References
- Agrafiotis, I. , J. R. C. Nurse , M. Goldsmith , S. Creese , and D. Upton . 2018. “A Taxonomy of Cyber-Harms: Defining the Impacts of Cyber-Attacks and Understanding How They Propagate.” Journal of Cybersecurity 4 (1): 1–15.
- Aradau, C. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7 (4): 388–413.
- Bakir, V. , and A. McStay . 2018. “Fake News and The Economy of Emotions.” Digital Journalism 6 (2): 154–175.
- Berr, J. 2017. “‘WannaCry’ Ransomware Attack Losses could reach $4 Billion.” CBS News, May 16. Accessed 1 October 2020. https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/.
- Best, K. 2003. “Revisiting the Y2K Bug: Language Wars Over Networking the Global Order.” Television & New Media 4 (3): 297–319.
- Betz, D. J. , and T. Stevens . 2013. “Analogical Reasoning and Cyber Security.” Security Dialogue 44 (2): 147–164. doi:10.1177/0967010613478323.
- Bilgin, P. 2003. “Individual and Societal Dimensions of Security.” International Studies Review 5 (2): 203–222.
- Black, S. 2012. “The Blowback and Collateral Damage of Cyber-warfare.” Business Insider, June 13. Accessed 6 September 2020. https://www.businessinsider.com/the-blowback-and-collateral-damage-of-cyber-warfare-2012-6?IR=T.
- Bloomfield, A. 2012. “Time to Move On: Reconceptualizing the Strategic Culture Debate.” Contemporary Security Policy 33 (3): 437–461. doi:10.1080/13523260.2012.727679.
- Borger, J. 1999. “Pentagon Kept the Lid on Cyberwar in Kosovo.” The Guardian, November 9. Accessed 20 May 2020. https://www.theguardian.com/world/1999/nov/09/balkans.
- Borghard, E. D. , and S. W. Lonergan . 2017. “The Logic of Coercion in Cyberspace.” Security Studies 26 (3): 452–481.
- Bourbeau, Philippe , and Caitlin Ryan . 2017. “Resilience, Resistance, Infrapolitics and Enmeshment.” European Journal of International Relations 24 (1): 221–239.
- Bourbeau, Philippe , and Juha A. Vuori . 2015. “Security, Resilience and Desecuritization: Multidirectional Moves and Dynamics.” Critical Studies on Security 3 (3): 253–268.
- Branch, J. 2020. “What's in a Name? Metaphors and Cybersecurity.” International Organization , 1-32. doi:10.1017/S002081832000051X
- Brantly, A. 2016. The Decision to Attack: Military and Intelligence Cyber Decision-Making . Athens: University of Georgia Press.
- Buchanan, B. 2014. “Cyber Deterrence Isn't MAD; It's Mosaic.” Georgetown Journal of International Affairs 15 (2): 130–140.
- Buchanan, B. 2016. The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations . London: Hurst.
- Bumiller, E. , and T. Shanker . 2012. “Panetta Warns of Dire Threat of Cyberattack on U.S.” New York Times, October 11. Accessed 20 May 2020. https://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html.
- Buzan, B. 1997. “Rethinking Security after the Cold War.” Cooperation and Conflict 32 (1): 5–28.
- Buzan, B. 2007. People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era . Colchester: ECPR Press.
- Buzan, B. , and O. Wæver . 2003. Regions and Powers: The Structure of International Security . Cambridge: Cambridge University Press.
- Carr, J. 2010. “Did the Stuxnet Worm Kill India's INSAT-4B Satellite?” The Firewall, September 29. Accessed May 20 2020. https://www.forbes.com/sites/firewall/2010/09/29/did-the-stuxnet-worm-kill-indias-insat-4b-satellite/#22772825127d.
- Carr, M. 2016. “Public-Private Partnerships in National Cyber Security Strategies.” International Affairs 92 (1): 43–62.
- Christensen, K. K. , and T. Liebetrau . 2019. “A New Role for ‘The Public’? Exploring Cyber Security Controversies in the Case of WannaCry.” Intelligence and National Security 34 (3): 395–408. doi:10.1080/02684527.2019.1553704.
- Coskun, B. B. 2008. “Analysing Desecuritisations: Prospects and Problems for Israeli–Palestinian Reconciliation.” Global Change, Peace & Security 20 (3): 393–408. doi:10.1080/14781150802394337.
- Demchak, C. C. , and P. Dombrowski . 2011. “Rise of a Cybered Westphalian Age.” Strategic Studies Quarterly 5 (1): 32–61.
