[Aquila, J. & Ronfeldt, D. (1993), ‘Cyberwar is coming!’ RAND Corporation. Retrieved from https://www.rand.org/pubs/reprints/RP223.html [accessed 6 Oct 2019]]Search in Google Scholar
[Bárd, P.; Uszkiewicz, E.; Alemanno, A.; Bayer, J.; Szakács, J. & Bitiukova, N. (2019), ‘Disinformation and propaganda Impact on the functioning of the rule of law in the EU and its Member States.’ Retrieved from http://www.europarl.europa.eu/thinktank/en/document.html?reference=IPOL_STU(2019)608864 [accessed 12 May 2019]]Search in Google Scholar
[Borghard, E. D. & Lonergan, S. W. (2017), ‘The logic of coercion in cyberspace,’ Security Studies, vol. 26, no. 3, pp. 452–481. https://doi.org/10.1080/09636412.2017.130639610.1080/09636412.2017.1306396]Open DOISearch in Google Scholar
[Buchanan, B. (2014), ‘Cyber deterrence isn’t MAD; it’s mosaic,’ International Engagement on Cyber IV: Post-Snowden Cyberspace, Georgetown Journal of International Affairs, pp. 130–140.]Search in Google Scholar
[Cook, S. (2013), ‘Congressional-executive commission on China roundtable China’s treatment of foreign journalists,’ Freedom House. Retrieved from https://freedomhouse.org/article/china-treatment-foreign-journalists [accessed 12 May 2019]]Search in Google Scholar
[Derfner, A. & Hebert, J. G. (2016), ‘Voting is speech,’ Yale Law and Policy Review, vol. 34, no. 2, p. 471.]Search in Google Scholar
[Geers, K., ed. (2015), Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications.]Search in Google Scholar
[Giles, K. (2015), ‘Russia and its neighbours: old attitudes, new capabilities,’ in K. Giles & K. Geers (eds.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 19–28.]Search in Google Scholar
[Giles, K. (2016), Russia’s ‘New’ Tools for Confronting the West: Continuity and Innovation in Moscow’s Exercise of Power, Chatham House Research Paper. Retrieved from https://www.chathamhouse.org/sites/default/files/publications/2016-03-russia-new-tools-giles.pdf [accessed 12 May 2019]]Search in Google Scholar
[Giles, K. & Hagestad, W. (2013), ‘Divided by a common language: Cyber definitions in Chinese, Russian and English, 5th International Conference on Cyber Conflict (CYCON 2013), pp. 1 17.]Search in Google Scholar
[Gomez, M. & Villar, E. (2018), ‘Fear, uncertainty, and dread: cognitive heuristics and cyber threats,’ Politics and Governance, vol. 6, no. 2, pp. 61–72. https://doi.org/10.17645/pag.v6i2.127910.17645/pag.v6i2.1279]Search in Google Scholar
[Greenberg, A. (2018), ‘The untold story of NotPetya, the most devastating cyberattack,’ Wired. Retrieved from https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ [accessed 12 May 2019]]Search in Google Scholar
[Hodgson, Q. (2018), ‘Understanding and countering cyber coercion’ in T. Minárik, R. Jakschis & L. Lindström (eds.) 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, Tallinn: NATO CCD COE Publications, pp. 73–88. https://doi.org/10.23919/CYCON.2018.840501110.23919/CYCON.2018.8405011]Search in Google Scholar
[Human Rights First (2108), ‘Fake news, free speech, and foreign influence: the smart way the United States can combat disinformation.’ Retrieved from https://www.humanrightsfirst.org/sites/default/files/Disinformation-Brief-March-2018.pdf [accessed 12 May 2019]]Search in Google Scholar
[Jasper, S. (2017), Strategic Cyber Deterrence: The Active Cyber Defense Option, Lanham, ML: Rowman & Littlefield.]Search in Google Scholar
[Jensen, B.; Valeriano, B. & Maness, R. (2018), Cyber Strategy: The Evolving Character of Power and Coercion, Oxford: Oxford University Press. https://doi.org/10.1093/oso/9780190618094.001.000110.1093/oso/9780190618094.001.0001]Open DOISearch in Google Scholar
