Reference list
- Allison, G., & Zelikow, P. (1999). Essence of decision: Explaining the Cuban missile crisis. Addison-Wesley Press.
- Bannelier, K., & Christakis, T. (2017). Cyber-attacks—prevention-reactions: The role of states and private actors. Les Cahiers de La Revue Défense Nationale. https://ssrn.com/abstract=2941988
- Bing, C., & Howell O’Neill, P. (2018, March 20). Kaspersky’s “slingshot” report burned an isis-focused intelligence operation. cyberscoop. https://www.cyberscoop.com/kaspersky-slingshot-isis-operation-socom-five-eyes/
- Brantly, A. (2018). The cyber deterrence problem. 10th International Conference on Cyber Conflict. https://doi.org/10.23919/CYCON.2018.8405009
- Bureau of Industry and Security. (2019). Addition of entities to the entity list 2019-10616. US Department of Commerce.
- Burt, T. (2019, December 30). Microsoft takes court action against fourth nation-state cybercrime group. Microsoft. https://blogs.microsoft.com/on-the-issues/2019/12/30/microsoft-court-action-against-nation-state-cybercrime/
- Burton, J. (2018). Cyber deterrence: A comprehensive approach? (CCDCOE Papers). NATO CCDCOE. https://www.ccdcoe.org/uploads/2018/10/BURTON_Cyber_Deterrence_paper_April2018.pdf
- Carr, M. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, 92(1), 43–62. https://doi.org/10.1111/1468-2346.12504
- Council on Foreign Relations. (2010, January). Operation aurora. https://www.cfr.org/interactive/cyber-operations/operation-aurora
- Cox, J., & Franceschi-Biccherai, L. (2018, February 7). Important hacking shop you’ve never heard of. Motherboard. https://www.vice.com/en_us/article/8xdayg/iphone-zero-days-inside-azimuth-security
- CrowdStrike. (2020, January 22). CrowdStrike’s work with the democratic national committee: Setting the record straight. CrowdStrike. https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
- Cyber Peace Institute. (n.d.). About us. Retrieved April 29, 2020, from https://cyberpeaceinstitute.org/about-us/advancement
- Cyberspace Solarium Commission. (2020). Final report. https://drive.google.com/file/d/1ryMCIL_dZ30QyjFqFkkf10MxIXJGT4yv/view
- Dave, P. (2016, February 24). While the FBI battles apple over encryption, pushback from the tech industry persists. Los Angeles Times. https://www.latimes.com/business/technology/la-fi-apple-encryption-20160224-story.html
- DOD Inspector General. (2020). Report on the joint enterprise defense infrastructure (jedi) cloud procurement. https://media.defense.gov/2020/Apr/15/2002281438/-1/-1/1/REPORT%20ON%20THE%20JOINT%20ENTERPRISE%20DEFENSE%20INFRASTRUCTURE%20(JEDI)%20CLOUD%20PROCUREMENT%20DODIG-2020-079.PDF
- Doty, K. (2016, March 31). The emergence of cyber deterrence: Implications for international law. https://ssrn.com/abstract=3128578
- Eichensehr, K. (2017). Public-private cybersecurity. Texas Law Review, 95(3), 467–538. https://ssrn.com/abstract=2847173
- Federal Trade Commission. (2019). Equifax to pay $575 million as part of settlement with FTC, CFPB, and states related to 2017 Data Breach. https://www.ftc.gov/news-events/press-releases/2019/07/equifax-pay-575-million-part-settlement-ftc-cfpb-states-related
- Finnemore, M., & Sikkink, K. (1998). International norm dynamics and political change. International Organization, 52(5), 887–917. https://doi.org/10.1162/002081898550789
- Fischerkeller, M., & Harknett, R. (2017). Deterrence is not a credible strategy for cyberspace. Orbis, 61(3), 381–393. https://doi.org/10.1016/j.orbis.2017.05.003
- Grabosky, P. (2013). Organised crime and the internet. The RUSI Journal, 158(5), 18–25. https://doi.org/10.1080/03071847.2013.847707
- Greenberg, A. (2018, August 22). The untold story of NotPetya, the most devastating cyberattack in history. Wired. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
- HackerOne. (2019, November 27). Incident Report | 2019-11-24 Account Takeover via Disclosed Session Cookie. https://hackerone.com/reports/745324
- Healey, J., Mallery, J., Tothova Jordan, K., & Youd, N. (2014). Confidence-building measures in cyberspace. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/confidence-building-measures-in-cyberspace-a-multistakeholder-approach-for-stability-and-security/
- Herring, E. (1995). Danger and opportunity: Explaining international crises outcomes. Manchester University Press.
- Hoffman, W. (2018, July 17). The future of cyber defense. Carnegie Endowment for International Peace. https://carnegieendowment.org/2018/07/17/future-of-cyber-defense-pub-76892
- Janis, I. L. (1972). Victims of groupthink: A psychological study of foreign-policy decisions and Fiascoes. Houghton Mifflin Company.
- Jasper, S. (2015). Deterring malicious behavior in cyberspace. Strategic Studies Quarterly, 9(1), 60–85. https://www.jstor.org/stable/26270834
- Kello, L. (2017). The virtual weapon and international order. Yale University Press.
