@inbook{Botsman_2017, address={London}, title={Chapter 7 - ‘Rated: Would Your Life Get a Good Trust Score?’ [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart}, url={https://contentstore.cla.co.uk/secure/link?id=88381a7f-2a05-e911-80cd-005056af4099}, booktitle={Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart}, publisher={Portfolio Penguin}, author={Botsman, Rachel}, year={2017}, pages={150–176} }
@inbook{Carlin_2019, address={New York}, edition={First edition}, title={Introduction - ‘The Code War’ [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat}, url={http://readinglists.exeter.ac.uk/Resource%20List%20Odd%20Links/SECM009S/The%20Code%20War.pdf}, booktitle={The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat}, publisher={PublicAffairs}, author={Carlin, John P.}, year={2019}, pages={31–64} }
@inbook{Epstein_2017, address={New York}, edition={First Vintage Books edition}, title={‘Epilogue: The Snowden Effect’ [in] How America Lost its Secrets: Edward Snowden, the Man and the Theft}, url={https://contentstore.cla.co.uk/secure/link?id=53938cd4-821d-e911-80cd-005056af4099}, booktitle={How America Lost its Secrets: Edward Snowden, the Man and the Theft}, publisher={Vintage Books}, author={Epstein, Edward Jay}, year={2017}, pages={299–304} }
@misc{Harari_2018, title={‘Why Technology Favors Tyranny’ [in] The Atlantic}, url={https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/}, author={Harari, Yuval Noah}, year={2018} }
@misc{2011, title={The UK Cyber Security Strategy}, url={https://www.gov.uk/government/publications/cyber-security-strategy}, author={HMG}, year={2011} }
@misc{HMG_2016, title={National Cyber Security Strategy 2016 to 2021}, url={https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021}, author={HMG}, year={2016} }
@misc{Horton_DeSimone_2018, title={‘Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace’}, url={https://apps.dtic.mil/docs/citations/AD1046744}, author={Horton, Nicholas and DeSimone, Antonio}, year={2018} }
@book{Jamieson_2018, address={New York, NY}, title={Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know}, url={https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008313999707446&context=L&vid=44UOEX_INST:default}, publisher={Oxford University Press}, author={Jamieson, Kathleen Hall}, year={2018} }
@inbook{Kaplan_2016, address={New York}, title={Chapter 5 - ‘Solar Sunrise, Moonlight Maze’ [in] Dark Territory: The Secret History of Cyber War}, url={https://contentstore.cla.co.uk/secure/link?id=a76f414c-821d-e911-80cd-005056af4099}, booktitle={Dark Territory: The Secret History of Cyber War}, publisher={Simon & Schuster}, author={Kaplan, Fred M.}, year={2016}, pages={73–88} }
@misc{Korzak_2017, title={‘UN GGE on Cybersecurity: The End of an Era?’ [in] The Diplomat}, url={https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/}, author={Korzak, Elaine}, year={2017} }
@misc{Protalinski_2012, title={NSA: Cybercrime is ‘the Greatest Transfer of Wealth in History’}, url={https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/}, author={Protalinski, Emil}, year={2012} }
@book{Sanger_2018, address={Melbourne}, title={The Perfect Weapon: War, Sabotage and Fear in the Cyber Age}, url={https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542419707446&context=L&vid=44UOEX_INST:default}, publisher={Scribe}, author={Sanger, David E.}, year={2018} }
@book{Singer_Friedman_2014, address={New York}, title={Cybersecurity and Cyberwar: What Everyone Needs to Know}, url={https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991003191999707446&context=L&vid=44UOEX_INST:default}, publisher={Oxford University Press}, author={Singer, P. W. and Friedman, Allan}, year={2014} }
@inbook{Steed_2015, address={London}, title={Chapter 4 - ‘The Strategic Implications of Cyber Warfare’ [in] Cyber Warfare: A Multidisciplinary Analysis}, url={https://contentstore.cla.co.uk/secure/link?id=4b343b69-2905-e911-80cd-005056af4099}, booktitle={Cyber Warfare: A Multidisciplinary Analysis}, publisher={Routledge}, author={Steed, Danny}, year={2015}, pages={73–95} }
@book{Thierer_Crews Jr._2003, address={Washington, D.C.}, title={Who Rules the Net?: Internet Governance and Jurisdiction}, url={https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542569707446&context=L&vid=44UOEX_INST:default}, publisher={Cato Institute}, author={Thierer, Adam and Crews Jr., Clyde Wayne}, year={2003} }
@misc{University of Exeter, title={Security Studies: LibGuide}, url={https://libguides.exeter.ac.uk/security}, author={University of Exeter} }
@inbook{Zetter_2014, address={New York}, edition={First Edition}, title={Chapter 4 - ‘Stuxnet Deconstructed’ [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon}, url={https://contentstore.cla.co.uk/secure/link?id=bb96accd-021b-e911-80cd-005056af4099}, booktitle={Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon}, publisher={Crown Publishers}, author={Zetter, Kim}, year={2014}, pages={52–68} }
@article{MIT Technology Review (Vol. 121:5)_2018, volume={121}, url={https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991000509279707446&context=L&vid=44UOEX_INST:default}, number={5}, year={2018} }
@article{Foreign Affairs_2018, address={New York}, url={https://libguides.exeter.ac.uk/c.php?g=654721&p=4706721}, publisher={Council on Foreign Relations}, year={2018} }