Este módulo es un recurso para los catedráticos 

 

Lecturas avanzadas

 

Se recomienda las siguientes lecturas a los interesados en investigar los temas de este módulo con más detalle:

  • Akatyev, Nikolay and Joshua I. James. (2017). United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping. European Conference on Information Warfare and Security, ECCWS (pp. 8-16).
  • Brown, James A. (1998). Media Literacy Perspectives. Journal of Communication, Vol. 48(1), 44-57.
  • Clarke, Richard and Robert K. Knake. (2010). Cyber War. Harper Collins.
  • Coleman, Gabriella. (2015). Hacker, hoaxer, whistleblower, spy the many faces of Anonymous. Verso.
  • Dipert, Randall R. (2010). The Ethics of Cyberwarfare. Journal of Military Ethics, Vol. 9(4), 384-410.
  • Greenberg, Andy. (2012). This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information. Dutton.
  • Huey, Laura and Eric Winter. (2016). #IS_Fangirl: Exploring a New Role for Women in Terrorism. Journal of Terrorism Research Vol. 7(1).
  • Huey, Laura, Rachel Inch and Hillary Peladeau. (2017). "@ me if you need shoutout": Exploring Women's Roles in Islamic State Twitter Networks, Studies in Conflict & Terrorism.
  • International Atomic Energy Agency. (2011). Computer Security at Nuclear Facilities: Reference Manual. IAEA Nuclear Security Series No. 17, Technical Guidance. 
  • Karanasiou, Argyro P. (2014). The changing face of protests in the digital age: on occupying cyberspace and Distributed-Denial-of-Services (DDoS) attacks. International Review of Law, Computers & Technology, Vol. 28(1), 98-113.
  • Kim, Jasper. (2011). Law of War 2.0: Cyberwar and the Limits of the UN Charter. Global Policy, Vol. 2(3), 322 -328.
  • Klein, Adam G. (2015). Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press. Communication Monographs, Vol. 82(3), 379-401.
  • Kont, Markus, Mauno Pihelgas, Jesse Wojtkowiak, Lorena Trinberg, and Anna-Maria Osula. (2015). Insider Threat Detection Study. NATO Cooperative Cyber Defence Centre of Excellence. 
  • Novetta. (2016). Operation Blockbuster: Unravelling the Long Threat of the Sony Attack.
  • RSA Conference 2017 Singapore. Infection Vector: How do they get in? 
  • Singer, P. W. and Allan Friedman. (2014). Cybersecurity and Cyberwar. Oxford University Press.
  • Katharina Ziolkowski (ed.). (2013). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence. 
 
Siguiente: Evaluación del estudiante
Volver al inicio