References
- Akaev, Askar, and Vladimir Pantin. 2014. “Technological Innovations and Future Shifts in International Politics.” International Studies Quarterly 58: 867–872.
- Ali, Idrees, and Phil Stewart. 2019. “Exclusive: U.S. Carried Out Secret Cyber Strike on Iran in Wake of Saudi Oil Attack: Officials.” Reuters, October 16. https://www.reuters.com/article/us-usa-iran-military-cyber-exclusive/exclusive-u-s-carried-out-secret-cyber-strike-on-iran-in-wake-of-saudi-oil-attack-officials-say-idUSKBN1WV0EK?utm_campaign=20191016&utm_source=sailthru&utm_medium=email&utm_term=MEM%20send%20list.
- Associated Press. 2017. “U.S. Charges Russian Officials, Hackers in Mass Yahoo Breach.” PBS NewsHour, March 15. https://www.pbs.org/newshour/world/watch-live-justice-department-expected-announce-charges-yahoo-hacking-reports-say.
- Barnes, Julian E., and Thomas Gibbons-Neff. 2019. “U.S. Carried Out Cyberattacks on Iran.” The New York Times, June 22. https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html.
- Barrett, Brian. 2018. “White House Cuts Critical Cybersecurity Role as Threats Loom.” Wired, May 15. https://www.wired.com/story/white-house-cybersecurity-coordinator/.
- Baumgartner, Frank, Bryan D. Jones, and Peter B. Mortensen. 2014. “Chapter 3: Punctuated Equilibrium Theory: Explaining Stability and Change in Public Policy Making.” In Theories of the Policy Making Process, edited by Paul A. Sabatier, and Christopher M. Weible. Boulder, CO: Westview Press.
- Bendor, Jonathan. 2015. “Incrementalism: Dead yet Flourishing.” Public Administration Review 75 (2): 194–205.
- Brimley, Shawn, Ben FitzGerald, and Kelley Sayler. 2013. “Game Changers: Disruptive Technology and U.S. Defense Strategy.” Washington DC: Center for a New American Security.
- Cioffi-Revilla, Claudio. 1998. “The Political Uncertainty of Interstate Rivalries: A Punctuated Equilibrium Model.” In The Dynamics of Enduring Rivalries, edited by Paul Diehl, 64–97. Chicago: University of Illinois Press.
- Colaresi, Michael P., Karen Rasler, and William R. Thompson. 2008. Strategic Rivalries in World Politics: Position, Space and Conflict Escalation. New York: Cambridge University Press.
- Crowley, Michael, Falih Hassan, and Eric Schmitt. 2020. “U.S. Strike in Iraq Kills Qassim Suleimani, Commander of Iranian Forces.” The New York Times, January 2. https://www.nytimes.com/2020/01/02/world/middleeast/qassem-soleimani-iraq-iran-attack.html.
- Department of Defense Strategy for Operating in Cyberspace. 2011. https://csrc.nist.gov/CSRC/media/Projects/ISPAB/documents/DOD-Strategy-for-Operating-in-Cyberspace.pdf.
- Department of Homeland Security. 2020. Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. October 28. https://www.dhs.gov/cisa/executive-order-strengthening-cybersecurity-federal-networks-and-critical-infrastructure#.
- Doran, Charles F. 1991. Systems in Crisis: New Imperatives of High Politics at Century’s End. New York: Cambridge University Press.
- Eckstein, Harry. 1975. “Case Studies and Theory in Political Science.” In Handbook of Political Science, edited by Fred Greenstein, and Nelson Polsby, 79–137. Reading, MA: Addison-Wesley.
- Executive Order 13757. 2016. “Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber- Enabled Activities.” 82 FR 1. Document no. 2016-31922. Signed December 28, published 3 January 2017. https://fas.org/irp/offdocs/eo/eo-13757.pdf.
- Executive Order 138000. 2017. “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” 82 FR 22391. Document no. 2017- 10004. Signed May 11, published 16 May 2017. https://www.govinfo.gov/content/pkg/FR-2017-05-16/pdf/2017-10004.pdf.
- Farrell, Henry. 2017. “Hackers Have Just Dumped a Treasure Trove of NSA Data. Here’s What it Means.” The Washington Post. Monkey Cage Blog, April 15. https://www.washingtonpost.com/news/monkey-cage/wp/2017/04/15/shadowy-hackers-have-just-dumped-a-treasure-trove-of-nsa-data-heres-what-it-means/?utm_term=.462c6e28e650&wpisrc=nl_cage&wpmm=1.
