This module is a resource for lecturers
The following readings are recommended for those interested in exploring the topics covered in this Module in more detail:
- Akatyev, Nikolay and Joshua I. James. (2017).
United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping.
European Conference on Information Warfare and Security, ECCWS (pp. 8-16).
- Brown, James A. (1998). Media Literacy Perspectives.
Journal of Communication, Vol. 48(1), 44-57.
- Clarke, Richard and Robert K. Knake. (2010).
Cyber War. Harper Collins.
- Coleman, Gabriella. (2015).
Hacker, hoaxer, whistleblower, spy the many faces of Anonymous. Verso.
- Dipert, Randall R. (2010). The Ethics of Cyberwarfare.
Journal of Military Ethics, Vol. 9(4), 384-410.
- Greenberg, Andy. (2012).
This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information. Dutton.
- Huey, Laura and Eric Winter. (2016).
#IS_Fangirl: Exploring a New Role for Women in Terrorism.
Journal of Terrorism Research Vol. 7(1).
- Huey, Laura, Rachel Inch and Hillary Peladeau. (2017). "@ me if you need shoutout": Exploring Women's Roles in Islamic State Twitter Networks,
Studies in Conflict & Terrorism.
- International Atomic Energy Agency. (2011).
Computer Security at Nuclear Facilities: Reference Manual.
IAEA Nuclear Security Series No. 17, Technical Guidance.
- Karanasiou, Argyro P. (2014). The changing face of protests in the digital age: on occupying cyberspace and Distributed-Denial-of-Services (DDoS) attacks.
International Review of Law, Computers & Technology, Vol. 28(1), 98-113.
- Kim, Jasper. (2011). Law of War 2.0: Cyberwar and the Limits of the UN Charter.
Global Policy, Vol. 2(3), 322 -328.
- Klein, Adam G. (2015). Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press.
Communication Monographs, Vol. 82(3), 379-401.
- Kont, Markus, Mauno Pihelgas, Jesse Wojtkowiak, Lorena Trinberg, and Anna-Maria Osula. (2015).
Insider Threat Detection Study.
NATO Cooperative Cyber Defence Centre of Excellence.
- Novetta. (2016).
Operation Blockbuster: Unravelling the Long Threat of the Sony Attack.
- RSA Conference 2017 Singapore.
Infection Vector: How do they get in?
- Singer, P. W. and Allan Friedman. (2014).
Cybersecurity and Cyberwar. Oxford University Press.
- Katharina Ziolkowski (ed.). (2013).
Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy
(pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence.