References
- Ashford, W. 2018. “Cobalt Cyber Heist Group Mounts New Campaign.” Computer Weekly, August 30. Accessed January 24, 2019. https://www.computerweekly.com/news/252447829/Cobalt-cyber-heist-group-mounts-new-campaign.
- BBC. 2018. “Germany starts enforcing hate speech law.” Accessed January 26, 2019. https://www.bbc.co.uk/news/technology-42510868.
- Benkler, Y., R. Faris, and H. Roberts. 2018. Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. Oxford: Oxford University Press.
- Bernays, E. L. 1928. Propaganda. New York: Ig Publishing.
- Brands, H. 2016. “Paradoxes of the gray zone.” Foreign Policy Research Institute. Accessed January 28, 2019. https://www.fpri.org/article/2016/02/paradoxes-gray-zone/.
- Brock, F. J., and G. S. Dhillon. 2001. “Managerial Information, the Basics.” Journal of International Information Management 10 (2): 5, 45–59.
- Corera, G. 2018. “Swedish Security Chief Warning on Fake News.” BBC News, January 4. Accessed January 5, 2018. https://www.bbc.com/news/world-europe-42285332.
- Cull, N. J., D. H. Culbert, and D. Welch. 2003. Propaganda and Mass Persuasion: A Historical Encyclopedia, 1500 to the Present. Santa Barbara, CA: ABC-CLIO.
- Darley, W. M. 2012. “Why Public Affairs is not Information Operations.” Army Magazine, January.
- Davenport, T. H. 1997. Information Ecology: Mastering the Information and Knowledge Environment. Oxford: Oxford University Press.
- Dearden, L. 2017a. “Khalid Masood: Met Police says Attacker's Previous Name was Adrian Russell Ajao Amid Confusion over Aliases.” The Independent, March. Accessed April 12, 2018.
- Dearden, L. 2017b. “Salman Abedi’s Brother says Manchester Bomber was Radicalized in UK.” The Independent, June 8. Accessed April 12, 2018.
- Dewey, J. 2008. The Later Works of John Dewey, Volume 7, 1925-1953: 1932. Ethics, Vol. 7. Carbondale, IL: SIU Press.
- DiResta, R., K. Shaffer, D. Ruppel, R. M. Sullivan, R. Fox, J. Albright, and B. Johnson. 2018. “The Tactics & Tropes of the Internet Research Agency.” New Knowledge.
- Dixon, H. 2017. “Russian Bot Behind False Claim Muslim Woman Ignored Criticisms of Westminster Terror Attack.” The Telegraph, November 13. Accessed April 12, 2018.
- Dryzek, J. S. 2000. Deliberative Democracy and Beyond: Liberals, Critics, Contestations. Oxford: Oxford University Press.
- Ellul, J. 1965. Propaganda: The Formation of Men’s Attitudes. Translated by Konrad Kellen and Jean Lerner. New York: Vintage Books.
- European Commission. 2018. Communication from the Commission to the European Parliament, The Council, The European Economic and Social Committee and the Committee of the Regions Tackling Online Disinformation: A European Approach. COM/2018/236 final. Accessed January 26, 2019. https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:52018DC0236.
- Europol. 2018. “Mastermind Behind EUR 1 Billion Cyber Bank Robbery Arrested in Spain.” Press Release. March 26. Accessed January 24, 2019. https://www.europol.europa.eu/newsroom/news/mastermind-behind-eur-1-billion-cyber-bank-robbery-arrested-in-spain.
- Fallis, D. 2011. “Floridi on Disinformation.” Etica & Politica/Ethics & Politics XIII (2): 201–214.
- Fetzer, J. H. 2004. “Information: Does it Have to be True?” Minds and Machines 14 (2): 223–229. doi: 10.1023/B:MIND.0000021682.61365.56
- Fitzgerald, C., and A. Brantly. 2017. “Subverting Reality: The Role of Propaganda in 21st Century Intelligence.” International Journal of Intelligence and CounterIntelligence 30 (2): 215–240. doi: 10.1080/08850607.2017.1263528
- Floridi, L. 2009. “Philosophical Conceptions of Information.” In Formal Theories of Information: From Shannon to Semantic Information Theory and General Concepts of Information, edited by G. Sommaruga, 13–53. doi:10.1007/978-3-642-00659-3.
- Floridi, L. 2011. The Philosophy of Information. Oxford: Oxford University Press.
