References
- Allhoff, Fritz, Adam Henschke, and Bradley J. Strawser, eds. 2016. Binary Bullets: The Ethics of Cyberwarfare. Oxford: Oxford University Press.
- Arquilla, John. 2016. “Foreword.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, vii–xii. Oxford: Oxford University Press.
- Banta, Benjamin R. 2011. “Virtuous War and the Emergence of jus Post Bellum.” Review of International Studies 37 (1): 277–299.
- Bellamy, Alex J. 2008. “The Responsibilities of Victory: Jus Post Bellum and the Just War.” Review of International Studies 34 (4): 601–625.
- Boebert, William Earl. 2011. “A Survey of Challenges in Attribution.” In Proceedings of a Workshop on Deterring Cyberattacks, edited by the Committee on Deterring Cyberattacks, 41–54. Washington, DC: National Academies Press.
- Borghard, Erica D., and Shawn W. Lonergan. 2017. “The Logic of Coercion in Cyberspace.” Security Studies 26 (3): 452–481.
- Brenner, Joel, and Jon R. Lindsay. 2015. “Correspondence: Debating the Chinese Cyber Threat.” International Security 40 (1): 191–195.
- Cabinet Office. 2016. National Cyber Security Strategy 2016–2021. Accessed April 3, 2020. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021.
- Canetti, Daphna, Michael L. Gross, and Israel Waismel-Manor. 2016. “Immune From Cyberfire? The Psychological and Physiological Effects of Cyberwarfare.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, 157–176. Oxford: Oxford University Press.
- Cisneros, Maribel. 2015. Cyber Warfare: Jus Post-Bellum. Monterey: Naval Postgraduate School. Accessed April 3, 2020. http://calhoun.nps.edu/bitstream/handle/10945/45169/15Mar_Cisneros_Maribel.pdf?sequence=1&isAllowed=y.
- Clapper, James R. 2015. Statement for the Record US Cybersecurity and Policy, Senate Armed Services Committee. Senate Armed Services Committee. Accessed April 3, 2020. https://fas.org/irp/congress/2015_hr/091015clapper.pdf.
- Clausewitz, Carl von. 1989. On War. Edited and Translated by Michael Howard and Peter Paret. Princeton: Princeton University Press.
- Daalder, Ivo H., and Michael E. O’Hanlon. 2000. Winning Ugly: NATO’s War to Save Kosovo. Washington, DC: Brookings Institution Press.
- Danks, David, and Joseph H. Danks. 2016. “Beyond Machines: Humans in Cyberoperations, Espionage, and Conflict.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, 177–199. Oxford: Oxford University Press.
- Davis, I. I., S. John, Benjamin Boudreaux, Jonathan W. Welburn, Jair Aguirre, Cordaye Ogletree, Geoffrey McGovern, and Michael S. Chase. 2017. Stateless Attribution: Toward International Accountability in Cyberspace. Santa Monica: RAND.
- Denning, Dorothy E. 2015. “Rethinking the Cyber Domain and Deterrence.” Joint Force Quarterly 77: 8–15.
- Der Derian, James. 2000. “Virtuous War/Virtual Theory.” International Affairs 76 (4): 771–788.
- Dipert, Randall R. 2010. “The Ethics of Cyberwarfare.” Journal of Military Ethics 9 (4): 384–410.
- Dunlap, Charles J. 2012. “The Intersection of Law and Ethics in Cyberwar: Some Reflections.” Air and Space Journal 24 (1): 1–17.
- Farmer, Ben. 2017. “Britain Prepared to Use Air Strikes or Send in Troops as Retaliation Against Future Cyber attack.” The Telegraph, June 28. Accessed April 3, 2020. http://www.telegraph.co.uk/news/2017/06/27/cyberattack-could-lead-military-retaliation-says-fallon/?WT.mc_id=tmg_share_tw .
- Fuchs, Michael H., and David Buckley. 2007. “Pursuing the Global Common Good.” In Pursuing the Global Common Good, edited by Sally Steenland, Peter Rundlet, Michael H. Fuchs, and David Buckley, 5–16. Washington, DC: Center for American Progress.
- Gartzke, Erik. 2013. “The Myth of Cyberwar.” International Security 38 (2): 41–73.
- Groves, Jason. 2017. “Boris’s Cyber War Threat to the Kremlin.” Mail Online, December 21. Accessed April 4, 2020. http://www.dailymail.co.uk/news/article-5204151/Borish-Johnson-Britain-ready-hit-back.html.
- Hehir, Bryan. 2007. “The Just War Ethic: Protecting the Global Common Good.” In Pursuing the Global Common Good, edited by Sally Steenland, Peter Rundlet, Michael H. Fuchs, and David Buckley, 17–30. Washington, DC: Center for American Progress.
- Henschke, Adam, and Patrick Lin. 2014. “Cyberwarfare Ethics, or How Facebook Could Accidently Make Its Engineers into Targets.” Bulletin of Atomic Scientists, August 25. Accessed April 3, 2020. https://thebulletin.org/2014/08/cyberwarfare-ethics-or-how-facebook-could-accidentally-make-its-engineers-into-targets/.
- Hirschfeld Davis, Julie. 2015. “Hacking of Government Computers Exposed 21.5 Million People.” The New York Times, July 29. Accessed April 3, 2020. http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html?_r=0.
- HM Treasury. 2015. “Chancellor’s Speech to GCHQ on Cyber Security.” Accessed March 30, 2020. https://www.gov.uk/government/speeches/chancellors-speech-to-gchq-on-cyber-security.
- Iasiello, L. V. 2004. “Jus Post Bellum: The Moral Responsibilities of Victors in War.” Naval College Review 57 (3/4): 33–52.
- Iasiello, Emilio. 2014. “Is Cyber Deterrence an Illusory Course of Action?” Journal of Strategic Security 7 (1): 54–67.
- Ignatieff, Michael. 2000. Virtual War. New York: Metropolitan Books.
- InformationWeek. 2013. “Offensive Cybersecurity: Theory and Reality.” Information Week, January 18. Accessed April 3, 2020. https://www.informationweek.com/government/cybersecurity/offensive-cybersecurity-theory-and-reality/d/d-id/1108269.
- International Committee of the Red Cross (ICRC). 1977 (1949). “Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol 1, June 8, 1977).” Accessed April 3, 2020. https://www.icrc.org/applic/ihl/ihl.nsf/9ac284404d38ed2bc1256311002afd89/50fb5579fb098faac12563cd0051dd7c.
- Jackson, Nicolas. 2011. “United Nations Declares Internet Access A Basic Human Right.” The Atlantic, June 3. Accessed March 30, 2020. https://www.theatlantic.com/technology/archive/2011/06/united-nations-declares-internet-access-a-basic-human-right/239911/.
- Jenkins, Ryan. 2016. “Cyberwarfare as Ideal War.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, 89–114. Oxford: Oxford University Press.
- Kaplan, Fred. 2016. Dark Territory: The Secret History of Cyber War. New York: Simon & Schuster.
- Kello, Lucas. 2013. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.” International Security 38 (2): 7–40.
- Leach, Adam. 2014. “Cyber Espionage: Understanding Energetic Bear.” Power-Technology.com. Accessed March 30, 2020. http://www.power-technology.com/features/featurecyber-espionage-understanding-energetic-bear-4414662/.
- Libicki, Martin C. 1999. “The Emerging Primacy of Information.” Orbis 40 (2): 261–274.
- Libicki, Martin C`. 2009. Cyberdeterrence and Cyberwar. Santa Monica: RAND.
- Lin, Patrick, Neil Rowe, and Fritz Allhoff. 2012. “Is it Possible to Wage a Just Cyberwar?” The Atlantic, June 5. Accessed April 5, 2020. https://www.theatlantic.com/technology/archive/2012/06/is-it-possible-to-wage-a-just-cyberwar/258106/.
- Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22 (3): 365–404.
- Lindsay, Jon R. 2015. “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence Against Cyber Attack.” Journal of Cyber Security 1 (1): 53–67.
- Lonsdale, David J. 2004. The Nature of War in the Information Age: Clausewitzian Future. London: Frank Cass.
- Lonsdale, David J. 2016. “Britain’s Emerging Cyber Strategy.” RUSI Journal 161 (4): 52–62.
- Lonsdale, David J. 2017. “Warfighting for Cyber Deterrence: A Strategic and Moral Imperative.” Philosophy and Technology 31 (1): 1–21.
- Lucas, George R. 2016. “Emerging Norms for Cyberwarfare.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, 13–33. Oxford: Oxford University Press.
- Lucas, George R. 2017. Ethics and Cyber Warfare: Law and Order for a Lawless Frontier. Oxford: Oxford University Press.
- Mahnken, Thomas G. 2011. “Cyber War and Cyber Warfare.” In America’s Cyber Future: Security and Prosperity in the Information Age, Volume II, edited by Kristin M. Lord, and Travis Sharp, 55–64. Washington, DC: Center for a New American Security.
- Michael, Walzer. 2015. Just and Unjust Wars: A Moral Argument with Historical Illustrations. 5th ed. New York: Basic Books.
- Nakashima, Ellen, and Ryan Missy. 2016. “US Military Has Launched a New Digital War Against the Islamic State.” Washington Post, July 15. Accessed April 5, 2020. https://www.washingtonpost.com/world/national-security/us-militarys-digital-war-against-the-islamic-state-is-off-to-a-slow-start/2016/07/15/76a3fe82-3da3-11e6-a66f-aa6c1883b6b1_story.html.
- Office of the Secretary of Defense. 2018. Nuclear Posture Review. Accessed March 30, 2020. https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF.
- Orend, Brian. 2007. “Jus Post Bellum: The Perspective of a Just-War Theorist.” Leiden Journal of International Law 20 (3): 571–591.
