References
- Abbott, Kenneth W., and Duncan Snidal. 2009. “Strengthening International Regulation through Transnational New Governance: Overcoming the Orchestration Deficit.” Vanderbilt Journal of Transnational Law 42: 501–578.
- AEC (Australian Electoral Commission). 1997. “Supplementary Submission to the Joint Standing Committee on Electoral Matters: Computer Security.” http://www.aec.gov.au/Elections/australian_electoral_system/files/jscem/1996_election/sub128.pdf.
- AGD (Attorney-General’s Department). 2009. “Submission to the House of Representatives Standing Committee on Communications Inquiry into Cyber Crime.” https://www.aph.gov.au/binaries/house/committee/coms/cybercrime/subs/sub44.pdf.
- AGD (Attorney-General’s Department) and AusCERT (Australia’s Computer Emergency Response Team). 2006. “Memorandum of Understanding.” Private archive.
- APCERT (Asia Pacific Computer Emergency Response Team). 2003a. “Asia Pacific Computer Emergency Response Team: 2003 Annual Report.” http://www.apcert.org/documents/pdf/annualreport2003.pdf.
- APCERT (Asia Pacific Computer Emergency Response Team). 2003b. “Proposal for Establishing an Asia Pacific Computer Emergency Response Team (Draft, Version 1).” Private archive.
- APSIRC (Asia Pacific Security Incident Response Coordination) Conference. 2002. “Outline.” Private archive.
- ASIO (Australian Security Intelligence Organisation). 2012. “ASIO Report to Parliament 2011–12.” https://www.asio.gov.au/previous-reports-parliament.html.
- AusCERT (Australia’s Computer Emergency Response Team). 2002a. “About AusCERT.” https://www1.auscert.org.au/render.html?cid=2.
- AusCERT (Australia’s Computer Emergency Response Team). 2002b. “AusCERT Vision and Mission Statement.” https://www.auscert.org.au/render.html?it=1936&template=1.
- AusCERT (Australia’s Computer Emergency Response Team). 2004. “Fraudulent Banking (‘Phishing’) Site Incident Report Information and Terms.” Private archive.
- Australian Government. 2009a. “Cyber Security Strategy.” http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/Cyber%20Security%20Strategy.pdf.
- Australian Government. 2009b. “Defending Australia in the Asia Pacific Century: Force 2030.” Department of Defence. http://www.defence.gov.au/whitepaper/2009/docs/defence_white_paper_2009.pdf.
- Australian Government. 2010. “Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime.” Standing Committee on Communications, House of Representatives. http://www.aph.gov.au/parliamentary_Business/Committees/House_of_Representatives_Committees?url=coms/cybercrime/report.htm.
- Australian Government. 2013. “National Plan to Combat Cybercrime.” Attorney-General’s Department. https://www.ag.gov.au/CrimeAndCorruption/Cybercrime/Documents/National%20Plan%20to%20Combat%20Cybercrime.pdf.
- Australian Government. 2016. “Australia’s Cyber Security Strategy.” https://cybersecuritystrategy.dpmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf.
- Blackburn, John, and Gary Waters. 2011. Optimising Australia’s Respond to the Cyber Challenge. Kokoda Foundation. https://www.regionalsecurity.org.au/Resources/Documents/KP14ResponsetoCyber.pdf.
- Bradshaw, Samantha. 2015. “Combatting Cyber Threats: CSIRTs and Fostering International Cooperation on Cybersecurity.” GCIG Paper No. 23. https://www.cigionline.org/publications/combatting-cyber-threats-csirts-and-fostering-international-cooperation-cybersecurity.
- Bush, George W. 2003. “The National Strategy to Secure Cyberspace.” https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf.
- Carr, Madeline. 2016. “Public–Private Partnerships in National Cyber-Security Strategies.” International Affairs 92 (1): 43–62. doi: 10.1111/1468-2346.12504
- CERT-RO (Computer Emergency Response Team, The Netherlands). 2002. “Draft, CERT-RO Symposium Minutes.” Private archive.
- Chester, Rodney. 1992a. “FBI Traces NASA Scare to Qld.” Courier-Mail, July 3. Private archive.
