Bibliography
- Abbott, Kenneth W., Philipp Genschel, Duncan Snidal, and Bernhard Zangl, eds. The Governor’s Dilemma: Indirect Governance beyond Principals and Agents. Oxford: Oxford University Press, 2020.
- Abbott, Kenneth W., David Levi-Faur, and Duncan Snidal. “Theorizing Regulatory Intermediaries: The RIT Model.” The ANNALS of the American Academy of Political and Social Science 670, no. 1 (2017): 14–35. doi:https://doi.org/10.1177/0002716216688272.
- Allhoff, Fritz, Adam Henschke, and Bradley J. Strawser, eds. Binary Bullets: The Ethics of Cyberwarfare. New York, NY: Oxford University Press, 2016.
- Avant, Deborah, and Virginia Haufler. “Public–Private Interactions and Practices of Security.” Oxford handbooks online. The Oxford Handbook of International Security. edited by Alexandra Gheciu and William C. Wohlforth. Oxford: Oxford University Press, 2018. 349–364.
- Avant, Deborah D. The Market for Force: The Consequences of Privatizing Security. Cambridge: Cambridge University Press, 2005.
- Belk, Robert, and Matthew Noyes. 2012. “On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policy.” Science, Technology, and Public Policy Program, Belfer Center, March.
- Berndtsson, Joakim, and Maria Stern. “Private Security and the Public–private Divide: Contested Lines of Distinction and Modes of Governance in the Stockholm-Arlanda Security Assemblage.” International Political Sociology 5, no. 4 (2011): 408–425. doi:https://doi.org/10.1111/j.1749-5687.2011.00142.x.
- Bernstein, Michael A., and Mark R. Wilson. “New Perspectives on the History of the Military–Industrial Complex.” Enterprise & Society 12, no. 1 (2011): 1–9. doi:https://doi.org/10.1017/S146722270000971X.
- Betz, David J., and Tim Stevens. Cyberspace and the State: Toward a Strategy for Cyber-power. Abingdon: Routledge, 2011.
- Brooks, Stephen G. Producing Security: Multinational Corporations, Globalization, and the Changing Calculus of Conflict. Princeton, N.J: Princeton University Press, 2007.
- Carr, Madeline. “Public-private Partnerships in National Cyber-security Strategies.” International Affairs 92, no. 1 (2016): 43–62. doi:https://doi.org/10.1111/1468-2346.12504.
- Choucri, Nazli. Cyberpolitics in International Relations. Massachusetts Institute of Technology: The MIT Press, 2012.
- Cusumano, Eugenio. “Policy Prospects on the Regulation of PMSCs.” In War by Contract. Human Rights, Humanitarian Law, and Private Contractors, edited by Francesco Francioni and Natalino Ronzitti, 11–37. Oxford: Oxford University Press, 2011.
- Cusumano, Eugenio. “The Scope of Military Privatization: Military Role Conceptions and Contractor Support in the United States and the United Kingdom.” International Relations 29, no. 2 (2015): 219–241. doi:https://doi.org/10.1177/0047117814552142.
- Cusumano, Eugenio, and Christopher Kinsey. “Bureaucratic Interests and the Outsourcing of Security: The Privatization of Diplomatic Protection in the United States and the United Kingdom.” Armed Forces & Society 41, no. 4 (2015): 591–615. doi:https://doi.org/10.1177/0095327X14523958.
- De Vore, Marc R., and Moritz Weiss. “Who’s in the Cockpit? The Political Economy of Collaborative Aircraft Decisions.” Review of International Political Economy 21, no. 2 (2014): 497–533. doi:https://doi.org/10.1080/09692290.2013.787947.
- Dunn Cavelty, Myriam, and Florian J. Egloff. “The Politics of Cybersecurity: Balancing Different Roles of the State.” St Antony’s International Review 15, no. 1 (2019): 37–57.
