20.04lulzsec
lulzsec 时间:2021-03-27 阅读:(
)
9.
1Literatur3459Literatur9.
1LiteraturAbel,David(1999):"HackersKeptAlliesontheDefensive",TheBostonGlobe,20.
06.
1999,A25.
Ackermann,Spencer(2011):"TrollsPounceonFacebook'sTahrirSquare",Wired,04.
02.
2011,http://www.
wired.
com/dangerroom/2011/02/trolls-pounce-on-facebooks-tahrir-square/(01.
08.
2011).
Adamek,Sascha(2011):DieFacebook-Falle:WiedassozialeNetzwerkunserLebenverkauft,München:HeyneVerlag.
Adams,James(2001):VirtualDefense",ForeignAffairs,80(3),98-112.
Aday,Seanetal.
(2010):BlogsandBullets:NewMediaandContentiousPolitics,UnitedStatesInstituteforPeace,http://www.
usip.
org/files/resources/pw65.
pdf(05.
12.
2011).
Addley,Esther/Hallyday,Josh(2010):"WikiLeaksSupportersDisruptVisaandMasterCardSitesin'OperationPayback'",TheGuardian,09.
12.
2010,http://www.
guardian.
co.
uk/world/2010/dec/08/WikiLeaks-visa-mastercard-operation-payback(15.
03.
2011).
Adler,Emmanuel(1992):"TheEmergenceofCooperation:NationalEpistemicCommunitiesandtheInternationalEvolutionoftheIdeaofNuclearArmsControl",InternationalOrganization,46(1),101-145.
Adler,Emmanuel/Haas,PeterM.
(1992):"Conclusion:EpistemicCommunities,WorldOrder,andtheCreationofaReflectiveResearchProgram",InternationalOrganization,46(1),367-390.
AgenceFrance-Presse(2011):"SocialMediaSitesStirringVietnam-ChinaTensions",11.
06.
2011,http://www.
leaderpost.
com/technology/Social+media+sites+stirring+Vietnam+China+tensions/4930189/story.
html(22.
06.
2011).
Aid,MatthewM.
(2010):TheSecretSentry:TheUntoldHistoryoftheNSA,NewYork/Berlin/London:Bloomsbury.
Aitoro,JillR.
(2008):"NationalCyberSecurityInitiativeWillHaveaDozenParts",NextGov,01.
08.
2008,http://www.
nextgov.
com/nextgov/ng_20080801_9053.
php(12.
08.
2011).
Akin,David(2004):"ArrestsKeyWinforNSAHackers",GlobeandMail,06.
04.
2004,http://lists.
jammed.
com/ISN/2004/04/0016.
html(15.
03.
2011).
Akude,JohnE.
etal.
(2009):"TransformationpolitischerOrdnung:AnstzezurErweiterungdesTransformationsbegriffes",ZeitschriftfürPolitikwissenschaft,56(2),142-161.
Al-bab.
com(2011):SpeechbyPresidentBasharal-AssadatDamascusUniversity",20.
06.
2011,http://www.
al-bab.
com/arab/docs/syria/bashar_assad_speech_110620.
htm(26.
06.
2011).
Alberts,DavidS.
/Hayes,RichardE.
(2003):PowertotheEdge:Command…Control…intheInfor-mationAge,CCRPPublicationSeries,Washington,DC:USDepartmentofDefense,http://www.
dodccrp.
org/files/Alberts_Power.
pdf(15.
03.
2011).
Albright,David/Brannan,Paul/Walrond,Christina(2011):StuxnetMalwareandNatanz:UpdateofISISDecember22,2010Report,15.
02.
2011,Washington,DC:InstituteforScienceandInter-nationalSecurity,http://www.
isis-online.
org/uploads/isis-reports/documents/stuxnet_update_15Feb2011.
pdf(15.
03.
2011).
AlLawati,Abas(2008):"GroupsHackAlArabiyaWebsite",Gulfnews.
com,10.
10.
2008,http://gulfnews.
com/news/gulf/uae/media/groups-hack-al-arabiya-website-1.
136725(17.
11.
2010).
M.
Hansel,InternationaleBeziehungenimCyberspace,DOI10.
1007/978-3-658-00228-2,SpringerFachmedienWiesbaden20133469LiteraturAlmond,Kyle(2011):"HowOneVoiceCanTelltheStoryofanEntireMovement",CNN.
com,01.
04.
2011,http://edition.
cnn.
com/2011/WORLD/meast/04/01/arab.
unrest.
faces/index.
html(10.
04.
2011).
Allchin,Joseph(2011):"CyberWarBreaksnewGround",DemocraticVoiceofBurma,14.
03.
2011,http://www.
dvb.
no/news/cyber-war-breaks-new-ground/14727(15.
03.
2011).
Allison,Graham/Zelikow,Philip(1999):EssenceofDecision:ExplainingtheCubanMissileCrsis,NewYork:Addison-WesleyLongman.
Alvestrand,Harald/Lie,HkonWium(2009):"DevelopmentofCoreInternetStandards:TheWorkofIETFandW3C",in:LeeA.
Bygrave/JonBing(Hg.
):InternetGovernance:InfrastructureandInstitutions,Oxford:OxfordUniversityPress.
Alvey,Ruth(2001):"RussianHackersforHire:TheRiseoftheE-Mercenary",Jane'sIntelligenceReview,30.
07.
2001.
Aly,Gtz(2005):HitlersVolksstaat:Raub,RassenkriegundnationalerSozialismus,Frankfurta.
M.
:FischerVerlag.
Amoroso,Edward(2007):CyberSecurity,Summit,NJ:SiliconPress.
Anderson,Chris/Wolff,Michael(2010):"TheWebisDead:LongLivetheInternet",Wired,17.
08.
2010,http://www.
wired.
com/magazine/2010/08/ff_webrip/all/1(15.
07.
2011).
Anderson,Lisa(2011):"DemystifyingtheArabSpring:ParsingtheDifferencesbetweenTunesia,Egypt,andLibya",ForeignAffairs,90(3).
Anderson,Nate(2011):"TweetingTyrantsoutofTunesia:GlobalInternetatitsBest",ArsTechnica,14.
01.
2011,http://arstechnica.
com/tech-policy/news/2011/01/tweeting-tyrants-out-of-tunisia.
ars(10.
04.
2011).
Anishchuk,Alexei(2011):"BlackBerryFirmSeeksSecurity'Balance'inRussia",Reuters,25.
04.
2011,http://www.
reuters.
com/article/2011/04/25/us-blackberry-russia-idUSTRE73O1ZL20110425(10.
06.
2011).
Apps,Peter/Prodhan,Georgina(2011):"ExpertsSkepticalonnewIran'CyberAttack'Claim",Reuters,05.
05.
2011,http://af.
reuters.
com/article/energyOilNews/idAFLDE74417H20110505(10.
05.
2011).
Aranson,JonathanD.
