References
- CERT Program. (2009a). About CERT. Retrieved September 17, 2009, from http://www.cert.org/meet_cert/
- Charney, S. (2009). Rethinking the cyber threat: A framework and path forward. Retrieved from http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=747
- Choucri, N. (2012). Cyberpolitics in international relations. Cambridge, MA: MIT Press.
- Claude, I. L., Jr. (1967). Collective legitimization as a political function of the United Nations. In O. R. Young (Ed.), The international political economy and international institutions, volume 1 (pp. 22–52). Cheltenham: Edward Elgar Publishing Limited.
- Cooperative Cyber Defence Centre of Excellence. (2013). Retrieved January 11, 2009, from http://www.ccdcoe.org/
- Council of Europe. (2001). ETS No. 185 – convention on cybercrime. Retrieved September 19, 2009, from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm
- Council of Europe. (2009a). Council of Europe action against economic crime. Retrieved September 28, 2009, from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Default_en.asp
- Council of Europe. (2009b). Convention on cybercrime. Retrieved September 27, 2009, from http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=1&DF=09/09/2009&CL=ENG
- Council of Europe. (2009c). Project on cybercrime (phase 1). Retrieved September 26, 2009, from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime%5Ccy%20Project/projectcyber_en.asp
- Council of Europe. (2009d). Cybercrime legislation – country profiles. Retrieved September 28, 2009, from http://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Documents/CountryProfiles/default_en.asp
- Europa. (2009). European Network and Information Security Agency (ENISA). Retrieved September 21, 2009, from http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_organised_crime/l24153_en.htm
- Federal Bureau of Investigation. (2006). Netting cyber criminals. Retrieved February 20, 2010, from http://www.fbi.gov/page2/jan06/ccctf012506.htm
- Forum of Incident Response and Security Teams. (2009a). Alphabetical list of FIRST members. Retrieved September 20, 2009, from http://www.first.org/members/teams/
- Forum of Incident Response and Security Teams. (2009b). FIRST history. Retrieved September 29, 2009, from http://www.first.org/about/history/
- Goodrich, L. M. (1947). From League of Nations to United Nations. In O. R. Young (Ed.), The international political economy and international institutions, volume 1 (pp. 22–52). Cheltenham: Edward Elgar Publishing Limited.
- G8 24/7 High Tech Contact Points. Cyber security co-operation. Retrieved October 28, 2009, from http://www.cybersecuritycooperation.org/moredocuments/24%20Hour%20Network/24%207%20invitation.pdf
- Haas, E. B. (1961). International integration: The European and the universal process. In O. R. Young (Ed.), The international political economy and international institutions, volume 1 (pp. 22–52). Cheltenham: Edward Elgar Publishing Limited.
- Hall, P. A., & Taylor, R. C. R. (1996). Political science and the three new institutionalisms. Political Studies, 44(5), 936–957. doi: 10.1111/j.1467-9248.1996.tb00343.x
- Hansen, D. L., Bertot, J. C., & Jaeger, P. T. (2011). Government policies of the use of social media: Legislating for change. In John Bertot & Karine Nahon (Eds.), Proceedings of the 12th annual international conference on digital government (pp. 131–140). College Park, MD.
- Hoffmann, S. (1987). International organization and the international system. In O. R. Young (Ed.), The international political economy and international institutions, volume 1 (pp. 22–52). Cheltenham: Edward Elgar Publishing Limited.
- IMPACT. (2009). Welcome to the coalition. Retrieved October 23, 2009, from http://www.impact-alliance.org/
- International Telecommunication Union. (2005). A comparative analysis of cybersecurity initiatives worldwide. Retrieved December 16, 2011, from http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparative_Analysis_Cybersecurity_Initiatives_Worldwide.pdf
- International Telecommunication Union. (2009a). Global Cybersecurity Agenda (GCA). Retrieved September 25, 2009, from http://www.itu.int/osg/csd/cybersecurity/gca/
- International Telecommunication Union. (2009b). Information and communication technology (ICT) statistics. Retrieved September 25, 2009, from http://www.itu.int/ITU-D/ict/
- International Telecommunication Union. (2009c). Global Cybersecurity Agenda (GCA): Technical and security measures. Retrieved September 25, 2009, from http://www.itu.int/osg/csd/cybersecurity/gca/tech-proced.html
- Keohane, R. O. (1983). The demand for international regimes. In O. R. Young (Ed.), The international political economy and international institutions, volume 1 (pp. 22–52). Cheltenham: Edward Elgar.