- Dunn Cavelty, Myriam, and Andreas Wenger. “Cyber Security Meets Security Politics: Complex Technology, Fragmented Politics, and Networked Science.” Contemporary Security Policy 41, no. 1 (2020): 5–32. doi:https://doi.org/10.1080/13523260.2019.1678855.
- Glen, Carol M. Controlling Cyberspace. Santa Barbara: ABC-CLIO LLC, 2017.
- Goldman, Emily O., and Michael Warner. “Why a Digital Pearl Harbour Makes Sense … and Is Possible.” In Understanding Cyber Conflict: 14 Analogies, edited by George Perkovich and Ariel Levite, 147–160. Washington: Georgetown University Press, 2017.
- Harris, Shane. @war: The Rise of the military-Internet Complex. Boston, MA: Houghton Mifflin Harcourt, 2014.
- Healey, Jason. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Washington, DC: Cyber Conflict Studies Association, 2013.
- Heinrich, Thomas. “Cold War Armory: Military Contracting in Silicon Valley.” Enterprise & Society 3, no. 2 (2002): 247–284. doi:https://doi.org/10.1017/S1467222700011666.
- Krahmann, Elke. “Security Governance and Networks: New Theoretical Perspectives in Transatlantic Security.” Cambridge Review of International Affairs 18, no. 1 (2005): 15–30. doi:https://doi.org/10.1080/09557570500059514.
- Krahmann, Elke. States, Citizens and the Privatization of Security. Cambridge, New York: Cambridge University Press, 2010.
- Krahmann, Elke. “NATO Contracting in Afghanistan: The Problem of Principal–agent Networks.” International Affairs 92, no. 6 (2016): 1401–1426. doi:https://doi.org/10.1111/1468-2346.12753.
- Kruck, Andreas. “Theorizing the Use of Private Military and Security Companies: A Synthetic Perspective.” Journal of International Relations and Development 17, no. 1 (2014): 112–141. doi:https://doi.org/10.1057/jird.2013.4.
- Kuerbis, Brenden, and Farzaneh Badiei. “Mapping the Cybersecurity Institutional Landscape.” Digital Policy, Regulation and Governance 19, no. 6 (2017): 466–492. doi:https://doi.org/10.1108/DPRG-05-2017-0024.
- Laffont, Jean-Jacques, and Jean Tirole. A Theory of Incentives in Procurement and Regulation. Cambridge, MA: The MIT Press, 1993.
- Leander, Anna. “The Power to Construct International Security: On the Significance of Private Military Companies.” Millennium 33, no. 3 (2005): 803–825. doi:https://doi.org/10.1177/03058298050330030601.
- Lewallen, Jonathan. “Emerging Technologies and Problem Definition Uncertainty: The Case of Cybersecurity.” Regulation & Governance Early View (2020). doi:https://doi.org/10.1111/rego.12341.
- Lin, Herbert. “Escalation Dynamics and Conflict Termination in Cyberspace.” Strategic Studies Quarterly 6, no. 3 (2012): 46–70.
- Mahoney, Charles W. “Corporate Hackers: Outsourcing US Cyber Capabilities.” Strategic Studies Quarterly 15, no. 1 (2021): 61–89.
- Markusen, Ann R. “The Case Against Privatizing National Security.” Governance 16, no. 4 (2003): 471–501. doi:https://doi.org/10.1111/1468-0491.00225.
- Maschmeyer, Lennart, Ronald J. Deibert, and Jon R. Lindsay. “A Tale of Two Cybers - How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society.” Journal of Information Technology & Politics 18, no. 1 (2021): 1–20. doi:https://doi.org/10.1080/19331681.2020.1776658.
- Maurer, Tim. Cyber Mercenaries: The State, Hackers, and Power. Cambridge, NY: Cambridge University Press, 2018.
- Mueller, Milton, Andreas Schmidt, and Brenden Kuerbis. “Internet Security and Networked Governance in International Relations.” International Studies Review 15, no. 1 (2013): 86–104. doi:https://doi.org/10.1111/misr.12024.
- Mueller, Milton L. “Against Sovereignty in Cyberspace.” International Studies Review 41, no. 4 (2019): 206. doi:https://doi.org/10.1093/isr/viz044.