(2005):"CausesandConsequencesoftheCommunicationsandInternetRevo-lution",in:JohnBaylis/SteveSmith(Hg.
):TheGlobalizationofWorldPolitics:AnIntroduc-tiontoInternationalStudies,Oxford:OxfordUniversityPress,621-643.
Arkin,WilliamM.
(1999):"TheCyberBombinYugoslavia",25.
10.
1999,WashingtonPost,http://www.
washingtonpost.
com/wp-srv/national/dotmil/arkin.
htm(17.
10.
2010).
Armistead,Leigh(Hg.
)(2007):InformationWarfare:SeparatingHypefromReality,Washington,DC:PotomacBooks.
Armistead,Leigh(Hg.
)(2004):InformationOperations:WarfareandtheHardRealityofSoftPower,Washington,DC:Brassey's.
Arquilla,John/Ronfeldt,David(2003):"CyberwarisComing!
",ComparativeStrategy,12(2),141-165.
Arquilla,John/Ronfeldt,David(Hg.
)(1997):InAthena'sCamp:PreparingforConflictintheInfor-mationAge,SantaMonica,CA:RAND.
Arrelano,NestorE.
(2011):"Canada'sPhishingActivityBooming,ReportWarns",itbusiness.
ca,10.
05.
2011,http://www.
itbusiness.
ca/it/client/en/home/News.
aspid=62413(10.
06.
2011).
Asimov,Nanetteetal.
(2009):"SabotageAttacksKnockoutPhoneService",SanFranciscoChroni-cle,10.
04.
2009,http://www.
sfgate.
com/cgi-bin/article.
cgif=/c/a/2009/04/10/MNP816VTE6.
DTL&type=printable(03.
03.
2010).
Asmolov,Gregory(2011):"Russia:InternetFreedomasColdWar2.
0",GlobalVoices,26.
02.
2011,http://globalvoicesonline.
org/2011/02/26/russia-internet-freedom-as-cold-war-2-0/(04.
06.
2011).
9.
1Literatur347Assange,Julian(2010):"InterviewwithTimeMagazineEditorviaSkype",TimeMagazine,01.
12.
2010,http://www.
time.
com/time/printout/0,8816,2034040,00.
html(15.
03.
2011).
Assange,Julian(2006a):"StateandTerroristConspiracies",me@iq.
org,10.
11.
2006,abrufbarunterhttp://cryptome.
org/0002/ja-conspiracies.
pdf(15.
03.
2011).
Assange,Julian(2006b):"ConspiracyasGovernance",me@iq.
org,03.
12.
2006,abrufbarunterhttp://cryptome.
org/0002/ja-conspiracies.
pdf(15.
03.
2011).
Assange,Julian(2006c):"TheNon-linearEffectsofLeaksonUnjustSystemsofGovernance",me@iq.
org,31.
12.
2006,abrufbarunterhttp://web.
archive.
org/web/20071020051936/http://iq.
org/(15.
03.
2011).
AssociatedPress(2011):"APNewsBreak:LeakedStudyShowsCompaniesAdvisedPentagononCyber-SabotageagainstLibya",TheWashingtonPost,13.
06.
2011,http://www.
washingtonpost.
com/business/technology/apnewsbreak-leaked-study-shows-companies-advised-pentagon-on-cyber-sabotage-against-libya/2011/06/13/AGHjJ6SH_story.
html(17.
06.
2011).
Austen,Ian/Johnston,David(2006):"17HeldinPlottoBombSitesinOntario",TheNewYorkTimes,04.
06.
2006,http://www.
nytimes.
com/2006/06/04/world/americas/04toronto.
html(15.
03.
2011).
Axelrod,Robert(2009)[1984]:DieEvolutionderKooperation,deutschebersetzungderOriginal-ausgabe,München:Oldenbourg.
Axelrod,Robert/Keohane,RobertO.
(1993):"AchievingCooperationUnderAnarchy:StrategiesandInstitutions",in:DavidA.
Baldwin(Hg.
):NeorealismandNeoliberalism:TheContemporaryDebate,NewYork:ColumbiaUniversityPress,85-115.
Baker,Al/Rashbaum,WiliamK.
(2006):"3HeldOverseasinPlantoBombNewYorkTarget",TheNewYorkTimes,08.
07.
2006,http://www.
nytimes.
com/2006/07/08/nyregion/08terror.
htmlfta=y(15.
03.
2011).
Baker,Stewart/Waterman,Shaun/Ivanov,George(2010):IntheCrossfire:CriticalInfrastructureintheAgeofCyberwar,SantaClara,CA:McAfee,http://www.
mcafee.
com/us/resources/reports/rp-in-crossfire-critical-infrastructure-cyber-war.
pdf(01.
06.
2011).
Baldor,LolitaC.
(2010):"HackersHitPoliticalDissidentsinVietnamasAttacksTargetGovernmentDissenters",WinnipegFreePress,28.
10.
2010,http://www.
winnipegfreepress.
com/world/breakingnews/hackers-hit-political-dissidents-in-vietnam-as-attacks-target-government-dissenters-106101938.
html(03.
11.
2010).
Baldwin,DavidA.
(2002):"PowerandInternationalRelations",in:WalterCarlsnaesetal.
(Hg.
):HandbookofInternationalRelations,Londonetal.
:Sage.
Bamford,James(2008):TheShadowFactory:TheUltra-SecretNSAfrom9/11totheEavesdroppingonAmerica,NewYork:AnchorBooks.
Baocun,Wang/Fei,Li(1995):InformationWarfare,ExzerptzweierArtikelausderLiberationArmyDaily,http://www.
fas.
org/irp/world/china/docs/iw_wang.
htm(22.
11.
2010).
Barlow,JohnPerry(1996):ADeclarationoftheIndependenceofCyberspace,Davos:ElectronicFrontierFoundation,http://homes.
eff.
org/~barlow/Declaration-Final.
html(15.
03.
2011).
Barbrook,Richard/Cameron,Andy(1997):TheCalifornianIdeology,http://www.
dinicola.
it/socinfo/california.
htm(10.
04.
2011).
Barme,GeremieR.
/Ye,Sang(1997):"TheGreatFirewallofChina",Wired,Juni1997,http://www.
wired.
com/wired/archive/5.
06/china.
html(03.
06.
2011).
Barnes,JulianE.
(2008):"PentagonComputerNetworksAttacked",LosAngelesTimes,28.
11.
2008,http://articles.
latimes.
com/2008/nov/28/nation/na-cyberattack28(17.
11.
2010).
Barnes,JulianE.
/Gorman,Siobhan(2011):"CyberwarPlanHasNewFocusonDeterrence",TheWallStreetJournal,15.
07.
2011,3489Literaturhttp://online.
wsj.
com/article/SB10001424052702304521304576446191468181966.
html(25.
08.
2011).
Barnet,Belinda/Eldredge,Niles(2004):"MaterialCulturalEvolution:AnInterviewwithNilesEldredge",TheFibrecultureJournal,3/2004,http://three.
fibreculturejournal.
org/fcj-017-material-cultural-evolution-an-interview-with-niles-eldredge/(28.
