Compton, Joshua and Michael Pfau. (2005). Inoculation Theory of Resistance to Influence at Maturity: Recent Progress in Theory Development and Application and Suggestions for Future Research. Annals of International Communication Association, Vol. 29(1), 97-146.
Cook, John, Stephan Lewandowsky and Ullrich K. H. Ecker. (2017). Neutralizing misinformation through inoculation: Exposing misleading argumentation techniques reduces their influence. PLOS ONE, Vol. 12(5), 1-21.
Alvarez, R. Michael, Thad E. Hall, and Susan D. Hyde. (2008). Introduction: Studying Election Fraud. In Alvarez, R. Michael, Thad E. Hall, and Susan D. Hyde (eds.). Election Fraud: Detecting and Deterring Electoral Manipulation. Brookings Series on Election Administration and Reform. Brookings Institution Press.
Denning, Dorothy E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In John Arquilla and Dadvid F. Ronfeldt (eds). Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 239-288), RAND.
Denning, Dorothy E. (2000). Cyberterrorism.Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.
Denning, Dorothy E. (2015). The Rise of Hacktivism.Georgetown Journal of International Affairs, 8 de septiembre de 2015.
Der Derian, James. (1992). Antidiplomacy: Spies, Terror, Speed, and War, 1st Edition. Wiley-Blackwell.
Fidler, David P. (2012). Tinker, Tailor, Soldier, Duqu: Why Cyberespionage is More Than You Think. Informational Journal of Critical Infrastructure Protection, Vol. 5, 28-29.
Gill, Terry D. (2013). Non-Intervention in the Cyber Context. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 217-238).
Lemay, Antoine, John Calvet, Francois Menet, and Jose M. Fernandez. (2018). Survey of publicly available reports on advanced persistent threat actors. Computers and Security, Vol. 72, 26-59.
Li, Xiang. (2013). Hacktivism and The First Amendment: Drawing the Line Between Cyber Protests and Crime. Harvard Journal of Law & Technology, Vol. 27(1), 301-330.
Libicki, Martin. (2017). The Coming of Cyber Espionage Norms. Proceedings of the 9th International Conference on Cyber Conflict, CyCon IX: Defending the Core, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 1.
Lin, Herb and Trachtman, Joel. (2018). Using International Export Controls to Bolster Cyber Defenses. Discussion Draft. 10 de septiembre de 2018.
Lubin, Asaf. (2018). Cyber Law and Espionage Law as Communicating Vessels. Proceedings of the 10th International Conference on Cyber Conflict, CyCon X: Maximising Effects, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 203.
Maras, Marie-Helen. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence, 2 nd edition. Jones and Bartlett.
Maras, Marie-Helen. (2012). Counterterrorism. Jones and Bartlett.
Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
Zhang, Jerry, Darrell Carpenter, and Myung Ko. (2013). Online astroturfing: A theoretical perspective. Proceedings of the Nineteenth Americas Conference on Information Systems 2013 (agosto), pp. 2559-2566.