Bibliography
- Adams, James, ‘Virtual Defense’, Foreign Affairs 80/3 (2001), 98. doi:10.2307/20050154
- Arquilla, John, ‘Twenty Years of Cyberwar’, Journal of Military Ethics 12/1 (2013), 80–87. doi:10.1080/15027570.2013.782632
- Arquilla, John and David Ronfeldt, ‘Cyberwar is Coming!’, Comparative Strategy 12/2 (1993), 141–65. doi:10.1080/01495939308402915
- Arquilla, John and David Ronfeldt, The Advent of Netwars (Santa Monica CA: Rand 1996).
- Arquilla, John and David Ronfeldt eds., Networks and Netwar (Santa Monica CA: RAND 2001).
- Barzashka, Ivanka, ‘Are Cyber-Weapons Effective?’, RUSI Journal 158/2 (2014), 48–56.
- Beeker, Kevin, Robert Mills, Michael Grimaila, and Michael Haas, ‘Operationally Responsive Cyberspace’, in A. Lowther (ed.), Thinking about Deterrence (Alabama: Maxwell Air Force Base (AFB) 2013), 17–36.
- Bennett, Trevor, Katy Holloway, and David Farrington, ‘Does Neighborhood Watch Reduce Crime?’, Journal of Experimental Criminology 2/4 (2006), 437–458.
- Betz, David and Tim Stevens, Cyberspace and the State (London: Adelphi (IISS) 51: 242 2011).
- Bing, Chris, ‘National Security Council Delays Publication of Cyber Strategy over Inclusion of “Offensive” Measures’, CyberScoop, 15 May 2018.
- Bing, Chris, ‘White House Official: Paul Nakasone Nominated for NSA Director’, Cyber Scoop, 13 Feb. 2018.
- Blank, Stephen, ‘Can Information Warfare Be Deterred?’, Defense Analysis 17/2 (2001), 121–38. doi:10.1080/07430170120064212
- Braga, Anthony and David Weisburd, ‘The Effects of Focused Deterrence Strategies on Crime’, Journal of Research in Crime and Delinquency 49 (2012), 323–58. doi:10.1177/0022427811419368
- Buchanan, Ben, The Cybersecurity Dilemma (New York NY: Oxford UP 2016).
- Clark, David C. and Susan Landau, ‘Untangling Attribution’, Harvard Law School National Security Journal 2 (2011), 1–30.
- Clarke, Richard and Robert Knake, Cyber War (New York NY: Ecco Press 2010).
- Clayton, Richard, ‘Anonymity and Traceability in Cyberspace’, University of Cambridge Technical Report # 653, (2005).
- Cordesman, Anthony and Justin Cordesman, Cyberthreats, Information Warfare, and Critical Infrastructure Protection (Westport CT: Praeger 2002).
- Davis, Paul, ‘Deterrence, Influence, Cyber Attack, and Cyberwar’, Rand Working Paper, 2014.
- Defense Information Systems Agency News, ‘Norton Assumes Command of JFHQ-DODIN and Directorship of DISA’, 1 Feb. 2018.
- Deibert, Ronald and Rafal Rohozinkis, ‘Risking Security’, International Political Sociology 4 (2010). doi:10.1111/j.1749-5687.2009.00088.x
- Deibert, Ronald, Rafal Rohozinski, and Masashi Crete-Nishihata, ‘Cyclones in Cyberspace’, Security Dialogue 43/1 (2012), 3–24. doi:10.1177/0967010611431079
- Department of Defence Videos, ‘Shanahan Speaks at Naval Conference’, 6 Feb. 2018. https://www.defense.gov/Videos/videoid/583404/, minute 29–33 (accessed Jan. 2019).
- DoD Defense Science Board, Resilient Military Systems and the Advanced Cyber Threat, 2013.
- DoD Defense Science Board, Task Force on Cyber Deterrence report, 2017.
- Dunn Cavelty, Myriam, ‘From Cyber-Bombs to Political Fallout’, International Studies Review 15 (2013), 105–22. doi:10.1111/misr.12023
- Emmott, Robin, ‘NATO Mulls ‘Offensive Defense’ with Cyber Warfare Rules’, Reuters, 30 Nov. 2017.
