REFERENCES
- Ali, A.H. (2011) ‘The power of social media in developing nations: New tools for closing the global Digital Divide and beyond’, Harvard Human Rights Journal, 24, pp.185–219.
- Ashmore, W.C. (2009) ‘Impact of alleged Russian cyber attacks’, Baltic Security & Defense Review, 11, pp.4–40.
- Ayanso, A., Cho, D.I., & Lertwachara, K. (2010) ‘The digital divide: Global and regional ICT leaders and followers’, Information Technology for Development, 16(4), pp.304–19.10.1080/02681102.2010.504698
- BBC News (2008) ‘White House confirms cyber-attack on “unclassified” system’, http://www.bbc.com/news/world-us-canada-19794745, accessed 24 July 2014.
- Billo, C. & Chang, W. (2004) ‘Cyber warfare: An analysis of the means and motivations of selected nation states’, Institute for Security Technology Studies at Dartmouth College Report, http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf, accessed 27 August 2014.
- Burton, J. (2013) ‘Cyber security: The strategic challenge and New Zealand's response’, New Zealand International Review, 38(3), pp.5–8.
- CIA World Factbook. (2012a) ‘Country comparison, GDP (purchasing power parity)’, https://www.cia.gov/library/publications/the-world-factbook/rankorder/2001rank.html?countryName=Georgia&countryCode=gg®ionCode=mde&rank=118#gg, accessed 21 February 2014.
- CIA World Factbook. (2012b) ‘Country comparison, GDP (purchasing power parity)’, https://www.cia.gov/library/publications/the-world-factbook/geos/rs.html, accessed 21 February 2014.
- CIA World Factbook. (2013a) ‘Europe: Estonia’, https://www.cia.gov/library/publications/the-world-factbook/geos/print/country/countrypdf_en.pdf, accessed 27 August 2014.
- CIA World Factbook. (2013b) ‘North America: United States’, https://www.cia.gov/library/publications/the-world-factbook/geos/us.html, accessed 27 August 2014.
- CIA World Factbook. (2013c) ‘East & Southeast Asia: China’, https://www.cia.gov/library/publications/the-world-factbook/geos/print/country/countrypdf_ch.pdf, accessed 27 August 2014.
- Claburn, T. (2008) ‘CNN faces cyberattack over Tibet coverage’, Information Week, http://www.informationweek.com/government/cybersecurity/cnn-faces-cyberattack-over-tibet-coverage/d/d-id/1066964?, accessed 24 July 2014.
- CNN. (2008) ‘CNN web site targeted’, http://www.cnn.com/2008/TECH/04/18/cnn.websites/, accessed 24 July 2014.
- Council of Europe Independent International Fact-Finding Mission on the Conflict in Georgia. (2009) (Report, Volume II). Retrieved from http://www.ceiig.ch/.
- CS Staff. (2011, November 15) ‘China's cyber warfare’, Chinascope, pp.6–16, http://chinascope.org/main/content/view/4064/148/, accessed 27 August 2014.
- Harašta, J. (2013) ‘Cyber security in young democracies’, Jurisprudence, 20(4), pp.1457–72.10.13165/JUR-13-20-4-10
- International Telecommunications Union (ITU). (2010) http://www.itu.int/cybersecurity/, accessed May 2013.
- Internet World Stats. (2014a) ‘Internet usage stats and country report’, Estonia, http://www.internetworldstats.com/eu/ee.htm, accessed 20 July 2014.
- Internet World Stats. (2014b) ‘Internet usage stats and country report’, China, http://www.internetworldstats.com/asia/cn.htm, accessed 20 July 2014.
- Internet World Stats. (2014c) ‘Internet usage stats and country report’, U.S., http://www.internetworldstats.com/am/us.htm, accessed 20 July 2014.
- Fors, M. (2003) ‘What the United Nations can do: Closing the Digital Divide’, UN Chronicle, 40(4), p.31.
- Georgiaupdate. (2008) ‘Russian invasion of Georgia: Russian cyberwar on Georgia’, http://www.mfa.gov.ge/files/556_10535_798405_Annex87_CyberAttacks.pdf, accessed 27 August 2014.
- Guillen, M.F. & Suarez, S.L. (2005) ‘Explaining the global Digital Divide: Economic, political and sociological drivers for cross-national Internet use’, Social Forces, 84(2), pp.681–708.10.1353/sof.2006.0015
- Kampmark, B. (2007) ‘Cyber warfare between Estonia and Russia’, Contemporary Review, 289(1686), pp.288–93.
- Klein, H. (2005) ‘Understanding WSIS: An institutional analysis of the UN World Summit on the Information Society’, Information Technologies and International Development, 1(34), pp.3–13.
- Kshetri, N. (2010) ‘Diffusion and effects of cyber-crime in developing economies’, Third World Quarterly, 31(7), pp.1057–79.10.1080/01436597.2010.518752
- Kugler, R.L. (2009) ‘Deterrence of cyber attacks’, in Cyberpower and National Security, http://ctnsp.dodlive.mil, accessed 27 August 2014.
- Landler, M. & Markoff, J. (2007, May 29) ‘Digital fears emerge after data siege in Estonia’, The New York Times, http://www.nytimes.com, accessed 27 August 2014.
- Leyden, J. (2008) ‘Chinese hackers call off CNN attack’, The Register, http://www.theregister.co.uk/2008/04/21/chinese_ddos_postponed/, accessed 24 July 2014.
- McEvoy Manjikian, M. (2010) ‘From global village to virtual battlespace: The colonizing of the Internet and the extension of Realpolitik’, International Studies Quarterly, 54, pp.381–401.10.1111/j.1468-2478.2010.00592.x
- Min, S.J. (2010) ‘From the Digital Divide to the Democratic Divide: Internet skills, political interest, and the second-level Digital Divide in political Internet use’, Journal of Information Technology & Politics, 7, pp.22–35.10.1080/19331680903109402
- National Security Concept of Georgia. (n.d.) Ministry of Foreign Affairs of Georgia, http://www.mfa.gov.ge/index.php?lang_id=ENG&sec_id=12, accessed 21 February 2014.
- Organization for Economic Co-operation and Development. (2001) ‘Understanding the digital divide’, Paris: Directorate for Science, Technology and Industry, OECD, http://www.oecd.org/dataoecd/38/57/1888451.pdf, accessed 27 August 2014.
- Ortis, C. & Evans, P. (2003) ‘The Internet and Asia-Pacific security: Old conflicts and new behavior’, The Pacific Review, 16(4), pp.549–72.10.1080/0951274032000132254
- Rogers, E.M. (2001) ‘The Digital Divide’, Convergence, 7(96), pp.96–111.10.1177/135485650100700406
- Sanger, D.E. (2013, June 9) ‘Obama and Xi try to avoid a Cold War mentality’, The New York Times, http://www.nytimes.com, accessed 27 August 2014.
- Shackelford, S.J. (2010) ‘Estonia three years later: A progress report on combating cyber attacks’, Journal of Internet Law, 13(8), pp. 22–9.
- Stohl, M., Myers, P., & Danis, M. (2008) ‘The dark side of WEB 2.0: Criminals, terrorists, the state and cyber security’, Harvard Asia Pacific Review, 9(2), pp.47–50.
- Thorne, K. & Kouzmin, A. (2008) ‘Cyberpunk-Web 1.0 “egoism” greets Group-Web 2.0 “narcissism”: Convergence, consumption, and surveillance in the Digital Divide’, Administrative Theory & Praxis, 30(3), pp.299–323.
- Tikk, E., Kaska, K., Rünnimeri, K., Kert, M., Talihärm, A.M., & Vihul, L. (2008) ‘Cooperative Cyber Defence Centre of Excellence’, Cyber attacks against Georgia: Legal lessons identified (Report Version 1.0), http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf, accessed 27 August 2014.
- US Cyber Consequences Unit. (2009) ‘Overview by the US-CCU of the cyber campaign against Georgia in August of 2008’, http://www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf, accessed 27 August 2014.
- Van Deursen, A. & Van Dijk, J. (2010) ‘Internet skills and the Digital Divide’, New Media & Society, 13(6), pp.893–911.10.1177/1461444810386774
- Vatis, M.A. (2001) ‘Cyber attacks during the War on Terrorism: A predictive analysis’, Institute for Technology Studies at Dartmouth College, http://www.ists.dartmouth.edu/docs/cyber_a1.pdf, accessed 24 July 2014.
- Wilson, A. (2009) ‘Computer gap: The Soviet Union's missed revolution and its implications for Russian technology policy’, Problems of Post-Communism, 56(4), pp.41–51.10.2753/PPC1075-8216560404
- World Bank. (2010a) ‘ICT at-a-glance: Georgia’, http://devdata.worldbank.org/ict/geo_ict.pdf, accessed 8 May 2012.
- World Bank. (2010b) ‘ICT at-a-glance: Russia’, http://devdata.worldbank.org/ict/rus_ict.pdf, accessed 8 May 2012.
- Zhang, L. (2012) ‘A Chinese perspective on cyber war’, International Review of the Red Cross, 94(886), pp.801–7.10.1017/S1816383112000823