thesis
thesis
thesis
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
314 Secrecy vs. Openness<br />
Thomson, I. (2007, May 31). Russia 'hired botnets' for Estonia cyber-war - Russian authorities accused<br />
of collusion with botnet owners. Computing.co.uk. Retrieved from<br />
http://www.computing.co.uk/vnunet/news/2191082/claims-russia-hired-botnets<br />
Tikk, E. (2010). Global cybersecurity — thinking about the niche for NATO. SAIS Review, 30(2),<br />
105-119.<br />
Tikk, E., Kaska, K., & Vihul, L. (2010). International cyber incidents — legal considerations. Tallinn,<br />
Estonia: Cooperative Cyber Defence of Excellence (CCD COE).<br />
Tilly, C. (1985). War making and state making as organized crime. In P. Evans, D. Rueschemeyer,<br />
& T. Skocpol (Eds.), Bringing the state back in (pp. 169-191). Cambridge: Cambridge University<br />
Press.<br />
Traynor, I. (2007). Russia accused on unleashing cyberwar to disable Estonia. The Guardian. Retrieved<br />
from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia<br />
Trnka, J., & Johansson. (2009). Collaborative command and control practice: Adaptation, selfregulation<br />
and supporting behavior. International Journal of Information Systems for Crisis Response<br />
and Management, 1(2), 47-67.<br />
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments.<br />
Computers & Security, 24(1), 10-15.<br />
U.S. Joint Chiefs of Staff. (1997). Joint doctrine for operations security [Joint Pub 3-54].<br />
U.S. Marine Corps. (2001). Information operations (Coordinating Draft 2-27-01 ed.) [Marine Corps<br />
Warfighting Publication (MCWP) 3-36].<br />
UCLA Center for Digital Humanities. (2008). A digital humanities manifesto. [Web page] Retrieved<br />
March 11, 2014, from http://manifesto.humanities.ucla.edu/2008/12/15/digital-humanitiesmanifesto/<br />
UK Launches New Cyber Security Strategy. (2011). Computer Fraud & Security, 2011(12), 3.<br />
doi:10.1016/S1361-3723(11)70119-1<br />
United States General Accounting Office. (2013). Morris worm: Virus highlights need for improved<br />
Internet management. In J. Healey (Ed.), The fierce domain – conflicts in cyberspace 1986-2012 (pp.<br />
107-119). Washington, D.C.: Atlantic Council. (Original work published June, 1989)<br />
US Embassy Cables: Germany Behind NATO Proposal for Baltic States. (2010, December 6). The<br />
Guardian. Retrieved from http://www.guardian.co.uk/world/us-embassy-cablesdocuments/240187<br />
US Embassy Tallinn. (2007a). Estonia's cyber attacks: Lessons learned. Secret US embassy cables [Cable<br />
07TALLINN375 sent to US Department of States on June 6]. Wikileaks. Retrieved May 31,<br />
2014, from https://wikileaks.org/cable/2007/06/07TALLINN375.html<br />
US Embassy Tallinn. (2007b). Estonia's cyber attacks: World's first virtual attack against nation state.<br />
Secret US embassy cables [Cable 07TALLINN366 to Department of State on Jun 4]. Wikileaks.<br />
Retrieved January 14, 2011, from https://wikileaks.org/cable/2007/06/07TALLINN366.html<br />
van Eeten, M. (2008). Internet security: Incentives, externalities and the opportunity costs of disaster<br />
resistance. [Surviving Future Disasters conference, Louisiana State University, Baton Rouge, April<br />
6-8, 2008]. Retrieved February 2, 2010, from<br />
http://www.bus.lsu.edu/centers/sdmi/files/SFDPapers/MvEeten-<br />
SDMIConferenceBaton%20Rouge.pdf<br />
van Eeten, M., & Bauer, J. (2008a). ITU study on the financial aspects of network security: Malware and<br />
spam [ICT Applications and Cybersecurity Division, Policies and Strategies Department, ITU<br />
Telecommunication Development Sector]. Retrieved December 10, 2009, from<br />
http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-study-financial-aspects-of-malware-andspam.pdf