[1]
Botsman, R. 2017. Chapter 7 - ‘Rated: Would Your Life Get a Good Trust Score?’ [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. Portfolio Penguin. 150–176.
[2]
Carlin, J.P. 2019. Introduction - ‘The Code War’ [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. PublicAffairs. 31–64.
[3]
Epstein, E.J. 2017. ‘Epilogue: The Snowden Effect’ [in] How America Lost its Secrets: Edward Snowden, the Man and the Theft. How America Lost its Secrets: Edward Snowden, the Man and the Theft. Vintage Books. 299–304.
[4]
Jamieson, K.H. 2018. Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know. Oxford University Press.
[5]
Kaplan, F.M. 2016. Chapter 5 - ‘Solar Sunrise, Moonlight Maze’ [in] Dark Territory: The Secret History of Cyber War. Dark Territory: The Secret History of Cyber War. Simon & Schuster. 73–88.
[6]
National Cyber Security Strategy 2016 to 2021: 2016. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021.
[7]
NSA: Cybercrime is ‘the Greatest Transfer of Wealth in History’: 2012. https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/.
[8]
Sanger, D.E. 2018. The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. Scribe.
[9]
Security Studies: LibGuide: https://libguides.exeter.ac.uk/security.
[10]
Singer, P.W. and Friedman, A. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
[11]
‘Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace’: 2018. https://apps.dtic.mil/docs/citations/AD1046744.
[12]
Steed, D. 2015. Chapter 4 - ‘The Strategic Implications of Cyber Warfare’ [in] Cyber Warfare: A Multidisciplinary Analysis. Cyber Warfare: A Multidisciplinary Analysis. Routledge. 73–95.
[13]
The UK Cyber Security Strategy: 2011. https://www.gov.uk/government/publications/cyber-security-strategy.
[14]
Thierer, A. and Crews Jr., C.W. 2003. Who Rules the Net?: Internet Governance and Jurisdiction. Cato Institute.
[15]
‘UN GGE on Cybersecurity: The End of an Era?’ [in] The Diplomat: 2017. https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/.
[16]
‘Why Technology Favors Tyranny’ [in] The Atlantic: 2018. https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/.
[17]
Zetter, K. 2014. Chapter 4 - ‘Stuxnet Deconstructed’ [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Crown Publishers. 52–68.
[18]
2018. Foreign Affairs. (2018).
[19]
2018. MIT Technology Review (Vol. 121:5). 121, 5 (2018).