References
Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science and Engineering Ethics, 25, 993–1006. https://www.doi.org/10.1007/s11948-016-9864-0
Baram, G., & Menashri, H. (2019). Why can’t we be friends? Challenges to international cyberwarfare cooperation efforts and the way ahead. Comparative Strategy, 38(2), 89–97. https://doi.org/10.1080/01495933.2019.1573069
Barrett, E. (2017). On the relationship between the ethics and the law of war: Cyber operations and sublethal harm. Ethica & International Affairs, 31(4), 467–477. https://doi.org/10.1017/S0892679417000454
Baumgartner, F. M., Jones, B. D., & Mortensen, P. B. (2018). Punctuated equilibrium theory: Explaining stability and change in public policymaking. In C. M. Weible, & P. A. Sabatier (Eds.), Theories of the policy process (4th ed., pp. 71–132). Routledge. https://lccn.loc.gov/2017009463
Boeke, S., & Broeders, D. (2018). The deminitarisation of cyber conflict. Survival, 60(6), 73–90. https://doi.org/10.1080/00396338.2018.1542804
Boo, H. W. (2017). An assessment of North Korean cyber threats. The Journal of Eastern Asian Affairs, 31(1), 97–117. https://www.jstor.org/stable/44321274
Boys, J. D. (2018). The Clinton administration’s development and implementation of cybersecurity strategy (1993–2001). Intelligence and National Security, 33(5). https://doi.org/10.1080/02684527.2018.1449369
Bracken, P. (2017). Cyberwar and its strategic context.* Georgetown Journal of International Affairs, 18*(3), 147–157. https://doi.org/10.1353/gia.2017.0047
Bracknell, B. (2016). NATO approaches in response to ISIL and international terrorism. International Lawyer, 49(3), 417–426. https://scholar.smu.edu/cgi/viewcontent.cgi?article=4470&context=til
Brantly, A. F. (2016). The most governed ungovened space: Legal and oplicy constraints on military operations in cyberspace.* SAIS Review, 36*(2), 29–39. https://doi.org/10.1353/sais.2016.0018
Bureau of Counterterrorism. (n.d.). Foreign terrorist organizations. U.S. Department of State. Retrieved May 19, 2020, from https://www.state.gov/foreign-terroristorganizations/
Caplan, N. (2013). Cyber war. The challenge to national security. Global Security Studies 4(1), 93–115. http://globalsecuritystudies.com/Caplan%20Cyber.pdf
Congressional Research Service. (2019). U.S.-China tariff actions by the numbers. https://fas.org/sgp/crs/row/R45949.pdf
Cook, C. (2018). Cross-Border data access and active cyber defense: Assessing legislative options for a new international cybersecurity rulebook. Stanford Law & Policy Review, 29(2), 205–236. https://law.stanford.edu/wpcontent/uploads/2018/08/SLPR_Cook.pdf
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches (3rd ed.). Sage.
Dev, P. R. (2015). “Use of force” and “armed attack” thresholds in cyber conflict: The looming definitional gaps and the growing need for formal U.N. response. Texas International Law Jounral, 50(2), 379–399. https://texashistory.unt.edu/ark:/67531/metapth838918/
Dinniss, H. A. (2018). The threat of cyber terrorism and what international law should (try to) do about it. Georgetown Journal of International Affairs, 19, 43–50. https://doi.org/10.1353/gia.2018.0006
Dorn, W. (2018). Cyberpeacekeeping: A new role for the United Nations? Georgetown Journal of International Affairs, 18(3), 138–146. https://muse-jhuedu.ezp.waldenulibrary.org/article/700309
