Bibliography
- Acton, James M., ‘Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War’, International Security 43/1 (1 August 2018), 56–99.
- Art, Robert J., ‘Geopolitics Updated: The Strategy of Selective Engagement’, International Security 23/3 (1998), 79–113. doi:10.2307/2539339
- Art, Robert J. and Kelly M Greenhill, ‘Coercion: An Analytical Overview’, in Kelly M. Greenhill and Peter J. P. Krause (eds.), Coercion: The Power to Hurt in International Politics (New York: Oxford University Press 2018), 3–32.
- Bacon, Francis, Essays, Civil and Moral: And the New Atlantis (New York: P.F. Collier & Son 1909).
- Bahney, Benjamin, Jonathan Pearl, and Michael Markey, ‘Anti-Satellite Weapons and the Instability of Deterrence’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 121–43.
- Bahney, Benjamin and Jonathan Pearl, ‘Why Creating a Space Force Changes Nothing’, Foreign Affairs (26 March 2019). https://www.foreignaffairs.com/articles/space/2019-03-26/why-creating-space-force-changes-nothing
- Bejtlich, Richard, The Practice of Network Security Monitoring: Understanding Incident Detection and Monitoring (San Francisco: No Starch Press 2013).
- Benbow, Tim, The Magic Bullet? Understanding the Revolution in Military Affairs (London: Brassey’s 2004).
- Betts, Richard K., ‘Is Strategy an Illusion?’, International Security 25/2 (2000), 5–50. doi:10.1162/016228800560444
- Beyerchen, Alan, ‘Clausewitz, Nonlinearity, and the Unpredictability of War’, International Security 17/3 (1992), 59–90. doi:10.2307/2539130
- Biddle, Stephen D, Military Power: Explaining Victory and Defeat in Modern Battle (Princeton, NJ: Princeton University Press 2004).
- Biddle, Stephen, ‘Speed Kills? Reassessing the Role of Speed, Precision, and Situation Awareness in the Fall of Saddam’, Journal of Strategic Studies 30/1 (2007), 3–46. doi:10.1080/01402390701210749
- Biddle, Tami Davis, Rhetoric and Reality in Air Warfare: The Evolution of British and American Ideas about Strategic Bombing, 1914–1945 (Princeton, NJ: Princeton University Press 2002).
- Biddle, Tami Davis, ‘Coercion Theory: A Basic Introduction for Practitioners’, Texas National Security Review 3/2 (20 February 2020). https://tnsr.org/2020/02/coercion-theory-a-basic-introduction-for-practitioners/
- Bijker, Wiebe E., Thomas P. Hughes, Trevor Pinch, and Deborah G Douglas, (eds.), The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology (Cambridge, MA: MIT press 1987).
- Blainey, Geoffrey, Causes of War 3rd. (New York: Simon and Schuster 1988).
- Bodmer, Sean, Max Kilger, Gregory Carpenter, and Jade Jones, Reverse Deception: Organized Cyber Threat Counter-Exploitation (New York: McGraw-Hill 2012).
- Borghard, Erica D. and Shawn W. Lonergan, ‘The Logic of Coercion in Cyberspace’, Security Studies 26/3 (3 July 2017), 452–81. doi:10.1080/09636412.2017.1306396
- Bowen, Bleddyn E, War in Space: Strategy, Spacepower, Geopolitics (Edinburgh: Edinburgh University Press 2020).
- Branch, Jordan, “What’s in a Name? Metaphors and Cybersecurity,” Typescript, 2019.
- Brodie, Bernard, Frederick Sherwood Dunn, Arnold Wolfers, Percy Ellwood Corbett, and William T. R. Fox, The Absolute Weapon: Atomic Power and World Order (New York: Harcourt, Brace and Co. 1946).
- Builder, Carl H., The Masks of War: American Military Styles in Strategy and Analysis (Baltimore: Johns Hopkins University Press 1989).