08.
2011).
Barney,Darin(2000):PrometheusWired:TheHopeforDemocracyintheAgeofNetworkTechnol-ogy,TheUniversityofChicagoPress:Chicago.
Bauer,Kevinetal.
(2007):Low-ResourceRoutingAttacksagainstTor,Boulder,CO:UniversityofColorado,http://www.
cs.
colorado.
edu/department/publications/reports/docs/CU-CS-1025-07.
pdf(10.
08.
2011).
Bayles,WilliamJ.
(2001):"TheEthicsofComputerNetworkAttack",Parameters,31(1),44-58.
BBC(2010):"Siprnet:WheretheCablesCamefrom",29.
11.
2010,http://www.
bbc.
co.
uk/news/world-us-canada-11863618(15.
03.
2011).
BBC(2009a):"ExpertsUnimpressedbyRussianGeneralStaff'InformationWar'Prediction",WorldwideMonitoringFormerSovietUnion,10.
03.
2009,OriginalerschieneninIzvestiyavom27.
02.
2009.
BBC(2009b):"IndiaSaysAttacks,TerrorisminCyberspaceEmergingas'NewThreats'",World-wideMonitoringSouthAsia,27.
03.
2009,OriginalerschienenaufTheAsianAgeWebsiteam27.
03.
2009.
BBC(2009c):"UK'HasCyberAttackCapability'",25.
06.
2009,http://news.
bbc.
co.
uk/2/hi/uk_news/politics/8118729.
stm(22.
11.
2010).
BBC(2009d):SKoreatoCreateCyberWarfareCommandagainstNKoreanHackers",WorldwideMonitoring,26.
06.
2009,ursprünglichYonhapNewsAgency.
BBC(2009e):"ChinaNewsAgencyViewsTwitter'sRoleinIranPoliticalCrisis",BBCWorldwideMonitoring,30.
06.
2009,ursprünglichXinhua.
BBC(2009f):ChinaMilitaryPaperIssuesWarningoverTwitter,YouTube'Subversion'",World-wideMonitoring,07.
08.
2009,ursprünglichSouthChinaMorningPostWebsite.
BBC(2003):"USHackersToldtoLeaveIraqalone",BBCNews,14.
02.
2011,http://news.
bbc.
co.
uk/2/hi/technology/2760899.
stm(01.
08.
2011).
BBCWorldService(2010):FourinFiveRegardInternetAccessasaFundamentalRight:GlobalPoll,http://www.
worldpublicopinion.
org/pipa/pdf/mar10/BBC_Internet_Poll.
pdf(17.
08.
2011).
Becker,Maren/John,Stefanie/Schirm,StefanA.
(2007):GlobalisierungundGlobalGovernance,Paderborn:WilhelmFink.
Beckmann,Rasmus(2011):ClausewitztrifftLuhmann:EinesystemtheoretischeInterpretationvonClausewitz'Handlungstheorie,Wiesbaden:VSVerlag.
Beckmann,Rasmus(2009):ClausewitztrifftLuhmann–berlegungenzursystemtheoretischenInterpretationvonClausewitz'Handlungstheorie,ArbeitspapierezurInternationalenPolitikundAuenpolitik4/2009,Kln:UniversittzuKln.
Beckstrom,Rod(2009):ResignationLetter,05.
03.
2009,http://online.
wsj.
com/public/resources/documents/BeckstromResignation.
pdf(22.
08.
2011).
Bell,Daniel(1973):TheComingofPost-IndustrialSociety:AVentureinSocialForecasting,NewYork,NY:BasicBooks.
Bell,Melissa/Flock,Elizabeth(2011):"'AGayGirlinDamaskus'ComesClean",TheWashingtonPost,12.
06.
2011,http://www.
washingtonpost.
com/lifestyle/style/a-gay-girl-in-damascus-comes-clean/2011/06/12/AGkyH0RH_story.
htmlhpid=z2(13.
06.
2011).
Bendrath,Ralf(2001):"KriegerindenDatennetzen:DieUS-StreikrfteeroberndenCyberspace",Telepolis,17.
06.
2001,http://www.
heise.
de/tp/r4/artikel/7/7892/1.
html(17.
11.
2010).
Bendrath,Ralf/Eriksson,Johan/Giacomello,Giampiero(2007):"From'Cyberterrorism'to'Cyber-war',backandforth:HowtheUnitedStatesSecuritizedCyberspace",in:JohanEriks-9.
1Literatur349son/GiampieroGiacomello(Hg.
):InternationalRelationsandSecurityintheDigitalAge,Londonetal.
:Routledge,57-82.
Benkler,Yochai(2006):TheWealthofNetworks:HowSocialProductionTransformsMarketsandFreedom,NewHaven/London:YaleUniversityPress.
Bentham,Jeremy(1995)[1787]:PanoptikumortheInspectionHouse,in:Ders.
:ThePanopticumWritings,editiertvonMiranBozovic,London:Verso,29-95.
Berger,Jens(2011):"AufrüstenimKampfumdievirtuelleMeinungshoheitimNetz",Telepolis,22.
02.
2011,http://www.
heise.
de/tp/r4/artikel/34/34240/1.
html(15.
03.
2011).
Berger,Jonah/Milkman,KatherineL.
(2011):"WhatMakesOnlineContentViral",JournalofMarketingResearch(imErscheinen),http://marketing.
wharton.
upenn.
edu/documents/research/virality.
pdf(28.
08.
2011).
Berinato,Scott(2006):AttackoftheBots",Wired,November2006,http://www.
wired.
com/wired/archive/14.
11/botnet.
html(31.
05.
2011).
Bernau,V.
/Kuh,J.
/Riedl,T.
(2011):SpielabbruchbeiSony",SüddeutscheZeitung,28.
04.
2011,17.
Berners-Lee,Tim(1999):WeavingtheWeb:TheOriginalDesignandUltimateDestinyoftheWorldWideWebbyitsInventor,SanFrancisco,CA:Harper.
Best,MichaelL.
/Wade,KeeganW.
(2005):TheInternetandDemocracy:GlobalCatalystorDe-mocraticDud,Cambridge,MA:TheBerkmanCenterforInternet&Society,http://cyber.
law.
harvard.
edu/sites/cyber.
law.
harvard.
edu/files/12-InternetDemocracy.
pdf(14.
04.
2011).
Bildt,Carl(2010):"TearDowntheseVirtualWalls",WashingtonPost,25.
01.
2010,A17.
Billing,Soren(2009):"SaudiCampaigntoCleanupYouTube",arabianbusiness.
com,13.
08.
2009,http://www.
arabianbusiness.
com/saudi-campaign-clean-up-youtube-14834.
html(10.
06.
2011).
Billo,Charles/Chang,Welton(2004):CyberWarfare:AnAnalysisoftheMeansandMotivationsofSelectedNationStates,InstituteforSecurityTechnologyStudiesatDartmouthCollege,Hano-ver,NH.
Bimber,Bruce(1994):"ThreeFacesofTechnologicalDeterminism",in:MerrittR.
Smith/LeoMarx(Hg.
):DoesTechnologyDriveHistoryTheDilemmaofTechnologicalDeterminism,Cam-bridge,MA:TheMITPress,79-100.
Bing,Jon(2009):"BuildingCyberspace:ABriefHistoryoftheInternet",in:LeeA.
Bygrave/JonBing(Hg.
):InternetGovernance:InfrastructureandInstitutions,Oxford:OxfordUniversityPress.
Bizeul,David(2007):RussianBusinessNetworkStudy,http://www.
bizeul.
org/files/RBN_study.
pdf(10.
06.
2011).
Blainey,Geoffrey(1973):TheCausesofWar,London:Macmillan.
Blancke,Stephan/Rosenke,Jens(2011):"BlutistdickeralsWasser:Diechinesisch-nordkoreanischeMilitr-undGeheimdienstkooperation",ZeitschriftfürAuen-undSicherheitspolitik,4(2),263-294.
Blouet,BrianW.
(Hg.
)(2005):GlobalGeostrategy:MackinderandtheDefenceoftheWest,NewYork:FrankCass.
Boas,TaylorC.
(2000):"TheDictator'sDilemmaTheInternetandU.
S.
PolicytowardCuba",TheWashingtonQuarterly,23(3),57-67.
Borchers,Detlef(2011):"DieWurzelnvonWikiLeaks",in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequenzen,Berlin,55-66.
Borchert,Heiko(Hg.
)(2004):VernetzteSicherheit:LeitideederSicherheitim21.
Jahrhundert,Hamburg/Berlin/Bonn:Mittler&Sohn.
Borger,Julian(1999):PentagonKepttheLidonCyberwarinKosovo",Guardian,09.
11.
1999,http://www.
guardian.
co.
uk/world/1999/nov/09/balkans(10.
10.
2010).
Bork,Henrik(2009):DickerLuo,ganzleise",SüddeutscheZeitung,16.
01.
2009,15.
3509LiteraturBowie,RobertR.
(1961):BasicRequirementsofArmsControl",in:DonaldG.
Brennan(Hg.
):ArmsControl,Disarmament,andNationalSecurity,NewYork:GeorgeBraziller,43-55.
Boyd,DanahM.
/Ellison,NicoleB.
(2007):SocialNetworkSites:Definition,History,andScholar-ship",JournalofComputer-MediatedCommunication,13(1),http://jcmc.
indiana.
edu/vol13/issue1/boyd.
ellison.
html(15.
03.
2011).
Boyer,MarkA.
/Butler,MichaelJ.
(2006):PublicGoodsLiberalism:TheProblemsofCollectiveActions",in:JenniferSterling-Folker(Hg.
):MakingSenseofInternationalRelationsTheory,Boulder/London:LynneRienner,75-91.
Bradbury,Danny(2009):"TheFogofCyberwar",TheGuardian,05.
02.
2009,http://www.
guardian.
co.
uk/technology/2009/feb/05/kyrgyzstan-cyberattack-internet-access(17.
11.
2010).
Brenner,SusanW.
(2002):"OrganizedCybercrimeHowCyberspaceMayAffecttheStructureofCriminalRelationsships",NorthCarolinaJournalofLaw&Technology,4(1),1-50.
Brewin,Bob(2008):"AirForceLookingtoBuildCyberWeapons",NextGov,14.
05.
2008,http://www.
nextgov.
com/nextgov/ng_20080514_6745.
php(22.
11.
2010).
Brewin,Bob(2007):"Army,AirForceSeektoGoonOffensiveinCyberWar",GovernmentExecu-tive,13.
06.
2007,http://www.
govexec.
com/story_page.
cfmarticleid=37185&printerfriendlyvers=1(22.
11.
2010).
Briggs,Asa/Burke,Peter(2009):ASocialHistoryoftheMedia,Cambridge:PolityPress.
Brill,Heinz(2008):GeopolitischeAnalysen:BeitrgezurdeutschenundinternationalenSicher-heitspolitik1974-2008,2.
Aufl.
,Bissendorf:BiblioVerlag.
Broad,WilliamJ.
(2010):"ReportSuggestsProblemswithIran'sNuclearEfforts",23.
11.
2010,http://www.
nytimes.
com/2010/11/24/world/middleeast/24nuke.
html(15.
07.
2011).
Broad,WilliamJ.
/Markoff,John/Sanger,DavidE.
(2011):"IsraeliTestonWormCalledCrucialinIranNuclearDelay",TheNewYorkTimes,15.
01.
2011,http://www.
nytimes.
com/2011/01/16/world/middleeast/16stuxnet.
html(15.
03.
2011).
Brckerhoff,Daniel(2011):"DieIdentittsmrdervonGooglePlus",ZDFHyperland,22.
07.
2011,http://blog.
zdf.
de/hyperland/2011/07/die-identitaetsmoerder-von-googleplus/(08.
08.
2011).
Brookes,Adam(2006):"USPlanstoFighttheNet'Revealed",BBCNews,27.
01.
2006,http://news.
bbc.
co.
uk/2/hi/americas/4655196.
stm(03.
03.
2010).
Brookes,Heather(2010):"WikiLeaksCables:SaudiPrincesThrowPartiesBoastingDrinks,DrugsandSex",TheGuardian,07.
12.
2010,http://www.
guardian.
co.
uk/world/2010/dec/07/WikiLeaks-cables-saudi-princes-parties(15.
03.
2011).
Brunker,Mike(2000):"FBIAgentChargedwithHacking",MSNBC.
com,15.
08.
2000,http://www.
msnbc.
msn.
com/id/3078784/(15.
03.
2011).
Builder,CarlH.
/Banks,StevenC.
(1990):TheEtiologyofEuropeanChange,SantaMonica,CA:RAND,http://www.
rand.
org/content/dam/rand/pubs/papers/2008/P7693.
pdf(03.
06.
2011).
Bull,Hedley(1977):TheAnarchicalSociety.
AStudyofOrderinWorldPolitics,London:Macmil-lan.
Bull,Hedley(1961):TheControloftheArmsRace,London:InstituteforStrategicStudies.
Bulliet,RichardW.
(1994):"DeterminismandPre-IndustrialTechnology",in:MerrittR.
Smith/LeoMarx(Hg.
):DoesTechnologyDriveHistoryTheDilemmaofTechnologicalDeterminism,Cambridge,MA:TheMITPress,201-215.
BundesamtfürSicherheitinderInformationstechnik(2005):NationalerPlanzumSchutzderKriti-schenInformationsinfrastrukturen,Bonn,http://www.
eco.
de/dokumente/Nationaler_Plan_Schutz_Informationsinfrastrukturen_%282%29.
pdf(10.
08.
2011).
9.
1Literatur351BundesministeriumdesInneren(2011):Cyber-SicherheitsstrategiefürDeutschland,http://www.
cio.
bund.
de/SharedDocs/Publikationen/DE/IT-Sicherheit/css_download.
pdf__blob=publicationFile(30.
06.
2011).
Burchill,Scott(2001):"RealismandNeo-realism",in:ScottBurchilletal.
(Hg.
):TheoriesofInter-nationalRelations,2.
Aufl.
,London:Palgrave,70-102.
Burkitt,Laurie/Greenberg,Andy(2009):"SenatorsPushDigitalCodeofConduct",Forbes,25.
06.
2009.
http://www.
forbes.
com/2009/06/25/digital-code-iran-technology-business-mccain.
html(03.
03.
2010).
Burroughs,Oliver(2002):"RussiansWageCyberWaronChechenWebsites",14.
11.
2002,Reuters,http://www.
infosecnews.
org/hypermail/0211/6795.
html(19.
11.
2010).
Bütikofer,Reinhard(2011):"DualUse:ExportkontrolleohneZhne",BltterfürdeutscheundinternationalePolitik,12/2011,9-12.
Buxbaum,PeterA.
(2008):"USCyberwarTurfBattleContinues",ISNSecurityWatch,28.
08.
2008,abrufbarunterhttp://intellibriefs.
blogspot.
com/2008/08/us-cyberwar-turf-battle-continues.
html(16.
08.
2011).
Buzan,Barry(1987):AnIntroductiontoStrategicStudies:MilitaryTechnologyandInternationalRelations,Houndmillsetal.
:Macmillan/InternationalInstituteforStrategicStudies.
Buzan,Barry/Hansen,Lene(2009):TheEvolutionofInternationalSecurityStudies,Cambridge:CambridgeUniversityPress.
Buzan,Barry/Herring,Eric(1998):TheArmsDynamicinWorldPolitics,Boulder/London:LynneRienner.
Buzan,Barry/Waever,Ole/deWilde,Jaap(1997):Security:ANewFrameworkforAnalysis,Boulder,CO:Lynne-Rienner.
Bygrave,LeeA.
/Bing,Jon(Hg.
)(2009):InternetGovernance:InfrastructureandInstitutions,Ox-ford:OxfordUniversityPress.
Bygrave,LeeA.
/Michaelsen,Terje(2009):"GovernorsoftheInternet",in:LeeA.
Bygrave/JonBing(Hg.
):InternetGovernance:InfrastructureandInstitutions,Oxford:OxfordUniversityPress,92-125.
Cairncross,Frances(1997):TheDeathofDistance.
HowtheCommunicationsRevolutionWillChangeOurLives,Boston,MA:HarvardBusinessSchoolPress.
Calingaert,Daniel(2010):"Authoritarianismvs.
theInternet",PolicyReview,No.
160,http://www.
hoover.
org/publications/policy-review/article/5269(01.
08.
2011).
Campbell,Duncan(1999a):"HowNSAAccessWasBuiltintoWindows",Telepolis,04.
09.
1999,http://www.
heise.
de/tp/artikel/5/5263/1.
html(10.
08.
2011).
Campbell,Duncan(1999b):"OnlyNSACanListen,soIt'sOK",Telepolis,01.
06.
1999,http://www.
heise.
de/tp/artikel/2/2898/1.
html(10.
08.
2011).
CanadaCentreforGlobalSecurityStudies/MunkSchoolofGlobalAffairs(2011):CastingaWiderNet:LessonsLearnedinDeliveringBBCContentontheCensoredInternet,11.
10.
2011,Uni-versityofToronto,http://munkschool.
utoronto.
ca/downloads/casting.
pdf(14.
12.
2011).
Carr,Jeffrey(2010):InsideCyberWarfare,Sebastopol,CA:O'Reilly.
Carr,Niclas(2009):TheBigSwitch:DieVernetzungderWeltvonEdisonbisGoogle.
Heidelberg:mitp.
Castells,Manuel(2009):CommunicationPower,Oxford:OxfordUniversityPress.
Castells,Manueletal.
(2007):MobileCommunicationandSociety:AGlobalPerspective,Lon-don/Cambridge,MA:TheMITPress.
Castells,Manuel(1996):TheRiseoftheNetworkSociety,Vol.
1:TheInformationAge:Economy,SocietyandCulture,Malden,MA:BlackwellPublishers.
CBSNews(2010):"ChinaGroup:FacebookUsedtoSowUnrest",09.
07.
2010,http://www.
cbsnews.
com/stories/2010/07/09/tech/main6661575.
shtml(04.
06.
2011).
3529LiteraturCBSNews(1999):"U.
S.
AdmitstoComputerWarfare:Enemy'sAirDefenseNetworkWasTar-geted",10.
07.
1999,http://www.
cbsnews.
com/stories/1999/10/07/tech/main65516.
shtml(10.
10.
2010).
Chandler,Daniel(1995):TechnologicalorMediaDeterminism,Aberystwyth:AberystwythUniver-sity,http://www.
aber.
ac.
uk/media/Documents/tecdet/tecdet.
html(03.
02.
2011).
Checkel,JeffreyT.
(1998):"TheConstructivistTurninInternationalRelationsTheory",WorldPolitics,50(2),324-348.
Chen,Adrian(2011):"WhyFacebookShouldDoMoretoHelpEgypt'sProtesters",Gawker(Blog),05.
02.
2011,http://gawker.
com/#!
5752904/why-facebook-should-do-more-to-help-egypts-protesters(10.
04.
2011).
Chen,Chengetal.
(2011):"BattlingtheInternetWaterArmy:DetectionofHiddenPaidPosters",TheComputingResearchRepository,November2011,http://arxiv.
org/PS_cache/arxiv/pdf/1111/1111.
4297v1.
pdf(01.
12.
2011).
Cheng,Gracye(2010):ResponsetoQuestionsPosedbyCNAsonInternationalLaw&InternetFreedom,Cambridge,MA:HarvardUniversity,http://www.
law.
harvard.
edu/students/orgs/nsrc/CNAS-Final%20Draft-3.
pdf(20.
08.
2011).
Cheng,Jacqui(2010):"'Deleted'FacebookPhotosStillnotDeleted:AFollowup",ArsTechnica,11.
10.
2010,http://arstechnica.
com/web/news/2010/10/facebook-may-be-making-strides.
ars(15.
03.
2011).
ChinaDaily(2011):"ChinaSetsupStateInternetInformationOffice",04.
05.
2011,http://www.
chinadaily.
com.
cn/china/2011-05/04/content_12440782.
htm(15.
08.
2011).
Chivers,Tom(2010):"WikiLeaks'10GreatestStories",TheTelegraph,18.
10.
2010,http://www.
telegraph.
co.
uk/news/worldnews/asia/afghanistan/8070253/WikiLeaks-10-greatest-stories.
html(15.
03.
2011).
Christensen,John(1999):"BracingforGuerrillaWarfareinCyberspace",CNNInteractive,06.
04.
1999,http://lists.
jammed.
com/ISN/1999/05/0029.
html(17.
11.
2010).
Citizenlap(2011):BehindBlueCoat:InvestigationsofCommercialFilteringinSyriaandBurma,09.
09.
2011,UniversityofToronto,http://citizenlab.
org/2011/11/behind-blue-coat/(14.
12.
2011).
Clarke,RichardA.
/Knake,RobertK.
(2010):Cyberwar:TheNextThreattoNationalSecurityandWhattoDoaboutit,NewYork:Harper/Collins.
Clausewitz,Carlvon(1980)[1832]:VomKriege:HinterlassenesWerkdesGeneralsCarlvonClau-sewitz,vollstndigeAusgabeimUrtext,dreiTeileineinemBand,Bonn:Dümmler.
Clayton,Mark(2011):FBISettoKillSecret-StealingRussianBotnet':IsYourComputerIn-fected",TheChristianScienceMonitor,06.
05.
2011,http://www.
csmonitor.
com/USA/2011/0506/FBI-set-to-kill-secret-stealing-Russian-botnet.
-Is-your-computer-infected(18.
07.
2011).
Clayton,Mark(2010a):StuxnetMalwareisWeapon'outtoDestroy…Iran'sBushehrNuclearPlant",TheChristianScienceMonitor,21.
09.
2010,http://www.
csmonitor.
com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant(15.
03.
2011).
Clayton,Mark(2010b):"SonofStuxnetVariantsoftheCyberweaponLikely,SenatorsTold",TheChristianScienceMonitor,17.
11.
2010,http://www.
csmonitor.
com/USA/2010/1117/Son-of-Stuxnet-Variants-of-the-cyberweapon-likely-senators-told(14.
08.
2011).
Coleman,Kevin(2008):"TheCyberArmsRaceHasBegun",CSOOnline,28.
01.
2008,http://www.
csoonline.
com/article/216991/coleman-the-cyber-arms-race-has-begunpage=1(10.
08.
2011).
CNN(2007):"EstoniaSuspectsKremlininWebAttacks",17.
05.
2007,http://www.
industrialdefender.
com/general_downloads/incidents/2007.
05.
17_estonia_suspects_kremlin_in_web_attacks.
pdf(28.
05.
2011).
9.
1Literatur353Cohen,Dudi(2008):IranianSpy'RevealsMossadMethods",ynetnews,07.
07.
2008,http://www.
ynetnews.
com/articles/0,7340,L-3565274,00.
html(22.
11.
2010).
Cole,JeffreyI.
etal.
(2003):TheUCLAInternetReport:SurveyingtheDigitalFuture,LosAngeles,CA:UCLACenterforCommunicationPolicy,http://www.
digitalcenter.
org/pdf/InternetReportYearThree.
pdf(01.
08.
2011).
Coleman,Gabriella(2011):"Unberechenbar,mchtigundgefhrlich",Interviewauftagesschau.
de,28.
02.
2011,http://www.
tagesschau.
de/ausland/Anonymous100_page-2.
html(15.
03.
2011).
CommissiononSecurity&CooperationinEurope(2009):Briefing:TwitteragainstTyrants:NewMediainAuthoritarianRegimes,Washington,DC,http://csce.
gov/index.
cfmFuseAction=ContentRecords.
ViewTran-script&ContentRecord_id=462&ContentType=H,B&ContentRecord-Type=B&CFID=32177263&CFTOKEN=96274551(03.
06.
2011).
Conetta,Carl(2005):ArmsControlinanAgeofStrategicandMilitaryRevolution,Cambridge,MA:CommonwealthInstitute.
CongressionalExecutiveCommissiononChina(2002):Roundtable:China'sCyber-Wall:CanTechnologyBreakThrough,04.
11.
2002,http://libweb.
uoregon.
edu/ec/e-asia/read/cybrchine.
pdf(03.
06.
2011).
Connolly,Kate(2009):"GermanyAccusesChinaofIndustrialEspionage",TheGuardian,22.
07.
2009,http://www.
guardian.
co.
uk/world/2009/jul/22/germany-china-industrial-espionage(16.
08.
2011).
Coonan,Clifford(2010):"TheGoogleWar:ChinaCallsUSan'InformationImperialist'",TheIndependent,23.
01.
2010,http://www.
independent.
co.
uk/news/world/asia/the-google-war-china-calls-us-an-information-imperialist-1876409.
html(15.
07.
2011).
Copeland,DaleC.
(2000):TheOriginsofMajorWar,Ithaca;London:CornellUniversityPress.
Corera,Gordon(2009):"Cyber-securityStrategyLaunched",BBCNews,25.
06.
2009,http://news.
bbc.
co.
uk/2/hi/uk_news/politics/8118348.
stm(15.
06.
2011).
Cottam,MarthaL.
etal.
(2010):IntroductiontoPoliticalPsychology,2ndEdition,NewYork/Hove:PsychologyPress.
Cronin,AudreyK.
(2006):"Cyber-Mobilization:TheNewLevéeenMasse",Parameters,Sommer2006,77-87.
CouncilofEurope(2003):AdditionalProtocoltotheConventiononCybercrime,ConcerningtheCriminalisationofActsofRacistandXenophobicNatureCommittedthroughComputerSys-tems,Straburg,http://conventions.
coe.
int/Treaty/en/Treaties/Html/189.
htm(17.
06.
2011).
CouncilofEurope(2001):ConventiononCybercrime,Budapest,http://conventions.
coe.
int/Treaty/en/Treaties/Html/185.
htm(17.
06.
2011).
Croen,Evan(2008):"InternetFilteringinAustraliaandNewZealand",in:RonaldDeibertetal.
(Hg.
):AccessDenied:ThePracticeandPolicyofGlobalInternetFiltering,Cambridge,MA:TheMITPress,166-176.
CSIS(2011):CybersecurityTwoYearsLater,Washington,DC,http://csis.
org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.
pdf(16.
08.
2011).
CSIS(2008):SecuringCyberspaceforthe44thPresidency,Washington,DC,http://csis.
org/files/media/csis/pubs/081208_securingcyberspace_44.
pdf(16.
08.
2011).
Czempiel,Ernst-Otto(1999):KlugeMacht:Auenpolitikfürdas21.
Jahrhundert,München:C.
H.
Beck.
Czempiel,Ernst-Otto(1996):InternationaleBeziehungen:Begriff,GegenstandundForschungsab-sicht",in:ManfredKnapp/GertKrell(Hg.
):EinführungindieInternationalePolitik:Studien-buch,Münchenetal.
:Oldenbourg,3-26.
Czempiel,Ernst-Otto(1986):Friedensstrategien:SystemwandeldurchInternationaleOrganisatio-nen,DemokratisierungundWirtschaft,Paderborn:Schningh.