- Chester, Rodney. 1992b. “Uni Hacker Raid a ‘Springboard’” Courier-Mail, July 21. Private archive.
- Choucri, Nazli, Stuart Madnick, and Jeremy Ferwerda. 2014. “Institutions for Cyber Security: International Responses and Global Imperatives.” Information Technology for Development 20 (2): 96–121. doi: 10.1080/02681102.2013.836699
- Clarke, Roger. 2004. “The Emergence of the Internet in Australia.” In Virtual Nation: The Internet in Australia, edited by Gerard Goggin. Sydney: UNSW Press, 30–42.
- Coulter, Alan W. 1993. “SERT: An Australian Security Response Team.” ftp://ftp.mcs.vuw.ac.nz/doc/misc/networkshop-93/net1990s/coulter.txt.
- Cyert, Richard M., and James G. March. 1963. A Behavioral Theory of the Firm. Englewood Cliffs, NJ: Prentice-Hall.
- “Defending Cyber Security”. 2010. Defence News, January 15. http://www.defence.gov.au/defencenews/stories/2010/Jan/0115.htm.
- DeNardis, Laura. 2014. The Global War for Internet Governance. New Haven, CT: Yale University Press.
- Department of Defence. 2013. “Defence White Paper 2013.” http://www.defence.gov.au/whitepaper/2013/docs/WP_2013_web.pdf.
- Dijk, Sandra Van. 2001. “Disputes Kill Key Australian Govt E-Security Initiative.” Computerworld, September 2. http://www.computerworld.co.nz/article/512272/disputes_kill_key_australian_govt_e-security_initiative/.
- DiMaggio, Paul J., and Walter W. Powell. 1983. “The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields.” American Sociological Review 48 (2): 147–160. doi: 10.2307/2095101
- Dreyfus, Suelette, and Julian Assange. 1997. Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. Melbourne: Canongate.
- Drezner, Daniel W. 2002. “The Global Governance of the Internet: Bringing the State Back In.” Political Science Quarterly 119 (3): 477–498. doi: 10.2307/20202392
- Dunn-Cavelty, Myriam, and Manuel Suter. 2009. “Public–Private Partnerships Are No Silver Bullet: An Expanded Governance Model for Critical Infrastructure Protection.” International Journal of Critical Infrastructure Protection 2 (4): 179–187. doi: 10.1016/j.ijcip.2009.08.006
- Eckermann, Robin. 1996. “Securing the Future of AusCERT: Report to the University of Queensland.” Private archive.
- Ellis, James, David Fisher, Thomas Longstaff, Linda Pesante, and Richard Pethia. 1997. “Report to the President's Commission on Critical Infrastructure Protection.” CERT Coordination Center. http://www.sei.cmu.edu/reports/97sr003.pdf.
- ENISA (European Union Agency for Network and Information Security). 2006. “CERT Cooperation and Its Further Facilitation by Relevant Stakeholders.” https://www.enisa.europa.eu/publications/cert-cooperation-and-its-further-facilitation-by-relevant-stakeholders.
- Feakin, Tobias, Jessica Woodall, and Klée Aiken. 2014. “Cyber Maturity in the Asia-Pacific Region 2014.” Australian Strategic Policy Institute. https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2014.
- Feakin, Tobias, Jessica Woodall, and Liam Nevil. 2015. “Cyber Maturity in the Asia-Pacific Region 2015.” Australian Strategic Policy Institute. https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2015.
- FIRST (Forum of Incident Response and Security Teams). 1999. “The 11th Annual FIRST Conference on Computer Security Incident Handling and Response: Final Program.” https://www.first.org/conference/1999/schedule.html.
- FIRST (Forum of Incident Response and Security Teams). 2003. “FIRST Vision and Mission Statement.” http://www.first.org/about/mission.
- Friedberg, Aaron L. 2000. In the Shadow of the Garrison State: America’s Anti-Statism and Its Cold War Grand Strategy. Princeton, NJ: Princeton University Press.
- GAO (US Government Accountability Office). 1989. “Computer Security: Virus Highlights Need for Improved Internet Management.” http://www.gao.gov/products/IMTEC-89-57.
- Global Watch Network. 2001a. “Description.” Private archive.
