This module is a resource for lecturers
The following readings are recommended for those interested in exploring the topics covered in this Module in more detail:
- Akatyev, Nikolay and Joshua I. James. (2017). United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping. European Conference on Information Warfare and Security, ECCWS (pp. 8-16).
- Brown, James A. (1998). Media Literacy Perspectives. Journal of Communication, Vol. 48(1), 44-57.
- Clarke, Richard and Robert K. Knake. (2010). Cyber War. Harper Collins.
- Coleman, Gabriella. (2015). Hacker, hoaxer, whistleblower, spy the many faces of Anonymous. Verso.
- Dipert, Randall R. (2010). The Ethics of Cyberwarfare. Journal of Military Ethics, Vol. 9(4), 384-410.
- Greenberg, Andy. (2012). This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information. Dutton.
- Huey, Laura and Eric Winter. (2016). #IS_Fangirl: Exploring a New Role for Women in Terrorism. Journal of Terrorism Research Vol. 7(1).
- Huey, Laura, Rachel Inch and Hillary Peladeau. (2017). "@ me if you need shoutout": Exploring Women's Roles in Islamic State Twitter Networks, Studies in Conflict & Terrorism.
- International Atomic Energy Agency. (2011). Computer Security at Nuclear Facilities: Reference Manual. IAEA Nuclear Security Series No. 17, Technical Guidance.
- Karanasiou, Argyro P. (2014). The changing face of protests in the digital age: on occupying cyberspace and Distributed-Denial-of-Services (DDoS) attacks. International Review of Law, Computers & Technology, Vol. 28(1), 98-113.
- Kim, Jasper. (2011). Law of War 2.0: Cyberwar and the Limits of the UN Charter. Global Policy, Vol. 2(3), 322 -328.
- Klein, Adam G. (2015). Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press. Communication Monographs, Vol. 82(3), 379-401.
- Kont, Markus, Mauno Pihelgas, Jesse Wojtkowiak, Lorena Trinberg, and Anna-Maria Osula. (2015). Insider Threat Detection Study. NATO Cooperative Cyber Defence Centre of Excellence.
- Novetta. (2016). Operation Blockbuster: Unravelling the Long Threat of the Sony Attack.
- RSA Conference 2017 Singapore. Infection Vector: How do they get in?
- Singer, P. W. and Allan Friedman. (2014). Cybersecurity and Cyberwar. Oxford University Press.
- Katharina Ziolkowski (ed.). (2013). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence.