1.
University of Exeter: Security Studies: LibGuide, https://libguides.exeter.ac.uk/security.
2.
Carlin, J.P.: Introduction - ‘The Code War’ [in] The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. In: The Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat. pp. 31–64. PublicAffairs, New York (2019).
3.
Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, New York (2014).
4.
Horton, N., DeSimone, A.: ‘Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace’, https://apps.dtic.mil/docs/citations/AD1046744.
5.
HMG: National Cyber Security Strategy 2016 to 2021, https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021.
6.
HMG: The UK Cyber Security Strategy, https://www.gov.uk/government/publications/cyber-security-strategy.
7.
Steed, D.: Chapter 4 - ‘The Strategic Implications of Cyber Warfare’ [in] Cyber Warfare: A Multidisciplinary Analysis. In: Cyber Warfare: A Multidisciplinary Analysis. pp. 73–95. Routledge, London (2015).
8.
Zetter, K.: Chapter 4 - ‘Stuxnet Deconstructed’ [in] Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. In: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. pp. 52–68. Crown Publishers, New York (2014).
9.
Jamieson, K.H.: Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don’t, Can’t, and Do Know. Oxford University Press, New York, NY (2018).
10.
Sanger, D.E.: The Perfect Weapon: War, Sabotage and Fear in the Cyber Age. Scribe, Melbourne (2018).
11.
Kaplan, F.M.: Chapter 5 - ‘Solar Sunrise, Moonlight Maze’ [in] Dark Territory: The Secret History of Cyber War. In: Dark Territory: The Secret History of Cyber War. pp. 73–88. Simon & Schuster, New York (2016).
12.
Protalinski, E.: NSA: Cybercrime is ‘the Greatest Transfer of Wealth in History’, https://www.zdnet.com/article/nsa-cybercrime-is-the-greatest-transfer-of-wealth-in-history/.
13.
Epstein, E.J.: ‘Epilogue: The Snowden Effect’ [in] How America Lost its Secrets: Edward Snowden, the Man and the Theft. In: How America Lost its Secrets: Edward Snowden, the Man and the Theft. pp. 299–304. Vintage Books, New York (2017).
14.
Botsman, R.: Chapter 7 - ‘Rated: Would Your Life Get a Good Trust Score?’ [in] Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. In: Who Can You Trust?: How Technology Brought Us Together – and Why It Could Drive Us Apart. pp. 150–176. Portfolio Penguin, London (2017).
15.
Harari, Y.N.: ‘Why Technology Favors Tyranny’ [in] The Atlantic, https://www.theatlantic.com/magazine/archive/2018/10/yuval-noah-harari-technology-tyranny/568330/.
16.
MIT Technology Review (Vol. 121:5). 121, (2018).
17.
Thierer, A., Crews Jr., C.W.: Who Rules the Net?: Internet Governance and Jurisdiction. Cato Institute, Washington, D.C. (2003).
18.
Foreign Affairs. (2018).
19.
Korzak, E.: ‘UN GGE on Cybersecurity: The End of an Era?’ [in] The Diplomat, https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/.