References
- Abrial, S., 2011. NATO builds its cyberdefenses [online]. The New York Times. Available from: http://www.nytimes.com/2011/02/28/opinion/28iht-edabrial28.html?_r=0 [Accessed 28 March 2013].
- Anonymous, 2012. Jim Lewis of CSIS speaks at Stimson on cyber deterrence [online]. The Stimson Center, Available from: www.stimson.org/about/news/jim-lewis-of-csis-speaks-at-stimson-on-cyber-deterrence/ [Accessed 27 March 2013].
- Anonymous, 2013. China rejects latest US hacking accusations [online]. Xinhua. Available from: http://usa.chinadaily.com.cn/china/2013-12/11/content_17166869.htm [Accessed 23 February 2015].
- Ashton, C., 2013. Remarks by EU high representative Catherine Ashton at press conference on the launch of the EU’s cyber security strategy [online]. European Union. Available from: http://europa.eu/rapid/press-release_SPEECH-13-108_en.htm [Accessed 9 October 2015].
- Bendiek, A., 2014. Tests of partnership: transatlantic cooperation in cyber security, internet governance, and data protection. German Marshall Fund. Available from: http://www.gmfus.org/publications/tests-partnership-transatlantic-cooperation-cyber-security-internet-governance-and-data#sthash.Nd17z4FZ.dpuf [Accessed 23 February 2015].
- Cortell, A.P. and Peterson, S., eds., 2002. Altered States: international relations, domestic politics, and institutional change. Lanham: Lexington Books.
- Crandall, M., 2014. Soft security threats and small states: the case of Estonia. Defence studies, 14 (1), 30–55.10.1080/14702436.2014.890334
- Croft, A. and Apps, P., 2014. NATO websites hit in cyber attack linked to Crimea tension [online]. Reuters. Available from: http://www.reuters.com/article/2014/03/16/us-ukraine-nato-idUSBREA2E0T320140316 [Accessed 23 February 2015].
- Curiel, J., 2005. Iraq’s tech-savvy insurgents are finding supporters and luring suicide-bomber recruits over the internet [online]. The San Francisco Chronicle, 7 October. Available from: http://www.sfgate.com/news/article/TERROR-COM-Iraq-s-tech-savvy-insurgents-are-2623261.php [Accessed 27 March 2013].
- Dijkstra, H., 2015. Functionalism, multiple principals and the reform of the NATO secretariat after the Cold War. Cooperation and conflict, 50 (1), 128–145.10.1177/0010836714532919
- European Commission, 2013. Cybersecurity strategy of the European Union: an open, safe and secure cyberspace [online]. Available from: http://www.eeas.europa.eu/policies/eu-cyber-security/cybseccommen.pdf [Accessed 23 February 2015].
- European Commission, 2014. European cybercrime centre–one year on [online]. Available from: http://europa.eu/rapid/press-release_IP-14-129_en.htm [Accessed 23 February 2015].
- Farnsworth, T., 2011. China and Russia submit cyber proposal [online]. Arms Control Association. Available from: http://www.armscontrol.org/act/2011_11/China_and_Russia_Submit_Cyber_Proposal [Accessed 23 February 2015].
- Finn, P., 2007. Cyber assaults on Estonia typify a new battle tactic [online]. Washington Post. Available from: http://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122.html [Accessed 28 March 2013].
- Fleck, D., 2013. Searching for international rules applicable to cyber warfare – a critical first assessment of the new Tallinn Manual. Journal of conflict & security law, 18 (2), 331–351.
- Gebauer, M., 2012. Warfare with malware: NATO faced with rising flood of cyberattacks [online]. Spiegel International. Available from: http://www.spiegel.de/international/world/nato-concerned-about-increasing-numbers-of-cyberattacks-a-829908.html [Accessed 23 February 2015].
- Gellman, B. and Nakashima, E., 2013. U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show [online]. The Washington Post. Available from: http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html [Accessed 23 February 2015].
- Gelpi, C., 1999. Alliances as instruments of intra-allied control. In: H. Haftendorn, R. Keohane, and C. Wallender, eds. Imperfect unions: security institutions over time and space. Oxford: Oxford University Press, 107–139.
- Giles, K., 2011. Information troops – a Russian cyber command? In: C. Czosseck, E. Tyugu, and T. Wingfield, eds. 3rd international conference on cyber conflict. Tallinn: CCD COE Publications, 45–60.
- Grant, I., 2008. NATO sets up Cyber Defence Management Authority in Brussels [online]. Computer Weekly. Available from: http://www.computerweekly.com/news/2240085580/Nato-sets-up-Cyber-Defence-Management-Authority-in-Brussels [Accessed 28 March 2013].
