References
- Agence France Presse. (2007). EU urged to deepen cooperation after Estonia cyber-attacks. 22 May.
- Alexander, K. (2010). House armed services subcommittee, cyberspace operations testimony’, Washington, DC. Retrieved March 12, 2014, from www.defense.gov/home/features/2010/0410_cybersec/docs/USCC%20Command%20Posture%20Statement_HASC_22SEP10_FINAL%20_OMB%20Approved_.pdf
- Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 388–413. doi: 10.1057/palgrave.jird.1800030
- Arquilla, J. (2012). Cyberwar is already upon us: But can it be controlled? Foreign Policy. Retrieved February 12, from http://www.foreignpolicy.com/articles/2012/02/27/cyberwar?page=full/
- Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141–165. doi: 10.1080/01495939308402915
- Austin, J. L. (1980). How to do things with words. (Eds. J. O. Urmson & Marina Sbisà). Oxford: Oxford University Press.
- Baudrillard, J. (1994). Simulacra and simulation trans. Sheila Faria Glaser. Ann Arbor: University of Michigan Press.
- Baudrillard, J. (2005). The intelligence of Evil or the lucidity pact. Trans. Chris Turner. Oxford: Berg.
- Bendrath, R. (2003). The American cyber-angst and the real world – Any link? In Robert Latham (Eds.), Bombs and bandwidth: The emerging relationship between information technology and security (pp. 49–73). New York: The New Press.
- Betz, D., & Stevens, T. (2011). Cyberspace and the state: Toward a strategy for cyber-power. Oxon: Routledge.
- Butler, J. (1993). Bodies that matter: On the discursive limits of ‘Sex’. New York, NY: Routledge.
- Butler, J. (1999). Gender trouble: Feminism and the subversion of identity. New York, NY: Routledge.
- Buzan, B. (2004). The United States and the great powers: World politics in the twenty-first century. Cambridge, MA: Polity.
- Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
- Carvell, A. (2009). Russian youth group claims responsibility for 2007 Estonian cyber attacks. Retrieved March 12, 2014, from http://www.geek.com/articles/news/russian-youth-group-claims-responsibility-for-2007-estonian-cyber-attacks-20090312
- Clarke, R., & Knake, R. (2012). Cyber war: The next threat to national security and what to do about it. New York, NY: Harper Collins.
- Connolly, W. E. (1991). Identity/difference: Democratic negotiations of political paradox. Ithaca, NY: Cornell University Press.
- Cramer, J., & Thrall, T. (2009). Introduction: Understanding threat inflation. In Jane Cramer & Trevor Thrall (Eds.), American foreign policy and the politics of fear: Threat inflation since 9/11 (pp. 40–53). New York, NY: Routledge.
- Derrida, J. (1982). Margins of philosophy. ( A. Bass, Trans.). Chicago, IL: University of Chicago Press.
- Derrida, J. (1988). Limited Inc. ( Samuel Weber, Trans.). Evanston, IL: Northwestern University Press.
- Deibert, R., Rohozinski, R., & Crete-Nishihata, M. (2012). Cyclones in cyberspace: Information shaping and denial in the 2008 Russia-Georgia war. Security Dialogue, 43(1), 3–24. doi: 10.1177/0967010611431079
- Eun, Y.-S., & Aßmann, J. S. (2015). Cyberwar: Taking stock of security and warfare in the digital age. International Studies Perspectives, 1–18. Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/insp.12073/abstract
- Farwell, J., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40. doi: 10.1080/00396338.2011.555586
- Government of Australia. (2009). Defence white paper 2009: Defending Australia in the Asia pacific century. Canberra: Department of Defence.
- Government of Australia. (2011), Cooperation on Cyber – A new dimension to the US alliance. Retrieved from http://www.foreignminister.gov.au/releases/2011/kr_mr_110916.html
- Hanlon, M. (2007, May 25). Attack of the cyber terrorists. Daily Mail.
- Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x
- Irvine, D. (2010). Director-general's speech UC lecture series. Retrieved from http://www.asio.gov.au/Publications/Public-Statements/2010/27-Aug-2010-UC-Lecture-Series-Speech.html
- Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), 7–40. doi: 10.1162/ISEC_a_00138
- Laclau, E. (1996). Deconstruction, pragmatism and hegemony. In Chantal Mouffe (Ed.), Deconstruction and pragmatism (pp. 47–67). London: Routledge.