- Owen, Taylor. Disruptive Power: The Crisis of the State in the Digital Age. New York. NY: Oxford University Press, 2016. Oxford studies in digital politics.
- Paarlberg, Robert L. “Knowledge as Power: Science, Military Dominance, and U.S. Security.” International Security 29, no. 1 (2004): 122–151. doi:https://doi.org/10.1162/0162288041762959.
- Rid, Thomas, and Ben Buchanan. “Attributing Cyber Attacks.” Journal of Strategic Studies 38, no. 1–2 (2014): 4–37. doi:https://doi.org/10.1080/01402390.2014.977382.
- Scharpf, Fritz W. Games Real Actors Play: Actor-centered Institutionalism in Policy Research. Boulder, CO: Westview Press, 1997.
- Schmidt, Andreas. Secrecy Vs. Openness: Internet Security and the Limits of Open Source and Peer Production. Delft: Uitgeverij BOXPress, 2014.
- Seidl, Timo. “The Politics of Platform Capitalism: A Case Study on the Regulation of Uber in New York.” Regulation & Governance (2020): 1–18. EarlyView. doi:https://doi.org/10.1111/rego.12353.
- Singer, P. W., and Allan Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. What everyone needs to know. Oxford: Oxford University Press, 2014.
- Slayton, Rebecca, and Aaron Clark-Ginsberg. “Beyond Regulatory Capture: Coproducing Expertise for Critical Infrastructure Protection.” Regulation & Governance 12, no. 1 (2018): 115–130. doi:https://doi.org/10.1111/rego.12168.
- Solms, Rossouw von, and Johan van Niekerk. “From Information Security to Cyber Security.” Computers & Security 38 (2013): 97–102. doi:https://doi.org/10.1016/j.cose.2013.04.004.
- Weiss, Moritz. “Power and Signals: Explaining the German Approach to European Security.” Journal of International Relations and Development 12, no. 3 (2009): 317–348. doi:https://doi.org/10.1057/jird.2009.15.
- Weiss, Moritz. “‘Transaction Costs and the Establishment of the European Security and Defense Policy.” Security Studies 21, no. 4 (2012): 654–682. doi:https://doi.org/10.1080/09636412.2012.734233.
- Weiss, Moritz. “How to Become a First Mover? Mechanisms of Military Innovation and the Development of Drones.” European Journal of International Security 3, no. 2 (2018): 187–210. doi:https://doi.org/10.1017/eis.2017.15.
- Weiss, Moritz. “Varieties of Privatization: Informal Networks, Trust and State Control of the Commanding Heights.” Review of International Political Economy 28, no. 3 (2021): 662–689. doi:https://doi.org/10.1080/09692290.2020.1726791.
- Weiss, Moritz, and Felix Biermann. “Networked Politics and the Supply of European Defence Integration.” Journal of European Public Policy (2021): 1–22. Early View. doi:https://doi.org/10.1080/13501763.2021.1916057.
- Weiss, Moritz, and Felix Biermann. “Cyberspace and the Protection of Critical National Infrastructure.” Journal of Economic Policy Reform (2021): 1–18. Latest Articles. doi:https://doi.org/10.1080/17487870.2021.1905530.
- Weiss, Moritz, and Tim Heinkelmann-Wild. “Disarmed Principals: Institutional Resilience and the Non-enforcement of Delegation.” European Political Science Review 12, no. 4 (2020): 409–425. doi:https://doi.org/10.1017/S1755773920000181.
- Weiss, Moritz, and Vytautas Jankauskas. “Securing Cyberspace: How States Design Governance Arrangements.” Governance 32, no. 2 (2019): 259–275. doi:https://doi.org/10.1111/gove.12368.
- Weiss, Moritz, and Hans-Jürgen Weiss. 2005. “Indexing. A General Approach for Explaining Political Biases in War Coverage.” Paper presented at the Annual Conference of the International Communication Association (ICA), New York.