Aufderheide, Patricia. (1993). Conference report. National leadership conference on media literacy. Washington, DC: Aspen Institute.
Banas, John A. and Gregory Miller. (2013). Inducing Resistance to Conspiracy Theory Propaganda: Testing Inoculation and Metainoculation Strategies. Human Communication Research, Vol. 39(2), 184-207.
Banks, William. (2017). State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0. Texas Law Review, Vol 95(7), 1487-1513.
Beyer, Jessica L. (2014). The Emergence of a Freedom of Information Movement: Anonymous, WikiLeaks, the Pirate Party, and Iceland. Journal of Computer-Mediated Communication, Vol. 19(2), 141-154.
Compton, Joshua and Michael Pfau. (2005). Inoculation Theory of Resistance to Influence at Maturity: Recent Progress in Theory Development and Application and Suggestions for Future Research. Annals of International Communication Association, Vol. 29(1), 97-146.
Cook, John, Stephan Lewandowsky and Ullrich K. H. Ecker. (2017). Neutralizing misinformation through inoculation: Exposing misleading argumentation techniques reduces their influence. PLOS ONE, Vol. 12(5), 1-21.
Daniels, Gilda R. (2010). Voter Deception.Indiana Law Review, Vol. 43, 343-387
Alvarez, R. Michael, Thad E. Hall, and Susan D. Hyde. (2008). Introduction: Studying Election Fraud. In Alvarez, R. Michael, Thad E. Hall, and Susan D. Hyde (eds.). Election Fraud: Detecting and Deterring Electoral Manipulation. Brookings Series on Election Administration and Reform. Brookings Institution Press.
Denning, Dorothy E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In John Arquilla and Dadvid F. Ronfeldt (eds). Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 239-288), RAND.
Denning, Dorothy E. (2000). Cyberterrorism.Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.
Denning, Dorothy E. (2015). The Rise of Hacktivism.Georgetown Journal of International Affairs, 8 de septiembre de 2015.
Der Derian, James. (1992). Antidiplomacy: Spies, Terror, Speed, and War, 1st Edition. Wiley-Blackwell.
Fidler, David P. (2012). Tinker, Tailor, Soldier, Duqu: Why Cyberespionage is More Than You Think. Informational Journal of Critical Infrastructure Protection, Vol. 5, 28-29.
Gill, Terry D. (2013). Non-Intervention in the Cyber Context. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 217-238).
Hasen, Richard L. (2014). Super PAC contributions, corruption, and the proxy war over coordination. Duke Journal of Constitutional Law & Public Policy Vol. 9, pp. 1-22
Himma, Kenneth Einar (ed.). (2007). Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett.
Hobbs, Renee. (1998). The Seven Great Debates in the Media Literacy Movement. Journal of Communication, Vol. 48(1), 16-32.
Jarvis, Lee and Stuart Macdonald. (2014). Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon. Perspectives on Terrorism Vol. 8(2), 52-65.
Jarvis, Lee and Stuart Macdonald. (2015). What Is Cyberterrorism? Findings From a Survey of Researchers. Terrorism and Political Violence, Vol. 27(4), 657-678.
Jarvis, Lee, Stuart Macdonald, and Lella Nouri. (2014). The Cyberterrorism Threat: Findings from a Survey of Researchers. Studies in Conflict & Terrorism, Vol. 37(1), 68-90.
Lemay, Antoine, John Calvet, Francois Menet, and Jose M. Fernandez. (2018). Survey of publicly available reports on advanced persistent threat actors. Computers and Security, Vol. 72, 26-59.
Li, Xiang. (2013). Hacktivism and The First Amendment: Drawing the Line Between Cyber Protests and Crime. Harvard Journal of Law & Technology, Vol. 27(1), 301-330.
Libicki, Martin. (2017). The Coming of Cyber Espionage Norms. Proceedings of the 9th International Conference on Cyber Conflict, CyCon IX: Defending the Core, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 1.
Lin, Herb and Trachtman, Joel. (2018). Using International Export Controls to Bolster Cyber Defenses. Discussion Draft. 10 de septiembre de 2018.
Lubin, Asaf. (2018). Cyber Law and Espionage Law as Communicating Vessels. Proceedings of the 10th International Conference on Cyber Conflict, CyCon X: Maximising Effects, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 203.
Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence, 2 nd edition. Jones and Bartlett.
Maras, Marie-Helen. (2012). Counterterrorism. Jones and Bartlett.
Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
Pirker, Benedikt. (2013). T erritorial Sovereignty and Integrity and the Challenges of Cyberspace. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 189-289). NATO Cooperative Cyber Defence Centre of Excellence.
Popham, James F. (2018). Microdeviation: Observations on the Significance of Lesser Harms in Shaping the Nature of Cyberspace. Deviant Behavior Vol. 29(2), pp. 159-169.
Roozenbeek, Jon and Sander van der Linden. (2018). The Fake News Game: Actively Inoculating Against the Risk of Misinformation. Journal of Risk Research, published online 26 February 2018.
Sauter, Molly. (2014). The Coming Sward: DDoS actions, Hacktivism, and Civil Disobedience on the Internet. Bloomsbury.
Shulsky, Abram N. and Schmitt, Gary J. (2002). Silent Warfare: Understanding the World of Intelligence, 3rd Edition. Potomac.
Solomon, Rukundo. (2017). Electronic Protests: Hacktivism as a form of Protest in Uganda. Computer Law & Security Review, Vol. 33, 718-728.
van der Linden, Sander, Anthony Leiserowitz, Seth Rosenthal, and Edward Maibach. (2017). Inoculating the Public against Misinformation about Climate Change. Global Challenges, Vol. 2(1), 1-7.
Warner, Michael. (2009). Intelligence as Risk Shifting. In Peter Gill, Stephen Marrin and Mark Phythian (eds.). Intelligence Theory: Key Questions and Debates. Routledge.
Zhang, Jerry, Darrell Carpenter, and Myung Ko. (2013). Online astroturfing: A theoretical perspective. Proceedings of the Nineteenth Americas Conference on Information Systems 2013 (agosto), pp. 2559-2566.
Ziolkowski, Katharina. (2013). Peacetime Cyber Espionage - New Tendencies in Public International Law. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence.