US Leadership in Cyberspace
US Leadership in Cyberspace
US Leadership in Cyberspace
Conclusion
References
- Abbate, Janet. 2000. Inventing the Internet.
Cambridge, MA: MIT press.
- Achen, C. H., & Snidal, D. 1989. “Rational
deterrence theory and comparative case studies.”
World Politics, 41(2), 143-169.
- Adams, James. 1998. The Next World War:
Computers are the Weapons & and Front Line is
Everywhere. New York: Simon and Schuster.
- Adas, Michael. 2006. Dominance by design:
technological imperatives and America's civilizing
mission. Cambridge, Mass.: Belknap Press of
Harvard University Press.
- Antonova, Slavka. 2008. "Powerscape of Internet
Governance: How was global multistakeholderism
invented in ICANN?".
- Armistead, Leigh. 2010. Information operations
matters : best practices. 1st ed. Washington, D.C.:
Potomac Books.
- Bacevich, A. J. 2002. American empire : the
realities and consequences of U.S. diplomacy.
Cambridge, Mass.: Harvard University Press.
- Beard, Charles A. 1934. The Idea of National
Interest. New York: The MacMillan Co.
- Broad, William J., John Markoff, David E. Sanger.
2011. "Israeli Test on Worm Called Crucial in Iran
Nuclear Delay." The New York Times, 15 Janurary
2012.
- Castells, Manuel. 1996. The rise of the network
society. Cambridge, Mass.: Blackwell Publishers.
- Castells, M., & United Nations Research Institute for
Social Development. (1999). Information
technology, globalization and social development.
Geneva: United Nations Research Institute for
Social Development.
- Cimbala, Stephen J. 2011. “Nuclear Crisis
Management and ‘Cyberwar’ Phishing for Trouble?”
Strategic Studies Quarterly (Spring 2011): 117-31.
- Clark, Ian. 2009. “Bringing hegemony back in: the
United States and international order.”
International Affairs 85(1): 23-36.
- Clarke, R. A., and Knake, R. 2010. Cyber War: The
next threat to national security and what to do
about it. Ecco.
- Conybeare, J. A. C. 1983. “Tarriff Protection in
Developed and Developing Countries: A Cross-
Sectional and Longitudinal Analysis.” International
Organization 37:441-63.
- Crosston, Matthew D. 2011. “World Gone Cyber
MAD: How ‘Mutually Assured Debilitation’ Is the
Best Hope for Cyber Deterrence.” Strategic Studies
Quarterly (Spring 2011): 100-16.
- Deibert, Ronald and Rohozinski, Rafal. 2010.
“Under cover of the Net: The Hidden Governance
Mechanisms of Cyberspace.” In Anne L. Clunan and
Harold A. Trinkunas (eds.). Ungoverned Spaces:
Alternatives to State Authority in an Era of
Softened Sovereignty . Palo Alto, CA: Stanford
University Press, pgs. 255-272.
- Demchak, Chris C. and Peter Dombrowski. 2011.
“Rise of a Cybered Westphalian Age.” Strategic
Studies Quarterly (Spring 2011): 32-61.
- Destradi, Sandra. 2010. “Regional Powers and their
Strategies: Empire, Hegemony, and Leadership.”
Review of International Studies 36:903-30.
- Deudney, Daniel and G. John Ikenberry. 1999. “The
Nature and Sources of Liberal International Order.”
Review of International Studies 25 (2):179-96.
- Dingwerth, Klaus and Philipp Pattberg. 2006.
“Global Governance as a Perspective on World
Politics.” Global Governance 12: 185-203.
- Enright, Allison. 2011. “Global e-commerce to
reach $1.4 trillion in 2015.” International
Marketing.
http://www.internetretailer.com/2011/06/07/global-
e-commerce-reach-14-trillion-2015. Last accessed
30 October 2012.
- Fearon, J. 2002. “Selection effects and deterrence.”
International Interactions, 28(1), 5-29.
- Finkelstein, Lawrence S. 1995. “What is Global
Governance?” Global Governance 1: 367-72.
- Finnemore, Martha. 1996. National interests in
international society. Ithaca, N.Y.: Cornell
University Press.
- Gerstein, Daniel M. 2005. Securing America's
future: national strategy in the information age. 1
vols. Westport, Conn.: Praeger Security
International.
- Gilpin, Robert. 2001. Global political economy:
understanding the global economic order.
Princeton, N.J.: Princeton University Press.
- Gilpin, Robert. 2002. “A Realist Perspective on
International Governance.” In Governing
Globalization: Power, Authority, and Global
- Governance, ed. D. a. A. M. Held. Cambridge:
Polity.
- Gorman, Siobhan and Julian E. Barnes. 2011.
“Cyber Combat: Act of War.” Wall Street Journal
online.
http://online.wsj.com/article/SB1000142405270230
4563104576355623135782718.html. Last
accessed 29 October 2012.
- Hart, J. A. 1988. “The politics of global competition
in the telecommunications industry.” The
Information Society, 5(3), 169-201.
