Link Search Menu Expand Document
  1. References

References

Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics, 25, 993–1006. https://www.doi.org/10.1007/s11948-016-9864-0

Baram, G., & Menashri, H. (2019). Why can’t we be friends? Challenges to international cyberwarfare cooperation efforts and the way ahead. Comparative Strategy, 38(2), 89–97. https://doi.org/10.1080/01495933.2019.1573069

Barrett, E. (2017). On the relationship between the ethics and the law of war: Cyber operations and sublethal harm. Ethica & International Affairs, 31(4), 467–477. https://doi.org/10.1017/S0892679417000454

Baumgartner, F. M., Jones, B. D., & Mortensen, P. B. (2018). Punctuated equilibrium theory: Explaining stability and change in public policymaking. In C. M. Weible, & P. A. Sabatier (Eds.), Theories of the policy process (4th ed., pp. 71–132). Routledge. https://lccn.loc.gov/2017009463

Boeke, S., & Broeders, D. (2018). The deminitarisation of cyber conflict. Survival, 60(6), 73–90. https://doi.org/10.1080/00396338.2018.1542804

Boo, H. W. (2017). An assessment of North Korean cyber threats. The Journal of Eastern Asian Affairs, 31(1), 97–117. https://www.jstor.org/stable/44321274

Boys, J. D. (2018). The Clinton administration’s development and implementation of cybersecurity strategy (1993–2001). Intelligence and National Security, 33(5). https://doi.org/10.1080/02684527.2018.1449369

Bracken, P. (2017). Cyberwar and its strategic context.* Georgetown Journal of International Affairs, 18*(3), 147–157. https://doi.org/10.1353/gia.2017.0047

Bracknell, B. (2016). NATO approaches in response to ISIL and international terrorism. International Lawyer, 49(3), 417–426. https://scholar.smu.edu/cgi/viewcontent.cgi?article=4470&context=til

Brantly, A. F. (2016). The most governed ungovened space: Legal and oplicy constraints on military operations in cyberspace.* SAIS Review, 36*(2), 29–39. https://doi.org/10.1353/sais.2016.0018

Bureau of Counterterrorism. (n.d.). Foreign terrorist organizations. U.S. Department of State. Retrieved May 19, 2020, from https://www.state.gov/foreign-terroristorganizations/

Caplan, N. (2013). Cyber war. The challenge to national security. Global Security Studies 4(1), 93–115. http://globalsecuritystudies.com/Caplan%20Cyber.pdf

Congressional Research Service. (2019). U.S.-China tariff actions by the numbers. https://fas.org/sgp/crs/row/R45949.pdf

Cook, C. (2018). Cross-Border data access and active cyber defense: Assessing legislative options for a new international cybersecurity rulebook. Stanford Law & Policy Review, 29(2), 205–236. https://law.stanford.edu/wpcontent/uploads/2018/08/SLPR_Cook.pdf

Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches (3rd ed.). Sage.

Dev, P. R. (2015). “Use of force” and “armed attack” thresholds in cyber conflict: The looming definitional gaps and the growing need for formal U.N. response. Texas International Law Jounral, 50(2), 379–399. https://texashistory.unt.edu/ark:/67531/metapth838918/

Dinniss, H. A. (2018). The threat of cyber terrorism and what international law should (try to) do about it. Georgetown Journal of International Affairs, 19, 43–50. https://doi.org/10.1353/gia.2018.0006

Dorn, W. (2018). Cyberpeacekeeping: A new role for the United Nations? Georgetown Journal of International Affairs, 18(3), 138–146. https://muse-jhuedu.ezp.waldenulibrary.org/article/700309

Efrony, D., & Shany, Y. (2018). A rule book on the shelf? Tallinn manual 2.0 on cyberoperations and subsequent state practice. American Journal of International Law, 112(4), 583–657. https://doi.org/10.1017/ajil.2018.86

Fatalities. (n.d.). United Nations peacekeeping. Retrieved November 27, 2020 from, https://peacekeeping.un.org/en/fatalities

Federica, G. (2018). NATO’s enhanced role in counter terrorism. Defence Against Terrorism Review, 10, 9–20. https://www.tmmm.tsk.tr/publication/datr/volume_10/01_NATOs_Enhanced_Role_in_CounterTerrorism.pdf

