References
- Allen, R.E., 2004. The Australian concise Oxford dictionary. Melbourne: Oxford University Press.
- Austin, G.D., 2016. Australia rearmed! Future needs for cyber-enabled warfare (ACCS Discussion Paper). Canberra, Australian Centre for Cyber Security, University of New South Wales. Available from: https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/sites/accs/files/uploads/DISCUSSION%20PAPER%20AUSTRALIA%20REARMED.pdf [Accessed 20 April 16].
- Barz, S., Fitzsimons, J.F., Kashefi, E., and Walther, P., 2013. Experimental verification of quantum computation. Nature physics, 9, 727–731.10.1038/nphys2763
- Bernier, M. and Treurniet, J., 2010. Understanding cyber operations in a Canadian strategic context: more than C4ISR, more than CNO. In: C. Czosseck and K. Podins, eds. Proceedings of the conference on cyber conflict 2010. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, CCDCOE Publications, 227–243.
- Boothby, W.H., 2012. The law of targeting. Oxford: Oxford University Press.
- Canadian Defence Force, 2009. Canadian forces joint publication CFJP 01. Canadian Military Doctrine. Available from: http://publications.gc.ca/collections/collection_2010/forces/D2-252-2009-eng.pdf [Accessed 24 March 15].
- Canadian Defence Force, 2010. Canadian forces land operations manual (B-GL-300-001/FP-001). Canadian Forces, Chief of Land Staff. Available from: https://publicintelligence.net/canadian-forces-land-operations-manual/ [Accessed 14 February 15].
- Carr, J., 2010. Inside cyber warfare: mapping the cyber underworld. Sebastopol, CA: O’Reilly Media.
- Caton, J., 2012. Beyond domains, beyond commons: context and theory of conflict in cyberspace. 4th International conference on cyber conflict (CYCON), 5–8 June 2012. Tallinn: Institute of Electrical and Electronics Engineers, 1–11.
- Clarke, R.A. and Knake, R.K., 2012. Cyber war: the next threat to national security and what to do about it. New York: HarperCollins.
- Colarik, A. and Janczewski, L., 2012. Establishing cyber warfare doctrine. Journal of strategic security, 5, 31–48.10.5038/1944-0472
- Collins, S. and McCombie, S., 2012. Stuxnet: the emergence of a new cyber weapon and its implications. Journal of policing, intelligence and counter terrorism, 7, 80–91.10.1080/18335330.2012.653198
- Commonwealth of Australia, 2012a. Australian defence doctrine publication–D (ADDP–D) – Foundations of Australian military doctrine. 3rd ed. Canberra, Department of defence. Available from: http://www.navedu.navy.mi.th/stg/databasestory/data/laukniyom/workjob/bigcountry-workjob/Australia/ADDP-D-FOUNDATIONS-OF-AUSTRALIAN-MILITARY-DOCTRINE.pdf [Accessed 24 May 15].
- Commonwealth of Australia, 2012b. Australian defence doctrine publication. ADDP 6.0 communication and information systems. Canberra, Department of Defence. Available from: http://www.defence.gov.au/adfwc/Documents/DoctrineLibrary/ADDP/ADDP_6-0_CIS.pdf [Accessed 24 May 15].
- Commonwealth of Australia, 2013a. Australian defence doctrine publication. ADDP 3.13 information activities (Released under FOI 330/13/14). 3rd ed. Canberra, Department of defence. Available from: http://www.defence.gov.au/FOI/Docs/Disclosures/330_1314_Document.pdf [Accessed 15 January 16].
- Commonwealth of Australia, 2013b. Defence white paper. Canberra: Department of Defence.
- Commonwealth of Australia, 2013c. The fundamentals of land power. Canberra, Department of Defence, Australian Army. Available from: http://www.army.gov.au/Our-future/Publications/Key-Publications/Land-Warfare-Doctrine-1 [Accessed 24 May 15].
