, David, Brannan, Paul and Walrond, Christina, ‘Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report’, ISIS Report 15 February 2011.
- Almog, Doron, ‘Cumulative Deterrence and the War on Terrorism’, Parameters 34/4 (2004/2005).
- Arquilla, John and Ronfeldt, David, The Advent of Netwar (Santa Monica, California: RAND, 1996).
- Arquilla, John and Ronfeldt, David, ‘Cyberwar is Coming!’ Comparative Strategy 12/2 (1993), 65–141.
- Atzili, Boaz and Wendy Pearlman, ‘Triadic Deterrence: Coercing Strength, Beaten by Weakness’, Security Studies 21 (2012), 301–35.
- Baldor, Lolita C., ‘US: Hackers in Iran Responsible for Cyber attacks’, CBS News 11 November 2012, http://m.nbcnews.com/technology/technolog/us-hackers-iran-responsible-cyberattacks-1C6423908
- Bar-Joseph, Uri, ‘Variations on a Theme: The Conceptualization of Deterrence in Israeli Strategic Thinking’, Security Studies 7/3 ( Spring, 1998), 149–84.
- Barzashka, Ivanka, ‘Are Cyber-Weapons Effective? Assessing Stuxnet’s Impact on the Iranian Enrichment Programme’, RUSI Journal 158/2 (April 2013).
- BBC News, ‘Sony Hack: White House Views Attack as Security Issue’, 19 December 2014. http://www.bbc.com/news/world-us-canada-30538154
- Booton, Jennifer, Egan Matt and Samson Adam, ‘Bank of America Hit by Cyber Attack’, FOX Business, 18 September 2012, http://www.foxbusiness.com/industries/2012/09/18/bank-america-website-experiencing-sporadic-outages
- Box, G.E.P. and N.R. Draper, Empirical Model Building and Response Surfaces (New York: Wiley, 1987).
- Clark, David D. and Susan Landau, ‘Untangling Attribution’, Committee on Deterring Cyberattacks, National Research Council, Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for U.S. Policy (2011), 25–40.
- Cohen, Daniel and Rotbart, Aviv, ‘The Proliferation of Weapons in Cyberspace’, Military and Strategic Affairs 5/1 (May, 2013).
- Crosston, Matthew D., ‘World Gone Cyber MAD: How “Mutually Assured Debilitation” Is the Best Hope for Cyber Deterrence’, Strategic Studies Quarterly 115 (Spring, 2011).
- Czech Republic, Cyber Security Strategy for the Czech Republic (2011).
- Dunn Cavelty, Myriam, ‘Unlocking the “Stuxnet Effect”: On Continuity and Change in the Discourse on Cyber Threats’, Military and Strategic Affairs 3/3 (December, 2011) (in Hebrew).
- Dwyer, Devin, ‘President Obama Sanctions North Korea after Sony Cyber attack’, ABC News, 2 January 2015. http://abcnews.go.com/Politics/obama-sanctions-north-korea-sony-cyberattack/story?id=27965524
- Falliere, Nicolas, Liam O. Murchu and Eric Chien, W32. Stuxnet Dossier. Version 1.4 (Symantec, 2011).
- Farwell, James P. and Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival 53 (2011), 23–40.
- Federal Ministry of the Interior, The New Cyber Security Strategy for Germany ( February, 2011).
- Fredericks, Brian E., ‘Information Warfare at the Crossroads’, Joint Force Quarterly 17 ( Summer 1997).
- Freedman, Lawrence, Deterrence (Cambridge: Polity, 2004).
- Gellman, Barton and Greg Miller, ‘U.S. Spy Network’s Successes, Failures and Objectives’ detailed in ‘Black Budget’ Summary, The Washington Post, 29 August 2013. http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html?tid=ts_carousel
- Glaser, Charles L., Deterrence of Cyber Attacks and U.S. National Security (Washington, DC: Elliot School of International Affairs, George Washington University, 2011).
- Goodman, Will, ‘Cyber Deterrence – Tougher in Theory than in Practice?’, Strategic Studies Quarterly (Fall, 2010).