- Eriksson, Johan and Giampiero Giacomello, ‘The Information Revolution, Security, and International Relations’, International Political Science Review 27/3 (2006), 221–44. doi:10.1177/0192512106064462
- Farrington, David, Martin Gill, Sam Waples, and Javier Argomaniz, ‘The Effects of Closed-Circuit Television on Crime’, Journal of Experimental Criminology 3 (2007), 21–38. doi:10.1007/s11292-007-9024-2
- Farwell, James and Rafal Rohozinski, ‘Stuxnet and the Future of Cyber War’, Survival 53/1 (2011), 23–40. doi:10.1080/00396338.2011.555586
- Finnemore, Martha, ‘Cultivating International Cyber Norms’, in K. Lord and T. Sharp (eds.), America’s Cyber Future: Security and Prosperity in the Information Age (Washington DC: Center for New America 2011), 87–101.
- Freedman, Lawrence, Deterrence (Cambridge: Polity Press 2004).
- Glaser, Charles, ‘Deterrence of Cyber Attacks and US National Security’, George Washington University working paper (2011).
- Goodman, Will, ‘Cyber Deterrence’, Strategic Studies Quarterly 4/3 (2010), 102–135.
- Government of the United States of America, National Strategy to Secure Cyberspace, 2003.
- Government of the United States of America, National Military Strategy for Cyberspace Operations, 2006.
- Government of the United States of America, Cyber Space Policy Review, 2009.
- Government of the United States of America, Cybersecurity National Action Plan, 2016
- Government of the United States of America, National Cyber Strategy of the United States of America, September 2018.
- Government of the United States of America, Report to the President’s Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America’s Infrastructures, 1997.
- Guerette, Rob and Kate Bowers, ‘Assessing the Extent of Crime Displacement and Diffusion of Benefits’, Criminology 47/4 (2009), 1331–68. doi:10.1111/(ISSN)1745-9125
- Guitton, Clement and Elaine Korzak, ‘The Sophistication Criterion for Attribution’, RUSI Journal 158/4 (2013), 62–68. doi:10.1080/03071847.2013.826509
- Hansen, Lene and Helen Nissenbaum, ‘Digital Disaster, Cyber Security, and the Copenhagen School’, International Studies Quarterly 53 (2009), 1155–75. doi:10.1111/isqu.2009.53.issue-4
- Harknett, Richard, ‘Information Warfare and Deterrence’, Parameters ( Autumn 1996), 93–107.
- Harknett, Richard, John Callaghan, and Rudi Kauffman, ‘Leaving Deterrence Behind’, Journal of Homeland Security and Emergency Management 7/1 (2010). doi:10.2202/1547-7355.1636
- Homeland Security Presidential Directive No. 7, Directive on Critical Infrastructure, Prioritization, and Protection, 2003.
- Iasiello, Emilio, ‘Is Cyber Deterrence an Illusory Course of Action?’, Journal of Strategic Security 7/1 (2014), 54–67. doi:10.5038/1944-0472
- Jabbour, Kamale and E. Paul Ratazzi, ‘Deterrence in Cyberspace’, in A. Lowther (ed.), Thinking about Deterrence (Alabama: Maxwell Air Force Base (AFB) 2013), 37–50.
- Jay, Kesan and Carol Hayes, ‘Thinking through Active Defense in Cyberspace’, Illinois Public Law and Legal Theory Research Paper, No. 10–11 (2010).
- Jervis, Robert, Richard Ned Lebow, and Janice Gross Stein, Psychology and Deterrence (Baltimore: Johns Hopkins University Press 1985).
- Johnston, Ryan, ‘After Widespread Outcry, Georgia Governor Vetoes ‘Hack Back’ Bill’, State Scoop, 8 May 2018.
- Kahneman, Daniel, Thinking, Fast and Slow (Toronto Canada: Random House 2011).
- Kaplan, Fred, Dark Territory (New York City NY: Simon and Schuster 2016).