- Healey, J. and van Bochoven, L., 2012. NATO’s cyber capabilities: yesterday, today, and tomorrow [online]. The Atlantic Council. Available from: http://www.atlanticcouncil.org/images/files/publication_pdfs/403/022712_ACUS_NATOSmarter_IBM.pdf [Accessed 28 March 2013].
- Hollis, D., 2011. Cyberwar case study: Georgia, 2008. Small wars journal [online]. Available from: www.smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf [Accessed 28 March 2013].
- Hughes, R.B., 2009. NATO and cyber defence, mission accomplished [online]? Atlantische Commissie. Available from: http://www.atlcom.nl/ap_archive/pdf/AP%202009%20nr.%201/Hughes.pdf [Accessed 28 March 2013].
- Kiss, J., 2014. Sony hack: sacked employees could be to blame, researchers claim [online]. The Guardian. Available from: http://www.theguardian.com/film/2014/dec/30/sony-hack-researchers-claim-sacked-employees-could-be-to-blame [Accessed 30 December 2014].
- Klimburg, A., 2011. Mobilising cyber power. Survival, 53 (1), 41–60.10.1080/00396338.2011.555595
- Korns, S.W. and Kastenberg, J.E., 2008. Georgia’s cyber left hook. Parameters, 38 (4), 60–76.
- Laasme, H., 2011. Estonia: cyber window into the future of NATO. Joint force quarterly, 63 (4), 58–63.
- Lan, T. and Xin Z., 2010. Can cyber deterrence work? In: A. Nagorski, ed. Global cyber deterrence: views from China, the U.S., Russia, India, and Norway. New York: EastWest Institute, 1–3.
- Lawson, S., 2015. With drone strike on ISIS hacker U.S. escalates its response to cyber attacks [online]. Forbes. Available from: http://www.forbes.com/sites#/sites/seanlawson/2015/09/12/with-drone-strike-on-isis-hacker-u-s-escalates-its-response-to-cyber-attacks/ [Accessed 24 September 2015].
- Lewis, J.A. and Timlin, K., 2011. Cybersecurity and cyberwarfare: preliminary assessment of national doctrine and organization [online]. Centre for Strategic and International Studies. Available from: http://www.unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfare-preliminary-assessment-of-national-doctrine-and-organization-380.pdf [Accessed 27 March 2012].
- Lin, H., 2012. Escalation dynamics and conflict termination in cyberspace. Strategic studies quarterly, 6 (3), 46–70.
- Loewen, H. and Nabers, D., 2005. Transregional security cooperation after September 11, 2001. Asia Europe journal, 3 (3), 333–346.10.1007/s10308-005-0007-5
- Menon, A. and Welsh, J., 2011. Understanding NATO’s sustainability: the limits of institutionalist theory. Global governance, 17 (1), 81–94.
- Messmer, E., 1999. Kosovo cyber war intensifies: Chinese hackers targeting U.S. sites, government says [online]. CNN. Available from: http://edition.cnn.com/TECH/computing/9905/12/cyberwar.idg/ [Accessed 28 March 2013].
- Miles, T., 2011. Army activates first-of-its-kind cyber brigade [online]. United States Army. Available from: http://www.army.mil/article/70611/Army_activates_first_of_its_kind_Cyber_Brigade/ [Accessed 27 March 2013].
- Mohan, R.C., 2013. US–China cyber talks: internet security in the global economy [online]. Eurasia Review. Available from: http://www.eurasiareview.com/25032013-us-china-cyber-talks-internet-security-in-the-global-economy-analysis/ [Accessed 27 March 2012].
- Morrow, J.D., 1991. Alliances and asymmetry: an alternative to the capability aggregation model of alliances. American journal of political science, 35 (4), 904–933.10.2307/2111499
- Nakashima, E., 2012. Obama signs secret directive to help thwart cyberattacks [online]. Washington Post. Available from http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story.html [Accessed 6 October 2015].
- National Security Council, 2014. Transnational organized crime: a growing threat to national and international security [online]. Available from: http://www.whitehouse.gov/administration/eop/nsc/transnational-crime/threat [Accessed 23 February 2015].
- NATO, 1950. Decision on M.C. 14 [online]. North Atlantic Military Committee. Available from: http://www.nato.int/docu/stratdoc/eng/a500328c.pdf [Accessed 8 October 2015].
- NATO, 1991. The alliance’s new strategic concept [online]. NATO Public Diplomacy Division. Available from: http://www.nato.int/cps/en/natolive/official_texts_23847.htm [Accessed 22 February 2015].
- NATO, 2002. NATO’s military concept for defence against terrorism [online]. NATO Public Diplomacy Division. Available from: http://www.nato.int/cps/en/natohq/topics_69482.htm [Accessed 27 March 2013].
- NATO, 2003. The Prague summit and NATO’s transformation [online]. NATO Public Diplomacy Division. Available from: http://www.nato.int/docu/rdr-gde-prg/rdr-gde-prg-eng.pdf[Accessed 29 March 2013].
