References
- Aggarwal, Vinod K., and Andrew W. Reddie. 2018. “Comparative Industrial Policy and Cybersecurity: the US Case.” Journal of Cyber Policy 3 (3): 445–466. doi:https://doi.org/10.1080/23738871.2018.1551910.
- Berg, Bruce, and Howard Lune. 2012. Qualitative Research Methods for the Social Sciences. eighth edition. Boston, MA: Pearson.
- Boys, James D. 2018. “The Clinton Administration’s Development and Implementation of Cybersecurity Strategy (1993-2001).” Intelligence and National Security 33 (5): 755. doi:https://doi.org/10.1080/02684527.2018.1449369.
- Buckley, Peter J. 2016. “Historical Research Approaches to the Analysis of Internationalisation.” Management International Review 56 (6): 879–900.
- Bush, George H.W. 1990. National Security Directive 42. Washington DC: The White House.
- Bush, George W. 2008. National Security Presidential Directive NSPD-54/Homeland Security Presidential Directive HSPD-23. Washington DC: The White House.
- Carr, Madeline. 2016. “Public–Private Partnerships in National Cyber-Security Strategies.” International Affairs 92 (1): 43–62. doi:https://doi.org/10.1111/1468-2346.12504.
- Cavelty, Myriam Dunn. 2018. “Cybersecurity Research Meets Science and Technology Studies.” Politics and Governance 6 (2): 22–30. doi:https://doi.org/10.17645/pag.v6i2.1385.
- Clinton, Bill. 1996. Executive Order 13010. Washington DC: The White House.
- Clinton, Bill. 1998. Presidential Decision Directive 63. Washington DC: The White House.
- Cochran, Charles, and Eloise Malone. 2014. Public Policy: Perspectives and Choices. Fifth edition. Boulder, CO: Lynne Rienner.
- Confucius. c.500 BC. The Analects. Accessed 12 December 2018. https://china.usc.edu/confucius-analects-13.
- Ebert, Hannes, and Tim Maurer. 2013. “Contested Cyberspace and Rising Powers.” Third World Quarterly 34 (6): 1054–1074. doi:https://doi.org/10.1080/01436597.2013.802502.
- Futter, Andrew. 2018. “Cyber Semantics: Why We Should Retire the Latest Buzzword in Security Studies.” Journal of Cyber Policy 3 (2), doi:https://doi.org/10.1080/23738871.2018.1514417.
- Gallagher, Sean. 2018. “Trump Eliminates National Cyber-Coordinator Job, Gives Bolton Keys to the Cybers.” Arstechnica, 16 May 2018. https://arstechnica.com/tech-policy/2018/05/trump-closes-job-opening-for-cyber-czar-raising-protests-from-congress/.
- Greenwald, Glenn, and Ewen MacAskill. 2013. “Obama Orders Us to Draw up Overseas Target List for Cyber-Attacks.” The Guardian, 7 June 2013. https://www.theguardian.com/world/2013/jun/07/obama-china-targets-cyber-overseas.
- Healey, Jason. 2013. A Fierce Domain. Washington DC: CCSA and Atlantic Council.
- Hofmann, Jeanette. 2016. “Multi-Stakeholderism in Internet Governance: Putting a Fiction Into Practice.” Journal of Cyber Policy 1 (1): 29–49.
- Howlett, Michael, and Ben Cashore. 2014. “Conceptualizing Public Policy.” In Comparative Policy Studies, edited by Isabelle Engeli, and Allison Rothmayr, 17–33. London: Palgrave.
- Isikoff, Michael. 2013. “Chinese Hacked Obama, McCain Campaigns, Took Internal Documents, Officials Say.” NBCNEWS, 10 June 2013. http://www.nbcnews.com/id/52133016/t/chinese-hacked-obama-mccain-campaigns-took-internal-documents-officials-say/.