- Kello, Lucas, ‘The Meaning of the Cyber Revolution’, International Security 38/2 (2013), 7–40. doi:10.1162/ISEC_a_00138
- Kello, Lucas, The Virtual Weapon (London: Yale UP 2017).
- Knopf, Jeffrey, ‘Terrorism and the Fourth Wave in Deterrence Research’, in A. Wenger and A. Wilner (eds.), Deterring Terrorism: Theory and Practice (Stanford: Stanford UP 2012), 21–45.
- Korns, Stephen and Josh Kastenberg, ‘Georgia’s Cyber Left Hook’, Parameters 38/4 ( Winter 2009), 60–76.
- Kugler, Richard, ‘Deterrence of Cyber Attacks’, in F. Kramer, S. Starr, and L. Wentz (eds.), Cyberpower and National Security (Washington DC: Potomac Press 2009), 309–342.
- Lebovic, James, Deterring International Terrorism and Rogue States (London: Routledge 2007).
- Lebow, Richard Ned and Janice Gross Stein, ‘Rational Deterrence Theory: I Think, Therefore I Deter’, World Politics 41/2 (1989), 208–24. doi:10.2307/2010408
- Levine, Mike, ‘China Is ‘Leading Suspect’ in Massive Hack of US Government Networks’, ABC News, 25 June 2016.
- Lewis, James, ‘Cross-Domain Deterrence and Credible Threats’, CSIS Working Paper (July 2010).
- Libicki, Martin, Conquest in Cyberspace (Cambridge: Cambridge UP 2007).
- Libicki, Martin, Cyberdeterrence and Cyberwar (Santa Monica CA: Rand 2009).
- Libicki, Martin, ‘Pulling Punches in Cyberspace’, in National Research Council (2010). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. https://doi.org/10.17226/12997.
- Libicki, Martin, ‘Cyberwar as a Confidence Game’, Strategic Studies Quarterly 5/1 (2011), 132–147.
- Libicki, Martin, Cyberspace in Peace and War (Annapolis MA: Naval Institute Press 2016).
- Libicki, Martin, ‘Can Denial Deter in Cyberspace?’, in A. Wilner and A. Wenger (eds.), Deterrence by Denial (Under Review 2018).
- Liff, Adam, ‘Cyberwar: A New “Absolute Weapon?”’, Journal of Strategic Studies 35/3 (2012), 401–428.
- Lin, Herbert, ‘Laying an Intellectual Foundation for Cyberdeterrence’, in J. Kruger et. al. (ed.), The Secure Information Society (London: Springer-Verlag 2013), 17–53.
- Lindsay, John and Erik Gartzke, ‘Cross-Domain Deterrence Project’, http://deterrence.ucsd.edu/ ( accessed Jan. 2019).
- Lindsay, Jon, ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (2013), 365–404. doi:10.1080/09636412.2013.816122
- Lindsay, Jon, ‘Tipping the Scales’, Journal of Cybersecurity 1/1 (2015), 53–67.
- Lindsay, Jon and Erik Gartzke eds., Cross-Domain Deterrence (Oxford: Oxford University Press, 2019).
- Lohrmann, Dan, 'Hack Back Law', Government Technology, 22 Sept 2017.
- Long, Jerry, ‘Mark and Alex Wilner, Delegitimizing al-Qaida: Defeating an “Army Whose Men Love Death”’, International Security 39/1 (2014), 126–64. doi:10.1162/ISEC_a_00167
- Lotrionte, Catherine, ‘State Sovereignty and Self-Defense in Cyberspace’, Emory International Law Review 26 (2012), 825–919.
- Lukasik, Stephen, ‘A Framework for Thinking about Cyber Conflict and Cyber Deterrence with Possible Declaratory Policies for These Domains’, in Workshop Proceedings Deterring Cyber Attacks (2010).
- Lupovici, Amir, ‘The Emerging Fourth Wave of Deterrence Theory’, International Studies Quarterly 54 (2010), 705–32. doi:10.1111/isqu.2010.54.issue-3
- Lupovici, Amir, ‘Cyber Warfare and Deterrence’, Military and Strategic Affairs 3/3 (2011), 49–62.
