References
- Abbott, K. W., D. Levi-Faur, and D. Snidal. 2017. “Theorizing Regulatory Intermediaries: The RIT Model.” The ANNALS of the American Academy of Political and Social Science 670 (1): 14–35. doi:10.1177/0002716216688272.
- Abbott, K. W., P. Genschel, D. Snidal, and B. Zangl, edited by. 2020. The Governor’s Dilemma: Indirect Governance beyond Principals and Agents. Oxford: Oxford University Press.
- ANSSI. 2015. “ANSSI - Stratégie Nationale Pour la Sécurité du Numérique.” Accessed 30 July 2019, . https://www.ssi.gouv.fr/actualite/la-strategie-nationale-pour-la-securite-du-numerique-une-reponse-aux-nouveaux-enjeux-des-usages-numeriques/.
- ANSSI. 2017. “The French CIIP Framework.” Accessed 06 January 2017. https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in-france/.
- ANSSI. 2019a. “ANSSI - Cybersecurity in France.” Accessed 30 July 2019, . https://www.ssi.gouv.fr/en/cybersecurity-in-france/.
- ANSSI. 2019b. “ANSSI - La Sécurité des Activités d’Importance Vitale.” Accessed 30 July 2019, . http://www.sgdsn.gouv.fr/uploads/2016/10/plaquette-saiv.pdf.
- ANSSI. 2019c. “ANSSI - Logiciels préconisés par l’ANSSI.” Accessed 30 July 2019, . https://www.ssi.gouv.fr/particulier/logiciels-preconises-par-lanssi-2/.
- ANSSI. 2019d. “ANSSI - the National Cybersecurity Agency of France.” Accessed 30 July 2019, . https://www.ssi.gouv.fr/en/cybersecurity-in-france/the-national-cybersecurity-agency-of-france/.
- ANSSI. 2019e. “Executive Office.” https://www.ssi.gouv.fr/en/organisation/executive-office/.
- ANSSI. 2019f. “Protection Des OIV En France.” Accessed 30 July 2019, . https://www.ssi.gouv.fr/entreprise/protection-des-oiv/protection-des-oiv-en-france/.
- Beck, U. 2016. The Metamorphosis of the World. Cambridge: Polity.
- Betz, D. J., and T. Stevens. 2011. Cyberspace and the State: Toward a Strategy for Cyber-power. Abingdon: Routledge.
- Boeke, S. 2018. “National Cyber Crisis Management: Different European Approaches.” Governance 31 (3): 449–464. doi:10.1111/gove.12309.
- Brassett, J., and N. Vaughan-Williams. 2015. “Security and the Performative Politics of Resilience: Critical Infrastructure Protection and Humanitarian Emergency Preparedness.” Security Dialogue 46 (1): 32–50. doi:10.1177/0967010614555943.
- Breznitz, D. 2006. “Innovation-Based Industrial Policy in Emerging Economies? the Case of Israel’s IT Industry.” Business and Politics 8 (3): 3. doi:10.2202/1469-3569.1155.
- Carr, M. 2016. “Public-private Partnerships in National Cyber-security Strategies.” International Affairs 92 (1): 43–62. doi:10.1111/1468-2346.12504.
- Dunn Cavelty, M. 2013. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review 15 (1): 105–122. doi:10.1111/misr.12023.
- CISA. 2020. “Critical Infrastructure Sectors.” Cybersecurity & Infrastructure Security Agency. Accessed 03 March 2021. https://www.cisa.gov/critical-infrastructure-sectors.
- Clifton, J., D. Díaz-Fuentes, and J. Revuelta. 2010. “The Political Economy of Telecoms and Electricity Internationalization in the Single Market.” Journal of European Public Policy 17 (7): 988–1006. doi:10.1080/13501763.2010.499229.
- Clifton, J., F. Comín, and D. Diaz-Fuentes. 2003. Privatisation in the European Union: Public Enterprises and Integration. Boston, MA: Springer US. doi:10.1007/978-1-4757-3733-2.
- Condron, S. M. 2007. “Getting It Right: Protecting American Critical Infrastructure in Cyberspace.” Harvard Journal of Law & Technology 20 (2): 403–422.
- CPNI. 2021. “Critical National Infrastructure.” Centre for the Protection of National Infrastructure. Accessed 03 March 2021. https://www.cpni.gov.uk/critical-national-infrastructure-0.
