Internet Security and Networked Governance in International Relations
暂无分享,去创建一个
[1] R. Coase. The Nature of the Firm , 1937 .
[2] Civil Service Recruitment , 1958 .
[3] Jeffrey H. Rohlfs. A theory of interdependent demand for a communications service , 1974 .
[4] O. Williamson. Markets and hierarchies, analysis and antitrust implications : a study in the economics of internal organization , 1975 .
[5] Mark S. Granovetter. Economic Action and Social Structure: The Problem of Embeddedness , 1985, American Journal of Sociology.
[6] H. Thorelli. Networks: Between Markets and Hierarchies , 1986 .
[7] O. Williamson,et al. The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting . By Oliver E. Williamson. (New York: Free Press, 1985. Pp. 450. $27.95.) , 1986 .
[8] R. Werle,et al. Policy Networks in the German Telecommunications Domain , 1991 .
[9] F. Scharpf,et al. Games in Hierarchies and Networks: Analytical and Empirical Approaches to the Study of Governance Institutions , 1994 .
[10] Laurent Joncheray,et al. Representation of IP Routing Policies in a Routing Registry (ripe-81++) , 1995, RFC.
[11] N. Economides. The economics of networks , 1996 .
[12] F. Scharpf. Games Real Actors Play: Actor-centered Institutionalism In Policy Research , 1997 .
[13] Anne-Marie Slaughter,et al. The Real New World Order , 1997 .
[14] Wolfgang H. Reinicke. Global Public Policy , 1997 .
[15] S. Borgatti,et al. A General Theory of Network Governance: Exchange Conditions and Social Mechanisms , 1997 .
[16] Tanja A. Börzel,et al. Organizing Babylon ‐ On the Different Conceptions of Policy Networks , 1998 .
[17] Reflections of the Evolving Concept of 'Private Policing' , 1999 .
[18] P. Adler. Market, Hierarchy, and Trust: The Knowledge Economy and the Future of Capitalism , 2001 .
[19] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[20] Karen Seo,et al. Public-key infrastructure for the Secure Border Gateway Protocol (S-BGP) , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[21] Kal Raustiala,et al. The Architecture of International Cooperation: Transgovernmental Networks and the Future of International Law , 2002 .
[22] Hans Klein,et al. ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy , 2002, Inf. Soc..
[23] Grahame F. Thompson,et al. Between Hierarchies and Markets , 2003 .
[24] Zeev Maoz,et al. International Relations: A Network Approach , 2003 .
[25] Grahame F. Thompson. Between Hierarchies and Markets: The Logic and Limits of Network Forms of Organization , 2003 .
[26] Joan V. Robinson,et al. The Nature of the Firm , 2004 .
[27] THE ENEMY WITHIN , 2004 .
[28] Michalis Faloutsos,et al. Analyzing BGP policies: methodology and tool , 2004, IEEE INFOCOM 2004.
[29] Anne-Marie Slaughter,et al. A New World Order , 2004 .
[30] E. Brophy. Ruling the Root: Internet Governance and the Taming of Cyberspace , 2004 .
[31] P. Howard. New Media Campaigns and the Managed Citizen , 2005 .
[32] Jürgen Bitzer,et al. Intrinsic motivation in open source software development , 2007 .
[33] E. Krahmann. Security Governance and Networks: New Theoretical Perspectives in Transatlantic Security , 2005 .
[34] M. Savage,et al. Social networks and the study of relations: networks as method, metaphor and form , 2006 .
[35] Stephen T. Kent,et al. An Infrastructure Supporting Secure Internet Routing , 2006, EuroPKI.
[36] M. Caparini,et al. Private actors and security governance , 2006 .
[37] Sheri Berman. Case Studies and Theory Development in the Social Sciences , 2007, Perspectives on Politics.
[38] Mette Eilstrup-Sangiovanni. Varieties of Cooperation: Government Networks in International Security , 2007 .
[39] Brian Fitzgerald,et al. Why Hackers Do What They Do: Understanding Motivation and Effort in Free/Open Source Software Projects , 2007 .
[40] David A. Lake,et al. The Politics of Networks: Interests, Power, and Human Rights Norms , 2007 .
[41] Michalis Faloutsos,et al. Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today? , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[42] Jock Given,et al. The wealth of networks: How social production transforms markets and freedom , 2007, Inf. Econ. Policy.
[43] E. Sørensen,et al. Theories of democratic network governance , 2007 .
[44] Myriam Dunn Cavelty. Cyber-Security and Threat Politics: US Efforts to Secure the Information Age , 2007 .
[45] Han Dorussen,et al. Intergovernmental Organizations and the Kantian Peace , 2008 .
[46] Reformatting Politics: Information Technology and Global Civil Society , 2008 .
[47] Emilie Marie Hafner-Burton,et al. Network Analysis for International Relations , 2008, International Organization.
[48] Tillmann Werner,et al. Proactive Botnet Countermeasures An Offensive Approach , 2009 .
[49] Doug Montgomery,et al. A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[50] A. Ohanyan. Policy Wars for Peace: Network Model of NGO Behavior , 2009 .
[51] Milton L. Mueller. Networks and States: The Global Politics of Internet Governance , 2010 .
[52] Patrick D. McDaniel,et al. A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.
[53] D. Clark. Untangling Attribution , 2010 .
[54] States, Citizens and the Privatization of Security: Introduction , 2010 .
[55] Mark Bowden. Worm: The First Digital World War , 2011 .
[56] Milton L. Mueller,et al. Negotiating a New Governance Hierarchy: An Analysis of the Conflicting Incentives to Secure Internet Routing , 2011 .
[57] Myriam Dunn Cavelty. From Cyber‐Bombs to Political Fallout: Threat Representations with an Impact in the Cyber‐Security Discourse , 2012 .
[58] Andreas Schmidt,et al. At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker , 2012 .
[59] Ronald J. Deibert,et al. Global Governance and the Spread of Cyberspace Controls , 2012 .
[60] J. P. Singh. Information Technologies, Meta-power, and Transformations in Global Politics† , 2013 .
[61] Archon Fung,et al. Six Models for the Internet + Politics , 2013 .
[62] R. Coase,et al. The Problem of Social Cost , 1960, The Journal of Law and Economics.
[63] D. Stetson,et al. The enemy within: endogenous retroelements and autoimmune disease , 2014, Nature Immunology.