Harvey, F. P. 1998. “Rigor mortis or rigor, more tests:
Necessity, sufficiency, and deterrence logic.”
International Studies Quarterly,
42(4), 675-707.
Held, David, and Anthony G. McGrew. 2002. Governing
Globalization: Power, Authority and Global Governance.
Cambridge, UK:
Polity in association with Blackwell.
Huth, P and Russett, B. 1984. What Makes Deterrence
Work? Cases from 1900 to 1980. World Politics 36 (July):
496-526.
Huth, P. and Russett, B. 1993. “General deterrence
between enduring rivals: Testing three competing
models.” American Political
Science Review, 61-73.
Huth, P. K. 1999. “Deterrence and international conflict:
Empirical findings and theoretical debates.” Annual
Review of Political Science,
2(1), 25-48.
Ikenberry, G. John. 2011. Liberal Leviathan: the Origins,
Crisis, and Transformation of the American World
Order. Princeton, NJ:
Princeton University Press.
Jervis, Robert. 1998. “The Utility of Nuclear
Deterrence.” International Security, 13(2), 80-90.
———. 1989. “Rational Deterrence Theory: Theory and
evidence.” World Politics 61 (January): 183-207.
Kagan, Robert. 2012. The World America Made. New
York: Alfred A. Knopf.
Katin-Borland, N. 2012. “Cyberwar: A Real and Growing
Threat.” In Sean S. Costigan and Jake Perry, eds.
Cyberspaces and Global
26
Affairs. London: Ashgate, pgs. 3-22.
Keohane, Robert O. 1980. "The Theory of Hegemonic
Stability and Changes in International Economic
Regimes, 1967-77." In Change
in the international system, ed. O. R. Holsti, R. M.
Siverson and A. L. George. Boulder, Colo.: Westview
Press.
———. 1982a. "Hegemonic Leadership and U.S. Foreign
Economic Policy." In America in a Changing World
Political Economy, ed. W.
P. A. a. D. P. Rapkin. New York: Longman.
———. 1982b. "The Theory of Hegemonic Stability and
Changes in International Economic Regimes, 1967-
1977." In Change in the
International System, ed. R. M. S. Ole R. Holsti, and
Alexander L. George. Boulder, CO: Westview Press.
———. 1984. After hegemony : cooperation and
discord in the world political economy. Princeton, N.J. ;
Chichester: Princeton
University Press.
Keohane, Robert O. and Joseph S. Nye. 2001. Power and
interdependence. 3rd ed. New York ; London: Longman.
Kiggins, Ryan David. 2011. “Wired World: US Policy and
the Open Door Internet.” Ph.D. diss. University of
Florida.
Kindleberger, Charles Poor. 1973. The world in
depression, 1929-1939. Rev. and enl. ed. Boston: Little
Brown.
Krasner, Stephen D. 1976. "State Power and the
Structure of International Trade." World Politics 28:317-
47.
Kugler, Richard L. 2009. "Deterrence of Cyber Attacks."
In Cyberpower and National Security, ed. F. D. Kramer,
Stuart H. Starr, and
Larry K. Wentz. Washington D.C.: NDU Press.
Lake, David A. 1983. "International Economic Structures
and American Foreign Policy, 1887-1934." World Politics
35:687-713.
———. 1993. "Leadership, Hegemony, and the
International Economy: naked Emperor or Tattered
Monarch with Potential?"
International Studies Quarterly 37 (4):459-89.
Layne, Christopher. 1998. "Rethinking American Grand
Strategy; Hegemony or Balance of Power in the Twenty-
First Century?" World
Policy Journal (Summer 1998):8-28.
———. 2006. The peace of illusions: American grand
strategy from 1940 to the present. Ithaca: Cornell
University Press.
Lebow, Richard Ned. “The golden age of deterrence
theory.” The Routledge handbook of security studies
(2009): 393.
Lebow R. N. and Stein, J. G. 1989. “Rational Deterrence
Theory: I Think, Therefore I Deter.” World Politics 61
(January): 208-24.
Libicki, Martin C. 2009. Cyberdeterrence and Cyberwar.
Santa Monica, CA: RAND Corporation.
———. 2007. Conquest in cyberspace: national security
and information warfare. New York, NY: Cambridge
University Press.
———. 2011. “Cyberwar as a Confidence Game.”
Strategic Studies Quarterly (Spring 2011): 132-46.
Mann, Catherine L. and Jacob F. Kirkegaard. 2006.
“Accelerating the globalization of America: the role for
information technology.”
Washington, DC: Institute For International Economics.
McCarthy, Daniel R. 2011. “Open Networks and the
Open Door: American Foreign Policy and the Narration
of the Internet.” Foreign
Policy Analysis 7 (1): 88-111.
Milner, Helen V. 1998. “International Political Economy:
Beyond Hegemonic Stability.” Foreign Policy 110
(Spring): 112-23.
Morgan, P. M. 2012. “The State of Deterrence in
International Politics Today.” Contemporary Security
Policy, 33(1), 85-107.
Morgan, P. M. 1983. Deterrence: A conceptual analysis,
rev. ed. Beverly Hills, CA: Sage Publications.
Mueller, Milton, and Dale Thompson. 2004. “ICANN and
Intelsat: GlobalCommunication Technologies and their
Incorporation into
International Regimes.” In The Emergent
GlobalInformation Policy Regime, ed. S. Braman:
Palgrave/Macmillan.
Nakashima, Ellen. 2012. “U.S. Accelerating
Cyberweapon Research.” The Washington Post, 19
march 2012.
Norrloff, Carla. 2010. America's Global Advantage: US
Hegemony and International Cooperation. New York:
Cambridge University
Press.
Nye, Joseph S. Jr. 2002. “The American National Interest
and Global Public Goods.” International Affairs 78 (2):
233-44.
———. 2004. Soft power: the means to success in world
politics. 1st ed. New York: PublicAffairs.
———. 2011a. The Future of Power. New York: Public
Affairs.
———. 2011b. “Nuclear Lessons for Cyber Security.”
Strategic Studies Quarterly (Winter): 18-28.
Osborne, Charlie. 2012. “Cybercrime costs U.S.
Consumers $20.7 billion.” CNet News. Available at
http://news.cnet.com/8301-1009_3-57506216-83/
cybercrime-costs-u.s-consumers-$20.7-billion/.Last
accessed 26 Oct 2012.
Rattray, Gregory J. 2001. Strategic Warfare in
Cyberspace. Cambridge, MA: The MIT Press.
Rauen, Cristiane V., Célio Hiratuka, Paulo S. Fracalanza,
(2011) “Universalization of telecommunications
services: Public policies in the
OECD and in Brazil.” International Journal of
Development Issues, 10(2), pp.108 – 122.
Rogin, Josh. 2012. “NSA Chief: Cybercrime
Constitutes the Greatest Transfer of Wealth in
History.” Foreign Policy.
http://thecable.foreignpolicy.com/posts/2012/07/09/
nsa_chief_cybercrime_constitutes_the_greatest_transfer
_of_wealth_in_history.
Last accessed 8 October 2012.
Rosenau, James N. 1995. “Governance in the Twenty-
First Century.” Global Governance, 1: 13-43.
Ruggie, John Gerard. 1983. “International regimes,
transactions, and change: embedded liberalism in the
postwar economic order.” In
International Regimes, ed. S. D. Krasner. Ithaca, NY:
Cornell University Press.
Schelling, T. C. (1980). The strategy of conflict. Harvard
university press.
Singh, J. P. 2010. “Negotiating Internet Governance:
Security Implications of Multilateral Approaches.” In
Anne L. Clunan and Harold
A. Trinkunas (eds.). Ungoverned Spaces: Alternatives to
State Authority in an Era of Softened Sovereignty. Palo
Alto, CA: Stanford
University Press, pgs. 232-254.
Snidal, Duncan. 1985. “The Limits of Hegemonic
Stability Theory.” International Organization 39 (4):579-
614.
Sterner, Eric. 2011. “Retaliatory Deterrence in
Cyberspace.” Strategic Studies Quarterly (Spring 2011):
62-80.
Stone, Randall W., Branislav L. Slantchev, and Tamar R.
London. 2008. “Choosing How to Cooperate: A
Repeated Public-Goods Model
of International Relations.” International Studies
Quarterly 52:335-62.
Schwartz, Matthew J. 2012. “Cybercrime Attacks, Costs
Escalating.” Information Week. Available at
http://www.informationweek.com/security/attacks/
cybercrime-attacks-costs-escalating/240008658. Last
accessed 8 Oct 2012
Stoll, Cliff. 1990. The Cuckoo's Egg. New York: Pocket
Books
27
Taipale, K. A., Cyber-Deterrence (2009). Available at
SSRN: http://ssrn.com/abstract=1336045. Last
accessed, 23 July 2013.
Verton, Dan. 2003. Black ice: the invisible threat of
cyber-terrorism. New York: McGraw-Hill/Osborne.
Waltz, Kenneth. 1959. Man, the State and War: A
Theoretical Analysis. New York: Columbia University
Press.
Weimann, Gabriel. 2006. Terror on the Internet: The
New Arena, the New Challenges. Washington, DC:
United States Institute of Peace Press.
Williams, William Appleman. [1959] 1972. The tragedy
of American diplomacy. 2d rev. and enl. ed. New York:
Dell Pub. Co.
Zacher, Mark W. 2002. “Capitalism, Technology, and
Liberalization: The International Telecommunications
Regime, 1865-1998.” In
Rosenau, J. N., & Singh, J. P., editors. Information
technologies and global politics: The changing scope of
power and governance.
New York: SUNY Press.
Zacher, M. W., & Sutton, B. A. 1996. “Mutual interests,
normative continuities, and regime theory:
cooperation in international
transportation and communications industries.”
European Journal of International Relations, 2(1), 5-46.