Efrony, D., & Shany, Y. (2018). A rule book on the shelf? Tallinn manual 2.0 on cyberoperations and subsequent state practice. American Journal of International Law, 112(4), 583–657. https://doi.org/10.1017/ajil.2018.86
Fatalities. (n.d.). United Nations peacekeeping. Retrieved November 27, 2020 from, https://peacekeeping.un.org/en/fatalities
Federica, G. (2018). NATO’s enhanced role in counter terrorism. Defence Against Terrorism Review, 10, 9–20. https://www.tmmm.tsk.tr/publication/datr/volume_10/01_NATOs_Enhanced_Role_in_CounterTerrorism.pdf
Fenton, H. A. (2019). Proportionality and its applicability in the realm of cyber-attacks. Duke Journal of Comparative & International Law, 29(2), 335–339. https://scholarship.law.duke.edu/djcil/vol29/iss2/6
Fidler, D. P. (2016). Cyberspace, terrorism and international law. Journal of Conflict & Security Law, 21(3), 475–493. https://doi.org/10.1093/jcsl/krw013
Finlay, L., & Payne, C. (2019). The attribution problem and cyber armed attacks. American Journal of International Law, 113, 202–206. https://doi.org/10.1017/aju.2019.35
Flink, C. M. (2017). Rethinking punctuated equilibrium theory: A public administration approach to budgetary changes. The Policy Studies Journal, 45(1), 101–120. https://doi.org/10.1111/psj.12114
Gaibulloev, K., & Sandler, T. (2019). Terrorism and affinity of nations. Public Choice, 178, 329–347. https://doi.org/10.1007/s11127-018-0611-8
Ghatak, S., Gold, A., & Prins, B. C. (2019). Domestic terrorism in democratic states: Understanding and addressing minority grievances. Journal of Conflict Resolution, 63(2), 439–467. https://doi.org/10.1177/0022002717734285
Goode, A. C. (2015). Cyberterrorists: The identification and classification of non-state actors who engage in cyber-hostilities. Military Law Review, 223(1), 157–197.
H.R.3270 - Active Cyber Defense Certainty Act. (n.d.). Congress.gov. Retrieved May 18, 2020, from https://www.congress.gov/bill/116th-congress/house-bill/3270
Haber, E., & Zarsky, T. (2017). Cybersecurity for infrastrucutre: A critical analysis. Florida State University Law Review, 44(2), 515–578. https://ir.law.fsu.edu/lr/vol44/iss2/3
Hansen, H. E., Memeth, S. C., & Mauslein, J. A. (2020). United Nations peacekeeping and terrorism: Short-Term risks and long-term benefits. International Interactions, 46(2), 199–226. https://doi.org/10.1080/03050629.2020.1725500
Hatch, B. B. (2018). Defining a class of cyber weapons as WMD: An examination of the merits. Journal of Strategic Study, 11(1), 43–61. https://doi.org/10.5038/1944-0472.11.1.1657
Healey, J. (2018). Who’s in control: Balance in cyber’s public-private sector partnerships. Georgetown Journal of International Affairs, 18(3), 120–130. https://doi.org/10.1353/gia.2017.0044
Hellmuth, D. (2018a). More similar than different: Of checks, balances, and German and American government responses to international terrorism. German Politics, 27(2), 265–281. https://doi.org/10.1080/09644008.2018.1443774
Hellmuth, D. (2018b). Of terrorism types and countermeasures: In need of a new framework. Comparative Strategy, 37(3), 155–174. https://doi.org/10.1080/01495933.2018.1486081
Hodgkinson, S. L. (2018). Crossing the line: The law of war and cyber engagement - applying the existing boby of law to this new national security threat. International Lawyer, 51(3), 613–628.