- Lupovici, Amir, ‘The “Attribution Problem” and the Social Construction of “Violence”’, International Studies Perspectives 17/3 (2016), 332–342.
- Lupvici, Amri, The Power of Deterrence (Cambridge: Cambridge UP 2016).
- Lyngaas, Sean, ‘Pentagon, DHS Agree to Framework for Joint Cyberdefense’, CyberScoop, 14 Nov. 2018.
- Lyngaas, Sean, ‘US Looks to Restart Talks on Global Cyber Norms’, CyberScoop, Oct. 2018.
- Lyngaas, Sean, ‘White House Announces Federal Cyber Strategy, Vows to Go on Offensive’, CyberScoop, 20 Sept. 2018.
- Lyngass, Sean, ‘PPD-20 Elimination Opens Arguments over How US Should Conduct Offensive Hacking Operations’, CyberScoop, 16 Aug. 2018.
- Mandel, Robert, Optimizing Cyberdeterrence (Washington DC: Georgetown UP 2017).
- Marks, Joseph, ‘Many Top Cybersecurity Posts Remain Empty – And Not on Purpose’, DefenseOne, 10 Nov. 2017.
- Marks, Joseph, ‘Trump Acknowledges Russian Hacking, Points to Poor Defenses’, NextGov, 11 Jan. 2017.
- Mazzotta, Ben, ‘Leverage in Cyberspace, without Deterrence’, Annual Convention of the International Studies Association, Montreal, QC, 2011.
- McConnell, Mike, ‘Cyberwar Is the New Atomic Age’, New Perspectives Quarterly 26/3 (2009), 72–77. doi:10.1111/npqu.2009.26.issue-3
- Morgan, Patrick, ‘Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm’, in Proceedings of a Workshop on Deterring Cyberattacks (Washington, DC: The National Academies Press, 2010).
- Nakashima, Ellen, ‘White House Cybersecurity Official to Return to NSA’, The Washington Post, 16 Apr. 2018.
- Nye, Joseph, ‘Cyber Power’, Belfer Center, Harvard Kennedy School Working Paper, 2011.
- Nye, Joseph, ‘Deterrence and Dissuasion in Cyberspace’, International Security 41/3 (2017), 44–71. doi:10.1162/ISEC_a_00266
- Office of the Director of National Intelligence, The National Counterintelligence Strategy of the United States of America, 2007.
- Paul, T. V., Patrick M. Morgan, and James J. Wirtz eds., Complex Deterrence: Strategy in the Global Age (Chicago: University of Chicago Press 2009).
- Payne, Keith, Deterrence in the Second Nuclear Age (Lexington: University of Kentucky 1996).
- Pellerin, Cheryl, ‘Rogers Discusses near Future of U.S. Cyber Command’, DoD News, 24 Feb. 2017.
- Rattray, Greg, Chris Evans, and Jason Healey, ‘American Security in the Cyber Commons’, in Denmark and Mulvenon (eds.), Contested Commons (Washington, DC: Center for a New American Security 2010), 137–176.
- Ravindranath, Mohana, ‘Many CFO Act Federal Agencies are Still Being Lead by Acting Chief Information Officers’, Nextgov, 17 Nov. 2017.
- Reuters, ‘Trump Scraps Cyber Czar Post after First Appointee Leaves: White House’, 15 May 2018.
- Rid, Thomas, ‘Deterrence beyond the State: The Israeli Experience’, Contemporary Security Policy 33/1 (2012), 124–47. doi:10.1080/13523260.2012.659593
- Rid, Thomas, ‘More Attacks, Less Violence’, Journal of Strategic Studies 36/1 (2013), 139–42. doi:10.1080/01402390.2012.742012
- Rid, Thomas and Ben Buchanan, ‘Attributing Cyber Attacks’, Journal of Strategic Studies 38/1–2 (2015), 4–37. doi:10.1080/01402390.2014.977382
- Rivera, Jason, ‘Achieving Cyberdeterrence and the Ability of Small States to Hold Large States at Risk’, 7th International Conference on Cyber Conflict (NATO CCD COE), Tallinn, Estonia, 2015.