- Garfinkel, Ben, and Allan Dafoe. 2019. “How Does the Offense-Defense Balance Scale?” Journal of Strategic Studies 42 (6): 736–763.
- Goertz, Gary. 2003. International Norms and Decision Making: A Punctuated Equilibrium Model. New York: Rowman and Littlefield.
- Head, Brian W., and John Alford. 2013. “Wicked Problems: Implications for Public Policy and Management.” Administration and Society 47 (6): 711–739.
- Herrera, Geoffrey L. 2006. Technology and International Transformation: The Railroad, the Atom Bomb, and the Politics of Technological Change. Albany, NY: SUNY Press.
- Holsti, Ole R., and James N. Rosenau. 1986. “Consensus Lost. Consensus Regained? Foreign Policy Beliefs and American Leaders, 1976-1980.” International Studies Quarterly 30 (4): 375–409.
- Isikoff, Michael. 2018. “Former Trump Official: No One ‘Minding the Store’ at White House on Cyberthreats.” yahoo!news, July 25. https://www.yahoo.com/news/former-trump-official-no-one-minding-store-white-house-cyberthreats-090017630.html.
- Jones, Bryan D., and Frank R. Baumgartner. 2012. “From There to Here: Punctuated Equilibrium to the General Punctuation Thesis to a Theory of Government Information Processing.” Policy Studies Journal 40 (1): 1–20.
- Joobani, Hossein Aghaie, and Mohammadhossein Daheshvar. 2020. “Deciphering Trump’s ‘Maximum Pressure’ Policy: The Enduring Challenge of Containing Iran.” New Middle Eastern Studies 10 (1): 2020.
- Kanno-Youngs, Zolan, and Nicole Perlroth. 2020. “Iran’s Military Response May Be ‘Concluded,’ but Cyberwarfare Threat Grows.” The New York Times, January 8. https://www.nytimes.com/2020/01/08/us/politics/iran-attack-cyber.html.
- Lantis, Jeffrey S. 2016. Arms and Influence: U.S. Technology Innovations and the Evolution of International Security Norms. Stanford: Stanford University Press.
- Legro, Jeffrey. 2005. Rethinking the World: Great Power Strategies and World Order. Ithaca: Cornell University Press.
- Levinthal, Daniel A. 1998. “The Slow Pace of Rapid Technological Change: Gradualism and Punctuation in Technological Change.” Industrial and Corporate Change 7 (2): 217–247.
- Levy, Jack. 2008. “Case Studies: Types, Designs, and Logics of Inference.” Conflict Management and Peace Science 25 (1): 1–18.
- Lieber, Keir Alexander. 2005. War and the Engineers: The Primacy of Politics Over Technology. Ithaca, NY: Cornell University Press.
- Mahoney, James, and Gary Goertz. 2006. “A Tale of Two Cultures: Contrasting Quantitative and Qualitative Research.” Political Analysis 14: 227–249.
- Miller, Greg, and Ellen Nakashima. 2017. “WikiLeaks Says It Has Obtained Trove of CIA Hacking Tools.” The Washington Post, March 7. https://www.washingtonpost.com/world/national-security/wikileaks-says-it-has-obtained-trove-of-cia-hacking-tools/2017/03/07/c8c50c5c-0345-11e7-b1e9-a05d3c21f7cf_story.html?utm_term=.eef95883ec86.
- Moyson, Stephane, Peter Scholten, and Christopher M. Weible. 2017. “Policy Learning and Policy Change: Theorizing Their Relations from Different Perspectives.” Policy and Society 36 (2): 161–177.
- Nakashima, Ellen. 2019a. “Trump Approved Cyber-Strikes Against Iran’s Missile Systems.” The Washington Post, June 22. https://www.washingtonpost.com/world/national-security/with-trumps-approval-pentagon-launched-cyber-strikes-against-iran/2019/06/22/250d3740-950d-11e9-b570-6416efdc0803_story.html?utm_term=.351ce9390cea.
- Nakashima, Ellen. 2019b. “U.S. Cyber Command Operation Disrupted Internet Access of Russian Troll Factory on Day of 2018 Midterms.” The Washington Post, February 27. https://www.washingtonpost.com/world/national-security/us-cyber-command-operation-disrupted-internet-access-of-russian-troll-factory-on-day-of-2018-midterms/2019/02/26/1827fc9e-36d6-11e9-af5b-b51b7ff322e9_story.html?utm_term=.48553489b774.