- Kahn, Jeremy. 2008. “Mumbai Terrorists Relied on New Technology for Attacks.” The New York Times, 8 December 2008. https://www.nytimes.com/2008/12/09/world/asia/09mumbai.html.
- Kello, Lucas. 2013. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.” International Security 38 (2): 7–40. doi:https://doi.org/10.1162/ISEC_a_00138.
- Krebs, Brian. 2018. “USPS Site Exposed Data on 60 Million Users.” Krebs on Security, 18 November 2018. https://krebsonsecurity.com/2018/11/usps-site-exposed-data-on-60-million-users/.
- Liff, Adam P. 2012. “Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War.” Journal of Strategic Studies 35 (3): 401–428. doi:https://doi.org/10.1080/01402390.2012.663252.
- Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22 (3): 365–404. doi:https://doi.org/10.1080/09636412.2013.816122.
- Naughton, John. 2016. “The Evolution of the Internet: From Military Experiment to General Purpose Technology.” Journal of Cyber Policy 1 (1): 5–28.
- Nye, Joseph S. 2010. Cyber Power. Cambridge, MA: Belfer Center for Science and International Affairs.
- Obama, Barack. 2007. “Innovation Agenda.” Obama Campaign 2008. https://www.wired.com/images_blogs/threatlevel/2009/04/obamatechplan.pdf.
- Obama, Barack. 2008. “Obama Remarks on Confronting Terrorist Threats.” Transcript. The Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/07/16/AR2008071601474.html??noredirect=on&noredirect=on.
- Obama, Barack. 2010. “The National Security Strategy of the United States 2010.”.
- Obama, Barack. 2012. Presidential Policy Directive 20. Washington DC: The White House.
- Obama, Barack. 2013a. Executive Order 13636. Washington DC: The White House.
- Obama, Barack. 2013b. Presidential Policy Directive 21. Washington DC: The White House.
- Obama, Barack. 2015a. Executive Order 13687. Washington DC: The White House.
- Obama, Barack. 2015b. Executive Order 13694. Washington DC: The White House.
- Obama, Barack. 2016a. Presidential Policy Directive 41. Washington DC: The White House. https://fas.org/irp/offdocs/ppd/ppd-41.html.
- Obama, Barack. 2016b. Executive Order 13757. Washington DC: The White House.
- O’Brien, Terrence. 2017. “Obama’s Legacy: The Most Tech-Savvy President.” Engadget, 21 January 2017. https://www.engadget.com/2017/01/21/obamas-legacy-the-most-tech-savvy-president/?guccounter=2.
- Organisation for Economic Cooperation and Development. 2004. “The Economic Impact of ICT.” https://www.oecd-ilibrary.org/docserver/9789264026780-en.pdf?expires=1544619062&id=id&accname=ocid43019508&checksum=A3BB6FB7B3A19B850F9177A4AD3C9486.
- Painter, Christopher. 2018. “Diplomacy in Cyberspace.” The Foreign Service Journal, June. http://www.afsa.org/diplomacy-cyberspace.
- Porra, Jaana, Rudy Hirschheim, and Michael Parks. 2014. “The Historical Research Method and Information Systems Research.” Journal of the Association for Information Systems 15 (9): 536–576.
- Reagan, Ronald. 1984. National Security Decision Directive 145. Washington DC: The White House.
- Richelson, Jeffrey T. 2013. “The Snowden Affair.” The National Security Archive, 4 September 2013. https://nsarchive2.gwu.edu/NSAEBB/NSAEBB436/.
- Sanger, David E. 2012. “Obama Order Sped Up Wave of Cyberattacks Against Iran.” The New York Times, 1 June 2012. https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html.
- Shachtman, Noah. 2010. “Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring.” Wired, 28 July 2010. https://www.wired.com/2010/07/exclusive-google-cia/.
- Slack, Chelsey. 2016. “Wired yet Disconnect: The Governance of International Cyber Relations.” Global Policy 7 (1): 69–78.