- Orend, Brian. 2016. “Postcyber: Dealing with the Aftermath of Cyberattacks.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, 115–137. Oxford: Oxford University Press.
- Pagliery, Jose. 2015. “The Inside Story of the Biggest Hack in History.” CNN Money, August 5. Accessed April 3, 2020. http://money.cnn.com/2015/08/05/technology/aramco-hack/.
- Payne, Keith B. 1996. Deterrence in the Second Nuclear Age. Lexington: University of Kentucky Press.
- Peter, Nicholson. 1990. The Political Philosophy of the British Idealists: Selected Studies. Cambridge: Cambridge University Press.
- Pontifical Council for Justice and Peace. 2004. Compendium of the Social Doctrine of the Church. Vatican City: Libreria Editrice Vaticana.
- Rid, Thomas. 2012. “Cyber War Will Not Take Place.” Journal of Strategic Studies 35 (1): 5–32.
- Rid, Thomas, and Ben Buchanan. 2014. “Attributing Cyber Attacks.” Journal of Strategic Studies 1 (2): 4–37.
- Rowe, N. C. 2007. “Ethics of Cyberwar Attack.” In Cyber War and Cyber Terrorism, edited by A. Colaril, and L. Janczewski, xx–xx. Hershey: The Idea Group.
- Schmitt, Michael N.2013. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press.
- Schmitt, Michael N., and Liis Vihul. 2016a. “The Emergence of International Legal Norms for Cyberconflict.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley J. Strawser, 34–55. Oxford: Oxford University Press.
- Schmitt, Michael N., and Liis Vihul, eds. 2016b. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.
- Sheldon, Robert, and Joe McReynolds. 2015. “Civil-Military Integration and Cybersecurity: A Study of Chinese Information Warfare Militias.” In China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron, 188–224. Oxford: Oxford University Press.
- Singer, Peter W. 2015. “How the US Can Win the Cyberwar of the Future: Cold War Deterrence Theory Won’t Cut it Anymore.” Foreign Policy, December 18. Accessed April 3, 2020. https://foreignpolicy.com/2015/12/18/how-the-united-states-can-win-the-cyberwar-of-the-future-deterrence-theory-security/.
- Singer, Peter W., and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press.
- Stoltenberg, Jens. 2016. NATO Press Conference, June 14. Accessed April 3, 2020. http://www.nato.int/cps/en/natohq/opinions_132349.htm?selectedLocale=en.
- Taddeo, Mariarosaria. 2014. “What Ethics Has to Do with the Regulation of Cyberwarfare.” Ethics and Armed Forces 2. Accessed April 4, 2020. http://www.ethikundmilitaer.de/en/full-issues/20142-cyberwar/taddeo-what-ethics-has-to-do-with-the-regulation-of-cyberwarfare/.
- Tsagourias, Nicholas. 2013. “Cyber Attacks, Self-Defence and the Problem of Attribution.” Journal of Conflict and Security Law 17 (2): 229–244.
- Tyler, Colin. 2006. “Contesting the Common Good: T. H. Green and Contemporary Republicanism.” In T. H. Green: Ethics, Metaphysics, and Political Philosophy, edited by Maria Dimova-Cookson, and William J. Mander, 262–291. Oxford: Clarendon.
- Tyler, Colin. 2012. Civil Society, Capitalism and the State. Exeter: Imprint Academic.
- United Nations Office for Disarmament Affairs. n.d. GGE Information Security: Developments in the Field of Information and Telecommunications in the Context of International Security. Accessed April 4, 2020. https://www.un.org/disarmament/ict-security/.
- Valeriano, Brandon, and Ryan C. Maness. 2015. Cyber War Versus Cyber Realities. Oxford: Oxford University Press.
- Vaticana, Libreria Editri. 1994. Catechism of the Catholic Church. Vatican City: Libreria Editrice Vaticana.
- White House. 2016. Fact Sheet: Cybersecurity National Action Plan. Accessed April 3, 2020. https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.
- Williams, Robert E., and Dan Caldwell. 2006. “Jus Post Bellum: Just War Theory and the Principles of Just Peace.” International Studies Perspectives 7 (4): 309–320.
- Work, Robert O. 2015. Opening Statement Before the Senate Armed Services Committee. Accessed March 30, 2020. https://www.armed-services.senate.gov/hearings/15-09-29-united-states-cybersecurity-policy-and-threats.
- Zetter, Kim. 2014. Countdown to Zero Day. New York: Broadway Books.
- Zetter, Kim. 2015. “The NSA Acknowledges What We All Feared: Iran Learns from US Cyberattacks.” Wired, February 10. Accessed April 3, 2020. https://www.wired.com/2015/02/nsa-acknowledges-feared-iran-learns-us-cyberattacks/.
- Zetter, Kim. 2016. “Everything We Know About Ukraine’s Power Plant Hack.” Wired, January 20. Accessed April 3, 2020. https://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/.