- Frické, M. 1997. “Information Using Likeness Measures.” Journal of the American Society for Information Science 48: 882–892. doi: 10.1002/(SICI)1097-4571(199710)48:10<882::AID-ASI4>3.0.CO;2-Y
- Fridman, O. 2018. Russian “Hybrid Warfare": Resurgence and Politicization. Oxford: Oxford University Press.
- Garrison, W. C. 1999. Information Operations and Counter-Propaganda: Making a Weapon of Public Affairs. Carlisle, PA: US Army War College Barracks.
- Gioe, D. V. 2017. “The History of Fake News.” The National Interest, July 1. https://nationalinterest.org/feature/the-history-fake-news-21386.
- Gioe, D. V. 2018. “Cyber Operations and Useful Fools: The Approach of Russian Hybrid Intelligence.” Intelligence and National Security 33 (7): 954–973. doi: 10.1080/02684527.2018.1479345
- Gleick, J. 2012. The Information: A History, A Theory, A Flood. Vintage: Kindle Edition.
- Hafner, J. 2017. “‘Army of Jesus’? How Russian Messed with Americans online.” USA Today, on Politics Blog. November 1. Accessed April 13, 2018. https://www.usatoday.com/story/news/politics/onpolitics/2017/11/01/onpolitics-today-army-jesus-how-russia-messed-americans-online/823842001/.
- Hatfield, J. M. 2017. “Social Engineering in Cybersecurity: The History of a Concept.” Computers & Security 73: 102–113. doi: 10.1016/j.cose.2017.10.008
- Hern, A., P. Duncan, and E. Creamer. 2018. “Russian Trolls’ Tweets Cited in More Than 100 UK News Articles.” The Guardian, September 10. Accessed January 26, 2019. https://www.theguardian.com/media/2018/sep/10/russian-trolls-tweets-cited-in-more-than-100-uk-news-articles.
- Howard, P. N., B. Ganesh, D. Liotsiou, J. Kelly, and C. François. 2018. “The IRA, Social Media and Political Polarization in the United States, 2012-2018.” In Computational Propaganda Research Project, 3–41. Oxford: University of Oxford.
- Inglis, C. 2017. “Statement Before the United States Senate Armed Service Committee.” April 27. Accessed May 13, 2018. https://www.armed-services.senate.gov/download/inglis_04-27-17.
- ISC (Intelligence and Security Committee of Parliament). 2018. The 2017 Attacks: What Needs to Change? HC 1694. November 22.
- Jetter, M. 2017. “The Effect of Media Attention on Terrorism.” Journal of Public Economics, September. Accessed April 12, 2018. https://www.sciencedirect.com/science/article/abs/pii/S0047272717301214.
- Jowett, G. S., and V. O'Donnell. 2015. Propaganda & Persuasion. Thousand Oaks, CA: Sage Publications.
- Krombholz, K., H. Hobel, M. Huber, and E. Weippl. 2015. “Advanced Social Engineering Attacks.” Journal of Information Security and Applications 22: 113–122. doi: 10.1016/j.jisa.2014.09.005
- Kuehl, D. 2007. “Brother Can You Spare Me a DIME?” In Information Warfare, edited by E. Leigh Armistead, 1–3. Washington, DC: Potomac Books.
- Kuehl, D., and E. L. Armistead. 2007. “Information Operations: The Policy and Organizational Evaluation.” In Information Warfare, edited by E. Leigh Armistead, 5–26. Washington, DC: Potomac Books.
- Lasswell, H. D. 1935. World Politics and Personal Insecurity. New York: McGraw-Hill.
- Lasswell, H. D. 1948. “The Structure and Function of Communication in Society.” In The Communication of Ideas, edited by Lymon Bryson, 215–228. New York: The Institute for Religious and Social Studies.
- Lazer, D. M. J., M. A. Baum, Y. Benkler, A. J. Berinsky, K. M. Greenhill, F. Menczer, M. J. Metzger, et al. 2018. “The Science of Fake News.” Science 359 (6380): 1094–1096. doi: 10.1126/science.aao2998
- Lippman, W. 1922/2012. . Public Opinion. North Chelmsford, MA: Courier Corporation.
- Losee, B. 1999. “Errors, Misinformation, and Bad Data.” Accessed January 26, 2019. https://ils.unc.edu/~losee/b5/node10.html.
- MacKay, B., and I. Munro. 2012. “Information Warfare and New Organizational Landscapes: An Inquiry Into the ExxonMobil–Greenpeace Dispute Over Climate Change.” Organization Studies 33 (11): 1507–1536. doi: 10.1177/0170840612463318
- Marlin, R. 2011. ““Propaganda and the Ethics of WikiLeaks.” Global Media Journal, Australian Edition 5 (1): 1–8.