- Stoddart, Kristan. 2016. “Live Free or Die Hard: U.S.-UK Cybersecurity Policies.” Political Science Quarterly 131 (4): 803–842. doi:https://doi.org/10.1002/polq.12535.
- Subrahmanian, V. S., Michael Ovelgōnne, Tudor Dumitras, and B. Aditya Prakash. 2015. The Global Cyber-Vulnerability Report. Switzerland: Springer.
- Taddeo, Mariarosaria. 2012. “Information Warfare: A Philosophical Perspective.” Philosophy & Technology 25 (1): 105–120. doi:https://doi.org/10.1007/s13347-011-0040-9.
- UK Ministry of Defence. 2013. “Cyber Primer.” https://www.scribd.com/document/254396001/Cyber-Primer-pdf.
- US Cyber Command. n.d. “U.S. Cyber Command History.” Cybercom.Mil. Accessed 13 December 2018. https://www.cybercom.mil/About/History /.
- US Department of Defense. 2010. “DOD Announces First U.S. Cyber Command and First U.S. CYBERCOM Commander.” http://archive.defense.gov/releases/release.aspx?releaseid=13551.
- US Department of Defense. 2011. “Strategy for Operating in Cyberspace.”.
- US Department of Defense. 2015. “Cyber Strategy.”.
- US Department of Homeland Security. 2011. “Blueprint for a Secure Cyber Future.”.
- US Department of Homeland Security. 2013. “The National Infrastructure Protection Plan.”.
- US Department of Homeland Security. 2016. “National Cyber Incident Response Plan.”.
- US Department of Justice. 2009. “RBS WorldPay Indictment.” https://www.wired.com/images_blogs/threatlevel/2009/11/rbs-worldpay-indictment.pdf.
- US Department of Justice. 2014. “Five Chinese Military Hackers Indictment.” https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor.
- US Department of Justice. 2016. “Seven Iranians Working for the IRGC Indictment.” https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged.
- US Department of State. 2016. “International Cyberspace Policy Strategy.”.
- US Government Accountability Office. 2016. “Information Security.”.
- US National Institute of Standards and Technology. 2014. Framework for Improving Critical Infrastructure Cyber Security. Gaithersburg: US Department of Commerce.
- US Office of the Director of National Intelligence. 2010. “Annual Worldwide Threat Assessment.” https://www.dni.gov/files/documents/Newsroom/Testimonies/20100202_testimony.pdf.
- US Office of the Director of National Intelligence. 2017. “Background to ‘Assessing Russian Activities and Intentions in Recent US Elections’.” https://www.dni.gov/files/documents/ICA_2017_01.pdf.
- US Office of the Press Secretary. 2016. “FACT SHEET: President Obama Announces ConnectALL Initiative.” https://obamawhitehouse.archives.gov/the-press-office/2016/03/09/fact-sheet-president-obama-announces-connectall-initiative.
- Wakabayashi, Daisuke, and Scott Shane. 2018. “Google Will Not Renew Pentagon Contract That Upset Employees.” The New York Times, 1 June 2018. https://www.nytimes.com/2018/06/01/technology/google-pentagon-project-maven.html.
- Warner, Michael. 2012. “Cybersecurity: A Pre-History.” Intelligence and National Security 27 (5): 781–799. doi:https://doi.org/10.1080/02684527.2012.708530.
- Weber, Valentin. 2018. “Linking Cyber Strategy with Grand Strategy: The Case of the United States.” Journal of Cyber Policy 3 (2): 236–257.
- Weidmann, Nils B. 2015. “Communication, Technology, and Political Conflict: Introduction to the Special Issue.” Journal of Peace Research 52 (3): 263–268. doi:https://doi.org/10.1177/0022343314559081.
- The White House. 2009. “Cyberspace Policy Review.”
- The White House. 2011. “The International Strategy for Cyberspace.”
- Working Group on Internet Governance. 2005. “WGIG Report 2005.” https://www.wgig.org/docs/WGIGREPORT.pdf.