- Commonwealth of Australia, 2014. Future land warfare report 2014. Canberra, Department of Defence. Available from: http://www.army.gov.au/~/media/Army/Our%20future/Publications/Key/FLWR_Web_B5_Final.pdf [Accessed 24 May 15].
- Commonwealth of Australia, 2016. Defence white paper. Canberra. Available from: http://www.defence.gov.au/WhitePaper/Docs/2016-Defence-White-Paper.pdf [Accessed 12 April 16].
- Cooperative Cyber Defence Centre of Excellence, 2010. Global commons strategic issues. ACT workshop report – NATO in the cyber commons. Tallinn, North Atlantic Treaty Organisation. Available from: http://www.act.nato.int/globalcommons [Accessed 24 May 15].
- Crown, 2011. The United Kingdom cyber security strategy: protecting and promoting the UK in a digital world. London: United Kingdom Cabinet Office.
- Deibert, R., 2012. Distributed security as cyber strategy: outlining a comprehensive approach for Canada in cyberspace. Journal of military and strategic studies, 14, 3.
- Department of Defence, 2009. Network centric warfare roadmap 2009. Canberra, Department of Defence, Commonwealth Government. Available from: http://www.maltutty.com/content/Reference%20Material/NCW%20Roadmap%202009.pdf [Accessed 12 March 15].
- Department of Defence, 2014. Defence issues paper 2014. Canberra, Commonwealth Government. Available from: http://www.defence.gov.au/whitepaper/docs/defenceissuespaper2014.pdf [Accessed 24 May 15].
- Department of Defense, 2012. Joint publication 3–13. Information operations. Washington, DC, Department of Defense. Available from: http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf [Accessed 14 March 15].
- Doughty, R.A., 2014. The seeds of disaster: the development of French army doctrine, 1919–39. London: Stackpole Books.
- Efatmaneshnik, M. and Ryan, M., 2014. Failure propagation in SoS: why SoS should be loosely coupled. 9th International conference on system of systems engineering 2014 (SOSE). Adelaide, South Australia: Institute of Electrical and Electronics Engineers, 49–54.
- Gilmore, J.M., 2016. Director, operational test and evaluation FY 2015 annual report – cybersecurity. The Office of the Director, Operational Test and Evaluation, United States Department of Defense. Available from: http://www.dote.osd.mil/pub/reports/FY2015/pdf/other/2015cybersecurity.pdf [Accessed 2 March 16].
- Glemser, J.L., 2014. The cyber domain: a leviathan or giant waiting to be slain with the stone of doctrine (School of Advanced Military Studies, ADA612117). Fort Leavenworth, KS: Army Command and Staff College.
- Glenny, M. and Kavanagh, C., 2012. 800 titles but no policy – thoughts on cyber warfare. American foreign policy interests, 34, 287–294.10.1080/10803920.2012.742410
- Goldman, N., Bertone, P., Chen, S., Dessimoz, C., LeProust, E.M., Sipos, B., and Birney, E., 2013. Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature, 494, 77–80.10.1038/nature11875
- Government of Canada, 2010. Canada’s cyber security strategy. Available from: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/cbr-scrt-strtgy-eng.pdf [Accessed 24 June 15].
- Healey, J., 2013. A fierce domain: conflict in cyberspace, 1986 to 2012. Arlington, VA: Cyber Conflict Studies Association.
- Hurwitz, R., 2012. Depleted trust in the cyber commons. Strategic studies quarterly, 6, 20–45.
- Ii, H.J.M. and Ketcham, C.C., 1983. Sabotage: a strategic tool for Guerrilla forces. World affairs, 146, 249–256.
- Klimburg, A., 2012. National cyber security framework manual. Tallinn, NATO CCD COE Publication. Available from: https://ccdcoe.org/publications/books/NationalCyberSecurityFrameworkManual.pdf [Accessed 17 February 15].
- Kramer, F.D., 2012. Achieving international cyber stability. Washington, DC, Atlantic Council. Available from: http://www.atlanticcouncil.org/publications/reports/achieving-international-cyber-stability [Accessed 3 March 15].
