Botsman, R. (2017). Chapter 7 - ‘Rated: Would Your Life Get a Good Trust Score?’ [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. In Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart (pp. 150–176). Portfolio Penguin. https://contentstore.cla.co.uk/secure/link?id=88381a7f-2a05-e911-80cd-005056af4099
Carlin, J. P. (2019). Introduction - ‘The Code War’ [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. In The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat (First edition, pp. 31–64). PublicAffairs. http://readinglists.exeter.ac.uk/Resource%20List%20Odd%20Links/SECM009S/The%20Code%20War.pdf
Epstein, E. J. (2017). ‘Epilogue: The Snowden Effect’ [in] How America Lost its Secrets: Edward Snowden, the Man and the Theft. In How America Lost its Secrets: Edward Snowden, the Man and the Theft (First Vintage Books edition, pp. 299–304). Vintage Books. https://contentstore.cla.co.uk/secure/link?id=53938cd4-821d-e911-80cd-005056af4099
Foreign Affairs. (2018). https://libguides.exeter.ac.uk/c.php?g=654721&p=4706721
Harari, Y. N. (2018). ‘Why Technology Favors Tyranny’ [in] The Atlantic. https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/
HMG. (2011). The UK Cyber Security Strategy. https://www.gov.uk/government/publications/cyber-security-strategy
HMG. (2016). National Cyber Security Strategy 2016 to 2021. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
Horton, N., & DeSimone, A. (2018). ‘Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace’. https://apps.dtic.mil/docs/citations/AD1046744
Jamieson, K. H. (2018). Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know. Oxford University Press. https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008313999707446&context=L&vid=44UOEX_INST:default
Kaplan, F. M. (2016). Chapter 5 - ‘Solar Sunrise, Moonlight Maze’ [in] Dark Territory: The Secret History of Cyber War. In Dark Territory: The Secret History of Cyber War (pp. 73–88). Simon & Schuster. https://contentstore.cla.co.uk/secure/link?id=a76f414c-821d-e911-80cd-005056af4099
Korzak, E. (2017). ‘UN GGE on Cybersecurity: The End of an Era?’ [in] The Diplomat. https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/
MIT Technology Review (Vol. 121:5). (2018). 121(5). https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991000509279707446&context=L&vid=44UOEX_INST:default
Protalinski, E. (2012). NSA: Cybercrime is ‘the Greatest Transfer of Wealth in History’. https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/
Sanger, D. E. (2018). The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. Scribe. https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542419707446&context=L&vid=44UOEX_INST:default
Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991003191999707446&context=L&vid=44UOEX_INST:default
Steed, D. (2015). Chapter 4 - ‘The Strategic Implications of Cyber Warfare’ [in] Cyber Warfare: A Multidisciplinary Analysis. In Cyber Warfare: A Multidisciplinary Analysis (pp. 73–95). Routledge. https://contentstore.cla.co.uk/secure/link?id=4b343b69-2905-e911-80cd-005056af4099
Thierer, A., & Crews Jr., C. W. (2003). Who Rules the Net?: Internet Governance and Jurisdiction. Cato Institute. https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542569707446&context=L&vid=44UOEX_INST:default
University of Exeter. (n.d.). Security Studies: LibGuide. https://libguides.exeter.ac.uk/security
Zetter, K. (2014). Chapter 4 - ‘Stuxnet Deconstructed’ [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. In Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (First Edition, pp. 52–68). Crown Publishers. https://contentstore.cla.co.uk/secure/link?id=bb96accd-021b-e911-80cd-005056af4099