[Johnson, D. R. & Post, D. G. (1996), ‘Law and borders – the rise of law in cyberspace,’ Stanford Law Review, vol. 48, no. 5, pp. 1367–1402. https://doi.org/10.2307/122939010.2307/1229390]Open DOISearch in Google Scholar
[Kogan, R. (2015), ‘Bedep trojan malware spread by the Angler exploit kit gets political,’ Trustwave. Retrieved from https://www.trustwave.com/Resources/SpiderLabs-Blog/Bedep-trojan-malware-spread-by-the-Angler-exploit-kit-gets-political/ [accessed 12 May 2019]]Search in Google Scholar
[Kostyuk, N. & Zhukov, Y. (2019), ‘Invisible digital front: can cyber attacks shape battlefield events?’ Journal of Conflict Resolution, vol. 63, no. 2, pp. 317–347. https://doi.org/10.1177/002200271773713810.1177/0022002717737138]Open DOISearch in Google Scholar
[Koval, N. (2015), ‘Revolution hacking,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 55–58.]Search in Google Scholar
[Libicki, M. C. (2018), ‘Drawing inferences from cyber espionage,’ in T. Minárik, R. Jakschis & L. Lindström (eds.) 10th International Conference on Cyber Conflict CyCon X: Maximising Effects, Tallinn: NATO CCD COE Publications, pp. 109–122. https://doi.org/10.23919/CYCON.2018.840501310.23919/CYCON.2018.8405013]Search in Google Scholar
[Neuman, C. & Poznansky, M. (2016), ‘Swaggering in cyberspace: busting the conventional wisdom on cyber coercion,’ War on the Rocks, 28 June. Retrieved from https://warontherocks.com/2016/06/swaggering-in-cyberspace-busting-the-conventional-wisdom-on-cyber-coercion/ [accessed 12 May 2019].]Search in Google Scholar
[Past, L. (2015), ‘Missing in action: rhetoric on cyber warfare,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 95–102.]Search in Google Scholar
[Piiparinen, A. (2016), ‘China’s secret weapon in the South China Sea: cyber attacks,’ The Diplomat, 22 July. Retrieved from https://thediplomat.com/2016/07/chinas-secret-weapon-in-the-south-china-sea-cyber-attacks/ [accessed 12 May 2019]]Search in Google Scholar
[Rid, T. & Buchanan, B. (2018), ‘Hacking democracy,’ The SAIS Review of International Affairs, vol. 38, no. 1, pp. 3–16. https://doi.org/10.1353/sais.2018.000110.1353/sais.2018.0001]Open DOISearch in Google Scholar
[Schelling, T. C. (1960), The Strategy of Conflict, Cambridge, MA: Harvard University Press.]Search in Google Scholar
[Schelling, T. C. (2008), Arms and Influence, New Haven, CT: Yale University Press.]Search in Google Scholar
[Schmitt, M. N. (2018), ‘Virtual disenfranchisement: cyber election meddling in the grey zones of international law,’ Chicago Journal of International Law, vol. 19, no. 1, pp. 8–16.]Search in Google Scholar
[Universal Declaration of Human Rights (1948), United Nations General Assembly, New York. Retrieved from https://www.un.org/en/universal-declaration-human-rights/ [accessed 12 May 2019]]Search in Google Scholar
[Weedon, J. (2015), ‘Beyond ‘cyber war’: Russia’s use of strategic cyber espionage and information operations in Ukraine,’ in K. Geers (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallinn: NATO CCD COE Publications, pp. 67–78.]Search in Google Scholar
[Wilton, C. (2017), ‘Sony, cyber security, and free speech: preserving the First Amendment in the modern world,’ Pace Intellectual Property, Sports & Entertainment Law Forum, vol. 7, no. 1.10.58948/2329-9894.1058]Search in Google Scholar
[Zetter, K. (2016), ‘Inside the cunning, unprecedented hack of Ukraine’s power grid,’ Wired, 3 March. Retrieved from https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ [accessed 12 May 2019]]Search in Google Scholar