- Kuehl, D.T., 2009. From cyberspace to cyberpower: defining the problem. In F.D. Kramer, S.H. Starr and L.K. Wentz (eds.) Cyberpower and national security. Washington, DC: National Defense University Press, Potomac Books, 24–42.
- Lessig, L., 2002. The future of ideas: the fate of the commons in a connected world. New York: Random House.
- Lewis, J.A. and Neuneck, G., 2013. The cyber index (International security trends and realities. UNIDIR/2013/3). Geneva: United Nations Institute for Disarmament Research.
- Lewis, J.A. and Timlin, K., 2011. Cybersecurity and cyberwarfare: preliminary assessment of national doctrine and organization. Washington, DC, Center for Strategic and International Studies, UNDIR. Available from: http://unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfare-preliminary-assessment-of-national-doctrine-and-organization-380.pdf [Accessed: 21 February 15].
- Libicki, M.C., 2012. Cyberspace is not a warfighting domain. I/S: A journal of law and policy for the information society, 8 (2), 325–340. Available from: http://www.rand.org/pubs/external_publications/EP51077.html [Accessed 4 March 14].
- Libicki, M.C., 2014. Why cyber war will not and should not have its grand strategist. Strategic studies quarterly, 7, 23–39.
- Maclntosh, J., Reid, J., and Tyler, L., 2011. Cyber doctrine: towards a coherent evolutionary framework for learning resilience. London, Institute for Security and Resilience Studies, University College London. Available from: https://www.ucl.ac.uk/isrs/publications/CyberDoctrine [Accessed 12 February 15].
- Melzer, N., 2009. Keeping the balance between military necessity and humanity: a response to four critiques of the ICRC’s interpretive guidance on the notion of direct participation in hostilities. New York university journal of international law & politics, 42 (3), 831–916.
- Ministry of Defence, 2013. Cyber primer. Swindon, Whiltshire, Ministry of Defence. Available from: https://www.gov.uk/government/publications/cyber-primer [Accessed: 24 May 15].
- New Zealand Government, 2010. Defence white paper 2010. Available from: http://www.nzdf.mil.nz/corporate-documents/defence-white-paper/ [Accessed 02 February 16].
- New Zealand Government, 2014. Defence capability plan. New Zealand Defence Force. Available from: http://www.nzdf.mil.nz/downloads/pdf/public-docs/2014/2014-defence-capability-plan.pdf [Accessed 02 February 16].
- New Zealand Ministry of Defence, 2014. Defence assessment. New Zealand Ministry of Defence. Available from: http://www.defence.govt.nz/reports-publications/defence-assessment-2014/contents.html [Accessed 02 February 16].
- Ormrod, D., 2014. A wicked problem. Predicting SoS behaviour in tactical land combat with compromised C4ISR. 9th International conference on system of systems engineering (SOSE) 2014. Adelaide: Institute of Electrical and Electronics Engineers, 107–112.
- Rabkin, J.A. and Rabkin, A., 2012. To confront cyber threats, we must rethink the law of armed conflict (Koret-Taube task force on national security and law). Stanford, CA: Hoover Institution, Stanford University.
- Regalado, D., Villeneuve, N., and Railton, J.S., 2014. Behind the Syrian conflict’s digital frontlines. Fireeye threat intelligence, Fireeye Inc. Available from: https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-behind-the-syria-conflict.pdf [Accessed 24 May 15].
- Rid, T., 2012. Cyber war will not take place. Journal of strategic studies, 35, 5–32.
- Robinson, M., Jones, K., and Janicke, H., 2015. Cyber warfare: issues and challenges. Computers & security, 49, 70–94.
- Rodziewicz, J. and David, J., 2011. Cyber threats: cyber crime, cyber terror, and cyber warfare – transnational risk in the internet’s global commons. Available from: https://works.bepress.com/david_rodziewicz/4/ [Accessed 12 March 15].
- Rosenfield, D.K., 2009. Rethinking cyber war. Critical review, 21, 77–90.10.1080/08913810902812156
- Sanger, D.E., 2012. Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Crown.
- Schmitt, M.N., 2012a. Classification of cyber conflict. Journal of conflict and security law, 17, 245–260.10.1093/jcsl/krs018
- Schmitt, M.N., 2012b. The ‘use of force’ in cyberspace: a reply to Dr Ziolkowski. In: C. Czosseck, R. Ottis and K. Ziolkowski, eds. 4th International conference on cyber conflict. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, CCDCOE Publications, 311–317.
- Schmitt, M.N., 2013. Tallinn manual on the international law applicable to cyber warfare. Tallin: NATO Cooperative Cyber Defence Centre of Excellence, CCDCOE. Cambridge University Press.10.1017/CBO9781139169288
- Severs, H., 2013. The cyber-industrial-complex: what does the militarisation of the ‘fifth domain’ entail and what are the consequences? Available from: http://www.henrysevers.com [Accessed 11 May 15].
- Shackelford, S., 2010. Estonia two-and-a-half years later: a progress report on combating cyber attacks. Journal of Internet law, 4, 22–29.
- Shakarian, P., 2011. The 2008 Russian cyber campaign against Georgia. Military review, 91, 63–68.
- Shannon, C.E. and Weaver, W., 1948. A mathematical theory of communication. Bell system technical journal, 27 (4), 623–656.10.1002/bltj.1948.27.issue-4
- Sharma, D., 2010. Integrated network electronic warfare: China’s new concept of information warfare. Journal of defence studies, 4, 36–49.
- Stallard, C., 2011. At the crossroads of cyber warfare: signposts for the Royal Australian Air Force. Alabama, AL: School of Advanced Air and Space Studies.
- Stone, J., 2013. Cyber war will take place! Journal of Strategic Studies, 36, 101–108.10.1080/01402390.2012.730485
- Szentgali, G., 2013. The NATO policy on cyber defence: the road so far. Budapest: AARMS, Academic & Applied Research in Military Science, 12.
- Tipton, H.F. and Nozaki, M.K., 2012. Information security management handbook. 6th ed. Vol. 6. Boca Raton, FL: CRC Press, Taylor & Francis, Auerbach Publications.10.1201/b11802
- United Kingdom Ministry of Defence, 2014. Joint doctrine publication 0-01 UK defence doctrine. London, Ministry of Defence. Available from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/389755/20141208-JDP_0_01_Ed_5_UK_Defence_Doctrine.pdf [Accessed 24 May 15].
- United States Air Force, 2010. Cyberspace operations. Air Force Doctrine Document 3-12, Incorporating Change 1, 30 November 2011. Available from: http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-060.pdf [Accessed 6 March 15].
- United States Army Combined Arms Center, 2008. Center for army lessons learned thesaurus index. Fort Leavenworth, Kansas, Department of Defense. Available from: http://www.webcitation.org/6MicvdCtb [Accessed 02 February 15].
- United States Department of Defense, 2001. Joint publication 1-02. Department of Defense Dictionary of Military and Associated Terms, Department of Defense, Joint Chiefs of Staff. Available from: http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf [Accessed 19 February 15].
- United States Department of Defense, 2011. Department of defense strategy for operating in cyberspace. Washington, DC: Department of Defense.
- United States Department of Defense, 2013a. Joint publication 3-12 (R) – cyberspace operations. Washington, DC, Department of Defense. Available from: http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf [Accessed 31 March 15].
- United States Department of Defense, 2013b. Task force report: resilient military systems and the advanced cyber threat. Washington, DC, Defense Science Board, Office of the Under Secretary of Defense for Acquisition, Technology and Logistics. Available from: http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf [Accessed 12 February 15].
- United States Department of Homeland Security, 2011. Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise. Washington, DC: United States Department of Homeland Security.
- Weedon, C., 1996. Feminist practice and poststructuralist theory. 2nd ed. Cambridge, MA: Blackwell.