Anon. 2018a. ‘Foreign Affairs’.
Anon. 2018b. ‘MIT Technology Review (Vol. 121:5)’. 121(5).
Botsman, Rachel. 2017. ‘Chapter 7 - “Rated: Would Your Life Get a Good Trust Score?” [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart’. Pp. 150–76 in Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. London: Portfolio Penguin.
Carlin, John P. 2019. ‘Introduction - “The Code War” [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat’. Pp. 31–64 in The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. New York: PublicAffairs.
Epstein, Edward Jay. 2017. ‘“Epilogue: The Snowden Effect” [in] How America Lost Its Secrets: Edward Snowden, the Man and the Theft’. Pp. 299–304 in How America Lost its Secrets: Edward Snowden, the Man and the Theft. New York: Vintage Books.
Harari, Yuval Noah. 2018. ‘“Why Technology Favors Tyranny” [in] The Atlantic’. Retrieved (https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/).
HMG. 2011. ‘The UK Cyber Security Strategy’. Retrieved (https://www.gov.uk/government/publications/cyber-security-strategy).
HMG. 2016. ‘National Cyber Security Strategy 2016 to 2021’. Retrieved (https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021).
Horton, Nicholas, and Antonio DeSimone. 2018. ‘“Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace”’. Retrieved (https://apps.dtic.mil/docs/citations/AD1046744).
Jamieson, Kathleen Hall. 2018. Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know. New York, NY: Oxford University Press.
Kaplan, Fred M. 2016. ‘Chapter 5 - “Solar Sunrise, Moonlight Maze” [in] Dark Territory: The Secret History of Cyber War’. Pp. 73–88 in Dark Territory: The Secret History of Cyber War. New York: Simon & Schuster.
Korzak, Elaine. 2017. ‘“UN GGE on Cybersecurity: The End of an Era?” [in] The Diplomat’. Retrieved (https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/).
Protalinski, Emil. 2012. ‘NSA: Cybercrime Is “the Greatest Transfer of Wealth in History”’. Retrieved (https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/).
Sanger, David E. 2018. The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. Melbourne: Scribe.
Singer, P. W., and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press.
Steed, Danny. 2015. ‘Chapter 4 - “The Strategic Implications of Cyber Warfare” [in] Cyber Warfare: A Multidisciplinary Analysis’. Pp. 73–95 in Cyber Warfare: A Multidisciplinary Analysis. London: Routledge.
Thierer, Adam, and Clyde Wayne Crews Jr. 2003. Who Rules the Net?: Internet Governance and Jurisdiction. Washington, D.C.: Cato Institute.
University of Exeter. n.d. ‘Security Studies: LibGuide’. Retrieved (https://libguides.exeter.ac.uk/security).
Zetter, Kim. 2014. ‘Chapter 4 - “Stuxnet Deconstructed” [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon’. Pp. 52–68 in Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. New York: Crown Publishers.