References
- وزارة الخارجية - قطر. (2017, May 26). Twitter Post. @MofaQatar_AR. https://twitter.com/MofaQatar_AR/status/867849549519388674
- Adler-Nissen, R. (2014). Stigma management in international relations: Transgressive identities, norms, and order in international society. International Organization, 68(1), 143–176. https://doi.org/10.1017/S0020818313000337
- Ahronheim, A., Lazaroff, T., & Harkov, L. (2020, August 11). Netanyahu, Gantz warn Hamas against continued explosive balloon launches. Jerusalem Post, https://www.jpost.com/breaking-news/netanyahu-warns-all-irans-proxies-will-pay-price-for-explosive-balloons-638225
- Al-Arabiya. (2017, January 24). تعرف على تاريخ فايروس “شمعون” في السعودية. alarabiya.net. https://bit.ly/3kgms91
- Al-Bilad. (2017, June 3). توضيح من وزارة الخارجية بشأن اختراق حساب (تويتر) لمعالي وزير الخارجية. Albiladpress.Com. http://www.albiladpress.com/index.php/news/2017/3155/bahrain/431070.html
- Al-Bilad. (2019, September 3). الوزير ميرزا يفتتح مؤتمر أمن المعلومات. Albiladpress.Com. http://www.albiladpress.com/news/2019/3977/bahrain/594628.html
- Aldar, L., Kampf, Z., & Heimann, G. (2021). Reframing, remorse, and reassurance: Remedial work in diplomatic crises. Foreign Policy Analysis, 17(3), 1–20. https://doi.org/10.1093/fpa/orab018
- Al-Ghamdi, M. (2012, December 10). محاولة اختراق أرامكو تهدف للإضرار بالاقتصاد الوطني ومنع تدفق الزيت إلى الأسواق المحلية والعالمية. AlRiyadh.com. http://www.alriyadh.com/791584
- Al-Hawawi, S. (2012, August 27). أرامكو: 30 الف جهاز أصيب بالفايروس. tech-wd.com. https://www.tech-wd.com/wd/2012/08/27/saudi-aramco-restores-network-services/
- Al-Shiyadhmi, M. (2017, July 20). الداخلية القطرية تؤكد اختراق وكالة الأنباء من الإمارات. Al-Jazeera.net. https://www.aljazeera.net/news/arabic/2017/7/20/الداخلية-القطرية-تؤكد-اختراق-وكالة
- Al-Turaisi, A. (2016, September 8). مختصان: المملكة تواجه حرباً إلكترونية واسعة. AlRiyadh.com. http://www.alriyadh.com/1531929
- Ashkenaz, A. (2022, April 13). Putin humiliated: 400,000 secret files leaked by hackers. Daily Express, https://www.express.co.uk/news/science/1595341/putin-news-anonymous-hack-secret-kremlin-files-leaked-ukraine-war-aerogas
- Baram, G., & Sommer, U. (2019). Covert or not covert: National strategies during cyber conflict. 1–16. https://doi.org/10.23919/CYCON.2019.8756682
- Bartholomew, B., & Guerrero-Saade, J. A. (2016). Wave your false flags! Deception tactics muddying attribution in targeted attacks. Virus Bulletin Conference.
- Benoit, W. L. (2014). Accounts, excuses, and apologies: Image repair theory and research (2nd ed.). SUNY Press.
- Benoit, W. L., & Henson, J. R. (2009). President Bush’s image repair discourse on Hurricane Katrina. Public Relations Review, 35(1), 40–46. https://doi.org/10.1016/j.pubrev.2008.09.022
- Bob, Y. J. (2022, November 21). Iran hackers closer to penetrating Israel, US drones—cyberdefense CEO. The Jerusalem Post, https://www.jpost.com/middle-east/iran-news/article-722964
- Borghard, E. D., & Lonergan, S. W. (2019). Cyber operations as imperfect tools of escalation. Strategic Studies Quarterly, 13(3), 122–145.
