[
Aleksandrowicz, T. R. – K. Liedel (2014): ‘Społeczeństwo informacyjne – sieć – cyberprzestrzeń. Nowe zagrożenia’, in K. Liedel, P. Piasecka and T.R. Aleksandrowicz (eds.), Sieciocentryczne bezpieczeństwo. Wojna, pokój i terroryzm w epoce informacji, Warsaw: Difin, 9–38.
]Search in Google Scholar
[
Aradau, C. (2010): Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue 4(5): 491–514.10.1177/0967010610382687
]Search in Google Scholar
[
Axelrod, R. – Iliev, R. (2014): Timing of cyber conflict. PNAS 111(4): 1298–1303.10.1073/pnas.1322638111
]Search in Google Scholar
[
Carr, M. (2016): US Power and the Internet in International Relations. The Irony of the Information Age, London: Palgrave Macmillan.10.1057/9781137550248
]Search in Google Scholar
[
CFR (2020): Cyber Operations Tracker. Available at https://www.cfr.org/interactive/cyber--operations (June 21 2020).
]Search in Google Scholar
[
Chamonikolas, K. (2016): Czech Republic Says Russian Hackers Were ‘Very Active’ There in 2016. Available at https://www.bloomberg.com/news/articles/2017-10-24/russian-fancy-bear--hackers-seen-very-active-in-prague-in-2016(18June2020).
]Search in Google Scholar
[
Christou, G. (2015): Cybersecurity in the European Union. Resilience and Adaptability in Governance Policy, London: Palgrave Macmillan.
]Search in Google Scholar
[
CSIC (2020): Significant Cyber Incidents. Available at https://www.csis.org/programs/cybersecurity-and-gov-ernance/technology-policy-program/other-projects-cybersecurity (29 June 2020).
]Search in Google Scholar
[
cyberdefence24 (2015): Perpetrator of cyber attack on Plus Bank in hands of police. Available at https://www.cyberdefence24.pl/sprawca-cyberataku-na-plus-bank-w-rekach-policji (18 June 2020).
]Search in Google Scholar
[
Czech Republic 2018–2022 (2018): Cyber Defence Strategy of the Czech Republic 2018–2022. available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
]Search in Google Scholar
[
de Wilde, P. – Leupold, A. – Schmidtke, H. (2016): Introduction: The Differentiated Politicisation of European Governance. West European Politics 39(1): 3–22.10.1080/01402382.2015.1081505
]Search in Google Scholar
[
Dunlap, C. (2011): Perspectives for cyber strategists on law for cyberwar. Strategic Studies Quarterly 5(1): 84.
]Search in Google Scholar
[
Egloff, F. (2017): Cybersecurity and the Age of Privateering. In: Understanding Cyber Conflict. 14 Analogies, edited by George Perkovich and Ariel E. Levite. Georgetown: Georgetown University Press, 231–247.
]Search in Google Scholar
[
ENISA (2016): Definition of Cybersecurity – Gaps and overlaps in standardisation: available at: https://www.enisa.europa.eu/publications/definition-of-cybersecurity (12 April 2022).
]Search in Google Scholar
[
European Commission (2020): The EU’s Cybersecurity Strategy for the Digital Decade: avail-ableat:https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital--decade-0 (8 April 2022).
]Search in Google Scholar
[
European Parliament (2019): EU Cybersecurity Act i.e.: Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013: available at: https://eur-lex.europa.eu/eli/reg/2019/881/oj (10 April 2022).
]Search in Google Scholar
[
Farwell, J.P. – Rohozinski, R. (2011): Stuxnet and the Future of Cyber War. Survival 53(1): 23–40.10.1080/00396338.2011.555586
]Search in Google Scholar
[
Fontana, I. (2017): Disentangling the cyber politics-cyber security nexus: the new challenge of global politics. Global Affairs 3(1): 2–4.10.1080/23340460.2017.1320059
]Search in Google Scholar
[
Goldman, E. – Warner, M. (2017): Why a Digital Pearl Harbor Makes Sense and Is Possible. In: George Perkovich and Ariel E. Levite Understanding Cyber Conflict. 14 Analogies G. Georgetown, Georgetown University Press, 147–157.
]Search in Google Scholar
[
HershOctober, S.M. (2010): The Online Threat, Should we be worried about a cyber war? available at: https://www.newyorker.com/magazine/2010/11/01/the-online-threat (29 June 2020).
]Search in Google Scholar
[
Hoath, P. – Mulhall, T. (1998): ‘Hacking: Motivation and Deterrence’, Computer Fraud and Security 4: 16–19.10.1016/S1361-3723(97)86611-0
]Search in Google Scholar
[
Hungary 2013 (2013): National Cyber Security Strategy of Hungary 2013. available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
]Search in Google Scholar
[
Jordan, T. and P. A. Taylor (2014): Hacktivism and Cyberwars Rebels with a cause?, London, New York: Routledge.
]Search in Google Scholar
[
Kulesza, J. (2009): State responsibility for cyber-attacks on international peace and security. Polish Yearbook of International Law 29: 139–151.