- Carson, Austin and Keren Yarhi-Milo, ‘Covert Communication: The Intelligibility and Credibility of Signaling in Secret’, Security Studies 26/1 (2017), 124–56. doi:10.1080/09636412.2017.1243921
- Carter, Ashton B., ‘Satellites and Anti-Satellites: The Limits of the Possible’, International Security 10/4 (1986), 46–98. doi:10.2307/2538950
- Choucri, Nazli and David D. Clark, International Relations in the Cyber Age: The Co-Evolution Dilemma (Cambridge, MA: MIT Press 2018).
- Clausewitz, Carl von, On War Translated by Michael Howard and Peter Paret. (Princeton, NJ: Princeton University Press 1976).
- Corbett, Julian Stafford, Some Principles of Maritime Strategy (London: Longmans, Green and Co. 1911).
- Dafoe, Allan, ‘On Technological Determinism: A Typology, Scope Conditions, and A Mechanism’, Science, Technology & Human Values 40/6 (1 November 2015), 1047–76. doi:10.1177/0162243915579283
- DeNardis, Laura, The Global War for Internet Governance (New Haven: Yale University Press 2014).
- Deudney, Daniel, Whole Earth Security: A Geopolitics of Peace Worldwatch Paper 55. (Washington, DC: Worldwatch Institute 1983).
- Drezner, Daniel W., ‘Economic Sanctions in Theory and Practice: How Smart are They?’, in Kelly M. Greenhill and Peter Krause (eds.), Coercion: The Power to Hurt in International Politics (New York: Oxford University Press 2018), 251–70.
- Early, Bryan R. and Erik Gartzke. ‘Spying from Space: Reconnaissance Satellites and Interstate Disputes.’ Typescript, 20 Aug., 2017.
- Fearon, James D., ‘Rationalist Explanations for War’, International Organization 49/3 (1995), 379–414. doi:10.1017/S0020818300033324
- Fearon, James D., ‘Signaling Foreign Policy Interests: Tying Hands versus Sinking Costs’, The Journal of Conflict Resolution 41/1 (1 February 1997), 68–90. doi:10.1177/0022002797041001004
- Frederick, Bryan, Stephen Watts, Matthew Lane, Abby Doll, Ashley L. Rhoades, and Meagan L. Smith, Understanding the Deterrent Impact of U.S. Overseas Forces (Santa Monica, CA: RAND Corporation 2020).
- Freedman, Lawrence, Deterrence (Cambridge: Polity Press 2004).
- Freedman, Lawrence, Strategy: A History (New York: Oxford University Press 2013).
- Friedman, Norman, Seapower and Space: From the Dawn of the Missile Age to Net-Centric Warfare (Annapolis, MD: Naval Institute Press 2000).
- Gartzke, Erik, ‘War Is in the Error Term’, International Organization 53/3 (1999), 567–87. doi:10.1162/002081899550995
- Gartzke, Erik, ‘Blood and Robots: How Remotely Piloted Vehicles and Related Technologies Affect the Politics of Violence’, Journal of Strategic Studies (3 October 2019), 1–31. doi:10.1080/01402390.2019.1643329
- Gartzke, Erik and James Igoe Walsh, ‘The Drawbacks of Drones: The Effects of UAVs on Militant Violence in Pakistan’, Journal of Peace Research (Forthcoming).
- Gartzke, Erik, Jeffrey M. Kaplow, and Rupal N. Mehta, ‘The Determinants of Nuclear Force Structure’, Journal of Conflict Resolution 58/3 (2014), 481–508. doi:10.1177/0022002713509054
- Gartzke, Erik and Jon R. Lindsay, ‘Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace’, Security Studies 24/2 (2015), 316–48. doi:10.1080/09636412.2015.1038188
- Gartzke, Erik and Jon R. Lindsay, ‘Thermonuclear Cyberwar’, Journal of Cybersecurity 3/1 (February 2017), 37–48.