- Branch, J. (2019). What’s in a name? Metaphors and cybersecurity. International Organization, 1–32. https://doi.org/10.1017/S002081832000051X
- Broeders, D., Boeke, S., & Georgieva, I. (2019). Foreign intelligence in the digital age. Navigating a State of ‘Unpeace.’ The Hague Program for Cyber Norms, https://papers.ssrn.com/sol3/papers.cfm?abstract_id = 3493612
- Bronk, C., & Tikk-Ringas, E. (2013). The cyber attack on Saudi aramco. Survival, 55(2), 81–96. https://doi.org/10.1080/00396338.2013.784468
- Brown, J. M., & Fazal, T. M. (2021). #Sorrynotsorry: Why states neither confirm nor deny responsibility for cyber operations. European Journal of International Security, 6(4), 401–417. https://doi.org/10.1017/eis.2021.18
- Buchanan, B., & Cunningham, F. S. (2020). Preparing the cyber battlefield: Assessing a novel escalation risk in a sino-American crisis (fall 2020). Texas National Security Review, 3(4), 54–81. https://doi.org/10.26153/tsw/10951
- Burton, J., & Lain, C. (2020). Desecuritising cybersecurity: Towards a societal approach. Journal of Cyber Policy, 5(3), 449–470. https://doi.org/10.1080/23738871.2020.1856903
- Carson, A. (2016). Facing off and saving face: Covert intervention and escalation management in the Korean War. International Organization, 70(1), 103–131. https://doi.org/10.1017/S0020818315000284
- Chon, M.-G., & Kim, S. (2022). Dealing with the COVID-19 crisis: Theoretical application of social media analytics in government crisis management. Public Relations Review, 48(3), 102201. https://doi.org/10.1016/j.pubrev.2022.102201
- Clinton, J. (2022, July 3). British army confirms breach of its Twitter and YouTube accounts. The Guardian, https://www.theguardian.com/uk-news/2022/jul/03/british-army-confirms-breach-of-its-twitter-and-youtube-accounts
- Cooke, M. (2014). Tribal modern: Branding new nations in the Arab Gulf. University of California Press.
- Coombs, W. T. (1998). An analytic framework for crisis situations: Better responses from a better understanding of the situation. Journal of Public Relations Research, 10(3), 177–191. https://doi.org/10.1207/s1532754xjprr1003_02
- Coulter, M. (2021, April 11). Accident’ at Iran’s Natanz nuclear plant as new uranium enrichment starts. The Guardian, https://www.theguardian.com/world/2021/apr/11/accident-at-irans-natanz-nuclear-plant-as-new-uranium-enrichment-starts
- Deibert, R. J., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15–32. https://doi.org/10.1111/j.1749-5687.2009.00088.x
- Doffman, Z. (2019, August 8). Iranian hackers suspected of cyberattacks on Bahrain—A warning beyond the gulf: Report. Forbes, https://www.forbes.com/sites/zakdoffman/2019/08/08/iranian-hackers-suspected-of-cyberattacks-on-bahrain-sending-message-beyond-the-gulf-report/
- Dukalskis, A. (2021). Making the world safe for dictatorship. Oxford University Press.
- Dunn Cavelty, M. (2008). Cyber-security and threat politics: US efforts to secure the information age. Routledge.
- Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122. https://doi.org/10.1111/misr.12023
- Egloff, F. J. (2020a). Contested public attributions of cyber incidents and the role of academia. Contemporary Security Policy, 41(1), 55–81. https://doi.org/10.1080/13523260.2019.1677324
- Egloff, F. J. (2020b). Public attribution of cyber intrusions. Journal of Cybersecurity, 6(1), 1–12. https://doi.org/10.3929/ethz-b-000442557
- Egloff, F. J., & Smeets, M. (2021). Publicly attributing cyber attacks: A framework. Journal of Strategic Studies, 1–32. https://doi.org/10.1080/01402390.2021.1895117
- Fars News Agency. (2015, May 23). Saudileaks 3: Riyadh confirms hacking of foreign ministry servers. Fars News Agency, https://en.farsnews.ir/newstext.aspx?nn = 13940302001087
- Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40. https://doi.org/10.1080/00396338.2011.555586
- Fattah, Z. (2017, May 30). Gulf spat escalates as Saudi Arabia, U.A.E. Media attack Qatar. Bloomberg.Com, https://www.bloomberg.com/news/articles/2017-05-30/gulf-spat-escalates-as-saudi-arabia-u-a-e-media-attack-qatar
- Fettweis, C. J. (2013). The pathologies of power: Fear, honor, glory, and hubris in U.S. Foreign policy. Cambridge University Press.
