1.
University of Exeter. Security Studies: LibGuide [Internet]. Available from: https://libguides.exeter.ac.uk/security
2.
Carlin JP. Introduction - ‘The Code War’ [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat [Internet]. First edition. New York: PublicAffairs; 2019. p. 31–64. Available from: http://readinglists.exeter.ac.uk/Resource%20List%20Odd%20Links/SECM009S/The%20Code%20War.pdf
3.
Singer PW, Friedman A. Cybersecurity and Cyberwar: What Everyone Needs to Know [Internet]. New York: Oxford University Press; 2014. Available from: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991003191999707446&context=L&vid=44UOEX_INST:default
4.
Horton N, DeSimone A. ‘Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace’ [Internet]. 2018. Available from: https://apps.dtic.mil/docs/citations/AD1046744
5.
HMG. National Cyber Security Strategy 2016 to 2021 [Internet]. 2016. Available from: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
6.
HMG. The UK Cyber Security Strategy [Internet]. 2011. Available from: https://www.gov.uk/government/publications/cyber-security-strategy
7.
Steed D. Chapter 4 - ‘The Strategic Implications of Cyber Warfare’ [in] Cyber Warfare: A Multidisciplinary Analysis. Cyber Warfare: A Multidisciplinary Analysis [Internet]. London: Routledge; 2015. p. 73–95. Available from: https://contentstore.cla.co.uk/secure/link?id=4b343b69-2905-e911-80cd-005056af4099
8.
Zetter K. Chapter 4 - ‘Stuxnet Deconstructed’ [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Internet]. First Edition. New York: Crown Publishers; 2014. p. 52–68. Available from: https://contentstore.cla.co.uk/secure/link?id=bb96accd-021b-e911-80cd-005056af4099
9.
Jamieson KH. Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know [Internet]. New York, NY: Oxford University Press; 2018. Available from: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008313999707446&context=L&vid=44UOEX_INST:default
10.
Sanger DE. The Perfect Weapon: War, Sabotage and Fear in the Cyber Age [Internet]. Melbourne: Scribe; 2018. Available from: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542419707446&context=L&vid=44UOEX_INST:default
11.
Kaplan FM. Chapter 5 - ‘Solar Sunrise, Moonlight Maze’ [in] Dark Territory: The Secret History of Cyber War. Dark Territory: The Secret History of Cyber War [Internet]. New York: Simon & Schuster; 2016. p. 73–88. Available from: https://contentstore.cla.co.uk/secure/link?id=a76f414c-821d-e911-80cd-005056af4099
12.
Protalinski E. NSA: Cybercrime is ‘the Greatest Transfer of Wealth in History’ [Internet]. 2012. Available from: https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/
13.
Epstein EJ. ‘Epilogue: The Snowden Effect’ [in] How America Lost its Secrets: Edward Snowden, the Man and the Theft. How America Lost its Secrets: Edward Snowden, the Man and the Theft [Internet]. First Vintage Books edition. New York: Vintage Books; 2017. p. 299–304. Available from: https://contentstore.cla.co.uk/secure/link?id=53938cd4-821d-e911-80cd-005056af4099
14.
Botsman R. Chapter 7 - ‘Rated: Would Your Life Get a Good Trust Score?’ [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart [Internet]. London: Portfolio Penguin; 2017. p. 150–176. Available from: https://contentstore.cla.co.uk/secure/link?id=88381a7f-2a05-e911-80cd-005056af4099
15.
Harari YN. ‘Why Technology Favors Tyranny’ [in] The Atlantic [Internet]. 2018. Available from: https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/
16.
MIT Technology Review (Vol. 121:5). 2018;121(5). Available from: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991000509279707446&context=L&vid=44UOEX_INST:default
17.
Thierer A, Crews Jr. CW. Who Rules the Net?: Internet Governance and Jurisdiction [Internet]. Washington, D.C.: Cato Institute; 2003. Available from: https://exeter.primo.exlibrisgroup.com/discovery/fulldisplay?docid=alma991008542569707446&context=L&vid=44UOEX_INST:default
18.
Foreign Affairs. New York: Council on Foreign Relations; 2018; Available from: https://libguides.exeter.ac.uk/c.php?g=654721&p=4706721
19.
Korzak E. ‘UN GGE on Cybersecurity: The End of an Era?’ [in] The Diplomat [Internet]. 2017. Available from: https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/