- Gartzke, Erik and Jon R. Lindsay, ‘The Influence of Seapower on Politics: Domain- and Platform-Specific Attributes of Material Capabilities,’ Security Studies (Forthcoming).
- Gartzke, Erik and Koji Kagotani, ‘Being There: U.S. Troop Deployments, Force Posture and Alliance Reliability,’ Working Paper, 2017.
- Gavin, Francis J, Nuclear Statecraft: History and Strategy in America’s Atomic Age (Ithaca: Cornell University Press 2012).
- Glaser, Charles L., Analyzing Strategic Nuclear Policy (Princeton, NJ: Princeton University Press 1990).
- Glaser, Charles L. and Steve Fetter, ‘Should the United States Reject MAD? Damage Limitation and U.S. Nuclear Strategy toward China’, International Security 41/1 (1 July 2016), 49–98. doi:10.1162/ISEC_a_00248
- Goldstein, Avery, ‘First Things First: The Pressing Danger of Crisis Instability in U.S.-China Relations’, International Security 37/4 (2013), 49–89. doi:10.1162/ISEC_a_00114
- Gompert, David C. and Phillip C. Saunders, The Paradox of Power: Sino-American Strategic Restraint in an Age of Vulnerability (Washington DC: National Defense University Press 2011).
- Green, Brendan Rittenhouse and Austin Long, ‘Conceal or Reveal? Managing Clandestine Military Capabilities in Peacetime Competition’, International Security 44/3 (1 January 2020), 48–83. doi:10.1162/isec_a_00367
- Greenhill, Kelly M., ‘Asymmetric Advantage: Weaponizing People as Nonmilitary Instruments of Cross-Domain Coercion’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 259–89.
- Haun, Phil M., Coercion, Survival, and War: Why Weak States Resist the United States (Stanford, CA: Stanford University Press 2015).
- Haun, Phil M., ‘Air Power versus Ground Forces—Deterrence at the Operational Level of War’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 144–62.
- Haun, Phil and Colin Jackson, ‘Breaker of Armies: Air Power in the Easter Offensive and the Myth of Linebacker I and II in the Vietnam War’, International Security 40/3 (1 January 2016), 139–78. doi:10.1162/ISEC_a_00226
- Herrera, Geoffrey L., Technology and International Transformation: The Railroad, the Atom Bomb, and the Politics of Technological Change (Albany, NY: State University of New York Press 2006).
- Heuser, Beatrice, The Evolution of Strategy: Thinking War from Antiquity to the Present (New York: Cambridge University Press 2010).
- Hunzeker, Michael Allen and Alexander Lanoszka, ‘Landpower and American Credibility’, Parameters 45/4 (2015), 17–26.
- Jervis, Robert, The Logic of Images in International Relations (Princeton, NJ: Princeton University Press 1970).
- Jervis, Robert, The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon (Ithaca: Cornell University Press 1989).
- Jervis, Robert, Richard Ned Lebow, and Janice Gross Stein, Psychology and Deterrence (Baltimore, MD: Johns Hopkins University Press 1985).
- Johnson, Nicholas L. ‘Orbital Debris: The Growing Threat to Space Operations.’ Breckenridge, CO, 2010. https://ntrs.nasa.gov/search.jsp?R=20100004498
- Johnston, Patrick B. and Anoop K. Sarbahi, ‘The Impact of US Drone Strikes on Terrorism in Pakistan’, International Studies Quarterly 60/2 (2016), 203–19. doi:10.1093/isq/sqv004
- Kahn, David, ‘An Historical Theory of Intelligence’, Intelligence and National Security 16/3 (1 September 2001), 79–92. doi:10.1080/02684520412331306220
- Kahn, Herman, On Thermonuclear War (Princeton, NJ: Princeton University Press 1960).
