Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war
暂无分享,去创建一个
Ronald J. Deibert | Rafal Rohozinski | Masashi Crete-Nishihata | Rafal Rohozinski | Masashi Crete-Nishihata
[1] W. Bayles. The Ethics of Computer Network Attack , 2001, The US Army War College Quarterly: Parameters.
[2] Martin Dodge,et al. The Role of Maps in Virtual Research Methods , 2005 .
[3] Stuart Hannabuss,et al. Terror on the Internet: The New Arena, the New Challenges , 2007 .
[4] Daniel W. Drezner. The Global Governance of the Internet: Bringing the State Back In , 2004 .
[5] Paul Sturges,et al. Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .
[6] Myriam Dunn Cavelty,et al. Power and Security in the Information Age: Investigating the Role of the State in Cyberspace , 2007 .
[7] J. Nichol. Russia-Georgia Conflict in South Ossetia: Context and Implications for U.S. Interests , 2008 .
[8] Richard Rogers. Internet Research: The Question of Method—A Keynote Address from the YouTube and the 2008 Election Cycle in the United States Conference , 2010 .
[9] Johan Eriksson,et al. International Relations and Security in the Digital Age , 2007 .
[10] Shanthi Kalathil,et al. Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule , 2003, First Monday.
[11] Rafal Rohozinski,et al. Shifting Fire: Information Effects in Counterinsurgency and Stability Operations. A Workshop Report , 2006 .
[12] Daniele Ehrlich,et al. Analyzing Spatial Drivers in Quantitative Conflict Studies: The Potential and Challenges of Geographic Information Systems , 2009 .
[13] Jeffrey T. G. Kelsey. Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare , 2008 .
[14] Ronald J. Deibert,et al. Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.
[15] Ronald J. Deibert,et al. Beyond Denial: Introducing Next-Generation Information Access Controls , 2010, Access Controlled.
[16] R. Hughes. A treaty for cyberspace , 2010 .
[17] Ronald J. Deibert,et al. Measuring Global Internet Filtering , 2008 .
[18] James N. Rosenau,et al. Turbulence in World Politics: A Theory of Change and Continuity , 1990 .
[19] T. Thomas. The Bear Went Through the Mountain: Russia Appraises its Five-Day War in South Ossetia , 2009 .
[20] John Arquilla,et al. The Emergence of Noopolitik: Toward an American Information Strategy , 1999 .
[21] Robert Latham,et al. Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security , 2004 .
[22] Kihong Park,et al. The Internet as a Large-Scale Complex System , 2005, Santa Fe Institute Studies in the Sciences of Complexity.
[23] Kristin A. Cook,et al. Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .
[24] JAVIERCORRALES FRANKWESTHOFF,et al. Information Technology Adoption and Political Regimes , 2006 .
[25] A. George,et al. Case Studies and Theory Development in the Social Sciences , 2005 .
[26] Shanthi Kalathil,et al. Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule , 2003 .
[27] Roger N. McDermott,et al. Russia’s Conventional Armed Forces and the Georgian War , 2009, The US Army War College Quarterly: Parameters.
[28] K. Himma. The Handbook of Information and Computer Ethics , 2007 .
[29] Mary Manjikian,et al. From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik , 2010 .
[30] M. Dodge,et al. Mapping Cyberspace , 2000 .
[31] H. Nissenbaum,et al. Digital Disaster, Cyber Security, and the Copenhagen School , 2009 .
[32] Anat Ben-David,et al. The Palestinian—Israeli peace process and transnational issue networks: the complicated place of the Israeli NGO , 2008, New Media Soc..
[33] Giampiero Giacomello,et al. Bangs for the Buck: A Cost-Benefit Analysis of Cyberterrorism , 2004 .
[34] John Arquilla,et al. Chechnya: A Glimpse of Future Conflict? , 1999 .
[35] Joshua E. Kastenberg,et al. Georgia’s Cyber Left Hook , 2008, The US Army War College Quarterly: Parameters.
[36] Milton L. Mueller,et al. The Internet and Global Governance: Principles and Norms for a New Regime , 2007 .
[37] David F. DiMeo,et al. UNGOVERNED SPACES: Alternatives to State Authority in an Era of Softened Sovereignty , 2011 .
[38] Johan Eriksson,et al. The Information Revolution, Security, and International Relations: (IR)relevant Theory? , 2006 .