- Finkle, J., & Wagstaff, J. (2016, December 1). Shamoon virus returns in new Gulf cyber attacks after four-year hiatus. Reuters. https://www.reuters.com/article/us-cyber-saudi-shamoon-idUSKBN13Q38B
- Finnemore, M., & Hollis, D. B. (2020). Beyond naming and shaming: Accusations and international law in cybersecurity. European Journal of International Law, https://papers.ssrn.com/abstract = 3347958
- Fischerkeller, M. P., Goldman, E. O., & Harknett, R. J. (2022). Cyber persistence theory: Redefining national security in cyberspace. Oxford University Press.
- Franceschi-Bicchierai, L. (2015). There’s evidence the “Yemen cyber army” is actually Iranian. In VICE, https://www.vice.com/en_us/article/wnj9gq/theres-evidence-the-yemen-cyber-army-is-actually-iranian
- Friedrichs, J., & Kratochwil, F. (2009). On acting and knowing: How pragmatism can advance international relations research and methodology. International Organization, 63(4), 701–731. https://doi.org/10.1017/S0020818309990142
- Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 41–73. https://doi.org/10.1162/ISEC_a_00136
- GCO. (2017, May 24). مكتب الاتصال الحكومي:موقع وكالة الأنباء القطرية تم اختراقه.. ونسب تصريح مغلوط لصاحب السمو. Government Communication Office. https://www.gco.gov.qa/ar/2017/05/24/1915/
- Goffman, E. (1959). The presentationn of self in everyday life. Anchor Books.
- Gray, M. (2011). A theory of “late rentierism” in the Arab States of the Gulf. CIRS, https://www.files.ethz.ch/isn/134326/No_7_MatthewGrayTheoryLaterRentierismArabStatesGulf.pdf
- Gray, M. (2016). Political economy dynamics in the Arab Gulf States: Implications for political transition. In A. Saikal (Ed.), The arab world and Iran: A turbulent region in transition (pp. 45–65). Palgrave Macmillan.
- Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53(4), 1155–1175. https://doi.org/10.1111/j.1468-2478.2009.00572.x
- Haugevik, K., & Neumann, C. B. (2021). Reputation crisis management and the state: Theorising containment as diplomatic mode. European Journal of International Relations, https://doi.org/10.1177/13540661211008213
- Hay, S. (2018, April 6). Lieberman says Israel won’t accept burning kites becoming the norm. Ynetnews, https://www.ynetnews.com/articles/0,7340,L-5278488,00.html
- Healey, J., & Jervis, R. (2020). The escalation inversion and other oddities of situational cyber stability. Texas National Security Review, 3(4), 30–53.
- Hedgecock, K., & Sukin, L. (2023). Responding to uncertainty: The importance of covertness in support for retaliation to cyber and kinetic attacks. Journal of Conflict Resolution, 1–31. https://doi.org/10.1177/00220027231153580
- Hertog, S., & Luciani, G. (2011). Energy and sustainability policies in the Gulf States. In D. Held, & K. Ulrichsen (Eds.), The transformation of the Gulf (pp. 236–257). Routledge.
- Hope, B., Strobel, W. P., & Volz, D. (2019). High-level cyber intrusions hit Bahrain Amid tensions with Iran. In The Wall Street Journal, https://www.wsj.com/articles/high-level-cyber-intrusions-hit-bahrain-amid-tensions-with-iran
- Jacobsen, J. T. (2021). Cyber offense in NATO: Challenges and opportunities. International Affairs, 97(3), 703–720. https://doi.org/10.1093/ia/iiab010
- Jarvis, L., Macdonald, S., & Whiting, A. (2017). Unpacking cyberterrorism discourse: Specificity, status, and scale in news media constructions of threat. European Journal of International Security, 2(1), 64–87. https://doi.org/10.1017/eis.2016.14
- Jarvis, L., Nouri, L., & Whiting, A. (2014). Understanding, locating and constructing cyberterrorism. In T. M. Chen, L. Jarvis, & S. Macdonald (Eds.), Cyberterrorism: Understanding, assessment, and response (pp. 25–41). Springer. https://doi.org/10.1007/978-1-4939-0962-9_2
- Kahan, R. (2020, December 21). Amateur hackers are poking holes in Israel’s image as a cyber superpower. CTech, https://www.calcalistech.com/ctech/articles/0,7340,L-3883153,00.html
- Kalman, M. (2011, November 7). Israel denies anonymous cyber-attack to blame for websites failure. The Guardian, https://www.theguardian.com/world/2011/nov/07/israel-anonymous-cyber-attack-websites
- Kaminska, M. (2021). Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks. Journal of Cybersecurity, 7(1), tyab008.
- Kampf, Z., & Löwenheim, N. (2012). Rituals of apology in the global arena. Security Dialogue, 43(1), 43–60. https://doi.org/10.1177/0967010611431095
- Kamrava, M. (2013). Qatar: Small state, big politics. Cornell University Press.
- Khatib, D. K., & Maziad, M., (2019). The Arab gulf states and the West: Perceptions and realities – opportunities and perils. Routledge.
- Kostyuk, N., & Zhukov, Y. M. (2019). Invisible digital front: Can cyber attacks shape battlefield events? Journal of Conflict Resolution, 63(2), 317–347. https://doi.org/10.1177/0022002717737138
- Kreps, S., & Schneider, J. (2019). Escalation firebreaks in the cyber, conventional, and nuclear domains: Moving beyond effects-based logics. Journal of Cybersecurity, 5(1), https://doi.org/10.1093/cybsec/tyz007
- Lennon, M. (2012, August 16). Saudi Arabia’s National Oil Company Kills Network After Cyber Attack. SecurityWeek. https://www.securityweek.com/saudi-arabias-national-oil-company-kills-network-after-cyber-attack/
- Libicki, M. C. (2012). Crisis and Escalation in Cyberspace. RAND Corporation. https://www.rand.org/pubs/monographs/MG1215.html
- Libicki, M. C. (2020). Correlations between cyberspace attacks and kinetic attacks, 1300, 199–213. https://doi.org/10.23919/CyCon49761.2020.9131731
- Lind, J. (2011). Sorry states: Apologies in international politics. Cornell University Press.
- Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404. https://doi.org/10.1080/09636412.2013.816122
- Lindsay, J. R. (2015). Tipping the scales: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53–67. https://doi.org/10.1093/cybsec/tyv003
- Lindsay, J. R., Cheung, T. M., & Reveron, D. S., eds. (2015). China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford University Press.
- Löwenheim, N. (2009). A haunted past: Requesting forgiveness for wrongdoing in international relations. Review of International Studies, 35(3), 531–555.
- Löwenheim, O., & Heimann, G. (2008). Revenge in international politics. Security Studies, 17(4), 685–724. https://doi.org/10.1080/09636410802508055
- Lupovici, A. (2016a). The “attribution problem” and the social construction of “violence”: taking cyber deterrence literature a step forward. International Studies Perspectives, 17(3), 322–342. https://doi.org/10.1111/insp.12082
- Lupovici, A. (2016b). The power of deterrence: Emotions, identity and American and Israeli wars of resolve. Cambridge University Press.
- Lupovici, A. (2023). Ontological security, cyber technology, and states’ responses. European Journal of International Relations, 29(1), 153–178. https://doi.org/10.1177/13540661221130958
- Masterson, M. (2022). Humiliation and international conflict preferences. The Journal of Politics, 84(2), 874–888. https://doi.org/10.1086/715591
- Mitchell, J. S. (2021). Transnational identity and the Gulf crisis: Changing narratives of belonging in Qatar. International Affairs, 97(4), 929–944. https://doi.org/10.1093/ia/iiab013
- Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266
- Okaz. (2017, March 22). «المياه»: لم نتأثر بـ«شامون 2» والإيقاف لحماية الأنظمة. Okaz. https://www.okaz.com.sa/flags/na/1534960
- Paganini, P. (2015, May 24). Yemen cyber army hacked principal Saudi Gov networks. Security Affairs, https://securityaffairs.co/wordpress/37132/hacking/yemen-cyber-army-saudi-gov.html
- Paletta, D. (2015, June 16). Former CIA chief says government data breach could help China recruit spies. Wall Street Journal, https://www.wsj.com/articles/former-cia-chief-says-government-data-breach-could-help-china-recruit-spies-1434416996
- Perlroth, N. (2012, October 23). In Cyberattack on Saudi Firm, U.S. Sees Iran firing back. New York Times (Online), https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html
- Poznansky, M., & Perkoski, E. (2018). Rethinking secrecy in cyberspace: The politics of voluntary attribution. Journal of Global Security Studies, 3(4), 402–416. https://doi.org/10.1093/jogss/ogy022
- Qatar MFA. (2017a, May 24). مصدر مسؤول بوزارة الخارجية: ستتم ملاحقة المسؤولين عن قرصنة موقع وكالة الأنباء القطرية. Ministry of Foreign Affairs - Qatar. https://bit.ly/3kmGkHD
- Qatar MFA. (2017b, May 24). وزارة الخارجية تنفي صدور تصريحات لسعادة وزير الخارجية. Ministry of Foreign Affairs - Qatar. https://bit.ly/3xERtXY
- Qatar MFA. (2017c, May 25). استعداد دولي للتعاون مع قطر في التحقيق بشأن جريمة القرصنة الإلكترونية. Ministry of Foreign Affairs - Qatar. https://bit.ly/2VwUewc
- Qatar MFA. (2017d, May 25). وزير الخارجية: قطر ستتصدى للحملة الإعلامية التي تستهدفها. Ministry of Foreign Affairs - Qatar. https://bit.ly/3r9FXBn
- Qatar MFA. (2017e, June 7). تصريح لوزارة الداخلية بشأن قرصنة موقع وكالة الأنباء القطرية. https://bit.ly/3yN0RsK
- Qatar MFA. (2017f, June 10). لقاء وزير الخارجية مع قناة “ روسيا اليوم” عن أزمة الخليج. Ministry of Foreign Affairs - Qatar. https://bit.ly/3hDEsbG
- Qatar MOI (Director). (2017, July 20). Hacking of QNA Website and Social Media Accounts. https://m.facebook.com/moigovqatar.en/videos/hacking-of-qna-website-and/1204739016299152/
- Republic of Albania. (2022, September 7). Video message of Prime Minister Edi Rama, regarding the response of the Albanian government to the cyber attack against the digital infrastructure of the Government of the Republic of Albania. https://kryeministria.al/en/newsroom/videomesazh-i-kryeministrit-edi-rama-lidhur-me-vendimin-e-qeverise-shqiptare-si-kunderpergjigje-ndaj-aktit-te-sulmit-te-rende-kibernetik-ndaj-infrastruktures-digjitale-te-qeverise-se-republikes-se-s/
- Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. https://doi.org/10.1080/01402390.2011.608939
- Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382
- Riemer, O. (2021). Politics is not everything: New perspectives on the public disclosure of intelligence by states. Contemporary Security Policy, 42(4), 554–583. https://doi.org/10.1080/13523260.2021.1994238
- Riley, M., Carey, G., & Fraher, J. (2016, December 1). Destructive hacks strike Saudi arabia, posing challenge to trump. Bloomberg.Com, https://www.bloomberg.com/news/articles/2016-12-01/destructive-hacks-strike-saudi-arabia-posing-challenge-to-trump
- Saudi Arabia, MFA. (2015a, May 23). أوضح رئيس الإدارة الإعلامية بوزارة الخارجية … Facebook. https://www.facebook.com/ksamofa/photos/a.501311693212397/1060172627326298
- Saudi Arabia, MFA. (2015b, June 20). عقب رئيس الإدارة الإعلامية بوزارة الخارجية … Facebook. https://www.facebook.com/ksamofa/photos/a.501311693212397/1079703598706534
- Schlenker, B. R. (1980). Impression management: The self-concept, social identity, and interpersonal relations. Brooks Cole.
- Schlenker, B. R., & Darby, B. W. (1981). The use of apologies in social predicaments. Social Psychology Quarterly, 44(3), 271–278. https://doi.org/10.2307/3033840
- Scott, M. B., & Lyman, S. M. (1968). Accounts. American Sociological Review, 33(1), 46–62. https://doi.org/10.2307/2092239
- Shackelford, S. J., Sulmeyer, M., Deckard, A. N. C., Buchanan, B., & Micic, B. (2017). From Russia with love: Understanding the Russian cyber threat to U.S. Critical Infrastructure and What to Do About It. Nebraska Law Review, 96(2), 320–338.
- Shandler, R., & Gomez, M. A. (2022). The hidden threat of cyber-attacks–undermining public confidence in government. Journal of Information Technology & Politics, 1–16.
- Sharp, T. (2017). Theorizing cyber coercion: The 2014 North Korean operation against sony. Journal of Strategic Studies, 40(7), 898–926. https://doi.org/10.1080/01402390.2017.1307741
- Shires, J. (2018). Enacting expertise: Ritual and risk in cybersecurity. Politics and Governance, 6(2), 31–40. https://doi.org/10.17645/pag.v6i2.1329
- Shires, J. (2019). Hack-and-leak operations: Intrusion and influence in the Gulf. Journal of Cyber Policy, 4(2), 235–256. https://doi.org/10.1080/23738871.2019.1636108
- Shires, J. (2020). The simulation of scandal: Hack-and-leak operations, the Gulf States, and U.S. Politics. Texas National Security Review, 3(4), 10–29.