- NATO, 2006. Riga summit declaration [online]. Available from: http://www.nato.int/docu/pr/2006/p06-150e.htm [Accessed 28 March 2013].
- NATO, 2009. NATO and cyber defence [online]. Available from: http://www.nato-pa.int/default.asp?SHORTCUT=1782 [Accessed 28 March 2013].
- NATO, 2010a. Strategic concept 2010 [online]. Available from: http://www.nato.int/cps/en/natohq/topics_82705.htm [Accessed 28 March 2013].
- NATO, 2010b. Operation active endeavour [online]. NATO Public Diplomacy Division. Available from: http://www.nato.int/cps/en/natolive/topics_7932.htm [Accessed 27 March 2013].
- NATO, 2010c. Cyber attacks: hype or an increasing headache for open societies? Available from: http://www.nato.int/nato_static/assets/audio/audio_2010_02/20100202_100202-jamie-lecture6.mp3 [Accessed 8 October 2010].
- NATO, 2011. Defending the networks: the NATO policy on cyber defence [online]. Available from: http://www.nato.int/nato_static/assets/pdf/pdf_2011_08/20110819_110819-policy-cyberdefence.pdf [Accessed 29 March 2013].
- NATO, 2013. Request for information RFI-ACT-SACT-13-01. Available from: https://www.fbo.gov/?s=opportunity&mode=form&id=b8d5ef834c79ce94b9858084b3fb8162&tab=core&_cview=0 [Accessed 27 March 2013].
- NATO, 2014. NATO launches industry cyber partnership [online]. Available from: http://www.nato.int/cps/en/natohq/news_113121.htm [Accessed 23 February 2015].
- Nicholson, A., et al., 2012. A taxonomy of technical attribution techniques for cyber attacks. Available from: http://search.proquest.com/docview/1035293424?accountid=14782 [Accessed 23 February 2015].
- Norton, 2013. Norton Report [online]. Symantec. Available from: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013 [Accessed 23 February 2015].
- Nye, J.S., 2011. Nuclear lessons for cyber security? Strategic studies quarterly, 5 (4), 18–38.
- O’Connell, M.E., 2012. Cyber security without cyber war. Journal of conflict & security law, 17 (2), 187–209.
- Paresh, D., 2013. Cybercrime costs U.S. economy up to $140 billion annually, report says [online]. The Los Angeles Times. Available from: http://articles.latimes.com/2013/jul/22/business/la-fi-tn-cybercrime-140-billion-dollars-economy-20130722 [Accessed 23 February 2015].
- Podgor, E.S., 2002. Computer crimes and the USA Patriot Act [online]. Criminal Justice Magazine. Available from: http://www.americanbar.org/publications/criminal_justice_magazine_home/crimjust_cjmag_17_2_crimes.html [Accessed 29 March 2013].
- Rasmussen, A.F., 2011a. Cyber defence: next steps [online]. Available from: http://www.nato.int/cps/en/natolive/news_75358.htm?selectedLocale=en [Accessed 23 February 2015].
- Rasmussen, A.F., 2011b. NATO after Libya. Foreign Affairs [online], 90 (4), 2–6.
- Rasmussen, A.F., 2013. NATO vs. cyber attackers [online]. Spiegel. Available from: http://www.spiegel.de/international/europe/nato-vs-cyber-attackers-internal-memo-reveals-robust-efforts-to-counter-threats-a-764714.html [Accessed 23 February 2015]
- Rasmussen, A.F., 2014. Press conference following the meeting of the North Atlantic Council at the level of Heads of State and Government during the NATO Wales Summit, September 5 [online]. Available from: http://www.nato.int/cps/en/natohq/opinions_112871.htm [Accessed 5 September 2014].
- Rid, T., 2012a. Cyber war will not take place. Journal of strategic studies, 35 (1), 5–32.10.1080/01402390.2011.608939
- Rid, T., 2012b. Think again: cyberwar [online]. Foreign policy. Available from: http://www.foreignpolicy.com/articles/2012/02/27/cyberwar [Accessed 29 March 2013].
- Ringsmose, J. and Rynning, S., eds., 2011. NATO’s new strategic concept. A comprehensive assessment [online]. Danish Institute for International Studies. Available from: http://subweb.diis.dk/graphics/Publications/Reports2011/RP2011-02-NATO_web.pdf [Accessed 29 March 2013].
- Risse-Kappen, T., 1996. Collective identity in a democratic community: the case of NATO. In: P.J. Katzenstein, ed. Culture of national security. New York: Colombia University Press, 357–399.
- Rollins, J. and Wilson, C., 2007. Terrorist capabilities for cyberattack: overview and policy issues [online]. Congressional Research Service. Available from: http://www.fas.org/sgp/crs/terror/RL33123.pdf [Accessed 27 March 2013].
- Sanger, D.E., Barboza, D., and Perlroth, N., 2013. Chinese army unit is seen as tied to hacking against U.S. [online]. The New York Times. Available from: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?nl=todaysheadlines&emc=edit_th_20130219&_r=0 [Accessed 27 March 2013].
- Sanger, D.E., Schmidt, M.S., and Perlroth, N., 2014. Obama vows a response to cyberattack on Sony [online]. The New York Times. Available from: http://www.nytimes.com/2014/12/20/world/fbi-accuses-north-korean-government-in-cyberattack-on-sony-pictures.html?_r=0 [Accessed 9 October 2015].
- Satter, R., 2012. U.S. general: we hacked the enemy in Afghanistan [online]. Associated Press. Available from: http://usatoday30.usatoday.com/news/military/story/2012-08-24/afghan-cyberattack/57295168/1 [Accessed 27 March 2013].
- Schimmelfennig, F., 1999. NATO enlargement: a constructivist explanation. In: G. Chafetz, M. Spirtas, and B. Frankel, eds. The origins of national interests. London: Frank Cass Publishers, 198–234.
- Schmidt, M.S. and Sanger, D.E., 2014. 5 in China army face U.S. charges of cyberattacks [online]. The New York Times. Available from: http://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-with-cyberspying.html?_r=0 [Accessed 8 October 2015].
- Schmitt, E. and Shanker, T., 2011. U.S. debated cyberwarfare in attack plan on Libya [online]. The New York Times. Available from http://www.nytimes.com/2011/10/18/world/africa/cyber-warfare-against-libya-was-debated-by-us.html [Accessed 9 October 2015].
- Shachtman, N. and Singer, P., 2011. The wrong war: the insistence on applying Cold War metaphors to cybersecurity is misplaced and counterproductive [online]. Brookings. Available from: http://www.brookings.edu/research/articles/2011/08/15-cybersecurity-singer-shachtman [Accessed 6 October 2015].
- Spillius, A., 2011. US could respond to cyber-attack with conventional weapons [online]. Daily Telegraph. Available from: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8550642/US-could-respond-to-cyber-attack-with-conventional-weapons.html [Accessed 27 March 2013].
- Strohm, C. and Shields, T., 2013. Obama boosts pentagon cyber budget amid rising attacks [online]. Bloomberg Business. Available from: http://www.bloomberg.com/news/2013-04-10/lockheed-to-general-dynamics-target-shift-to-cyber-spend.html [Accessed 23 February 2015].
- Thies, W.J., 2009. Why NATO endures. Cambridge: Cambridge University Press.10.1017/CBO9780511627002
- Tikk, E., 2011. Ten rules for cyber security. Survival, 53 (3), 119–132.
- Traynor, I., 2007. Russia accused of unleashing cyberwar to disable Estonia [online]. The Guardian. Available from http://www.theguardian.com/world/2007/may/17/topstories3.russia [Accessed 28 March 2013].
- Tuschoff, C., 1999. Alliance cohesion and peaceful change in NATO. In: H. Haftendorn, R. Keohane, and C. Wallender, eds. Imperfect unions: security institutions over time and space. Oxford: Oxford University Press, 140–161.
- Van Ham, P., 2001. Security and culture, or, why NATO won’t last. Security dialogue, 32 (4), 393–406.10.1177/0967010601032004002
- Wallander, C.A., 2000. Institutional assets and adaptability: NATO after the Cold War. International organization, 54 (4), 705–735.10.1162/002081800551343
- Walt, S.M., 1997. Why alliances endure or collapse. Survival, 39 (1), 156–179.
- Waltz, K.N., 2000. NATO expansion: a realist’s view. Contemporary security policy, 21 (2), 23–38.10.1080/13523260008404253
- Washford, W., 2014. NATO to adopt new cyber defence policy [online]. Computer Weekly. Available from: http://www.computerweekly.com/news/2240228071/Nato-to-adopt-new-cyber-defence-policy [Accessed 22 February 2012].
- Weimann, G., 2004. Cyberterrorism: how real is the threat [online]? United States Institute for Peace. Available from: http://www.usip.org/sites/default/files/sr119.pdf [Accessed 29 March 2013].
- Wilder, C., 2013. Out of hand: Europe furious over US spying allegations [online]. Spiegel International. Available from: http://www.spiegel.de/international/world/angry-european-and-german-reactions-to-merkel-us-phone-spying-scandal-a-929725.html [Accessed 23 February 2015].
- Woodward, S.L., 1995. Balkan tragedy, chaos and disintegration after the Cold War. Washington, DC: Brookings Institution Press, 369.
- Yost, D.S., 2010. NATO’s evolving purposes and the next strategic concept. International affairs, 86 (2), 489–522.10.1111/inta.2010.86.issue-2