4,194
Views
10
CrossRef citations to date
0
Altmetric
Articles

The Cyber Pearl Harbor

Bibliography

  • Adamsky, Dima. The Culture of Military Innovation: The Impact of Cultural Factors on the Revolution in Military Affairs in Russia, the US and Israel. Stanford, CA: Stanford University Press, 2010.
  • Alexander, Keith B. Memorandum for Record, Subject: United States Cyber Command (USCYBERCOM) Commander’s Strategic Assessment for Operating in Cyberspace – Preventing a Pearl Harbor Environment, United States Cyber Command, Fort George G. Meade, Maryland, March 23, 2012.
  • Baer, George W. One Hundred Years of Sea Power: The U.S. Navy, 1890–1990. Stanford, CA: Stanford University Press, 1994.
  • Lewis, Ted G. Bak’s Sand Pile: Strategies for a Catastrophic World. Williams, CA: Agile Press, 2011.
  • Perrow, Charles. Normal Accidents: Living with High Risk Technologies. Princeton, NJ: Princeton University Press, 1999.
  • Posen, Barry. Inadvertent Escalation: Conventional War and Nuclear Risks. Ithaca, NY: Cornell University Press, 1991.
  • Sagan, Scott. The Limits of Safety. Princeton, NJ: Princeton University Press, 1993.
  • Saunders, Paul. 2015. “Why America Can’t Stop Russia’s Hybrid Warfare.” The National Interest, June 23. www.nationalinterest.org/feature/shy-america-can’t-stop-russias-hybrid-warfare-13166
  • Smith, David J. “How Russia Harnesses Cyberwarfare.” Defense Dossier, Issue 4, August 2012, 7–11.
  • Watts, Barry D. The Maturing Revolution in Military Affairs. Washington, DC: Center for Strategic and Budgetary Assessments, 2011.
  • Wirtz, James J. “Deterring the Weak: Problems and Prospects.” Proliferation Papers, No. 43, Fall 2012.
  • Wirtz, James J. “Theory of Surprise.” In Paradoxes of Strategic Intelligence, edited by Richard K. Betts and Thomas G. Mahnken, 101–116. London: Frank Cass, 2003.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.