- Shires, J. (2021a). The cyber operation against Qatar news agency. In M. Zweiri, M. M. Rahman, & A. Kamal (Eds.), The 2017 gulf crisis: An interdisciplinary approach (pp. 101–113). Springer. https://doi.org/10.1007/978-981-15-8735-1_6
- Shires, J. (2021b). The politics of cybersecurity in the Middle East. Oxford University Press.
- Shuya, M. (2018). Russian cyber aggression and the new cold war. Journal of Strategic Security, 11(1), 1–18.
- Snyder, J. (2020). Backlash against naming and shaming: The politics of status and emotion. The British Journal of Politics and International Relations, https://doi.org/10.1177/1369148120948361
- Soubrier, E., Moritz, J., & Freer, C. (2021). Introduction: New trends in Gulf international relations and transnational politics. International Affairs, 97(4), 925–928. https://doi.org/10.1093/ia/iiab087
- Steele, B. J. (2019). Restraint in international politics. Cambridge University Press. https://doi.org/10.1017/9781108644082
- Subotic, J., & Zarakol, A. (2013). Cultural intimacy in international relations. European Journal of International Relations, 19(4), 915–938. https://doi.org/10.1177/1354066112437771
- The White House. (2015, June 5). Press Briefing by Press Secretary Josh Earnest, 6/5/2015. Whitehouse.Gov. https://obamawhitehouse.archives.gov/the-press-office/2015/06/05/press-briefing-press-secretary-josh-earnest-652015
- The White House. (2021, April 15). Background Press Call by Senior Administration Officials on Russia. Whitehouse.Gov. https://www.whitehouse.gov/briefing-room/press-briefings/2021/04/15/background-press-call-by-senior-administration-officials-on-russia/
- TOI. (2020, May 19). 6 facilities said hit in Iran’s cyberattack on Israel’s water system in April. Times of Israel, https://www.timesofisrael.com/6-facilities-said-hit-in-irans-cyberattack-on-israels-water-system-in-april/
- Ulrichsen, K. C. (2017, June 1). What’s going on with Qatar? The Washington Post. https://www.washingtonpost.com/news/monkey-cage/wp/2017/06/01/whats-going-on-with-qatar/
- Valeriano, B., Jensen, B., & Maness, R. C. (2018). Cyber strategy: The evolving character of power and coercion. Oxford University Press.
- Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.
- Ware, B. L., & Linkugel, W. A. (1973). They spoke in defense of themselves: On the generic criticism of apologia. Quarterly Journal of Speech, 59(3), 273–283. https://doi.org/10.1080/00335637309383176
- Waxman, M. C. (2013). Self-defensive force against cyber attacks: Legal, strategic and political dimensions. International Law Studies, 89, 109–122.
- Weitzenkorn, B. (2012, August 28). Oil giant admits hack of 30,000 computers. NBC News, https://www.nbcnews.com/id/wbna48814107
- WikiLeaks. (2015, June 19). The Saudi Cables. WikiLeaks.Org. https://wikileaks.org/saudi-cables/press
- Williams, B. (2017, February 7). Iran’s cyber strategy: A case study in Saudi Arabia. C4ISRNET. https://www.c4isrnet.com/home/2017/02/07/irans-cyber-strategy-a-case-study-in-saudi-arabia/
- Wolf, R. (2011). Respect and disrespect in international politics: The significance of status recognition. International Theory, 3(1), 105–142. https://doi.org/10.1017/S1752971910000308
- Wolf, R. (2017). Identifying emotional reactions to status deprivations in discourse. International Studies Review, 19(3), 491–496. https://doi.org/10.1093/isr/vix033
- Yarhi-Milo, K. (2018). Who fights for reputation: The psychology of leaders in international conflict. Princeton University Press.
- Zarakol, A. (2010). Ontological (In)security and state denial of historical crimes: Turkey and Japan. International Relations, 24(1), 3–23. https://doi.org/10.1177/0047117809359040
- Zhang, E., & Benoit, W. L. (2009). Former Minister Zhang’s discourse on SARS: Government’s image restoration or destruction? Public Relations Review, 35(3), 240–246. https://doi.org/10.1016/j.pubrev.2009.04.004