- Harknett, Richard J., ‘Information Warfare and Deterrence’, Parameters 26/3 (1996), 93–107.
- Harknett, Richard J., John P. Callaghan and Rudi Kauffman, ‘Leaving Deterrence Behind: War-Fighting and National Cyber Security’, Journal of Homeland Security and Emergency Management 7/1 (2010).
- Henriksen, Dag, ‘Deterrence by Default? Israel’s Military Strategy in the 2006 War against Hizballah’, Journal of Strategic Studies 35/1 (February 2012), 95–120.
- Knopf, Jeffrey W., ‘The Fourth Wave in Deterrence Research’, Contemporary Security Policy 31/1 (2010), 1–33.
- Kugler, Richard L., ‘Deterrence of Cyber Attacks.’ in Franklin D. Kramer, Stuart H. Starr and Larry Wentz (eds.), Cyber Power and National Security (Washington, DC: National Defense University, 2009) Ch. 13, 309–40.
- Langner, Ralph, ‘A Declaration of Bankruptcy for US Critical Infrastructure Protection’, The Last Line of Cyber Defense (June, 2011).
- Langner, Ralph, ‘Matching Langner’s Stuxnet Analysis and Symantec’s Dossier Update’, The Last Line of Cyber Defense ( February, 2011).
- Langner, Ralph, ‘What Stuxnet Is All About’, The Last Line of Cyber Defense ( January, 2011).
- Libicki, Martin, Cyber Deterrence and Cyber War (Santa Monica, CA: RAND Corporation, 2009).
- Liff, Adam P., ‘Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyber Warfare Capabilities and Interstate War’, Journal of Strategic Studies (May 2012), 1–28.
- Lindsay Jon R., ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (August 2013), 365–404. http://dx.doi.org/10.1080/09636412.2013.816122
- Lukasik, Stephen J., ‘A Framework for Thinking about Cyber Conflict and Cyber Deterrence with Possible Declaratory Policies for These Domains’, in Committee on Deterring Cyber Attacks, National Research Council, Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy (2011), 101.
- Lupovitz, Amir, ‘Cyber Warfare and Deterrence: Trends and Challenges in Research’, Military And Strategic Affairs 3/3 (December 2011) (in Hebrew).
- Malka, Amos, ‘Israel and Asymmetrical Deterrence’, Comparative Strategy 27/1 (2008), 1–19.
- Nakashima, Ellen, ‘Iran Blamed for Cyber attacks on US Banks and Companies’, The Washington Post, 21 September 2012, http://articles.washingtonpost.com/2012-09-21/world/35497878_1_web-sites-quds-force-cyberattacks#
- McGraw, Gary, ‘Cyber War is Inevitable (Unless We Build Security In)’, Journal of Strategic Studies ( February 2013).
- Morgan, Patrick M., ‘Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm’, in Committee on Deterring Cyber Attacks, National Research Council, Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Options for US Policy (2011).
- Morgan, Patrick M., ‘The State of Deterrence in International Politics Today’, Contemporary Security Policy 33/1 (2012), 85–107.
- Netherlands Cabinet, The National Cyber Security Strategy (2011).
- Obama, Barack, US International Strategy for Cyberspace - Prosperity, Security, and Openness in A Networked World (Washington, DC: The White House, 2011).
- Ortal, Eran, ‘The Paradigm of Deterrence Operations: a Strategic Pattern at a Dead-End’, Eshtonot (1), Israel’s National Security Collage (2013) (in Hebrew).
- Paul, T.V., ‘Complex Deterrence – An Introduction’ in T.V. Paul, Patrick M. Morgan, James J. Wirtz (eds.), Complex Deterrence (Chicago: The University of Chicago Press, 2009).
- Panetta, Leon, ‘Serious Cyber-attacks Are Imminent Warns Leon Panetta: A Cyber Pearl Harbor or Cyber 9/11’, IDG News Service, 11 October 2012, http://www.youtube.com/watch?v=z1IF0bEMZts
- Patterson Manson, George III., ‘Cyberwar: The United States and China Prepare for the Next Generation of Conflict’, Comparative Strategy 30/2 (2011), 121–33.
