The Limits of Deterrence Theory in Cyberspace

[1]  M. Taddeo Deterrence by Norms to Stop Interstate Cyber Attacks , 2017, Minds and Machines.

[2]  M. Taddeo Cyber Conflicts and Political Power in Information Societies , 2017, Minds and Machines.

[3]  B. Schneier Why the NSA Makes Us More Vulnerable to Cyberattacks , 2017 .

[4]  George E. Tita,et al.  National Security Strategy , 2017 .

[5]  N. J. Ryan,et al.  Five Kinds of Cyber Deterrence , 2017, Philosophy & Technology.

[6]  L. Floridi,et al.  Artificial Intelligence and the ‘Good Society’: the US, EU, and UK approach , 2016, Science and Engineering Ethics.

[7]  Mariarosaria Taddeo,et al.  On the Risks of Relying on Analogies to Understand Cyber Conflicts , 2016, Minds and Machines.

[8]  R. Dipert THE ESSENTIAL FEATURES OF AN ONTOLOGY FOR CYBERWARFARE , 2016 .

[9]  L. Floridi The Ethics of Information Warfare , 2014 .

[10]  Emilio Iasiello,et al.  Is Cyber Deterrence an Illusory Course of Action , 2014 .

[11]  M. Taddeo Cyber Security and Individual Rights, Striking the Right Balance , 2013, Philosophy & Technology.

[12]  M. Martellini Cyber Security: Deterrence and IT Protection for Critical Infrastructures , 2013 .

[13]  Daniel S. Nagin,et al.  Deterrence in the Twenty-First Century , 2013, Crime and Justice.

[14]  T. Stevens,et al.  Analogical reasoning and cyber security , 2013, Security Dialogue.

[15]  Tim Stevens,et al.  A Cyberwar of Ideas? Deterrence and Norms in Cyberspace , 2012 .

[16]  Bernard Brodie,et al.  The Development of Nuclear Strategy , 2011 .

[17]  M. Taddeo Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.

[18]  Duncan B. Hollis,et al.  An e-SOS for Cyberspace , 2010 .

[19]  Eric Talbot Jensen,et al.  Cyber Warfare and Precautions Against the Effects of Attacks , 2010 .

[20]  Herbert S. Lin,et al.  Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities , 2009 .

[21]  Luciano Floridi,et al.  The Method of Levels of Abstraction , 2008, Minds and Machines.

[22]  Martin C. Libicki Defending Cyberspace and Other Metaphors , 2002 .

[23]  M. Curran,et al.  The Ethics of Information , 1991, The Journal of nursing administration.

[24]  R. Powell,et al.  Nuclear Deterrence Theory: The Search for Credibility , 1990 .

[25]  Robert Jervis,et al.  Realism, Game Theory, and Cooperation , 1988, World Politics.

[26]  Stephan Haggard,et al.  Theories of international regimes , 1987, International Organization.

[27]  Scott L. Feld,et al.  Deterrence , 1978 .

[28]  T. Schelling ARMS AND INFLUENCE , 1967, Sam Nunn.

[29]  T. Schelling,et al.  The Strategy of Conflict. , 1961 .

[30]  S. T. Possony Atomic Power and World Order , 1946, The Review of Politics.

[31]  H. V. Hentig Limits of Deterrence , 1938 .

[32]  M. Taddeo,et al.  Ethics and Policies for Cyber Operations , 2017 .

[33]  Annegret Bendiek,et al.  Deterrence theory in the cyber-century , 2015, GI-Jahrestagung.

[34]  S. Bologna,et al.  From Fortress to Resilience , 2013 .

[35]  Oona A. Hathaway,et al.  The Law of Cyber-Attack , 2012 .

[36]  Eric R. Sterner Retaliatory Deterrence in Cyberspace , 2011 .

[37]  Kenneth Geers,et al.  Sun Tzu and Cyber War , 2011 .

[38]  J. Nye Nuclear Lessons for Cyber Security , 2011 .

[39]  M. Crosston World Gone Cyber MAD How “ Mutually Assured Debilitation ” Is the Best Hope for Cyber Deterrence , 2011 .

[40]  W. Goodman Cyber Deterrence: Tougher in Theory than in Practice? , 2010 .

[41]  D. Clark Untangling Attribution , 2010 .

[42]  Joshua E. Kastenberg Changing the Paradigm of Internet Access from Government Information Systems: A Solution to the Need for the DOD to Take Time-Sensitive Action on the Niprnet , 2009 .

[43]  M. Bunn Can Deterrence Be Tailored? Strategic Forum, Number 225, January 2007 , 2007 .

[44]  B. Elliott,et al.  Deterrence Theory Revisited , 2003 .

[45]  Patrick M. Morgan,et al.  Deterrence Now: CAMBRIDGE STUDIES IN INTERNATIONAL RELATIONS , 2003 .

[46]  D. Marc Kilgour,et al.  Perfect Deterrence , 2000 .