References
- Albers, Cheryl. 2003. “Using the Syllabus to Document the Scholarship of Teaching.” Teaching Sociology 31 (1):60–72. doi: https://doi.org/10.2307/3211425.
- Colgan, Jeff. 2016. “Gender Bias in IR Graduate Education? New evidence from syllabi.” Paper presented at American Political Science Association Annual Conference, Philadelphia. http://web.apsanet.org/cswp/wp-content/uploads/sites/4/2016/04/Gender-Bias-in-IR-Education.pdf (September 1–4, 2016).
- Colgan, Jeff D. 2016. “Where is International Relations Going? Evidence from Graduate Training.” International Studies Quarterly 60 (3):486–498. doi: https://doi.org/10.1093/isq/sqv017.
- Collier, Jamie. 2016. “Getting Started with Cyber Security.” https://www.jamiecollier.co.uk/single-post/2016/11/30/Getting-Started-with-Cyber-Security (November 30, 2016).
- Diament, Sean M., Adam J. Howat, and Matthew J. Lacombe. 2017. “What is the Canon in American Politics? Analyses of Core Graduate Syllabi.” Journal of Political Science Education 13 (3):256–278. doi: https://doi.org/10.1080/15512169.2017.1340165.
- Falcone, Robert, and Bryan Lee. 2017. “Shamoon 2: Delivering Disstrack.” Palo Alto Networks. https://researchcenter.paloaltonetworks.com/2017/03/unit42-shamoon-2-delivering-disttrack/ (March 27, 2017).
- Fan, Lisa L. 2013. “Canonic Texts in Public Policy Studies: A Quantitative Analysis.” Journal of Public Affairs Education 19 (4):681–704. doi: https://doi.org/10.1080/15236803.2013.12001759.
- Gorwa, Robert, and Max Smeets. 2019. “Cyber Conflict in Political Science: A Review of Methods and Literature.” Paper presented at 2019 ISA Annual Convention. https://osf.io/preprints/socarxiv/fc6sg/ (March 2019).
- Griffith, Melissa K. 2018. “Why Cyber Conflict as an Academic Discipline Struggles to Make Its Mark in Political Science.” Council on Foreign Relations. https://www.cfr.org/blog/why-cyber-conflict-academic-discipline-struggles-make-its-mark-political-science (September 6).
- Harris, Mark A., and Karen P. Patten. 2015. “Using Bloom’s and Webb’s Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum.” Journal of Information Systems Education 26 (3):219–233. http://jise.org/Volume26/n3/JISEv26n3p219.pdf
- Healey, Jason, and Karl Grindal. 2013. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Arlington, VA: Cyber Conflict Studies Association.
- Kousha, Kayvan, and Mike Thelwall. 2008. “Assessing the Impact of Disciplinary Research on Teaching: An Automatic Analysis of Online Syllabuses.” Journal of the American Society for Information Science and Technology 59 (13):2060–2069. doi: https://doi.org/10.1002/asi.20920.
- Kingston, Paul W., Ryan Hubbard, Brent Lapp, Paul Schroeder, and Julia Wilson. 2003. “Why Education Matters.” Sociology of Education 76 (1):53–70. doi: https://doi.org/10.2307/3090261.
- Lang, James M., and Kenneth R. Bain. 1997. “Recasting the Teaching Portfolio.” The Teaching Professor 1 :11.
- Matejka, Ken, and Lance B. Kurke. 1994. “Designing a Great Syllabus.” College Teaching 42 (3):115–117. doi: https://doi.org/10.1080/87567555.1994.9926838.
- Perlroth, Nicole. 2012. “In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back.” New York Times. October 23. http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html.
- Ryan, Sarah E. 2012. “Assessing Diversity in Public Affairs Curricula: A Multi-Methodological Model for Student-Led Programmatic Self-Study.” Journal of Public Affairs Education 18 (4):757–774.
- Sanger, David E., and Mark Mazzetti. 2016. “U.S. Had Cyberattack Plan if Iran Nuclear Dispute Led to Conflict.” New York Times. February 16. https://www.nytimes.com/2016/02/17/world/middleeast/us-had-cyberattack-planned-if-iran-nuclear-negotiations-failed.html
- Schwartz-Shea, Peregrine. 2003. “Is This the Curriculum We Want? Doctoral Requirements and Offerings in Methods and Methodology.” PS: Political Science & Politics 36 (3):379–386. doi: https://doi.org/10.1017/S1049096503002488.
- Slattery, Jeanne M., and Janet F. Carlson. 2005. “Preparing an Effective Syllabus: Current Best Practices.” College Teaching 53 (4):159–164. doi: https://doi.org/10.3200/CTCH.53.4.159-164.
- Smeets, Max, and Herbert Lin. 2018. “Offensive Cyber Capabilities: To What Ends?” Paper presented at 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, eds. T. Minárik, R. Jakschis and L. Lindström. Tallinn: NATO CCD COE Publications.
- Smeets, Max. 2018. “The Strategic Promise of Offensive Cyber Operations.” Strategic Studies Quarterly 12:90–113.
- Unknown. 2015. “APT Groups and Operations.” http://apt.threattracking.com
- Zetter, Kim. 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York, NY: Crown.