Этот модуль является ресурсом для лекторов
Этот модуль является ресурсом для лекторов
Список использованной литературы
Abdollah, Tami. (2017).
US designates election infrastructure as 'critical'.
Associated Press, 7 January 2017. Alouane, Rim-Sarah. (2018).
Macron's Fake News Solution is a Problem.
Foreign Policy, 29 May 2018. Aufderheide, Patricia. (1993). Conference report.
National leadership conference on media literacy. Washington, DC: Aspen Institute. Banas, John A. and Gregory Miller. (2013). Inducing Resistance to Conspiracy Theory Propaganda: Testing Inoculation and Metainoculation Strategies.
Human Communication Research, Vol. 39(2), 184-207. Banks, William. (2017). State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0.
Texas Law Review, Vol 95(7), 1487-1513. Bencsáth, Boldizsár. (2012).
Duqu, Flame, Gauss: Followers of Stuxnet.
RSA Conference Europe 2012. Berger, J. M. (2014).
How ISIS Games Twitter.
The Atlantic, 16 June 2014. Beyer, Jessica L. (2014). The Emergence of a Freedom of Information Movement: Anonymous, WikiLeaks, the Pirate Party, and Iceland.
Journal of Computer-Mediated Communication, Vol. 19(2), 141-154. Brewster, Thomas. (2018).
Disturbing Smartphone Hacks Hit Saudi Activists Via WhatsApp,
Forbes, 1 August 2018. Business Ghana. (2018).
Vice President Launches Cyber Security Awareness Campaign. CERT Insider Threat Center. (2016).
Technical Note CMU/SEI-2015-TR-010. Common Sense Guide to Mitigating Insider Threats, Fifth Edition. Compton, Joshua and Michael Pfau. (2005). Inoculation Theory of Resistance to Influence at Maturity: Recent Progress in Theory Development and Application and Suggestions for Future Research.
Annals of International Communication Association, Vol. 29(1), 97-146. Conway, Maura. (2002).
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet.
First Monday 7(11), Cook, John. (2017).
Inoculation theory: Using misinformation to fight misinformation.
The Conversation, 14 May 2017. Cook, John, Stephan Lewandowsky and Ullrich K. H. Ecker. (2017). Neutralizing misinformation through inoculation: Exposing misleading argumentation techniques reduces their influence.
PLOS ONE, Vol. 12(5), 1-21. Daniels, Gilda R. (2010).
Indiana Law Review, Vol. 43, 343-387 Alvarez, R. Michael, Thad E. Hall, and Susan D. Hyde. (2008). Introduction: Studying Election Fraud. In Alvarez, R. Michael, Thad E. Hall, and Susan D. Hyde (eds.).
Election Fraud: Detecting and Deterring Electoral Manipulation. Brookings Series on Election Administration and Reform. Brookings Institution Press. Denning, Dorothy E. (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In John Arquilla and Dadvid F. Ronfeldt (eds).
Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 239-288), RAND. Denning, Dorothy E. (2000).
Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Denning, Dorothy E. (2015).
The Rise of Hacktivism.
Georgetown Journal of International Affairs, 8 September 2015. Der Derian, James. (1992).
Antidiplomacy: Spies, Terror, Speed, and War, 1st Edition. Wiley-Blackwell. Fidler, David P. (2012). Tinker, Tailor, Soldier, Duqu: Why Cyberespionage is More Than You Think.
Informational Journal of Critical Infrastructure Protection, Vol. 5, 28-29. Funke, Daniel (2018).
A guide to anti-misinformation actions around the world.
Poynter, 25 September 2018. G7. (2017).
Lucca, Italy (11 APRIL 2017). Declaration on Responsible States Behavior in Cyberspace. Gathright, Jenny. (2018).
Kenya's Crackdown on Fake News Raises Questions About Press Freedom.
NPR, 19 May 2018. Gill, Terry D. (2013).
Non-Intervention in the Cyber Context. In Katharina Ziolkowski (ed.).
Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 217-238). Goodin, Dan. (2010).
'Virtual sit-in' tests line between DDoS and free speech.
The Register, 9 April 2010. Gordon, Sarah and Richard Ford. (2003).
Symantec. Cyberterrorism? Graham, Chris. (2017).
Cyber attack hits German train stations as hackers target Deutsche Bahn.
