[1]
University of Exeter, ‘Security Studies: LibGuide’. [Online]. Available: https://libguides.exeter.ac.uk/security
[2]
J. P. Carlin, ‘Introduction - “The Code War” [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat’, in The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat, First edition., New York: PublicAffairs, 2019, pp. 31–64 [Online]. Available: http://readinglists.exeter.ac.uk/Resource%20List%20Odd%20Links/SECM009S/The%20Code%20War.pdf
[3]
P. W. Singer and A. Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press, 2014 [Online]. Available: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991003191999707446&context=L&vid=44UOEX_INST:default
[4]
N. Horton and A. DeSimone, ‘“Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace”’, 2018. [Online]. Available: https://apps.dtic.mil/docs/citations/AD1046744
[5]
HMG, ‘National Cyber Security Strategy 2016 to 2021’, 2016. [Online]. Available: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
[6]
HMG, ‘The UK Cyber Security Strategy’, 2011. [Online]. Available: https://www.gov.uk/government/publications/cyber-security-strategy
[7]
D. Steed, ‘Chapter 4 - “The Strategic Implications of Cyber Warfare” [in] Cyber Warfare: A Multidisciplinary Analysis’, in Cyber Warfare: A Multidisciplinary Analysis, London: Routledge, 2015, pp. 73–95 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=4b343b69-2905-e911-80cd-005056af4099
[8]
K. Zetter, ‘Chapter 4 - “Stuxnet Deconstructed” [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon’, in Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon, First Edition., New York: Crown Publishers, 2014, pp. 52–68 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=bb96accd-021b-e911-80cd-005056af4099
[9]
K. H. Jamieson, Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know. New York, NY: Oxford University Press, 2018 [Online]. Available: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008313999707446&context=L&vid=44UOEX_INST:default
[10]
D. E. Sanger, The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. Melbourne: Scribe, 2018 [Online]. Available: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542419707446&context=L&vid=44UOEX_INST:default
[11]
F. M. Kaplan, ‘Chapter 5 - “Solar Sunrise, Moonlight Maze” [in] Dark Territory: The Secret History of Cyber War’, in Dark Territory: The Secret History of Cyber War, New York: Simon & Schuster, 2016, pp. 73–88 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=a76f414c-821d-e911-80cd-005056af4099
[12]
E. Protalinski, ‘NSA: Cybercrime is “the Greatest Transfer of Wealth in History”’, 2012. [Online]. Available: https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/
[13]
E. J. Epstein, ‘“Epilogue: The Snowden Effect” [in] How America Lost its Secrets: Edward Snowden, the Man and the Theft’, in How America Lost its Secrets: Edward Snowden, the Man and the Theft, First Vintage Books edition., New York: Vintage Books, 2017, pp. 299–304 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=53938cd4-821d-e911-80cd-005056af4099
[14]
R. Botsman, ‘Chapter 7 - “Rated: Would Your Life Get a Good Trust Score?” [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart’, in Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart, London: Portfolio Penguin, 2017, pp. 150–176 [Online]. Available: https://contentstore.cla.co.uk/secure/link?id=88381a7f-2a05-e911-80cd-005056af4099
[15]
Y. N. Harari, ‘“Why Technology Favors Tyranny” [in] The Atlantic’, 2018. [Online]. Available: https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/
[16]
‘MIT Technology Review (Vol. 121:5)’, vol. 121, no. 5, 2018 [Online]. Available: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991000509279707446&context=L&vid=44UOEX_INST:default
[17]
A. Thierer and C. W. Crews Jr., Who Rules the Net?: Internet Governance and Jurisdiction. Washington, D.C.: Cato Institute, 2003 [Online]. Available: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542569707446&context=L&vid=44UOEX_INST:default
[18]
‘Foreign Affairs’, 2018 [Online]. Available: https://libguides.exeter.ac.uk/c.php?g=654721&p=4706721
[19]
E. Korzak, ‘“UN GGE on Cybersecurity: The End of an Era?” [in] The Diplomat’, 2017. [Online]. Available: https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/