- Denning, D. E. 2011. “Cyber Conflict as an Emergent Social Phenomenon.” In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications , edited by T. Holt , and B. Schell , 170–186. Hershey, PA: IGI Global.
- Department of Defense . 2000. “Kosovo/Operation Allied Force After Action Report.” Report to Congress, January 31.
- Department of Homeland Security . 2013. “National Infrastructure Protection Plan.” Accessed 1 October 2020. https://www.cisa.gov/national-infrastructure-protection-plan.
- Dunn Cavelty, M. , and E. M. Brunner . 2007. “Introduction: Information, Power, and Security—an Outline of Debates and Implications.” In Power and Security in the Information Age: Investigating the Role of the State in Cyberspace , edited by Myriam Dunn Cavelty , Victor Mauer , and Sai Felicia Krishna-Hensel , 1–18. Aldershot: Ashgate.
- Eichensehr, K. 2019. “Cyberattack Attribution and the Virtues of Decentralization.” Just Security, July 3. Accessed 20 May 2020. https://www.justsecurity.org/64755/cyberattack-attribution-and-the-virtues-of-decentralization/.
- Geer, D. , E. Jardine , and E. Leverett . 2020. “On Market Concentration and Cybersecurity Risk.” Journal of Cyber Policy 5 (1): 9–29.
- Gershwin, L. K. 1999. “Foreign Preparedness for Y2K Statement for the Record House International Relations Committee.” CIA, October 21. Accessed 20 May 2020. https://www.cia.gov/news-information/speeches-testimony/1999/gershwin_testimony_102199.html.
- Ghishal, A. 2017. “US Government will Stop Battling the Y2K Bug at Last.” The Next Web, June 16. Accessed 20 May 2020. https://thenextweb.com/us/2017/06/16/us-government-will-stop-battling-the-y2k-bug-at-last/.
- Gioe, D. V. , M. S. Goodman , and A. Wanless . 2019. “Rebalancing Cybersecurity Imperatives: Patching the Social Layer.” Journal of Cyber Policy 4 (1): 117–137.
- Glisinan, K. 2018. “If Terrorists Launch a Major Cyberattack, We Won’t See It Coming.” The Atlantic, November 1. Accessed 20 May 2020. https://www.theatlantic.com/international/archive/2018/11/terrorist-cyberattack-midterm-elections/574504/.
- Gomez, M. A. , and E. B. Villar . 2018. “Fear, Uncertainty, and Dread: Cognitive Heuristics and Cyber Threats.” Politics and Governance 6 (2): 61–72.
- Greenberg, A. 2017. “Hold North Korea Accountable for WannaCry – and the NSA, Too.” Wired, December 19. Accessed 1 October. https://www.wired.com/story/korea-accountable-wannacry-nsa-eternal-blue/.
- Guadagno, R. E. , R. B. Cialdini , and G. Evron . 2010. “What About Estonia? A Social Psychological Analysis of the First Internet War.” Cyberpsychology, Behavior, and Social Networking 13 (4): 447–453.
- Hang, R. 2014. “Freedom for Authoritarianism: Patriotic Hackers and Chinese Nationalism.” Yale Review of International Studies, October. Accessed 20 May 2020. http://yris.yira.org/essays/1447.
- Hansen, L. , and H. Nissenbaum . 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53 (4): 1155–1175.
- Harold, S. W. , M. C. Libicki , and A. S. Cevallos . 2016. Getting To Yes With China in Cyberspace . Santa Monica, CA: RAND Corporation. Accessed 20 May 2020. https://www.rand.org/pubs/research_reports/RR1335.html.
- Hodgson, Q. 2018. “Understanding and Countering Cyber Coercion.” In 10th International Conference on Cyber Conflict CyCon X: Maximising Effects , edited by T. Minárik , R. Jakschis , and L. Lindström , 73–88. Tallinn: NATO CCDCOE Publications.
- Janofsky, A. 2018. “Overclassification of Cyber Threats Puts Businesses at Risk.” The Wall Street Journal, October 31. Accessed 20 May 2020. https://www.wsj.com/articles/gen-michael-hayden-overclassification-of-cyber-threats-puts-businesses-at-risk-1541018014.
- Jowitt, T. 2017. “Tales In Tech History: The Y2K Bug.” Silicon, May 12. Accessed 20 May 2020. https://www.silicon.co.uk/security/firewall/tales-tech-history-y2k-bug-211625.
- Kasvio, A. 2000. “Towards a Wireless Information Society: The Case of Finland.” Paper presented at lecture series at University of Tampere, Finland, autumn 2000. Accessed 20 May 2020. http://www.info.uta.fi/winsoc/engl/lect/progr.html.
- Lawson, S. 2012. “Putting the “War” in Cyberwar: Metaphor, Analogy, and Cybersecurity Discourse in the United States.” First Monday. Accessed 11 July 2019. https://firstmonday.org/ojs/index.php/fm/article/view/3848/3270.
- Lawson, S. 2013. “Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats.” Journal of Information Technology & Politics 10 (1): 86–103.
- Lillington, K. 2018. “Cybersecurity ‘Everyone’s Problem’ across Society – US Security Chief.” The Irish Times, April, 17. Accessed 20 May 2020. https://www.irishtimes.com/business/technology/cybersecurity-everyone-s-problem-across-society-us-security-chief-1.3465066.
- Loesche, D. 2017. “Ransomware: Who's Affected & Why.” Statista, May 15. Accessed 20 May 2020. https://www.statista.com/chart/9378/distribution-of-global-ransomware-infections-and-leading-causes/.
- McDermott, D. 2019. “Some Emotional Considerations in Cyber Conflict.” Journal of Cyber Policy 4 (3): 309–325.
- Muncaster, P. 2012. “Patriotic Hackers face off in South China Sea.” The Register, April 27. Accessed 26 September 2020. https://www.theregister.com/2012/04/27/philippine_china_hack_stand_off/.
- Newman, H. L. 2019. “What Israel's Strike on Hamas Hackers Means For Cyberwar.” Wired , June 5. Accessed 9 December 2020. https://www.wired.com/story/israel-hamas-cyberattack-air-strike-cyberwar/
- Oskui, R. 2018. “The 5 Industries Most Vulnerable to Cyber-Attacks.” CDNetworks, December 11. Accessed 20 May 2020. https://www.cdnetworks.com/cloud-security/the-5-industries-most-vulnerable-to-cyber-attacks/.
- Quiggin, J. 2005. “The Y2K Scare: Causes, Costs and Cures.” Australian Journal of Public Administration 64 (3): 46–55.
- Quigley, K. 2004. “The Emperor’s New Computers: Y2K (Re)Visited.” Public Administration 82 (4): 801–829.
- Research Council of Norway . 2014. “Research for a Safer Society, Research Programme on Societal Security and Risk – SAMRISK.” http://ec.europa.eu/DocsRoom/documents/946/attachments/1/translations/en/renditions/pdf, Accessed 20 May 2020.
- Rid, T. 2012. “Think Again: Cyberwar.” Foreign Policy 192 (March 2012): 81.
- Roe, P. 2004. Ethnic Violence and the Societal Security Dilemma . Florence: Routledge.
- Schuilenburg, M. 2012. “The Securitization of Society: On The Rise of Quasi-Criminal Law and Selective Exclusion.” Social Justice 38 (1/2): 73–89.
- Slayton, R. 2017. “What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security 41 (3): 72–109.
- Stevens, T. 2012. “A Cyberwar of Ideas? Deterrence and Norms in Cyberspace.” Contemporary Security Policy 33 (1): 148–170.
- Strategic Comments . 2017. “The WannaCry Ransomware Attack.” International Institute for Strategic Studies 23 (4): 7–9.
- Theiler, T. 2003. “Societal Security and Social Psychology.” Review of International Studies 29 (2): 249–268.
- Twitter . 2020. “Actual Ransom.” Accessed 1 October. https://twitter.com/actual_ransom.
- Valeriano, B. , and B. Jensen . 2019. “The Myth of the Cyber Offense: The Case for Restraint.” CATO Institute, January 15. Accessed 2 March 2020. https://www.cato.org/publications/policy-analysis/myth-cyber-offense-case-restraint.
- Wæver, O. 2000. “The EU as a Security Actor: Reflections from a Pessimistic Constructivist on Post Sovereign Security Orders.” In International Relations Theory and the Politics of European Integration , edited by M. Kelstrup , and M. C. Williams , 250–294. New York: Routledge.
- Waugh, P. 1998. “Army on Call for Year 2000 ‘Bug’ Trouble.” The Independent, September 11. Accessed 20 May 2020. https://www.independent.co.uk/news/army-on-call-for-year-2000-bug-trouble-1197312.html.
- Wetsman, N. 2020. “Woman Dies during a Ransomware attack on a German hospital.” The Verge, September 17. Accessed 26 September 2020. https://www.theverge.com/2020/9/17/21443851/death-ransomware-attack-hospital-germany-cybersecurity.