- Kennedy, Paul M., The Rise and Fall of British Naval Mastery Revised. (London: Penguin Random House 2017).
- Kroenig, Matthew, The Logic of American Nuclear Strategy: Why Strategic Superiority Matters (New York: Oxford University Press 2018).
- Lasswell, Harold D., Politics: Who Gets What, When, How (New York: Whittlesey House 1936).
- Levy, Jack S. and William R. Thompson, ‘Balancing on Land and at Sea: Do States Ally against the Leading Global Power?’, International Security 35/1 (1 July 2010), 7–43. doi:10.1162/ISEC_a_00001
- Libicki, Martin C., Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND 2009).
- Lieber, Keir A. and Daryl G. Press, ‘The End of MAD? The Nuclear Dimension of U.S. Primacy’, International Security 30/4 (1 April 2006), 7–44. doi:10.1162/isec.2006.30.4.7
- Lieber, Keir A. and Daryl G. Press, ‘The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence’, International Security 41/4 (1 April 2017), 9–49. doi:10.1162/ISEC_a_00273
- Lindsay, Jon R., ‘Restrained by Design: The Political Economy of Cybersecurity’, Digital Policy, Regulation and Governance 19/6 (2017), 493–514. doi:10.1108/DPRG-05-2017-0023
- Lindsay, Jon R. and Erik Gartzke, ‘Coercion through Cyberspace: The Stability-Instability Paradox Revisited’, in Kelly M. Greenhill and Peter Krause (eds.), Coercion: The Power to Hurt in International Politics (New York: Oxford University Press 2018), 179–203.
- Lindsay, Jon R., Information Technology and Military Power (Ithaca, NY: Cornell University Press 2020).
- Lindsay, Jon R. and Erik Gartzke, (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019).
- Long, Austin and Brendan Rittenhouse Green, ‘Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy’, Journal of Strategic Studies 38/1–2 (2014), 38–73. doi:10.1080/01402390.2014.958150
- Lyall, Jason, ‘Bombing to Lose? Airpower and the Dynamics of Violence in Counterinsurgency Wars,’ Working Paper, Social Science Research Network, 3 Sept., 2017. doi:10.2139/ssrn.2422170.
- Lynn, William J., III, ‘Defending a New Domain: The Pentagon’s Cyberstrategy’, Foreign Affairs 89/5 (2010), 97–108.
- Mackinder, H. J., ‘The Geographical Pivot of History’, The Geographical Journal 23/4 (1904), 421–37. doi:10.2307/1775498
- Mahan, Alfred Thayer, The Influence of Sea Power upon History, 1660–1783 (Boston: Little, Brown, and Co. 1890).
- McNeal, Gregory S., ‘Targeted Killing and Accountability’, Georgetown Law Journal 102 (March 2014), 681–794.
- McNeill, William H., The Pursuit of Power: Technology, Armed Force, and Society since A.D. 1000 (Chicago: University of Chicago Press 1982).
- McRaven, William H., Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice (New York: Presidio Press 1995).
- Mearsheimer, John J., Conventional Deterrence (Ithaca, NY: Cornell University Press 1985).
- Mearsheimer, John J., The Tragedy of Great Power Politics (New York: Norton 2001).
- Mehta, Rupal N., ‘Extended Deterrence and Assurance in Multiple Domains’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 234-56.
- Meirowitz, Adam and Anne E. Sartori, ‘Strategic Uncertainty as a Cause of War’, Quarterly Journal of Political Science 3/4 (31 December 2008), 327–52. doi:10.1561/100.00008018
- Moltz, James Clay, The Politics of Space Security: Strategic Restraint and the Pursuit of National Interests (Stanford, Calif: Stanford Security Studies 2008).
- Moltz, James Clay, Crowded Orbits: Conflict and Cooperation in Space (New York: Columbia University Press 2014).
- Mumford, Lewis, Technics and Civilization (Chicago: University of Chicago Press 2010).