- Mendick, R. 2017. “Khalid Masood: Everything We Know About the London Attacker”. The Telegraph, March 27. Accessed April 12, 2018.
- Moloney, K. 2006. Rethinking Public Relations: PR Propaganda and Democracy. Abingdon-on-Thames: Routledge.
- NATO. 2018. “NATO Term: The Official NATO Terminology Database.” Accessed November 18, 2018. https://nso.nato.int/natoterm/Web.mvc.
- Office of Angus King. 2017. “King Questions Facebook, Twitter, Google on Russian Social Media Disinformation Campaigns and Interference in 2016 Election.” Senator Angus King Homepage, November 1. Accessed April 12, 2018. https://www.king.senate.gov/newsroom/press-releases/king-questions-facebook-twitter-google-on-russian-social-media-disinformation-campaigns-and-interference-in-2016-election.
- Pacepa, I. M., and R. J. Rychlak. 2013. Disinformation: Former Spy Chief Reveals Secret Strategy for Undermining Freedom, Attacking Religion, and Promoting Terrorism. Washington, DC: WND Books.
- Pomerleau, M. 2017. “Is the US Behind in Cyber-enabled Info Operations?” Fifth Domain, November, 27. Accessed April 12, 2018. https://www.fifthdomain.com/2017/ … /27/is-the-us-behind-in-cyber-enabled.
- Proofpoint. 2018. “The Human Factor: People-Centre Threats Define the Landscape”.
- Proofpoint. 2019. “State of the Phish 2019 Report.” Accessed January 24, 2019. https://www.proofpoint.com/sites/default/files/pfpt-us-tr-state-of-the-phish-2019.pdf.
- RFE/RL. 2017. “Russian Document Suggests All Foreign Media Could Be Labeled ‘Agents’.” December 21. Accessed January 26, 2019. https://www.rferl.org/a/russia-foreign-agents-media-voa-rferl/28931411.html.
- Rid, T. 2012. “Think Again: Cyberwar.” Foreign Policy 192: 80–84.
- Rogozin, D. 2010. “Как в НАТО ловят души [How do NATO nations hunt].” KM.RU, July 6. Accessed 24 January 2019. http://www.km.ru/news/kak_v_nato_lovyat_dushi.
- Ross, S. T. 2002. “Understanding Propaganda: The Epistemic Merit Model and its Application to Art.” Journal of Aesthetic Education 36 (1): 16–30. doi: 10.2307/3333623
- Russian Ministry of Defence. 2018. “Information Warfare.” In Military Encyclopaedic Dictionary. Accessed November 20, 2018. http://encyclopedia.mil.ru/encyclopedia/dictionary/details.htm?id=5211@morfDictionary.
- Schroeder, R., and R. Ling. 2014. “Durkheim and Weber on the Social Implications of New Information and Communication Technologies.” New Media & Society 16 (5): 789–805. doi: 10.1177/1461444813495157
- Schwartau, W. 1994. Information Warfare: Chaos on the Electronic Superhighway. New York: Thunder's Mouth Press.
- Shannon, C. E. 1948. “A Mathematical Theory of Communication.” Bell System Technical Journal 27 (3): 379–423. doi: 10.1002/j.1538-7305.1948.tb01338.x
- Smith, B., J. Gruenewald, P. Roberts, and K. R. Damphousse. 2015. “The Emergence of Lone Wolf Terrorism: Patterns of Behavior and Implications for Intervention.” In Sociology of Crime, Law and Deviance 20 (September), edited by Mathieu Deflem, 89–110. Bingley: Emerald Publishing.
- Smith Jr, P. A. 1989. On Political War. Washington, DC: National Defense University Press.
- Sparrow, A. 2017. “WhatsApp Must be Accessible to Authorities, says Amber Rudd.” The Guardian, March 26. Accessed April 12, 2018. https://www.theguardian.com/technology/2017/mar/26/intelligence-services-access-whatsapp-amber-rudd-westminster-attack-encrypted-messaging.
- Stamos, A. 2017. “An Update on Information Operations on Facebook.” Facebook. Accessed January 26, 2019. https://newsroom.fb.com/news/2017/09/information-operations-update/.
- Stiawan, D., M. Y. Idris, A. H. Abdullah, F. Aljaber, and R. Budiarto. 2017. “Cyber-attack Penetration Test and Vulnerability Analysis.” International Journal of Online Engineering (iJOE 13 (1): 125–132. doi: 10.3991/ijoe.v13i01.6407
- Stuart, H. (on behalf of the Henry Jackson Society). 2017. “Islamist Terrorism: Analysis of Offences and Attacks in the UK (1998-2015).” Henry Jackson Society. Accessed April 12, 2018. http://henryjacksonsociety.org/wp-content/uploads/2017/03/Islamist-Terrorism-preview-1.pdf.