- Rogers, Michael, ‘Statement before the Senate Committee on Armed Services’, Mar. 2015.
- Rosenzweig, Paul, ‘The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence’, in National Research Council (2010). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: The National Academies Press. https://doi.org/10.17226/12997.
- Sanger, David, ‘US Wrestles with How to Fight Back against Cyberattacks’, New York Times, 30 July 2016.
- Schelling, Thomas, Arms and Influence (New Haven CT: Yale UP 1966).
- Schmidle, Nicholas, ‘The Digital Vigilantes Who Hack Back’, New Yorker, 7 May 2018.
- Schneier, Bruce, ‘Botnets of Things’, MIT Technology Review, Mar./Apr. 2017.
- Segal, Adam, ‘The Top Five Cyber Policy Developments of 2015’, Council on Foreign Relations blog, 4 Jan. 2016.
- Shachtman, Noah, ‘26 Years after Gibson, Pentagon Defines “Cyberspace”’, Wired, 23 May 2008.
- Sharp, Travis, ‘Theorizing Cyber Coercion: The 2014 North Korean Operation against Sony’, Journal of Strategic Studies 40/7 (2017), 898–926. doi:10.1080/01402390.2017.1307741
- Shear, Michael and Julie Hirschfeld Davis, ‘Trump, on YouTube, Pledges to Create Jobs’, New York Times, 21 Nov. 2016.
- Shoorbajee, Zaid, ‘Google and Microsoft Ask Georgia Governor to Veto “Hack Back” Bill’, CyberScoop, 27 Apr. 2018.
- Singer, P.W. and Allan Friedman, ‘Cult of the Cyber Offensive’, Foreign Policy, Jan. 2014.
- Slaughter, Anne-Marie, The Chessboard & The Web (New Haven CT: Yale UP 2017).
- Sobelman, Daniel, ‘Learning to Deter’, International Security 41/3 (2016/17), 151–196.
- Sterner, Eric, ‘Retaliatory Deterrence in Cyberspace’, Strategic Studies Quarterly 5/1 ( Spring 2011), 62–80.
- Stevens, Tim, ‘A Cyberwar of Ideas?’, Contemporary Security Policy 33/1 (2012), 148–70. doi:10.1080/13523260.2012.659597
- Sutherland, Benjamin ed., Modern Warfare, Intelligence and Deterrence (Hoboken NJ: The Economist and Wiley 2011).
- Tor, Uri, ‘’Cumulative Deterrence’ as a New Paradigm for Cyber Deterrence’, Journal of Strategic Studies 40/1/2 (2015), 92–117.
- Trujillo, Clorinda, ‘The Limits of Cyberspace Deterrence’, Joint Force Quarterly 75/4 (2014), 43–52.
- Trump, Donald J., ‘Cybersecurity’, Presidential Campaign Website, 2016, https://www.donaldjtrump.com/policies/cyber-security (accessed Jan. 2017).
- Tsagourias, Nicholas, ‘Cyber Attacks, Self-Defence and the Problem of Attribution’, Journal of Conflict & Security Law 17 (2012), 229–44. doi:10.1093/jcsl/krs019
- UK National Cyber Security Centre, ‘Advisory: Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices’, 16 Apr. 2018.
- UK National Cyber Security Centre, ‘Joint US-UK Statement on Malicious Cyber Activity Carried Out by Russian Government’, 16 Apr. 2018.
- UN General Assembly, ‘Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security’, Seventieth Session, Item 93, 2015.
- US Cyber Command News Release, ‘All Cyber Mission Force Teams Achieve Initial Operating Capability’, 24 Oct. 2016.
- US Cyber Command News Release, ‘DoD’s Network Defense Headquarters Achieves Full Operational Capability’, 31 Jan. 2018.
- US Department of Defence, Department of Defence Cyber Strategy (Summary), Sept. 2018.