Hoffman, B. (2017). Inside terrorism (3rd ed.). Columbia University Press. Holt, T. J., & Kilger, M. (2012). Examining willingness to attack critical infrastructure online and offline. Crime and Delinquency, 778–872. https://doi.org/10.1177/0011128712452963
Hughes, M. J. (2011). British opinion and Russian terrorism in the 1880s. European History Quarterly, 41(2), 255–277. https://doi.org/10.1177/0265691411399039
Jarvis, L., & Macdonald, S. (2015). What is cyberterrorism? Findings from a survey of researchers. Terrorism and Political Violence, 27(4), 657–676. https://doi.org/10.1080/09546553.2013.847827
Jasko, K., LaFree, G., & Kruglanski, A. (2017). Quest for significance and violent extremism: The case of domestic radicalization. Political Psychology, 38(5), 815– 831. https://doi.org/10.1111/pops.12376
Jenkins, B. M., & Godges, J. P. (2011). The long shadow of 9/11: America’s response to terrorism. RAND corporation. https://www.rand.org/pubs/monographs/MG1107.html
Karlsrud, J. (2017). Towards UN counter-terrorism operations? Third World Quarterly, 38(6), 1215–1231. http://dx.doi.org/10.1080/01436597.2016.1268907
Klein, J. J. (2015). Deterring and dissuading cyberterrorism. Journal of Strategic Study, 8(4), 23–38. http://dx.doi.org/10.5038/1944-0472.8.4.1460
Koski, C., & Workman, S. (2018). Drawing practical lessons from punctuated equilibrium theory. Policy & Politics, 46(2), 293–308. https://doi.org/10.1332/030557318X15230061413778
Kosseff, J. (2018). Defining cybersecurity law. Iowa Law Review, 103(3), 985–1031. https://ilr.law.uiowa.edu/print/volume-103-issue-3/defining-cybersecurity-law/
Kuhlmann, J., & Van der Heijden, J. (2018). What is known about punctuated equilibrium theory? And what does that tell us about the construction, validation, and replication of knowledge in the policy sciences? Review of Policy Research, 35(2), 326–347. https://doi.org/10.1111/ropr.12283
László, K. (2018). Cyber security policy and strategy in the European Union and NATO. Revista Academiei Forţelor Terestre, 23(1), 16–24. https://doaj.org/article/229c48348c894f07a5c5d59280edb5a5
Loleski, S. (2019). From cold to cyber warriors: The origins and expansion of NSA’s tailored access operations (TAO) to shadow brokers. Intelligence and National Security, 34(1), 112–128. https://doi.org/10.1080/02684527.2018.1532627
Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199. https://doi.org/10.1080/17419166.2018.1496826
Matwyshyn, A. M. (2018). CYBER!. Brigham Young University Law Review, 2017(5), 1109–1196. https://digitalcommons.law.byu.edu/lawreview/vol2017/iss5/6/
Mazanec, B. M. (2016). Constraining norms for cyber warfare are unlikely. Georgetown Journal of International Affairs, 17(3), 100–109. https://doi.org/10.1353/gia.2016.0040
Merriam, S. B. (2009). Qualitative research: A guide to design and implementation. Wiley.
Mori, S. (2019). US technological competition with China: The military, industrial and digital network dimensions. Asia-Pacific Review, 26(1), 77–120. https://doi.org/10.1080/13439006.2019.1622871
Morkevičius, V. (2015). Power and order: The shared logics of realism and just war theory. International Studies Quarterly, 11–22. https://doi.org/10.1111/isqu.12152
Morse, J. M. (1994). Designing funded qualitative research. Sage.
Naím, M. (2017). Why democracies are at a disadvantage in cyber wars. *Journal of International Affairs, *70, 1–4. https://jia.sipa.columbia.edu/democraciesdisadvantage-cyber-wars
Nance, M., & Sampson, C. (2017). Hacking ISIS. How to destroy cyber jihad. Skyhorse Publishing.
National Commission of Terrorist Attacks upon the United States. (2004). The 9/11 commission report: Final report on the national commission on terrorist attacks upon the United States (1st ed.). https://9-11commission.gov/report/
Neely, P. R., & Allen, M. T. (2018). Policing cyber terrorism. Journal of Cybersecurity, 3(1), 13–18. https://doi.org/10.19030/jcr.v3i1.10227
Noone, H. (2019). Two-Level games and the policy process: Assessing domestic-foreign policy linkage theory. World Affairs, 182(2), 165–186. https://doi.org/10.1177/0043820019839074
Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266
Office of Public Affairs. (2016). ISIL-Linked Kosovo hacker sentenced to 20 years in prison. Department of Justice. https://www.justice.gov/opa/pr/isil-linked-kosovohacker-sentenced-20-years-prison
Osawa, J. (2017). The escalation of state sponsored cyberattack and national cyber security affairs: Is strategic cyber deterrence the key to solving the problem? AsiaPacific Review, 24(2), 113–131. https://doi.org/10.1080/13439006.2017.1406703
Patton, M. Q. (2015). Qualitative research & evaluation methods: Integrating theory and practice (4th ed.). Sage. Podgor, E. S. (2002). Computer crimes and the USA PATRIOT act. Criminal Justice, 17(2). https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=196247
Qureshi, W. A. (2019). Fourth- and fifth-generation warfare: Technology and perceptions. San Diego International Law Journal, 187–216. https://digital.sandiego.edu/ilj/vol21/iss1/7
Rapoport, D. C. (2013). The four waves of modern terror: International dimensions and consequences. In J. M. Hanhimaki, & B. Blumenau (Eds.), An international history of terrorism (pp. 282–310). Routledge. https://doi.org/10.4324/9780203093467
Rapoport, D. C. (2016). It is waves, not strains. Terrorism and Political Violence, 28(2), 217–224. https://doi.org/10.1080/09546553.2015.1112278
Rich, P. B. (2013). Understanding terror, terrorism, and their representations in media and culture. Studies in Conflist & Terrorism, 36(3), 255–277. https://doi.org/10.1080/1057610X.2013.755915
Roberts, A. (2015). Terrorism research: Past, present, and future. Studies in Conflict & Terrorism, 38(1), 62–74. https://www.doi.org/10.1080/1057610X.2014.976011
Rudestam, K. E., & Newton, R. R. (2015). Surviving your dissertation: A comprehensive guide to content and process (4th ed.). Sage. Saldaña, J. (2016). The coding manual for qualitative researchers (3rd ed.). Sage. Schulzke, M. (2018). The politics of attributing blame for cyberattacks and the costs of uncertainty. Perspectives on Politics, 16(4), 954–968. https://doi.org/10.1017/S153759271800110X
Shad, M. R. (2018). Cyber threat in interstate relations: Case of US-Russia cyber tensions. Policy Perspectives, 14(2), 41–55. https://doi.org/10.13169/polipers.15.2.0041
Shor, E. (2016). Counterterrorist legislation and subsequent terrorism: Does it work? Social Forces, 95(2), 525–557. https://doi.org/10.1093/sf/sow052
Sleat, M. (2017). Just cyber war?: Casus belli, information ethics, and the human perspective. Review of International Studies, 44(2), 324–342. https://doi.org/10.1017/S026021051700047X
Tabansky, L. (2018). Sticking to their guns: The missing RMA for cybersecurity. Military Cyber Affairs, 3(1), 1–21. https://doi.org/10.5038/2378-0789.3.1.1039
Taylor, I. (2017). Just war theory and the military response to terrorism. Social Theory & Practice, 717–740. https://www.jstor.org/stable/26405304
Tehrani, P. M. (2017). Cyberterrorism: The legal and enforcement issues. World Scientific Publishing Europe Ltd.
UN. (1945, June 26). Charter of the United Nations. United Nations. https://www.un.org/en/charter-united-nations/index.html
Van Dine, A. (2020). When is cyber defense a crime? Evaluating active cyber defense measures under the Budapest Convention. Chicago Journal of International Law, 20(2), 532–563. https://chicagounbound.uchicago.edu/cjil/vol20/iss2/18
Walzer, M. (2007). Michael Walzer on terrorism and just war. IAS. https://www.ias.edu/ideas/2007/walzer-terrorism-just-war
Warf, B., & Fekete, E. (2016). Relational geographies of cyberterrorism and cyberwar. Space and Polity, 20(2), 143–157. https://doi.org/10.1080/13562576.2015.1112113
Weiss, M., & Jankauskas, V. (2018). Securing cyberspace: How states design governance arrangements. Governance, 32(2), 259–275. https://doi.org/10.1111/gove.12368
White, J. (2016). Cyber threats and cyber security: National security issues, policy and strategies. Global Security Studies, 7(4), 24–33. http://www.globalsecuritystudies.com/White%20Cyber.docx.pdf
Wilner, A. S. (2020). US cyber deterrence: Practice guiding theory. Journal of Strategic Studies, 43(2), 245–280. https://doi.org/10.1080/01402390.2018.1563779
Wirtz, J. J. (2017). The cyber Pearl Harbor. Intelligence and National Security, 32(6), 758–767. https://doi.org/10.1080/02684527.2017.1294379
Table of Contents
- Chapter 1 - Introduction to the Study
- Chapter 2 - Literature Review
- Chapter 3 - Research Method
- Chapter 4 - Results
- Chapter 5 - Discussion, Conclusions, and Recommendations
- References
- Appendix A - Interview Protocol
- Appendix B - Interview Questions
- Appendix C - Second Cycle Codes