- Naylor, Sean, Not a Good Day to Die: The Untold Story of Operation Anaconda (New York: Penguin 2005).
- Nolan, Cathal, The Allure of Battle: A History of How Wars Have Been Won and Lost (New York: Oxford University Press 2017).
- North Atlantic Treaty Organization. ‘NATO Cyber Defence Factsheet.’ February 2018. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2018_02/20180213_1802-factsheet-cyber-defence-en.pdf
- Nye, Joseph S., ‘Deterrence and Dissuasion in Cyberspace’, International Security 41/3 (1 January 2017), 44–71. doi:10.1162/ISEC_a_00266
- Pape, Robert Anthony, Bombing to Win: Air Power and Coercion in War (Ithaca, NY: Cornell University Press 1996).
- Posen, Barry R., Inadvertent Escalation: Conventional War and Nuclear Risks (Ithaca, N.Y.: Cornell University Press 1991).
- Posen, Barry R., ‘Command of the Commons: The Military Foundation of U.S. Hegemony’, International Security 28/1 (2003), 5–46. doi:10.1162/016228803322427965
- Posen, Barry R., The Sources of Military Doctrine: France, Britain, and Germany between the World Wars (Ithaca, NY: Cornell University Press 1984).
- Post, Abigail, ‘Flying to Fail: Costly Signals and Air Power in Crisis Bargaining’, Journal of Conflict Resolution 63/4 (2019), 869–95. doi:10.1177/0022002718777043
- Powell, Robert, ‘Bargaining Theory and International Conflict’, Annual Review of Political Science 5/1 (2002), 1–30. doi:10.1146/annurev.polisci.5.092601.141138
- Poznansky, Michael and Evan Perkoski, ‘Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution’, Journal of Global Security Studies 3/4 (1 October 2018), 402–16. doi:10.1093/jogss/ogy022
- Press, Daryl G., Scott D. Sagan, and Benjamin A. Valentino, ‘Atomic Aversion: Experimental Evidence on Taboos, Traditions, and the Non-Use of Nuclear Weapons’, American Political Science Review 107/1 (February 2013), 188–206. doi:10.1017/S0003055412000597
- Ramsay, Kristopher W., ‘Information, Uncertainty, and War’, Annual Review of Political Science 20/1 (2017), 505–27. doi:10.1146/annurev-polisci-051215-022729
- Reiter, Dan, ‘Exploring the Bargaining Model of War’, Perspectives on Politics 1/1 (2003), 27–43. doi:10.1017/S1537592703000033
- Rid, Thomas, Cyber War Will Not Take Place (London: Hurst 2013).
- Roland, Alex, ‘Technology, Ground Warfare, and Strategy: The Paradox of the American Experience’, The Journal of Military History 55/4 (1994), 447–67. doi:10.2307/1985764
- Ross, Robert S., ‘The Geography of the Peace: East Asia in the Twenty-First Century’, International Security 23/4 (1999), 81–118. doi:10.1162/isec.23.4.81
- Rovner, Joshua, “Cyber War as an Intelligence Contest,” War on the Rocks (blog), 16 Sept., 2019. https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/
- Schelling, Thomas C., Arms and Influence: With a New Preface and Afterword (New Haven, CT: Yale University Press 2008).
- Schneider, Jacquelyn, ‘The Capability/Vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and the Onset of War’, Journal of Strategic Studies 42/6 (19 September 2019), 841–63. doi:10.1080/01402390.2019.1627209
- Sechser, Todd S. and Matthew Fuhrmann, Nuclear Weapons and Coercive Diplomacy (New York: Cambridge University Press 2017).