- Global Watch Network. 2001b. “Framework.” Private archive.
- Hawkins, Darren G., David A. Lake, Daniel L. Neilson, and Michael J. Tierney. 2006. “Delegation Under Anarchy: States, International Organizations, and Principle-Agent Theory.” In Delegation and Agency in International Organizations. Cambridge: Cambridge University Press, p. 3–38.
- Heinl, Caitriona H. 2014. “Regional Cybersecurity: Moving toward a Resilient ASEAN Cybersecurity Regime.” Asia Policy 18: 131–159. doi: 10.1353/asp.2014.0026
- Her Majesty’s Government. 2016. “Nation Cyber Security Strategy 2016–2021.” https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021.
- HKCERT (Hong Kong Computer Emergency Response Team Coordination Centre). 2013. “Security Blog: APCERT Celebrated Her 10th Anniversary.” https://www.hkcert.org/my_url/en/blog/13053102.
- Holl, Jane, and Bruce McConnell. 2011. “A Civil Perspective on Cybersecurity.” Wired, February 14. https://www.wired.com/2011/02/dhs-op-ed/.
- Ingram, Graham. 2002. “Proposal for Establishing an Asia-Pacific Computer Emergency Response Task Force.” Private archive.
- Interdepartmental Committee on Protection of the National Information Infrastructure. 1998. “Protecting Australia’s National Information Infrastructure.” Attorney-General’s Department. http://nla.gov.au/nla.arc-21857.
- International Y2K Cyber Assurance Workshop. 1999. “Agenda.” Private archive.
- IWWN (International Watch and Warning Network). 2007. “Draft Charter, Version 0.3.” Private archive.
- Jennings, Peter, and Tobias Feakin. 2013. “The Emerging Agenda for Cybersecurity.” Australian Strategic Policy Institute. https://www.aspi.org.au/publications/special-report-the-emerging-agenda-for-cybersecurity/SR51_agenda_cybersecurity.pdf.
- Kaplan, Fred. 2016. Dark Territory: The Secret History of Cyber War. New York: Simon & Schuster.
- Khalil, Lydia, James Lewis, Jessica Herrera-Flanigan, and James Mulvenon. 2012. “ANZUS 2.0: Cybersecurity and Australia–US Relations.” Australian Strategic Policy Institute. https://www.aspi.org.au/publications/special-report-issue-46-anzus-2.0-cybersecurity-and-australia-us-relations/SR46_cybersecurity_v2.pdf.
- Killcrece, Georgia, Klaus-Peter Kossakowski, Robin Ruefle, and Mark Zajicek. 2003. “State of the Practice of Computer Security Incident Response Teams (CSIRTs).” Carnegie Mellon University. http://resources.sei.cmu.edu/asset_files/TechnicalReport/2003_005_001_14204.pdf.
- Koporaal, Glenda. 2009. “AARNET: 20 Years of the Internet in Australia.” http://mirror.aarnet.edu.au/pub/aarnet/AARNet_20YearBook_Full.pdf.
- Legrand, Tim. 2015. “Transgovernmental Policy Networks in the Anglosphere.” Public Administration 93 (4): 973–991. doi: 10.1111/padm.12198
- Libicki, Martin C. 2009. Cyberdeterrence and Cyberwar. Santa Monica, CA: RAND Corporation.
- Lindsay, Jon R. 2015. “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence against Cyberattacks.” Journal of Cybersecurity 1 (1): 53–67.
- MacGibbon, Alastair. 2009. “Cyber Security: Threats and Responses in the Information Age.” Australian Strategic Policy Institute. https://www.aspi.org.au/publications/special-report-issue-26-cyber-security-threats-and-responses-in-the-information-age/SR26_Cyber-security.pdf.
- MacGibbon, Alastair. 2016. “Review of the Events Surrounding the 2016 eCensus: Improving Institutional Cyber Security Culture and Practices Across the Australian Government.” Department of the Prime Minister and Cabinet. http://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22publications%2Ftabledpapers%2Fa41f4f25-a08e-49a7-9b5f-d2c8af94f5c5%22.