- Libicki, M. (2009). Cyber deterrence and cyberwar. Santa Monica: RAND Corporation.
- Liff, A. (2012). Cyberwar: A new, “Absolute Weapon?” The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401–428. doi: 10.1080/01402390.2012.663252
- Lindsay, J. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365–404. doi: 10.1080/09636412.2013.816122
- Lupovichi, A. (2015). The “Attribution Problem” and the social construction of “Violence”: Taking cyber deterrence literature a step forward. International Studies Perspectives, 1–21. Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/insp.12082/abstract
- Lynn, W. J. (2010). Remarks on cyber at the council on foreign relations, as delivered by deputy secretary of defense William J. Lynn, Iii, Council on Foreign Relations, New York City, Thursday, September 30, 2010. Retrieved March 12, 2014, from http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1509
- Lynn, W. J. (2011a). Remarks on the Department of defense cyber strategy, as delivered by deputy secretary of defense William J. Lynn, III, National Defense University, Washington, D.C., Thursday, July 14, 2011. Retrieved March 12, 2014, from http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1593
- Lynn, W. J. (2011b). Remarks on cyber at the RSA conference, as delivered by William J. Lynn, III, San Francisco, California, Tuesday, February 15, 2011. Retrieved March 12, 2014, from http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1535
- McKeon, H. (2010). House Armed Services Subcommittee, Cyberspace Operations Testimony. Retrieved March 12, 2014, from www.defense.gov/home/features/2010/0410_cybersec/docs/USCC%20Command%20Posture%20Statement_HASC_22SEP10_FINAL%20_OMB%20Approved_.pdf
- Michaels, J. (2007, June 15). NATO to Study Defense Against Cyberattacks; Computer Assault Staggered Estonia. USA Today.
- Nietzsche, F. (1989). On the genealogy of morals ( Walter Kaufmann and R. J. Hollingdale Trans.). New York, NY: Vintage Books.
- Obama, B. (2009). Remarks by the President on securing our nation's cyber infrastructure. Retrieved March 12, 2014, from http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/
- Panetta, L. (2011). Clinton, Panetta and Australian Ministers after defense talks. Retrieved from http://translations.state.gov/st/english/texttrans/2011/09/20110916091505su2.346003e-02.html
- Rid, T. (2012). Think again: Cyberwar. Foreign Policy, February 27. Retrieved from http://foreignpolicy.com/2012/02/27/think-again-cyberwar/
- Rudd, K. (2011). Just a mouse click away from war. Retrieved from http://www.foreignminister.gov.au/articles/2011/kr_ar_110919.html
- Saco, D. (1999). Colonizing cyberspace: “National Security” and the internet. In Jutta Weldes, Mark Laffey, Hugh Gusterson, & Raymond Duvall (Eds.), Cultures of insecurity: States, communities, and the production of danger (pp. 261–291). Minneapolis: University of Minnesota Press.
- Salter, M. (2008). Securitization and desecuritization: A dramaturgical analysis of the Canadian Air Transport Security Authority. Journal of International Relations and Development, 11(4), 321–349. doi: 10.1057/jird.2008.20
- Stempfley, R., & McGurk, S. P. (2011). Statement before the United States House of Representatives, Committee on Energy and Commerce, Subcommittee on Oversight and Investigations, Washington, DC, July 26, 2011. Retrieved March 12, 2014, from http://republicans.energycommerce.house.gov/Media/file/Hearings/Oversight/072611/StempflyMcgurk.pdf
- Tanner, J. (2007). Estonia: Cyber attacks a security threat. Associated Press Newswires. 17 May.
- The Courier-Mail. (2011). FBI to target cyberthreats. 8 October.
- The New York Times. (2007). A cyberblockade in Estonia. June 2.
- The Washington Times. (2007). Cyberwarfare Worries. June 2.
- Traynor, I. (2007). Russia accused of unleashing cyberwar to disable Estonia, The Guardian, 17 May.
- Wæver, Ole. (2004, March 17–20). Aberystwyth, Paris, Copenhagen: New schools in securitytheory and their origins between core and periphery. Paper presented atInternational Studies Association Conference, Montreal.
- Warner, D. (1993). An ethic of responsibility in international relations and the limits of responsibility/community. Alternatives, 18(4), 431–452. doi: 10.1177/030437549301800402
- Žižek, S. (2008). The sublime object of ideology. London: Verso.