3549LiteraturCzempiel,Ernst-Otto(1975):FriedeundKonfliktindenInternationalenBeziehungen",in:HelgaHaftendorn(Hg.
):TheoriederInternationalenPolitik:GegenstandundMethodederInternati-onalenBeziehungen,Hamburg:HoffmannundCampe,89-113.
Daase,Christopher(2010):DererweiterteSicherheitsbegriff,WorkingPaper,Frankfurta.
M.
:Goe-the-UniversittFrankfurt,http://www.
sicherheitskultur.
org/fileadmin/files/WorkingPapers/01-Daase.
pdf(10.
03.
2011).
Dahlkamp,Jürgen(2007):PrinzipSandkorn",DerSpiegel,Heft35,27.
08.
2007,18.
Damschke,Giesbert(2011):DasDigiNotar-Desaster",ZDFHyperland,12.
09.
2011,http://blog.
zdf.
de/hyperland/2011/09/das-diginotar-desaster-oder-warum-sie-sich-vielleicht-sorgen-machen-sollten-2/(14.
09.
2011).
Darnton,Geoffrey(2006):"InformationWarfareandtheLawsofWar",in:EdwardHalpinetal.
(Hg.
):Cyberwar,NetwarandtheRevolutioninMilitaryAffairs,Houndmills:Palgrave,139-153.
Dauber,CoriE.
(2009):YoutubeWar:FightinginaWorldofCamerasineveryCellPhoneandPhotoshoponeveryComputer,Carlisle,PA:StrategicStudiesInstitute.
Daun,Anna(2011):AugeumAuge:Intelligence-Kooperationindendeutsch-amerikanischenBezie-hungen,Wiesbaden:VSVerlagfürSozialwissenschaften.
Davis,Joshua(2007):"HackersTakeDowntheMostWiredCountryinEurope",Wired,21.
08.
2007,http://www.
wired.
com/politics/security/magazine/15-09/ff_estonia(28.
05.
2011).
Deibert,Ronald(2011):CyberSecurity:CanadaisFailingtheWorld,26.
05.
2011,http://www.
infowar-monitor.
net/2011/05/7334/(10.
06.
2011).
Deibert,Ronald(2010):China'sCyberspaceControlStrategy:AnOverviewandConsiderationofIssuesforCanadianPolicy,Toronto,ON:CanadianInternationalCouncil.
Deibert,Ronald/Rohozinski,Rafal(2011):"TheNewCyberMilitary-IndustrialComplex",TheGlobeandMail,28.
03.
2011,http://www.
theglobeandmail.
com/news/opinions/opinion/the-new-cyber-military-industrial-complex/article1957159/print/(27.
04.
2011).
Deibert,Ronald/Rohozinski,Rafal(2010):"ControlandSubversioninRussianCyberspace",in:Deibert,Ronaldetal.
(Hg.
)(2010):AccessControlled:TheShapingofPower,Rights,andRuleinCyberspace,Cambridge,MA:TheMITPress,15-34.
Deibert,Ronaldetal.
(Hg.
)(2010):AccessControlled:TheShapingofPower,Rights,andRuleinCyberspace,Cambridge,MA:TheMITPress.
Deibert,Ronaldetal.
(Hg.
)(2008):AccessDenied:ThePracticeandPolicyofGlobalInternetFiltering,Cambridge,MA:TheMITPress.
Delio,Michelle(2004):"Linux:FewerBugsthanRivals",Wired,14.
12.
2004,http://www.
wired.
com/software/coolapps/news/2004/12/66022(10.
08.
2011).
DeNardis,Laura(2009):ProtocolPolitics:TheGlobalizationofInternetGovernance,Cambridge,MA:TheMITPress.
Denning,DorothyE.
(2001):"ObstaclesandOptionsforCyberArmsControl",in:Heinrich-Bll-Stiftung(Hg.
):RüstungskontrolleimCyberspace,Berlin,36-39.
Denning,DorothyE.
(1999):InformationWarfareandSecurity,Reading,MA:Addison-Wesley.
DePalma,Anthony(2006):"OntarioTerrorismSuspectsFaceListsofChargesinPlot",TheNewYorkTimes,06.
06.
2006,http://query.
nytimes.
com/gst/fullpage.
htmlres=9E05EEDC1431F935A35755C0A9609C8B63(15.
03.
2011).
Derene,Glenn(2008):"InsideNSARedTeamSecretOpswithGovernment'sTopHackers",Popu-larMechanics,30.
06.
2008,http://www.
popularmechanics.
com/technology/how-to/computer-security/4270420(22.
11.
2010).
DerStandard(2007):"Lawrow:EstlandbespucktGrberunsererSoldaten",02.
05.
2007,http://derstandard.
at/2860303(28.
05.
2011).
9.
1Literatur355DeSolaPool,Ithiel(1983):TechnologiesofFreedom:OnFreeSpeechinanElectronicAge,Cam-bridge,MA:HarvardUniversityPress.
DeSolaPool,Ithiel(1973):"CommunicationinTotalitarianSocieties",in:Ders.
etal.
(Hg.
):Hand-bookofCommunication,Chicago,IL:RandMcNallyCollegePublishingCompany,462-511.
Deutsch,KarlW.
(1969)[1963]:PolitischeKybernetic:ModelleundPerspektiven,Freiburgi.
Br.
:VerlagRombach&Co.
DeutscherBundestag(2011):AntwortderBundesregierungaufdieKleineAnfragederAbgeordnetenUllaJelpke,JanKorte,Dr.
PetraSitte,weitererAbgeordneterundderFraktionDIELINKE,14.
07.
2011,Drucksache17/6587,Berlin,http://dipbt.
bundestag.
de/dip21/btd/17/065/1706587.
pdf(11.
08.
2011).
DiCenso,DavidJ.
(1999):"IWCyberlaw:TheLegalIssuesofInformationWarfare",AirpowerJournal,Summer1999,85-102.
Diehl,PaulF.
(1992):"WhatAreTheyFightingForTheImportanceofIssuesinInternationalConflictResearch",JournalofPeaceResearch,29(3),333-344.
Dolman,EverettC.
(2002):Astropolitik:ClassicalGeopoliticsintheSpaceAge,London:FrankCass.
Domscheit-Berg(2011):InsideWikiLeaks:MeineZeitbeidergefhrlichstenWebsitederWelt,Berlin:EconVerlag.
Donati,Madeleine(2011):48JahrefehlenderpolitischerKultur",Telepolis,07.
06.
2011,http://www.
heise.
de/tp/druck/mb/artikel/34/34880/1.
html(13.
06.
2011).
Donati,PaoloR.
(2001):DieRahmenanalysepolitischerDiskurse",in:ReinerKelleretal.
(Hg.
):HandbuchSozialwissenschaftlicheDiskursanalyse,Bd.
1:TheorienundMethoden,Opladen:Leske+Budrich,145-175.
Dring,Nicola(2003):SozialpsychologiedesInternet:DieBedeutungdesInternetfürKommunika-tionsprozesse,Identitten,sozialeBeziehungenundGruppen,2.