- Manion, Mark, and William M. Evan. 2000. “The Y2K Problem and Professional Responsibility: A Retrospective Analysis.” Technology in Society 22 (3): 361–387. doi: 10.1016/S0160-791X(00)00015-4
- March, James G., and Johan P. Olsen. 1998. “The Institutional Dynamics of International Political Orders.” International Organization 52 (4): 943–969. doi: 10.1162/002081898550699
- Markoff, John. 1990. “Arrests in Computer Break-Ins Show a Global Peril.” New York Times, April 4. http://www.nytimes.com/1990/04/04/us/arrests-in-computer-break-ins-show-a-global-peril.html.
- McCombie, Stephen, Josef Pieprzyk, and Paul Watters. 2009. “Cybercrime Attribution: An Eastern European Case Study.” Paper presented at the 7th Australian Digital Forensics Conference, Edith Cowan University, 3 December.
- McCosker, Craig. 1992. “FBI Called In to Hunt Uni Hacker.” Weekend Independent, July 3. Private archive.
- Morgus, Robert, Isabel Skierka, Mirko Hohmann, and Tim Maurer. 2015. “National CSIRTs and Their Role in Computer Security Incident Response.” New America. https://www.newamerica.org/cybersecurity-initiative/policy-papers/national-csirts-and-their-role-in-computer-security-incident-response/.
- Norman, James. 2003. “Hack to the Future.” The Age, May 25. http://www.theage.com.au/articles/2003/05/24/1053585748340.html.
- PITAC (President’s Information Technology Advisory Committee). 2005. “ Cyber Security: A Crisis of Prioritization.” https://www.nitrd.gov/Pitac/Reports/20050301_cybersecurity/cybersecurity.pdf.
- PreFIRST (Forum of Incident Response and Security Teams). 2004. “Agenda.” Private archive.
- Rid, Thomas, and Ben Buchanan. 2015. “Attributing Cyber Attacks.” Journal of Strategic Studies 38 (1–2): 4–37. doi: 10.1080/01402390.2014.977382
- Riley, James. 2006. “Feds Lift Security Role of AusCERT.” The Australian, May 30. Private archive.
- Senate (Environment, Communications, Information Technology and the Arts Legislation Committee). 2003. “Answers to Estimates Questions on Notice, Topic: $24.9 Million Budgeted for E-Security National Agenda.” National Office for the Information Economy. February 10. http://www.aph.gov.au/~/media/Estimates/Live/ecita_ctte/estimates/add_0203/cita/noie.ashx.
- Sherlis, William L., Stephen L. Squires, and Richard D. Pethia. 1990. “Computer Emergency Response.” In Computers Under Attack: Intruders, Worms, and Viruses, edited by Peter J. Denning, 495–504. New York: ACM Press.
- Smith, Danny. 1994. “Forming an Incident Response Team.” http://csrc.nist.gov/publications/secpubs/form-irt.pdf.
- Smith, Frank L. III. 2016. “Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.” Health Security 14 (5): 305–314. doi: 10.1089/hs.2015.0077
- “TAPA Accord.” 2002. Private archive.
- Trinkunas, Harold, and Ian Wallace. 2015. “Converging on the Future of Global Internet Governance: The United States and Brazil.” Brookings Institution. https://www.brookings.edu/wp-content/uploads/2016/06/USBrazil-Global-Internet-Governance-web-final.pdf.
- Turnbull, Malcolm. 2016. “Keynote Address at the Australia–US Cyber Security Dialog.” https://www.pm.gov.au/media/2016-09-22/keynote-address-australia-us-cyber-security-dialogue-center.
- UN (United Nations). 2015. “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.” http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174.
- Warren, M. J. 2003. “Australia’s Agenda for E-Security Education and Research.” In Security Education and Critical Infrastructures, edited by Cynthia Irvine and Helen Armstrong. Boston, MA: Springer US.
- Waters, Gary, Desmond Ball, and Ian Dudgeon. 2008. Australia and Cyber-Warfare. ANU E Press.
- World Bank. 2015. “Internet Users (per 100 People).” http://data.worldbank.org/indicator/IT.NET.USER.P2?locations=AU.
- Young, Peter. 1992. “Security Holes in AARNet.” Computerworld, July 17. Private archive.