- US Department of Defense, Nuclear Posture Review, 2010.
- US Department of Defense, Cyberspace Policy Report, 2011.
- US Department of Defense, Strategy for Operating in Cyberspace, 2011.
- US Department of Defense, DoD Cyber Strategy, 2015.
- US Department of Defense, Nuclear Posture Review, 2018.
- US Department of Homeland Security, National Infrastructure Protection Plan, 2006.
- US Department of Homeland Security, ‘Statement by Secretary Jeh Johnson on the Designation of Election Infrastructure as a Critical Infrastructure Subsector’, 6 Jan. 2017.
- US Department of State, Office of the Coordinator for Cyber Issues, ‘Recommendations to the President on Deterring Adversaries and Better Protecting the American People from Cyber Threats’, 31 May 2018.
- US Senate Confirmation Hearing, ‘Advanced Policy Questions for James Mattis’, 12 Jan. 2017.
- Waterman, Shaun, ‘Bossert Promises New National Cybersecurity Strategy’, CyberScoop, 24 Oct. 2017.
- Wenger, Andreas and Alex Wilner eds., Deterring Terrorism (Stanford: Stanford UP 2012).
- Wheller, David and Gregory Larsen, ‘Techniques for Cyber Attack Attribution’, Institute for Defense Analyses (P-3792), (2003).
- The White House, National Plan for Information Systems Protection: An Invitation to a Dialogue, 2000.
- The White House, ‘Comprehensive National Cybersecurity Initiative’, 2009.
- The White House, International Strategy for Cyberspace, 2011.
- The White House, ‘Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea’, 19 Dec. 2017.
- The White House, ‘Remarks by Homeland Security Advisor Thomas P. Bossert at Cyber Week 2017’, 26 June 2017.
- The White House, Statement by President Donald J. Trump on the Elevation of Cyber Command, 18 Aug. 2017.
- The White House, Executive Order 13231, Critical Infrastructure Protection in the Information Age, Oct. 2001.
- The White House, Executive Order 13636, Improving Critical Infrastructure Cybersecurity, 2013.
- The White House, Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical infrastructure, 11 May 2017.
- The White House, National Security Presidential Directive No. 54, Cybersecurity Policy, 2008.
- Wilner, Alex, ‘Deterring the Undeterrable: Coercion, Denial, and Delegitimization in Counterterrorism’, Journal of Strategic Studies 34/1 (2011), 3–37. doi:10.1080/01402390.2011.541760
- Wilner, Alex, ‘Apocalypse Soon? Deterring Nuclear Iran and Its Terrorist Proxies’, Comparative Strategy 31/1 (2012), 18–40. doi:10.1080/01495933.2012.647539
- Wilner, Alex, ‘Contemporary Deterrence Theory Counterterrorism: A Bridge Too Far?’, NYU Journal of International Law and Politics 47/2 (2015), 439–462.
- Wilner, Alex, Deterring Rational Fanatics (Philadelphia PA: University of Pennsylvania Press 2015).
- Wilner, Alex, ‘The Dark Side of Extended Deterrence: Thinking through the State Sponsorship of Terrorism’, Journal of Strategic Studies 40/1 (2017), 410–437.
- Wilner, Alex and Andreas Wenger eds., Deterrence by Denial: Theory, Practice, and Empiricism (Under Review Winter 2018).
- Wilner, Wilner, ‘Cyber Deterrence and Critical Infrastructure Protection’, Comparatvie Strategy 36/4 (2017), 309–318.
- Woods, Kevin and Mark Stout, ‘Saddam’s Perceptions and Misperceptions’, Journal of Strategic Studies 33/1 (2010), 5–41. doi:10.1080/01402391003603433
- Writz, James, ‘The Cyber Pearl Harbour’, Intelligence and National Security 32/6 (2017), 758–767.
- Yannakogeorgos, Panayotis and Adam Lowther, ‘The Prospects for Cyber Deterrence’, in P. Yannakogeorgos and A. Lowther (eds.), Conflict and Cooperation in Cyberspace (New York NY: Taylor & Francis 2010), 49–80.