- Klimburg, A. (2011). Mobilising cyber power. Survival: Global Politics and Strategy, 53(1), 41–60. https://doi.org/10.1080/00396338.2011.555595
- Knight, W. (2020, March 31). The newest US sanctions on china’s huawei could backfire. Wired. https://www.wired.com/story/newest-us-sanctions-chinas-huawei-backfire/
- Koch, R., & Golling, M. (2018). The cyber decade: Cyber defence at a X-ing Point. 10th International Conference on Cyber Conflict. http://dx.doi.org/10.23919/CYCON.2018.8405016
- Lin, H. (2013, February 6). Defining self-defense for the private sector in cyberspace. World Politics Review. https://www.worldpoliticsreview.com/articles/12694/defining-self-defense-for-the-private-sector-in-cyberspace
- Lindsay, J. R., & Gartzke, E. (2019). Cross-domain deterrence: Strategy in an Era of complexity. Oxford University Press.
- Lupovici, A. (2016). The “attribution Problem” and the social construction of “violence”: taking cyber deterrence literature a step forward. International Studies Perspectives, 17(3), 322–342. https://doi.org/10.1111/insp.12082
- Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199. https://doi.org/10.1080/17419166.2018.1496826
- Maurer, T. (2018). Cyber proxies and their implications for liberal democracies. The Washington Quarterly, 41(2), 171–188. https://doi.org/10.1080/0163660X.2018.1485332
- Missiroli, A. (2019). The dark side of the web: Cyber as a threat. European Foreign Affairs Review, 24(2), 135–152. https://kluwerlawonline.com/journalarticle/European+Foreign+Affairs+Review/24.2/EERR2019009
- National Protection and Programs Directorate. (2017). Notification of issuance of binding operational directive 17-01 and establishment of procedures for responses. Federal Register.
- Nye, J. S. (2017). Deterrence and Dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266
- Office of the Inspector General of the Intelligence Community. (2019). Unclassified joint report on the implementation of the cybersecurity information sharing act of 2015.
- O’Neill, P. H. (2019, November 6). Inside the Microsoft team tracking the world’s most dangerous hackers. MIT Technology Review. https://www.technologyreview.com/2019/11/06/238375/inside-the-microsoft-team-tracking-the-worlds-most-dangerous-hackers/
- Paris Call. (n.d.). Home. Retrieved April 29, 2020, from https://pariscall.international/en/
- Raytheon Technologies. (2020, October 14). Department of homeland security selects raytheon to help protect government networks. Raytheon Technologies. https://www.raytheon.com/news/feature/defending-gov
- Riberio, J. (2016, May 9). Twitter blocks access to analytics of its data to U.S. intelligence agencies. Computer World. https://www.computerworld.com/article/3067400/twitter-blocks-access-to-analytics-of-its-data-to-us-intelligence-agencies.html
- Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382
- Romanosky, S., & Boudreaux, B. (2019). Private sector attribution of cyber incidents (Working Paper). RAND.
- Rosenzweig, P. (2010). The organization of the United States government and private sector for achieving cyber deterrence. workshop on deterring cyberattacks: Informing Strategies and Developing Options for U.S. Policy.
- Ruhl, C., Hollis, D., Hoffman, W., & Maurer, T. (2020). Cyberspace and geopolitics. Carnegie Endowment for International Peace. https://carnegieendowment.org/2020/02/26/cyberspace-and-geopolitics-assessing-global-cybersecurity-norm-processes-at-crossroads-pub-81110
- Schelling, T. (1966). Arms and influence. Yale University Press.
- Shorrock, T. (2015, May 27). How private contractors have created a shadow NSA. The Nation. https://www.thenation.com/article/archive/how-private-contractors-have-created-shadow-nsa/
- Sperandei, M. (2006). Bridging deterrence and compellence: An alternative approach to the study of coercive diplomacy. International Studies Review, 8(2), 253–280. https://doi.org/10.1111/j.1468-2486.2006.00573.x
- Stevens, C. (2020). Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet. Contemporary Security Policy, 41(1), 129–152. https://doi.org/10.1080/13523260.2019.1675258
- Taillat, S. (2019). Disrupt and restraint: The evolution of cyber conflict and the implications for collective security. Contemporary Security Policy, 40(3), 368–381. https://doi.org/10.1080/13523260.2019.1581458
- Tech Accord. (n.d.). About the cybersecurity Tech Accord. Retrieved April 29, 2020, from https://cybertechaccord.org/about/
- Thumfart, J. (2020). Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius. Internet Policy Review, 9(3), 1–26. https://doi.org/10.14763/2020.3.1500
- Tor, U. (2017). ‘Cumulative deterrence’ as a new paradigm for cyber deterrence. Journal of Strategic Studies, 40(1–2), 92–117. https://doi.org/10.1080/01402390.2015.1115975
- Trump, D. (2019). Executive order 13873. The White House.
- US Congress. (1986). H.R. 4718: computer fraud and abuse act of 1986.
- Valeriano, B., & Jensen, B. (2019). The Myth of the cyber offense. CATO Institute.
- Wilner, A. S. (2020). US cyber deterrence: Practice guiding theory. Journal of Strategic Studies, 43(2), 245–280. https://doi.org/10.1080/01402390.2018.1563779