- Peterson, Dale, ‘Offensive Cyber Weapons: Construction, Development, and Employment’, Journal of Strategic Studies (February 2013), 1–5.
- Rid, Thomas, ‘More Attacks, Less Violence’, Journal of Strategic Studies (February, 2013).
- Rid, Thomas and Ben Buchanan, ‘Attributing Cyber Attacks’, Journal of Strategic Studies 38/1-2 (2015), 4–37.
- Rid, Thomas and Peter McBurney, ‘Cyber-Weapons’, The RUSI Journal 157/1 (2012), 6–13.
- Rid, Thomas, ‘Deterrence beyond the State: the Israeli Experience’, Comparative Security Policy 33/1 (2012), 124–47.
- Rid, Thomas, ‘Cyber War Will Not Take Place’, Journal of Strategic Studies (October 2011), 1–28.
- Russia, 2011. Conceptual Views on the Activates of the Armed Forces of the Russian Federation in Information Space. For a partial translation into English, see Atlantic Organization for Security, http://www.aofs.org/2012/04/15/russia%C2%B4s-cyber-strategy-published/
- Russia Ministry of Foreign Affairs, Doctrine of the Information Security of the Russian Federation (September 2000).
- Sanger, David E., Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Random House, 2012).
- Sanger, David E. and Nicole Perlroth, ‘U.S. Said to Find North Korea Ordered Cyber attack on Sony’. The New York Times, 17 December 2014. http://www.nytimes.com/2014/12/18/world/asia/us-links-north-korea-to-sony-hacking.html?_r=0
- Sanger, David E. and Nicole Perlroth, ‘North Korea Loses Its Link to the Internet.’ The New York Times, 22 December 2014. http://www.nytimes.com/2014/12/23/world/asia/attack-is-suspected-as-north-korean-internet-collapses.html
- Solomon, Jonathan, ‘Cyber deterrence between Nation-States-Actors: Plausible Strategy or a Pipe Dream?’ Strategic Studies Quarterly ( Spring 2011).
- State of Israel, Report of the National Council for Research and Development, 2010-2011 (July 2012), 10–18 (in Hebrew).
- State of Israel, Promoting National Capability in Cyberspace, Decision 3611 of the 32nd Government (August 2011) (in Hebrew).
- Sterner, Eric, ‘Retaliatory Deterrence in Cyberspace’, Strategic Studies Quarterly ( Spring 2011), 62–80.
- Stevens, Tim, ‘A Cyberwar of Ideas? Deterrence and Norms in Cyberspace’, Contemporary Security Policy 33/1 (2012), 148–70.
- The White House, U.S. National Strategy to Secure Cyberspace (2003).
- The White House, U.S. International Strategy for Cyberspace: Prosperity, Security, and Openness In a Networked World (2011).
- UK Cabinet Office, The U.K. Cyber Security Strategy – Protecting & Promoting the UK in a Digital World ( November 2011).
- UK Cabinet Office, Cyber Security Strategy of the United Kingdom ( June 2009).
- US Department of Homeland Security, Blueprint for a Secure Cyber Future (November 2011).
- US Department of Justice - Office of Public Affairs. 2014 ‘U.S. Charges Five Chinese Military Hackers For Cyber Espionage against U.S. Corporations and a Labor Organization for Commercial Advantage’, 19 May 2011. http://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor
- US Senate, Advance Questions for Lieutenant General Keith Alexander, USA Nominee for Commander, United States Cyber Command (2010) http://www.armed-services.senate.gov/statemnt/2010/04%20April/Alexander%2004-15-10.pdf
- US STRATCOM, ‘Cyberspace Deterrence vs. Deterrence – Is It a Meaningless Distinction?’, Deterrence Symposium, Panel 3, August 2011, http://www.youtube.com/watch?v=-ck6QH0pm6c
- Wenger, Andreas and Alex Wilner (eds), Deterring Terrorism – Theory and Practice (Stanford, CA: Stanford Security Studies, 2012).
- Zetter Kim, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (New York: Crown, 2014).