Fenton, H. A. (2019). Proportionality and its applicability in the realm of cyber-attacks. Duke Journal of Comparative & International Law, 29(2), 335–339. https://scholarship.law.duke.edu/djcil/vol29/iss2/6

Fidler, D. P. (2016). Cyberspace, terrorism and international law. Journal of Conflict & Security Law, 21(3), 475–493. https://doi.org/10.1093/jcsl/krw013

Finlay, L., & Payne, C. (2019). The attribution problem and cyber armed attacks. American Journal of International Law, 113, 202–206. https://doi.org/10.1017/aju.2019.35

Flink, C. M. (2017). Rethinking punctuated equilibrium theory: A public administration approach to budgetary changes. The Policy Studies Journal, 45(1), 101–120. https://doi.org/10.1111/psj.12114

Gaibulloev, K., & Sandler, T. (2019). Terrorism and affinity of nations. Public Choice, 178, 329–347. https://doi.org/10.1007/s11127-018-0611-8

Ghatak, S., Gold, A., & Prins, B. C. (2019). Domestic terrorism in democratic states: Understanding and addressing minority grievances. Journal of Conflict Resolution, 63(2), 439–467. https://doi.org/10.1177/0022002717734285

Goode, A. C. (2015). Cyberterrorists: The identification and classification of non-state actors who engage in cyber-hostilities. Military Law Review, 223(1), 157–197.

H.R.3270 - Active Cyber Defense Certainty Act. (n.d.). Congress.gov. Retrieved May 18, 2020, from https://www.congress.gov/bill/116th-congress/house-bill/3270

Haber, E., & Zarsky, T. (2017). Cybersecurity for infrastrucutre: A critical analysis. Florida State University Law Review, 44(2), 515–578. https://ir.law.fsu.edu/lr/vol44/iss2/3

Hansen, H. E., Memeth, S. C., & Mauslein, J. A. (2020). United Nations peacekeeping and terrorism: Short-Term risks and long-term benefits. International Interactions, 46(2), 199–226. https://doi.org/10.1080/03050629.2020.1725500

Hatch, B. B. (2018). Defining a class of cyber weapons as WMD: An examination of the merits. Journal of Strategic Study, 11(1), 43–61. https://doi.org/10.5038/1944-0472.11.1.1657

Healey, J. (2018). Who’s in control: Balance in cyber’s public-private sector partnerships. Georgetown Journal of International Affairs, 18(3), 120–130. https://doi.org/10.1353/gia.2017.0044

Hellmuth, D. (2018a). More similar than different: Of checks, balances, and German and American government responses to international terrorism. German Politics, 27(2), 265–281. https://doi.org/10.1080/09644008.2018.1443774

Hellmuth, D. (2018b). Of terrorism types and countermeasures: In need of a new framework. Comparative Strategy, 37(3), 155–174. https://doi.org/10.1080/01495933.2018.1486081

Hodgkinson, S. L. (2018). Crossing the line: The law of war and cyber engagement - applying the existing boby of law to this new national security threat. International Lawyer, 51(3), 613–628.

Hoffman, B. (2017). Inside terrorism (3rd ed.). Columbia University Press. Holt, T. J., & Kilger, M. (2012). Examining willingness to attack critical infrastructure online and offline. Crime and Delinquency, 778–872. https://doi.org/10.1177/0011128712452963

Hughes, M. J. (2011). British opinion and Russian terrorism in the 1880s. European History Quarterly, 41(2), 255–277. https://doi.org/10.1177/0265691411399039

Jarvis, L., & Macdonald, S. (2015). What is cyberterrorism? Findings from a survey of researchers. Terrorism and Political Violence, 27(4), 657–676. https://doi.org/10.1080/09546553.2013.847827

Jasko, K., LaFree, G., & Kruglanski, A. (2017). Quest for significance and violent extremism: The case of domestic radicalization. Political Psychology, 38(5), 815– 831. https://doi.org/10.1111/pops.12376