- Sechser, Todd S., Neil Narang, and Caitlin Talmadge, ‘Emerging Technologies and Strategic Stability in Peacetime, Crisis, and War’, Journal of Strategic Studies 42/6 (19 September 2019), 727–35. doi:10.1080/01402390.2019.1626725
- Shah, Aqil, ‘Do U.S. Drone Strikes Cause Blowback? Evidence from Pakistan and Beyond’, International Security 42/4 (1 May 2018), 47–84. doi:10.1162/isec_a_00312
- Slantchev, Branislav L., Military Threats: The Costs of Coercion and the Price of Peace (New York: Cambridge University Press 2011).
- Slantchev, Branislav L. and Ahmer Tarar, ‘Mutual Optimism as a Rationalist Explanation of War’, American Journal of Political Science 55/1 (1 January 2011), 135–48. doi:10.1111/j.1540-5907.2010.00475.x
- Smith, Merritt Roe and Leo Marx, (eds.), Does Technology Drive History? The Dilemma of Technological Determinism (Cambridge, MA: MIT Press 1994).
- Snyder, Glenn H., ‘The Balance of Power and the Balance of Terror’, in Paul Seabury (ed.), The Balance of Power (San Francisco, CA: Chandler 1965), 184–201.
- Spykman, Nicholas J., ‘Geography and Foreign Policy, I’, The American Political Science Review 32/1 (1938), 28–50. doi:10.2307/1949029
- Stares, Paul B., The Militarization of Space: U.S. Policy, 1945–1984 (Ithaca, NY: Cornell University Press 1985).
- State Council Information Office, China’s Military Strategy (Beijing: The State Council Information Office of the People’s Republic of China May 2015). http://www.chinadaily.com.cn/china/2015-05/26/content_20820628.htm
- Stevens, Tim, ‘A Cyberwar of Ideas? Deterrence and Norms in Cyberspace’, Contemporary Security Policy 33/1 (1 April 2012), 148–70. doi:10.1080/13523260.2012.659597
- Talmadge, Caitlin, ‘Would China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Conventional War with the United States’, International Security 41/4 (1 April 2017), 50–92. doi:10.1162/ISEC_a_00274
- U. S. Army, FM 3-24: Counterinsurgency (Washington, D.C.: Government Printing Office 2006).
- U.S. Army, The U.S. Army in Multi-Domain Operations 2028 (TRADOC Pamphlet. Fort Eustis, VA: U.S. Army Training and Doctrine Command 6 December 2018).
- Ucko, David H., The New Counterinsurgency Era: Transforming the U.S. Military for Modern Wars (Washington, DC: Georgetown University Press 2009).
- United States, ‘National Security Strategy of the United States of America,’ White House Office, December 2017. https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf
- Valeriano, Brandon, Benjamin M. Jensen, and Ryan C. Maness, Cyber Strategy: The Evolving Character of Power and Coercion (New York: Oxford University Press 2018).
- Wagner, R. Harrison., ‘Bargaining and War’, American Journal of Political Science 44/3 (2000), 469–84. doi:10.2307/2669259
- Waldman, Thomas, War, Clausewitz and the Trinity (New York: Routledge 2016).
- Walsh, James Igoe., The Effectiveness of Drone Strikes in Counterinsurgency and Counterterrorism Campaigns (Carlisle Barracks, PA: Strategic Studies Institute 26 September 2013). http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1167
- Weigley, Russell F., The American Way of War: A History of United States Military Strategy and Policy (Bloomington, IN: Indiana University Press 1973).
- White, Hugh. ‘Losing the War in an Afternoon: Jutland 1916.’ The Strategist. Autralian Strategic Policy Institute, 13 May, 2016.
- Winner, Langdon, Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought (Cambridge, MA: MIT Press 1977).
- Wylie, J.C., Military Strategy: A General Theory of Power Control Edited by John B. Hattendorf. (Annapolis, MD: Naval Institute Press 1989).
- Zegart, Amy, ‘Cheap Fights, Credible Threats: The Future of Armed Drones and Coercion’, Journal of Strategic Studies 43/1 (28 February 2018), 6–46. doi:10.1080/01402390.2018.1439747