- Nuruzzaman, Mohammed. 2020. “President Trump’s ‘Maximum Pressure’ Campaign and Iran’s Endgame.” Strategic Analysis 44 (6): 570–582.
- Nye, Joseph. 2016–2017. “Deterrence and Dissuasion in Cyberspace.” International Security 41 (3): 44–71.
- Paul, Kari, and Lois Beckett. 2020. “What We Know – and Still Don’t – About the Worst-ever US Government Cyber-Attack.” The Guardian, December 19. https://www.theguardian.com/technology/2020/dec/18/orion-hack-solarwinds-explainer-us-government.
- Pierson, Paul. 2004. Politics in Time: History, Institutions, and Social Analysis. Princeton: Princeton University Press.
- Porter, Patrick. 2018. “Why America’s Grand Strategy Has Not Changed: Power, Habit, and the U.S. Foreign Policy Establishment.” International Security 42 (4): 9–46. doi:https://doi.org/10.1162/ISEC_a_00311.
- Presidential Notice. 2017. Continuation of the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities. Executive Office of the President. 82 FR 16099. Document no. 2017-06583. Signed March 29, filed 31 Mar 2017. https://www.govinfo.gov/content/pkg/FR-2017-03-31/pdf/2017-06583.pdf.
- Report of the Select Committee on Intelligence United States Senate on Russian Active Measures and Interference in the 2016 U.S. Election. 2020. Vol. 5: Counterintelligence Threats and Vulnerabilities. 116th Congress 1st Session. Report 116-XX, August 18. https://www.intelligence.senate.gov/sites/default/files/documents/report_volume5.pdf
- Ruggie, John Gerard. 1975. “International Responses to Technology: Concepts and Trends.” International Organization 29 (3): 557–583.
- Saltzman, Ilai. 2013. “Cyber Posturing and the Offense-Defense Balance.” Contemporary Security Policy 34 (1): 40–63.
- Samuels, Richard J. 1994. “Rich Nation, Strong Army”: National Security and the Technological Transformation of Japan. Ithaca: Cornell University Press.
- Sanger, David E. 2016. “Obama Strikes Back at Russia for Election Hacking.” The New York Times, December 29. https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html.
- Sanger, David E., and William J. Broad. 2017. “Trump Inherits a Secret Cyberwar Against North Korean Missiles.” The New York Times, March 4. https://www.nytimes.com/2017/03/04/world/asia/north-korea-missile-program-sabotage.html?_r=2.
- Sanger, David E., and Nicole Perlroth. 2019. “U.S. Escalates Online Attacks on Russia’s Power Grid.” The New York Times, June 15. https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html.
- Schneider, Jackie. 2019a. “Iran Can Use Cyberattacks Against the U.S. That’s Not Nearly as Bad as it Sounds.” The Washington Post, Monkey Cage blog, January 6. https://www.washingtonpost.com/politics/2020/01/06/iran-can-use-cyberattacks-against-us-thats-not-nearly-bad-it-sounds/.
- Schneider, Jacquelyn. 2019b. “The Capability/Vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and the Onset of War.” Journal of Strategic Studies 42 (6): 841–863.
- Slayton, Rebeca. 2016/2017. “What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment” International Security 41 (3): 72–109.
- Summary: Department of Defense Cyber Strategy. 2018. https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF.
- Talmadge, Caitlin. 2019. “Emerging Technology and Intra-war Escalation Risks: Evidence from the Cold War, Implications for Today.” Journal of Strategic Studies 42 (6): 864–887.
- Taylor, Mark Zachary. 2016. The Politics of Innovation: Why Some Countries are Better Than Others at Science and Technology. New York: Oxford University Press.
- Valeriano, Brandon, and Benjamin Jensen. 2019. “How Cyber Operations Can Help Manage Crisis Escalation with Iran.” The Washington Post, The Monkey Cage blog. June 25. https://www.washingtonpost.com/politics/2019/06/25/how-cyber-operations-can-help-manage-crisis-escalation-with-iran/.
- Valeriano, Brandon, and Ryan C. Maness. 2015. Cyber War Versus Cyber Realities: Cyber Conflict in the International System. New York: Oxford University Press.
- Volz, Dustin. 2008. “Trump, Seeking to Relax Rules on U.S. Cyberattacks, Reverses Obama Directive.” The Wall Street Journal, August 15.
- Welch, David A. 2005. Painful Choices: A Theory of Foreign Policy Change. Princeton: Princeton University Press.
- White House. 2011. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, May. https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.