- Stubbs, J., and G. Gibson. 2017. “Russia's RT America Registers as ‘Foreign Agent’ in U.S.” Reuters. November 13. Accessed January 26, 2019. https://uk.reuters.com/article/uk-russia-usa-media-restrictions-rt/russias-rt-america-registers-as-foreign-agent-in-u-s-idUKKBN1DD29M.
- Szafranksy, R. 1995. “A Theory of Information Warfare.” Airpower Journal. Spring. Accessed September 13, 2017. http://bit.ly/2jlTQxh. Accessed January 24, 2019.
- Twitter. 2018. “ Update on Twitter’s Review of the 2016 US Election.” Twitter Public Policy. Accessed January 26, 2019. https://blog.twitter.com/official/en_us/topics/company/2018/2016-election-update.html.
- UK Department for Digital, Culture, Media and Sport. 2018. “Cyber Security Breaches Survey 2018.” Accessed December 31, 2018. https://bit.ly/2StMHYP.
- UN General Assembly. 2015. “Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations Addressed to the Secretary-General.” Agenda Item 91, Developments in the Field of Information and Telecommunications in the Context of International Security. Sixty-ninth session. January 13.
- United States Department of Defense. 2013. “Cyberspace Operations.” Joint Publication 3-13. Accessed April 12, 2018. https://fas.org/irp/doddir/dod/jp3_12r.pdf.
- United States Department of Defense. 2014. “Information Operations.” Joint Publication 3-13. Accessed 28 February 2019. http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf.
- United States Department of Defense. 2018. “DOD Dictionary of Military and Associated Terms.” Accessed November 18, 2018. http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2018-09-28-100314-687.
- United States Department of Justice. 2018. Indictment, United States of America v. Internet Research Agency, et al., filed February 16, 2018, in the US District Court for the District of Columbia. Case 1:18-cr-00032-DLF. Accessed May 10, 2018. https://www.justice.gov/file/1035477/download.
- United States Director of National Intelligence (DNI). 2017. Intelligence Community Assessment: “Assessing Russian Activities and Intentions in Recent US Elections.” January 7. Accessed April 12, 2018. https://www.dni.gov/files/documents/ICA_2017_01.pdf.
- UsHadrons Medium. 2017. “Repository for Defend the Second Memes.” Accessed April 12, 2018. https://medium.com/@ushadrons/this-space-is-a-repository-for-ads-from-the-russian-social-media-group-defend-the-second-70cb1a6b150f.
- Wanless, A., and M. Berk. Forthcoming. “The Audience is the Amplifier: Participatory Propaganda.” In The Sage Handbook of Propaganda, edited by Paul Baines, Nicholas J. O’Shaughnessy, and Nancy Snow. London: Sage.
- The Washington Post. 2017. “Russian Propaganda has Flooded U.S. Airwaves. How About Some Reciprocity?” Accessed January 26, 2019. https://wapo.st/2ORT4Hw.
- Waterson, J. 2018. “Ofcom to Push for Regulation of Social Networks.” The Guardian, September 17. Accessed November 21, 2018. https://www.theguardian.com/media/2018/sep/17/ofcom-to-push-for-regulation-of-social-media-platforms.
- Williams, E. J., J. Hinds, and A. N. Joinson. 2018. “Exploring Susceptibility to Phishing in the Workplace.” International Journal of Human-Computer Studies 120: 1–13. doi: 10.1016/j.ijhcs.2018.06.004
- Wilson, M. 2017. “Russian Network RT Must Register as Foreign Agent in US.” The Hill, September 12. Accessed January 24, 2019. http://thehill.com/business-a-lobbying/business-a-lobbying/350226-russian-network-rt-must-register-as-foreign-agent-in.
- Wintour, P. 2018. “UK Accuses Kremlin of Ordering Series of ‘Reckless’ Cyber-Attacks.” The Guardian, October 4.
- Woolley, S. C., and P. N. Howard. 2016. “Political Communication, Computational Propaganda, and Autonomous Agents: Introduction.” International Journal of Communication 10: 4882–4890.
- Workman, M. 2008. “Wisecrackers: A Theory-Grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security.” Journal of the American Society for Information Science and Technology 59 (4, February 15): 662–674. doi: 10.1002/asi.20779