- De Vore, M. R., and M. Weiss. 2014. “Who’s in the Cockpit? the Political Economy of Collaborative Aircraft Decisions.” Review of International Political Economy 21 (2): 497–533. doi:10.1080/09692290.2013.787947.
- ENISA. 2020. “NIS Directive.” European Union Agency for Cybersecurity. Accessed 03 March 2021. https://www.enisa.europa.eu/topics/nis-directive.
- European Parliament and Council. 2016. “Directive concerning measures for a high common level of security of network and information systems across the Union. NIS Directive.” Accessed 13 August 2018, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=EN
- George, A. L., and A. Bennett. 2005. Case Studies and Theory Development in the Social Sciences. BCSIA studies in international security. Cambridge, Massachusetts: MIT Press.
- Gilardi, F. 2012. “Transnational Diffusion: Norms, Ideas, and Policies.” In Handbook of International Relations, edited by W. Carlsnaes, T. Risse, and B. A. Simmons, 453–477. 2nd ed. ed. Thousand Oaks, CA: SAGE Publications.
- Gritzalis, D., M. Theocharidou, and G. Stergiopoulos. 2019. Critical Infrastructure Security and Resilience. Cham: Springer International Publishing.
- Herr, T. 2021. “Cyber Insurance and Private Governance: The Enforcement Power of Markets.” Regulation & Governance 15 (1): 98–114. doi:10.1111/rego.12266.
- HM Government. 2017. “National Cyber Security Strategy 2016-2021: United Kingdom.” https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf.
- Jong-Chen, D. Jing, and Bobby O’Brien. 2017. “A Comparative Study: The Approach to Critical Infrastructure Protection in the U.S., E.U., And China.” Digital Futures Project. https://www.wilsoncenter.org/sites/default/files/media/documents/publication/approach_to_critical_infrastructure_protection.pdf.
- Kello, L. 2017. The Virtual Weapon and International Order. New Haven: Yale University Press.
- LOI n° 2013-1168 du 18 décembre 2013 relative à la programmation militaire pour les années 2014 à 2019 et portant diverses dispositions concernant la défense et la sécurité nationale (1). Assemblée Nationale; Sénat. Journal officiel de la République française 20570. December 19. https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000028338825&categorieLien=id.
- Lukasik, S. J., S. E. Goodman, and D. W. Longhurst. 2003. Protecting Critical Infrastructures against Cyber-attack. Adelphi paper 359. Oxford: Oxford Univ. Press. http://www3.oup.co.uk/adelph/hdb/Volume_359/Issue_01.
- McCarthy, D. R. 2018. “Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order.” Politics and Governance 6 (2): 5. doi:10.17645/pag.v6i2.1335.
- Moe, T. M. 2019. The Politics of Institutional Reform: Katrina, Education, and the Second Face of Power. Cambridge: Cambridge University Press.
- Mueller, M. L. 2019. “Against Sovereignty in Cyberspace.” International Studies Review 22 (4): 779–801. doi:10.1093/isr/viz044.
- National Audit Office. 2019. “Progress of the 2016 – 2021 National Cyber Security Programme.” SESSION 2017–2019 HC 1988. https://publications.parliament.uk/pa/jt201719/jtselect/jtnatsec/1708/1708.pdf.
- NCSC. 2019a. “NCSC - about NCSC. What We Do.” Accessed July 302019, https://www.ncsc.gov.uk/section/about-ncsc/what-we-do.
- NCSC. 2019b. “NCSC Certification.” https://www.ncsc.gov.uk/section/products-services/ncsc-certification.
- NCSC. 2019c. “NCSC NIS Guidance.” Accessed July 302019., https://www.ncsc.gov.uk/collection/nis-directive.
- NCSC. 2019d. “NCSC NIS Guidance: Table View of Principles and Related Guidance.” https://www.ncsc.gov.uk/collection/nis-directive/table-view-principles-and-related-guidance.
- NCSC. 2019e. “NCSC NIS Guidance. Introduction to the NIS Directive.” Accessed July 302019, https://www.ncsc.gov.uk/collection/nis-directive/introduction-to-the-nis-directive.
- Newlove-Eriksson, L., G. Giacomello, and J. Eriksson. 2018. “The Invisible Hand? Critical Information Infrastructures, Commercialisation and National Security.” The International Spectator 53 (2): 124–140. doi:10.1080/03932729.2018.1458445.
- Nölke, A. 2018. “Dependent versus State-permeated Capitalism: Two Basic Options for Emerging Markets.” International Journal of Management and Economics 54 (4): 269–282. doi:10.2478/ijme-2018-0026.
- Nölke, A. 2019. “In Search of Institutional Complementarities: Comparative Capitalism and Economic Policy Reform.” Journal of Economic Policy Reform 1–8. doi:10.1080/17487870.2019.1637582.
- Nossenateurs.fr. 2018. “Commission des finances, du contrôle budgétaire et des comptes économiques de la nation: Réunion du 18 avril 2018 à 14h35.” https://www.nossenateurs.fr/seance/17644#inter_743bb480874fd68a748735069807262b.
- Nye, J. S. 2017. “Deterrence and Dissuasion in Cyberspace.” International Security 41 (3): 44–71. doi:10.1162/ISEC_a_00266.
- Owen, T. 2015. Disruptive Power: The Crisis of the State in the Digital Age. New York: Oxford University Press. doi:10.1093/acprof:oso/9780199363865.001.0001.
- Ross, T. 2017. “Threat of Cyber Attack Is Biggest Fear for Businesses.” Accessed 03 June 2017. https://www.bloomberg.com/politics/articles/2017-02-21/threat-of-cyber-attack-is-biggest-fear-for-businesses-survey.
- Rotolo, D., D. Hicks, and B. R. Martin. 2015. “What Is an Emerging Technology?” Research Policy 44 (10): 1827–1843. doi:10.1016/j.respol.2015.06.006.
- Schmidt, V. A. 2002. The Futures of European Capitalism. New York: Oxford University Press.
- Singer, P. W., and A. Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press.
- Slayton, R., and A. Clark-Ginsberg. 2018. “Beyond Regulatory Capture: Coproducing Expertise for Critical Infrastructure Protection.” Regulation & Governance 12 (1): 115–130. doi:10.1111/rego.12168.
- Stoddart, K. 2016. “UK Cyber Security and Critical National Infrastructure Protection.” International Affairs 92 (5): 1079–1105. doi:10.1111/1468-2346.12706.
- UK Cabinet Office. 2018. “National Cyber Security Centre: Staff: Written Question - 186193.” https://www.parliament.uk/business/publications/written-questions-answers-statements/written-question/Commons/2018-10-31/186193/.
- United Nations Institute for Disarmament Research. 2013. “The Cyber Index: International Security Trends and Realities.”
- Wallander, C. A., and R. O. Keohane. 1999. “Risk, Threat, and Security Institutions.” In Imperfect Unions: Security Institutions over Time and Space, edited by H. Haftendorn, O. Robert, Keohane, and C. A. Wallander, 21–47. Oxford: Oxford University Press.
- Warner, M. E., and J. Clifton. 2014. “Marketisation, Public Services and the City: The Potential for Polanyian Counter Movements.” Cambridge Journal of Regions, Economy and Society 7 (1): 45–61. doi:10.1093/cjres/rst028.
- Weiss, M. 2018. “How to Become a First Mover? Mechanisms of Military Innovation and the Development of Drones.” European Journal of International Security 3 (2): 187–210. doi:10.1017/eis.2017.15.
- Weiss, M. 2019. “From Wealth to Power? the Failure of Layered Reforms in India’s Defense Sector.” Journal of Global Security Studies 4 (4): 560–578. doi:10.1093/jogss/ogz036.
- Weiss, M. 2020a. “Varieties of Privatization: Informal Networks, Trust and State Control of the Commanding Heights.” Review of International Political Economy: 1–28. Latest Articles. doi:10.1080/09692290.2020.1726791.
- Weiss, M. 2020b. “Who Should Be in Charge of Cyberspace? the European Union, Member States and the Constitution of Structural Power.” Working Paper, EUI RSCAS, 2020/22, Global Governance Programme-388, [Europe in the World]. http://hdl.handle.net/1814/66809.
- Weiss, M., and T. Heinkelmann-Wild. 2020. “Disarmed Principals: Institutional Resilience and the Non-enforcement of Delegation.” European Political Science Review 12 (4): 409–425. doi:10.1017/S1755773920000181.
- Weiss, M., and V. Jankauskas. 2019. “Securing Cyberspace: How States Design Governance Arrangements.” Governance 32 (2): 259–275.
- Wills, J. 2017. “Tug of War: Surveillance Capitalism, Military Contracting, and the Rise of the Security State” Montreal: McGill-Queen’s University Press.