]Search in Google Scholar
[
Lakomy, M. (2010): Znaczenie cyberprzestrzeni dla bezpieczeństwa państw na początku XXI wieku. Stosunki Międzynarodowe – International Relations 3(4): 59.
]Search in Google Scholar
[
Lasota, A. (2014): Cyberatak jako wstęp do cyberwojny. Studia Mazowieckie, 4: 65–78.
]Search in Google Scholar
[
Lin, H. (2012): Escalation dynamics and conflict termination in cyberspace. Strategic studies quarterly 6(3): 48.
]Search in Google Scholar
[
Lisiak-Felicka, D. (2017): Information Security Incidents: A comparison between the Czech Republic and Poland, 20th International Scientific Conference. Economic and Social Development, Prague.
]Search in Google Scholar
[
Mačák, K. (2016): Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of cyber operations by non-state actors. Journal of Conflict and Security Law 21(3): 408.
]Search in Google Scholar
[
Madej, M. (2009): Rewolucja informatyczna – istota, przejawy oraz wpływ na postrzeganie bezpieczeństwa państw i systemu międzynarodowego. In: Marek Madej and Marcin Terlikowski Bezpieczeństwo teleinformatyczne państwa, Warsaw: Polski Instytut Spraw Międzynarodowych, 17–40.
]Search in Google Scholar
[
Maness, R.C. – Valeriano, B. (2016): Cyber Spillover Conflicts: Transitions from Cyber Conflict to Conventional Foreign Policy Disputes?, Conflict, Security and Technology. In: Karsten Friis and Jens Ringsmose: Conflict in Cyber Space. Theoretical, Strategic and Legal Perspectives. London: Routledge, 45–64.
]Search in Google Scholar
[
MEDEA (2017): The 5th International Interdisciplinary Symposium On Art, Science, Technology Medea 2017. Available at: https://uap.edu.pl/wp-content/uploads/2017/09/Medea-2017-eng.pdf (21 June 2020).
]Search in Google Scholar
[
Minarik, T. (2016): National Cyber Security Organization: Czech Republic: available at: https://ccdcoe.org/multimedia/national-cyber-security-organisation-czech-republic.html (29January 2020).
]Search in Google Scholar
[
NIST (2020): NIST Cybersecurity Framework: available at: https://www.nist.gov/cyberframework (10 April 2022).
]Search in Google Scholar
[
Nye, J. (2011): Nuclear lessons for cyber security? Strategic Studies Quarterly 5(4): 21.10.21236/ADA553620
]Search in Google Scholar
[
Nye, J. (2017): Deterrence and Dissuasion in Cyberspace. International Security 41(3): 51.10.1162/ISEC_a_00266
]Search in Google Scholar
[
Nye, J. and J. S. Nye (2011): Nuclear lessons for cyber security? Strategic studies quarterly 5(4): 22.10.21236/ADA553620
]Search in Google Scholar
[
Paganini, P. (2016): The website of the Hungarian Government temporarily shut by cyber-attack: available at: from https://securityaffairs.co/wordpress/45898/hacking/hungarian--government-website.html (18 June 2020).
]Search in Google Scholar
[
Poland 2019–2024 (2019): Poland’s Cyber Security Strategy 2019–2024: available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
]Search in Google Scholar
[
Procner, W. (2015): Wywiad i kontrwywiad w procesie strategicznej dezinformacji. Secretum 1(2): 40–57.
]Search in Google Scholar
[
Rid, T. – Buchanan, B. (2015): Attributing Cyber Attacks. Journal of Strategic Studies 38(2): 7.10.1080/01402390.2014.977382
]Search in Google Scholar
[
Sanger, D. (2017): Cyber, Drones, and Secrecy. In: Understanding Cyber Conflict. 14 Analogies, edited by George Perkovich and Ariel E. Levite. Georgetown: Georgetown University Press, 61–78.
]Search in Google Scholar
[
Schmitt, M. N. – Watts, S. (2016): Beyond State-centrism: International Law and Non-state Actors in Cyberspace. Journal of Conflict and Security Law 21(3): 595–611.10.1093/jcsl/krw019
]Search in Google Scholar
[
Slovakia 2021–2025 (2021): The National Cybersecurity Strategy 2021–2025: available at: https://ccdcoe.org/library/strategy-and-governance (12 April 2022).
]Search in Google Scholar
[
Sparks, C. (2003): Are the Western Media Really That Interested in China? Javnost – The Public 10(4): 93–108.10.1080/13183222.2003.11008843
]Search in Google Scholar
[
Trim, P. – Upton, D. (2016): Cyber Security Culture. Counteracting Cyber Threats through Organizational Learning and Training, New York: Routledge.10.4324/9781315575681
]Search in Google Scholar
[
Valeriano, B. – Maness, R.C. (2014): The Dynamics of Cyber Conflict between Rival Antagonists, 2001–2011. Journal of Peace Research 51(3): 347–360.10.1177/0022343313518940
]Search in Google Scholar
[
Warner, J. – Chapin, E. Matfess. H. (2019): Suicide Squads: The Logic of Linked Suicide Bombings. Security Studies 28 (1): 8–9.10.1080/09636412.2018.1508632
]Search in Google Scholar