References
- Adams, G. and Murray, S., 2014. Mission creep: the militarization of US foreign policy. Washington, DC: Georgetown University Press.
- Aitel, D., 2016. Useful fundamental metrics for cyber power, CyberSecPolitics. Available from: https://cybersecpolitics.blogspot.com/2016/06/useful-fundamental-metrics-for-cyber.html.
- Argote, L., et al., 2000. Introduction: knowledge transfer in organizations: learning from the experience of others. Organizational behavior and human decision processes, 82 (1), 1–8. doi:10.1006/obhd.2000.2883
- Argote, L. and Ingram, P., 2000. Knowledge transfer: A basis for competitive advantage in firms. Organizational behavior and human decision processes, 82 (1), 150–169. doi:10.1006/obhd.2000.2893
- Barney, J., 1991. Firm resources and sustained competitive advantage. Journal of management, 17:1, 99–120. doi:10.1177/014920639101700108
- Bejtich, R., 2015.What are the prospects for the cyber threat intelligence integration center, Brookings Institution. Available from: https://www.brookings.edu/blog/techtank/2015/02/19/what-are-the-prospects-for-the-cyber-threat-intelligence-integration-center/.
- Bendrath, R., 2001. The cyberwar debate: perception and politics in us critical infrastructure protection. Information & security, 7, 80–103.
- Bing, C., 2016. US cyber command director: we want “loud,” offensive tools, FedScoop (August 30, 2016). Available from: http://fedscoop.com/us-cyber-command-offensive-cybersecurity-nsa-august-2016.
- Brey, R., 2013. National cyber security strategy of Spain, Available from: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/NCSS_ESen.pdf
- Brito, J. and Watkins, T., 2011. The cybersecurity-industrial complex. Reason, 43, 4.
- Buchanan, B., 2017a. The cyber security dilemma: hacking, trust and fear between nations. Oxford: Oxford University Press.
- Buchanan, B., 2017b. The legend of sophistication in cyber operations, Harvard Kennedy School Belfer Center, Working paper series, 1–27.
- Butterfield, H., 1951. History and human relations. London: Collins.
- Caraccilo, D.J., 2001. Beyond Guns and Steel: A War Termination Strategy. Santa Barbara: Praeger Security International.
- Carr, M., 2016. Public–private partnerships in national cyber-security strategies. International affairs, 92 (1), 43–62. Available from https://www.chathamhouse.org/sites/default/files/publications/ia/INTA92_1_03_Carr.pdf. doi:10.1111/inta.2016.92.issue-1
- Chalmeta, R., Campos, C., and Grangel, R., 2001. Reference architectures for enterprise integration. The journal of systems software, 57, 175–191. doi:10.1016/S0164-1212(01)00008-5
- Cillufo, F. 2016. Emerging cyber threats to the United States, Testimony U.S. House of Representatives, Available from: http://docs.house.gov/meetings/HM/HM08/20160225/104505/HHRG-114-HM08-Wstate-CilluffoF-20160225.pdf
- Clarke, D.D. and Landau, S., 2010. The problem isn’t attribution; it’s multi-stage attacks, ACM ReArch.
- Clarke, R., 2009. War from Cyberspace. National interest, 104, 31–36.
- Collier, J., 2015. State Proxies & Plausible Deniability: challenging Conventional Wisdom, Cyber Security Intelligence, Available from: https://www.cybersecurityintelligence.com/blog/state-proxies-and-plausible-deniability-challenging-conventional-wisdom-644.html
- Davies, M., 2015. Knowledge – explicit, implicit and tacit: philosophical aspects. In: James D. Wright, ed. International encyclopaedia of social and behavioral sciences. New York: Elsevier.
- Ducaru, S., 2016. The cyber dimension of modern hybrid warfare and its relevance for NATO. Europolity, continuity and change in European governance, 10 (1). Available from http://europolity.eu/wp-content/uploads/2016/07/Vol.-10.-No.-1.-2016-editat.7-23.pdf
- Dunn Cavelty, M., 2008. Cyber-security and threat politics US efforts to secure in the information age. Abingdon: Routledge.
- Einhorn, J., 2015. The world bank’s mission creep. Foreign affairs, 80 (5), 22–35. doi:10.2307/20050248
- Ettlie, J. and Ernesto, M.R., 2001. Organizational integration and process innovation. Academy of management journal, 35 (4), 795–827.
- Even, S., 2015. The strategy for integrating the private sector in national cyber defense in Israel. Military and strategic affairs, 7 (2).
- FireEye, 2012. Advanced targeted attacks: how to protect against the next generation of cyber attacks, WhitePaper. Available from: http://www.softbox.co.uk/pub/fireeye-advanced-targeted-attacks.pdf.
- Gartzke, E. and Lindsay, J.R., 2015. Weaving tangled webs: offense, defense, and deception in cyberspace. Security studies, 24 (2), 316-348. doi:10.1080/09636412.2015.1038188
- Gates, R.M., 2008. Secretary of defense speech. Washington, DC: US Global Leadership Campaign.
- Griffiths, P., 2007. World faces “cyber cold war” threat, Reuters, Available from: http://www.reuters.com/article/us-britain-internet-idUSL2932083320071129
- Hayden, M. 2016. Playing the edge: American intelligence in the age of terror. New York: Penguin.
- Herz, J., 1951. Political realism and political idealism: a study in theories and realities. Chicago: University of Chicago Press.
- Hoffman, F., 2009. Hybrid warfare and challenges. Joint force quarterly, 52, 34–39.
- Jervis, R., 1976. Perception and misperception in international politics. Princeton, NJ: Princeton University Press.
- Jervis, R., 1978. Cooperation under the security dilemma,’. World politics, 30 (2), 167–214. doi:10.2307/2009958
- Kaplan, F., 2016. Dark territory: the secret history of cyber war. New York: Simon & Schuster.
- Knake, R.K., 2010. Internet governance in an age of cyber insecurity, Council on Foreign Relations, Special Report No. 56 Available from
- Lawrence, R.R. and Lorsch, J.W., 1967. Differentiation and integration in complex organizations. Administrative science quarterly, 12 (1), 1–47. doi:10.2307/2391211
- Libicki, M., 2007. Conquest in cyberspace: national security and information warfare. New York: Cambridge University Press.
- Lin, H., 2016a. Developing ‘loud’ cyber weapons, Lawfare. Available from: https://lawfareblog.com/developing-loud-cyber-weapons.
- Lin, H., 2016b. Still more on loud cyber weapons, Lawfare, Available from: https://www.lawfareblog.com/still-more-loud-cyber-weapons.
- Lindsay, J.R., 2013. Stuxnet and the limits of cyber warfare. Security studies, 22 (3), 365–404. doi:10.1080/09636412.2013.816122
- Mathew, S., et al., 2016. Understanding multistage attacks by attack-track based visualization of heterogeneous event streams, VizSEC ‘06, proceedings of the 3rd international workshop on visualization for computer security, 1–6.
- Maurer, T., 2015. Cyber proxies and the crisis in Ukraine. In: K. Geers, ed. Cyber war in perspective: Russian aggression against Ukraine. Tallinn: NATO CCD COE Publications.
- Maurer, T., 2016. “Proxies” and cyberspace. Journal of conflict and security law, 21 (3), 383–403. doi:10.1093/jcsl/krw015
- Maurer, T., 2017. Cyber mercenaries: the state, hackers, and power. Cambridge: Cambridge University Press. Available from
- Monahan, T., 2009. The murky world of ‘fusion centres’. Criminal justice matters, 75 (1), 20–21. doi:10.1080/09627250802699715
- Morgus, R., 2016. Whodunnit? Russia and coercion through cyberspace, War on the Rocks. Available from: http://warontherocks.com/2016/10/whodunnit-russia-and-coercion-through-cyberspace/.
- Owens, W.A.K.W.D. and Lin, H.S., 2008. Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities. Washington, DC: National Research Council.
- Pellerin, C., 2015. New threat center to integrate cyber intelligence, US Department of Defense. Available from: https://www.defense.gov/News/Article/Article/604093.
- Pierson, P., 2004. Politics in time: history, institutions, and social analysis. Princeton: Princeton University Press.
- Polanyi, M., 1958. Personal knowledge: towards a post-critical philosophy. Chicago: University of Chicago Press.
- Pomerleau, M., 2016. Services integrating cyber and traditional military forces (September 30, 2016). Available from: https://defensesystems.com/articles/2016/05/11/military-services-weaponizing-the-network.aspx
- Rid, T., 2013. Cyber war will not take place. London: C. Hurst & Co.
- Rid, T. and Buchanan, B., 2015. Attributing cyber attacks. Journal of strategic studies, 38 (1–2), 4–37. doi:10.1080/01402390.2014.977382
- Sanger, D., 2012. Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Random House.
- Seagraves, J.A. and Bishop, C.E., 1968. Impacts of vertical integration on output and industry structure. Journal of farm economics, 40, 1814–1827. doi:10.2307/1235085
- Shea, J., 2012. Lecture 6 - cyber attacks: hype or an increasing headache for open societies? Available from: http://www.nato.int/cps/en/natolive/opinions_84768.htm.
- Slayton, R., 2017. What is the cyber offense-defense balance? Conceptions, causes, and assessment. International security, 41 (3), 72–109. doi:10.1162/ISEC_a_00267
- Smeets, M., 2016. What it takes to develop a cyber weapon. Columbia University. SIPA: Tech & Policy Initiative. Working paper series 1, 49–67.
- Smeets, M., 2017. When routine isn’t enough: why military cyber commands need human creativity, War on the Rocks, Available from: https://warontherocks.com/2017/12/routine-isnt-enough-military-cyber-commands-need-human-creativity/
- Smeets, M., 2018. A matter of time: on the transitory nature of cyber weapons. Journal of strategic studies, 41 (1–2), 6–32. doi:10.1080/01402390.2017.1288107
- Tang, S., 2009. The security dilemma: a conceptual analysis. Security studies, 18 (3), 587–623. doi:10.1080/09636410903133050
- Thompson, J.D., 1967. Organizations in action: social science bases of administrative theory. New York: McGraw-Hill.
- Tritak, J., 2001. Protecting America’s Critical Infrastructures: How Secure Are Government Computer Systems?’ hearing before the committee on Energy and Commerce.
- Truman, G.E., 2000. Integration in electronic exchange environments. Journal of management information systems, 17 (1), 209–244. doi:10.1080/07421222.2000.11045630
- US Department of Defense, 2015. The DoD Cyber Strategy,’
- Valentino-Devries, J. and Yadron, D., 2015. Cataloging the world’s cyberforces, Wall street journal. Available from: http://graphics.wsj.com/world-catalogue-cyberwar-tools/
- Waltz, K., 1979. A theory of international politics. New York: McGraw-Hill.
- Woods, N., 2006. The globalizers: the IMF, the world bank and their borrowers. Ithaca, NY: Cornell University Press.
- Yould, R., 2003. Beyond the American fortress: understanding homeland security in the information age. In: Robert Latham, ed. Bombs and bandwidth: the emerging relationship between information technology and security. New York: The New Press.