- Killcrece, G. (2004). Steps for creating national CERTs. Carnegie Mellon Software Engineering Institute. Retrieved September 13, 2009, from http://www.cert.org/archive/pdf/NationalCSIRTs.pdf
- Lowi, T. J. (1964). American business, public policy, case studies, and political theory. World Politics, 16(4), 677–715. doi: 10.2307/2009452
- Madnick, S., Choucri, N., Camina, S., Fogg, E., Li, X., & Wei, F. (2009, August). Explorations in Cyber International Relations (ECIR) – Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System. Cambridge, MA: Sloan School of Management, MIT (Sloan School of Management Working Paper SWP #4754–09).
- Madnick, S., Choucri, N., Li, X., & Ferwerda, J. (2011, December 3–4). Comparative analysis of cybersecurity metrics to develop new hypotheses. In Karin Hedström, Fredrik Karlsson, & Zhengchuan Xu (Eds.), Proceedings of the workshop on information security & privacy, (Jointly hosted by AIS SIGSEC and IFIP TC11.1). Shanghai: Association of Information Systems Special Interest Group on Information Security and Privacy.
- Madnick, S., Li, X., & Choucri, N. (2009, December). Experiences and challenges with using CERT data to analyze international cyber security. In Merrill Warkentin & Rita Walczuch (Eds.), Proceedings of the AIS SIGSEC Workshop on Information Security & Privacy (pp. 6–16). Phoenix, AZ: Association of Information Systems Special Interest Group on Information Security and Privacy.
- Mitrany, D. (1948). The functional approach to world organization. In O. R. Young (Ed.), The international political economy and international institutions, volume 1 (pp. 22–52). Cheltenham: Edward Elgar Publishing Limited.
- National White Collar Crime Center. (2008). IC3 annual report. Retrieved September 23, 2009, from http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf
- Nye, J. S., & Keohane, R. O. (1977). Power and interdependence: World politics in transition. Boston, MA: Little, Brown and Company.
- OECD. (2009a). What is the Working Party on Information Security and Privacy (WPISP)? Retrieved October 23, 2009, from http://www.oecd.org/document/46/0,3343,en_2649_34255_36862382_ 1_1_1_1,00.html
- OECD. (2009b). Initiatives by country. Retrieved September 27, 2009, from http://www.oecd.org/document/63/0,3343,en_21571361_36139259_36306559_1_1_1_1,00.html
- Reich, S. (2000). The four faces of institutionalism: Public policy and a pluralistic perspective. Governance, 13(4), 501–522. doi: 10.1111/0952-1895.00143
- Samson, V. (2008, July 23). The murky waters of the White House's cybersecurity plan. Center for Defense Information. Retrieved September 26, 2009, from http://www.cdi.org/program/document.cfm?DocumentID=4345&from_page=../index.cfm
- Slaughter, A.-M. (2004). Disaggregated sovereignty: Towards the public accountability of global government networks. Government and Opposition, 39(2), 159–190. doi: 10.1111/j.1477-7053.2004.00119.x
- The White House. (2003). The National Strategy to Secure Cyberspace. Retrieved September 20, 2009, from http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf
- The White House. (2009a). Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure. Retrieved September 23, 2009, from http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
- The White House. (2009b). The comprehensive national cybersecurity initiative. Retrieved March 20, 2010, from http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative
- UNESCO. (2009, March 23). UN-backed anti-cyber-threat coalition launches headquarters in Malaysia. Retrieved March 24, 2009, from http://portal.unesco.org/ci/en/ev.php-URL_ID=28464&URL_ DO=DO_TOPIC&URL_SECTION=201.html
- Verdelho, P. (2008). The effectiveness of international co-operation against cybercrime. Council of Europe. Retrieved September 27, 2009, from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/T-CY/DOC-567study4-Version7_en.PDF/
- WPISP. (2002). OECD guidelines for the security of information systems and networks: Towards a culture of security. Paris: OECD.
- WPISP. (2005). The promotion of a culture of security for information systems and networks in OECD countries. Paris: OECD.
- WSIS. (2003). Plan of action. Retrieved October 17, 2009, from http://www.itu.int/wsis/docs/geneva/official/poa.html
- WSIS. (2009a). Stocktaking. Retrieved October 17, 2009, from http://www.itu.int/wsis/stocktaking/index.html
- WSIS. (2009b). WSIS C5. Retrieved October 17, 2009, from http://www.itu.int/osg/csd/cybersecurity/WSIS/