Telegraph, 13 May 2017. Greenberg, Andy. (2017).
The Wannacry Ransomware Hackers Made Some Real Amateur Mistakes.
Wired, 15 May 2017. Halliday, Josh and Charles Arthur. (2010).
WikiLeaks: Who are the hackers behind Operation Payback?
The Guardian, 8 December 2010. Hampson, Noah C.N. (2012).
Hacktivism: A New Breed of Protest in a Networked World.
Boston College International and Comparative Law Review, Vol. 35(2), 511-542. Hasen, Richard L. (2014). Super PAC contributions, corruption, and the proxy war over coordination.
Duke Journal of Constitutional Law & Public Policy Vol. 9, pp. 1-22 Himma, Kenneth Einar (ed.). (2007).
Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett. Hobbs, Renee. (1998). The Seven Great Debates in the Media Literacy Movement.
Journal of Communication, Vol. 48(1), 16-32. Jarvis, Lee and Stuart Macdonald. (2014). Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon.
Perspectives on Terrorism Vol. 8(2), 52-65. Jarvis, Lee and Stuart Macdonald. (2015). What Is Cyberterrorism? Findings From a Survey of Researchers.
Terrorism and Political Violence, Vol. 27(4), 657-678. Jarvis, Lee, Stuart Macdonald, and Lella Nouri. (2014). The Cyberterrorism Threat: Findings from a Survey of Researchers.
Studies in Conflict & Terrorism, Vol. 37(1), 68-90. Kirk, Jeremy. (2011).
"Night Dragon" Attacks From China Strike Energy Companies.
PC World, 10 February 2011. Klimburg, Alexander. (2012).
North Atlantic Treaty Organization (NATO) Cooperative Cyber Defence Centre of Excellence. National Cybersecurity Framework Manual. Laville, Sandra. (2012).
Anonymous cyber-attacks cost PayPal £3.5m, court told.
The Guardian, 22 November 2012. Lemay, Antoine, John Calvet, Francois Menet, and Jose M. Fernandez. (2018). Survey of publicly available reports on advanced persistent threat actors.
Computers and Security, Vol. 72, 26-59. Li, Xiang. (2013). Hacktivism and The First Amendment: Drawing the Line Between Cyber Protests and Crime.
Harvard Journal of Law & Technology, Vol. 27(1), 301-330. Libicki, Martin. (2017). The Coming of Cyber Espionage Norms.
Proceedings of the 9th International Conference on Cyber Conflict, CyCon IX: Defending the Core, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 1. Lin, Herb and Trachtman, Joel. (2018).
Using International Export Controls to Bolster Cyber Defenses. Discussion Draft. 10 September 2018. López-Pintor, Rafael. (2010).
Assessing Electoral Fraud in New Democracies: A Basic Conceptual Framework.
White Paper Series. International Foundation for Electoral Systems. Lubin, Asaf. (2018). Cyber Law and Espionage Law as Communicating Vessels.
Proceedings of the 10th International Conference on Cyber Conflict, CyCon X: Maximising Effects, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), 203. Maras, Marie-Helen. (2014).
Computer Forensics: Cybercriminals, Laws, and Evidence, 2
nd edition. Jones and Bartlett. Maras, Marie-Helen. (2012).
Counterterrorism. Jones and Bartlett. Maras, Marie-Helen. (2016).
Cybercriminology. Oxford University Press. Marlatt, Greta. E. (2008).
Information Warfare and Information Operations (IW/IO): A Bibliography. Maurer, Tim. (2018).
Cyber Proxies and Their Implications for Liberal Democracies. The
Washington Quarterly, Vol. 41(2), 171-188. MI5. (nd.).
Espionage. Morgan, Susan. (2018) Fake news, disinformation, manipulation and online tactics to undermine democracy,
Journal of Cyber Policy, Vol. 3(1), 39-43. Morozov, Evgeny. (2011).
The Net Delusion: The Dark Side of Internet Freedom. Public Affairs. Morrelli, Vincent L. and Archick, Kristin. (2016).
European Union Efforts to Counter Disinformation.
CRS Insight. Myres S. McDougal, Harold D. Lasswell and W. Michael Reisman. (1973).
The Intelligence Function and World Public Order.
Faculty Scholarship Series. 665. Newman, Lily Hay. (2018).
The Leaked NSA Spy Tool That Hacked the World.
Wired, 3 July 2018. Ngak, Chenda. (2013).
13 members of hacking group Anonymous indicted over 'Operation Payback'.
CBS News, 3 October 2013. OECD. (2012).
Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy. Peterson, Andrea. (2015).
Forbes Web site was compromised by Chinese cyberespionage group, researchers say.
Washington Post, 10 February 2015. Peterson, Andrea. (2016).
NSA hacking tools were leaked online. Here's what you need to know.
Washington Post, 17 August 2016. Pirker, Benedikt. (2013). T
erritorial Sovereignty and Integrity and the Challenges of Cyberspace. In Katharina Ziolkowski (ed.).
Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 189-289). NATO Cooperative Cyber Defence Centre of Excellence. Popham, James F. (2018). Microdeviation: Observations on the Significance of Lesser Harms in Shaping the Nature of Cyberspace.
Deviant Behavior Vol. 29(2), pp. 159-169. Priday, Richard. (2018).
Fake news laws are threatening free speech on a global scale.
Wired, 5 April 2018. Reuters. (2018).
Egypt targets social media with new law. Prier, Jarred. (2017). Commanding the Trend Social Media as Information Warfare.
Strategic Studies Quarterly, Vol. 11(4), 50-85. Rashid, Fahmida Y. (2015).
Chinese Attackers Hacked Forbes Website in Watering Hole Attack: Security Firms.
Security Week, 11 February 2015. Roozenbeek, Jon and Sander van der Linden. (2018). The Fake News Game: Actively Inoculating Against the Risk of Misinformation.
Journal of Risk Research, published online 26 February 2018. Sauter, Molly. (2014).
The Coming Sward: DDoS actions, Hacktivism, and Civil Disobedience on the Internet. Bloomsbury. Shulsky, Abram N. and Schmitt, Gary J. (2002).
Silent Warfare: Understanding the World of Intelligence, 3rd Edition. Potomac. Solomon, Rukundo. (2017). Electronic Protests: Hacktivism as a form of Protest in Uganda.
Computer Law & Security Review, Vol. 33, 718-728. US Department of Homeland Security. (n.d.).
Critical infrastructure sectors. US Department of Homeland Security. (2017).
Statement by Secretary Jeh Johnson on the Designation of Election Infrastructure as a Critical Infrastructure Subsector. US Office of the Director of National Intelligence. (2017).
Background to "Assessing Russian Activities and Intentions in Recent US Elections": The Analytic Process and Cyber Incident Attribution. US White House. (2016).
Office of the Press Secretary (29 December 2016). Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment. van der Linden, Sander, Anthony Leiserowitz, Seth Rosenthal, and Edward Maibach. (2017). Inoculating the Public against Misinformation about Climate Change.
Global Challenges, Vol. 2(1), 1-7. Warner, Michael. (2009). Intelligence as Risk Shifting. In Peter Gill, Stephen Marrin and Mark Phythian (eds.).
Intelligence Theory: Key Questions and Debates. Routledge. Warner, Micheal. (2002).
Wanted: A Definition of 'Intelligence'.
Studies in Intelligence Vol. 46(3). Weimann, Gabriel. (2004).
Cyberterrorism How Real Is the Threat?
Special Report 119. Yousafzai, Gul. (2017).
Pakistani journalist arrested under cyber crime law.
Business Insider, 30 June 2017. Zetter, Kim. (2011).
Anonymous Hacks Security Firm Investigating It; Releases E-Mail.
Wired, 2 February 2011. Zetter, Kim. (2012).
Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload.
Wired, 9 August 2012. Zetter, Kim. (2016).
Inside The Cunning, Unprecedented Hack of Ukraine's Power Grid.
Wired, 3 March 2016. Zhang, Jerry, Darrell Carpenter, and Myung Ko. (2013). Online astroturfing: A theoretical perspective.
Proceedings of the Nineteenth Americas Conference on Information Systems 2013 (August), pp. 2559-2566. Ziolkowski, Katharina. (2013).
Peacetime Cyber Espionage - New Tendencies in Public International Law. In Katharina Ziolkowski (ed.).
Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence.
Corfu Channel, ICJ GL No 1 .
Nicaragua v. United States, 1986 ICJ 14.