Jenkins, B. M., & Godges, J. P. (2011). The long shadow of 9/11: America’s response to terrorism. RAND corporation. https://www.rand.org/pubs/monographs/MG1107.html

Karlsrud, J. (2017). Towards UN counter-terrorism operations? Third World Quarterly, 38(6), 1215–1231. http://dx.doi.org/10.1080/01436597.2016.1268907

Klein, J. J. (2015). Deterring and dissuading cyberterrorism. Journal of Strategic Study, 8(4), 23–38. http://dx.doi.org/10.5038/1944-0472.8.4.1460

Koski, C., & Workman, S. (2018). Drawing practical lessons from punctuated equilibrium theory. Policy & Politics, 46(2), 293–308. https://doi.org/10.1332/030557318X15230061413778

Kosseff, J. (2018). Defining cybersecurity law. Iowa Law Review, 103(3), 985–1031. https://ilr.law.uiowa.edu/print/volume-103-issue-3/defining-cybersecurity-law/

Kuhlmann, J., & Van der Heijden, J. (2018). What is known about punctuated equilibrium theory? And what does that tell us about the construction, validation, and replication of knowledge in the policy sciences? Review of Policy Research, 35(2), 326–347. https://doi.org/10.1111/ropr.12283

László, K. (2018). Cyber security policy and strategy in the European Union and NATO. Revista Academiei Forţelor Terestre, 23(1), 16–24. https://doaj.org/article/229c48348c894f07a5c5d59280edb5a5

Loleski, S. (2019). From cold to cyber warriors: The origins and expansion of NSA’s tailored access operations (TAO) to shadow brokers. Intelligence and National Security, 34(1), 112–128. https://doi.org/10.1080/02684527.2018.1532627

Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199. https://doi.org/10.1080/17419166.2018.1496826

Matwyshyn, A. M. (2018). CYBER!. Brigham Young University Law Review, 2017(5), 1109–1196. https://digitalcommons.law.byu.edu/lawreview/vol2017/iss5/6/

Mazanec, B. M. (2016). Constraining norms for cyber warfare are unlikely. Georgetown Journal of International Affairs, 17(3), 100–109. https://doi.org/10.1353/gia.2016.0040

Merriam, S. B. (2009). Qualitative research: A guide to design and implementation. Wiley.

Mori, S. (2019). US technological competition with China: The military, industrial and digital network dimensions. Asia-Pacific Review, 26(1), 77–120. https://doi.org/10.1080/13439006.2019.1622871

Morkevičius, V. (2015). Power and order: The shared logics of realism and just war theory. International Studies Quarterly, 11–22. https://doi.org/10.1111/isqu.12152

Morse, J. M. (1994). Designing funded qualitative research. Sage.

Naím, M. (2017). Why democracies are at a disadvantage in cyber wars. *Journal of International Affairs, *70, 1–4. https://jia.sipa.columbia.edu/democraciesdisadvantage-cyber-wars

Nance, M., & Sampson, C. (2017). Hacking ISIS. How to destroy cyber jihad. Skyhorse Publishing.

National Commission of Terrorist Attacks upon the United States. (2004). The 9/11 commission report: Final report on the national commission on terrorist attacks upon the United States (1st ed.). https://9-11commission.gov/report/

Neely, P. R., & Allen, M. T. (2018). Policing cyber terrorism. Journal of Cybersecurity, 3(1), 13–18. https://doi.org/10.19030/jcr.v3i1.10227

Noone, H. (2019). Two-Level games and the policy process: Assessing domestic-foreign policy linkage theory. World Affairs, 182(2), 165–186. https://doi.org/10.1177/0043820019839074

Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266

Office of Public Affairs. (2016). ISIL-Linked Kosovo hacker sentenced to 20 years in prison. Department of Justice. https://www.justice.gov/opa/pr/isil-linked-kosovohacker-sentenced-20-years-prison

Osawa, J. (2017). The escalation of state sponsored cyberattack and national cyber security affairs: Is strategic cyber deterrence the key to solving the problem? AsiaPacific Review, 24(2), 113–131. https://doi.org/10.1080/13439006.2017.1406703

Patton, M. Q. (2015). Qualitative research & evaluation methods: Integrating theory and practice (4th ed.). Sage. Podgor, E. S. (2002). Computer crimes and the USA PATRIOT act. Criminal Justice, 17(2). https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=196247

Qureshi, W. A. (2019). Fourth- and fifth-generation warfare: Technology and perceptions. San Diego International Law Journal, 187–216. https://digital.sandiego.edu/ilj/vol21/iss1/7

Rapoport, D. C. (2013). The four waves of modern terror: International dimensions and consequences. In J. M. Hanhimaki, & B. Blumenau (Eds.), An international history of terrorism (pp. 282–310). Routledge. https://doi.org/10.4324/9780203093467

Rapoport, D. C. (2016). It is waves, not strains. Terrorism and Political Violence, 28(2), 217–224. https://doi.org/10.1080/09546553.2015.1112278

Rich, P. B. (2013). Understanding terror, terrorism, and their representations in media and culture. Studies in Conflist & Terrorism, 36(3), 255–277. https://doi.org/10.1080/1057610X.2013.755915

Roberts, A. (2015). Terrorism research: Past, present, and future. Studies in Conflict & Terrorism, 38(1), 62–74. https://www.doi.org/10.1080/1057610X.2014.976011

Rudestam, K. E., & Newton, R. R. (2015). Surviving your dissertation: A comprehensive guide to content and process (4th ed.). Sage. Saldaña, J. (2016). The coding manual for qualitative researchers (3rd ed.). Sage. Schulzke, M. (2018). The politics of attributing blame for cyberattacks and the costs of uncertainty. Perspectives on Politics, 16(4), 954–968. https://doi.org/10.1017/S153759271800110X

Shad, M. R. (2018). Cyber threat in interstate relations: Case of US-Russia cyber tensions. Policy Perspectives, 14(2), 41–55. https://doi.org/10.13169/polipers.15.2.0041

Shor, E. (2016). Counterterrorist legislation and subsequent terrorism: Does it work? Social Forces, 95(2), 525–557. https://doi.org/10.1093/sf/sow052

Sleat, M. (2017). Just cyber war?: Casus belli, information ethics, and the human perspective. Review of International Studies, 44(2), 324–342. https://doi.org/10.1017/S026021051700047X

Tabansky, L. (2018). Sticking to their guns: The missing RMA for cybersecurity. Military Cyber Affairs, 3(1), 1–21. https://doi.org/10.5038/2378-0789.3.1.1039

Taylor, I. (2017). Just war theory and the military response to terrorism. Social Theory & Practice, 717–740. https://www.jstor.org/stable/26405304

Tehrani, P. M. (2017). Cyberterrorism: The legal and enforcement issues. World Scientific Publishing Europe Ltd.

UN. (1945, June 26). Charter of the United Nations. United Nations. https://www.un.org/en/charter-united-nations/index.html

Van Dine, A. (2020). When is cyber defense a crime? Evaluating active cyber defense measures under the Budapest Convention. Chicago Journal of International Law, 20(2), 532–563. https://chicagounbound.uchicago.edu/cjil/vol20/iss2/18

Walzer, M. (2007). Michael Walzer on terrorism and just war. IAS. https://www.ias.edu/ideas/2007/walzer-terrorism-just-war

Warf, B., & Fekete, E. (2016). Relational geographies of cyberterrorism and cyberwar. Space and Polity, 20(2), 143–157. https://doi.org/10.1080/13562576.2015.1112113

Weiss, M., & Jankauskas, V. (2018). Securing cyberspace: How states design governance arrangements. Governance, 32(2), 259–275. https://doi.org/10.1111/gove.12368

White, J. (2016). Cyber threats and cyber security: National security issues, policy and strategies. Global Security Studies, 7(4), 24–33. http://www.globalsecuritystudies.com/White%20Cyber.docx.pdf

Wilner, A. S. (2020). US cyber deterrence: Practice guiding theory. Journal of Strategic Studies, 43(2), 245–280. https://doi.org/10.1080/01402390.2018.1563779

Wirtz, J. J. (2017). The cyber Pearl Harbor. Intelligence and National Security, 32(6), 758–767. https://doi.org/10.1080/02684527.2017.1294379


Table of Contents