Aufl.
,Gttingenetal.
:Hogrefe.
Dougherty,JamesE.
/Pfaltzgraff,RobertL.
(1997):ContendingTheoriesofInternationalRelations:AComprehensiveSurvey,4.
Aufl.
,NewYork:Addison-WesleyLongman.
Douhet,Giulio(1998)[1942]:TheCommandoftheAir,übersetztvonDinoFerrari,Tuscaloosa:UniversityofAlabamaPress.
Drew,Christopher/Markoff,John(2009):"ContractorsVieforPlumWork,HackingforU.
S.
",TheNewYorkTimes,31.
05.
2009,1.
Dreyfus,Suelette(2003):"HacktivismthroughtheEyesofanInfiltrator",TheAge(Melbourne),08.
05.
2003,10.
Dreyfus,Suelette/Assange,Julian(2011)[1997]:Underground:DieGeschichtederfrühenHacker-Elite,Berlin:Haffmans&Tolkemit.
Drezner,DanielW.
(2007):AllPoliticsisGlobal:ExplainingInternationalRegulatoryRegimes,Princeton/Oxford:PrincetonUniversityPress.
Drucker,PeterF.
(1989):TheNewRealities:InGovernmentandPolitics,inEconomicsandBusi-ness,inSocietyandWorldView,NewYork,NY:Harper&Row.
Ducker,James(1985):"ElectronicInformation–ImpactoftheDatabase",Futures,17(2),164-169.
Dunn-Cavelty,Myriam(2008):Cyber-SecurityandThreatPolitics:USEffortstoSecuretheInfor-mationAge,NewYork:Routledge.
Dunn-Cavelty,Myriam/Kristensen,KristianS.
(Hg.
)(2008):SecuringtheHomeland:CriticalInfra-structure,Riskand(In)Security,London:Routledge.
Dunn-Cavelty,Myriam/Krishna-Hensel,SaiF.
/Mauer,Victor(Hg.
)(2007):TheResurgenceoftheState:TrendsandProcessesinCyberspaceGovernance,Aldershot:Ashgate.
Dunne,Tim/Schmidt,BrianC.
(2001):"Realism",in:JohnBaylis/SteveSmith(Hg.
):TheGlobaliza-tionofWorldPolitics:AnIntroductiontoInternationalRelations,2.
Aufl.
,Oxfordetal.
:Ox-fordUniversityPress,141-161.
3569LiteraturDuerr,HansPeter(1995):DerMythosvomZivilisationsprozess:Band3:ObsznittundGewalt,Frankfurta.
M.
:Suhrkamp.
Dyson,Estheretal.
(1994):CyberspaceandtheAmericanDream:AMagnaChartafortheKnowl-edgeAge,Washington,DC:ProgressandFreedomFoundation.
Ebersole,Samuel(2007):MediaDeterminisminCyberspace,VirginiaBeach,VA:RegentUniver-sity,http://www.
regent.
edu/acad/schcom/rojc/mdic/md.
html(02.
02.
2011).
Eckert,Paul/Magnowski,Daniel(2011):"Kissinger,Huntsman:U.
S.
,ChinaNeedCyberDetente",Reuters,14.
06.
2011,http://www.
reuters.
com/article/2011/06/14/us-china-kissinger-cyber-idUSTRE75D62Q20110614(17.
06.
2011).
Efinger,Manfred/Rittberger,Volker/Zürn,Michael(1988):InternationaleRegimeindenOst-West-Beziehungen:EinBeitragzurErforschungderfriedlichenBehandlunginternationalerKonflik-te,FrankfurtamMain:HaagundHerchenVerlag.
Efinger,Manfred/Zürn,Michael(1990):"ExplainingConflictManagementinEast-WestRelations:AQuantitativeTestofProblem-StructuralTypologies",in:VolkerRittberger(Hg.
):Interna-tionalRegimesinEast-WestPolitics,London/NewYork:PinterPublishers.
ElDeeb,Sarah/Michael,Maggie(2011):"WaelGhonim,FreedActivist,EnergizesEgyptianPro-tests",HuffingtonPost,08.
02.
2011,http://www.
huffingtonpost.
com/2011/02/08/wael-ghonim-egypt-protests-google_n_820330.
html(10.
04.
2011).
ElDifraoui,Asiem/Steinberg,Guido(2011):"DerFeindinunseremNetz:WiebekmpftmanAl-Kaida&Co.
imvirtuellenRaum",InternationalePolitik,Januar/Februar2011,20-25.
ElectronicFrontierFoundation(2011):EEFtoObamaAdministration:SyriansDeserveAccesstoCommunicationsandInformationTools,SanFrancisco,CA,http://www.
eff.
org/deeplinks/2011/07/eff-u-s-treasury-and-commerce-time-clarify-u-s(20.
07.
2011).
ElectronicFrontierFoundation(2010):BetterU.
S.
NetRulesforIran,CubaandSyria,SanFran-cisco,CA,http://www.
eff.
org/deeplinks/2010/03/better-u-s-net-rules-iran-cuba-and-syria(29.
03.
2010).
Elliott,David(2009):"WeighingtheCaseforaConventiontoLimitCyberwarfare",ArmsControlToday,39(9).
Ellul,Jacques(1964):TheTechnologicalSociety,NewYork:VintageBooks.
Elter,Andreas(2007):"DieRAFunddieMedien:EinFallbeispielfürterroristischeKommunikati-on",in:BundeszentralefürpolitischeBildung(Hg.
):DossierRAF,Bonn,abrufbarunterhttp://www.
bpb.
de/themen/XNP7ZG,0,0,Die_RAF_und_die_Medien.
html(05.
08.
2011).
Emm,David(2010):"SchwachstelleMensch",Viruslist.
com,01.
04.
2010,http://www.
viruslist.
com/de/analysispubid=200883688(15.
03.
2011).
ENISA(2010):FirstEUCyberSecurityExercise'CyberEurope2010'with>320'incidents'suc-cessfullyconcluded",05.
11.
2010,http://www.
enisa.
europa.
eu/media/press-releases/cyber-europe-20102019-cyber-security-exercise-with-320-2018incidents2019-successfully-concluded(16.
08.
2011).
Entman,RobertM.
(1993):Framing:TowardClarificationofaFracturedParadigm",JournalofCommunication,43(4),51-58.
Erdbrink,Thomas/Warrick,Joby(2011):Iran:CountryunderAttackbySecondComputerVirus",TheWashingtonPost,25.
04.
2011,http://www.
washingtonpost.
com/world/iran-country-under-attack-by-second-computer-virus/2011/04/25/AFudkBjE_story.
html(27.
04.
2011).
Eriksson,John/Giacomello,Giampiero(2009):"WhoControlstheInternetBeyondtheObstinacyorObsolescenceoftheState",InternationalStudiesReview,11(1),205-230.
Esfandiari,Golnaz(2010):TheTwitterDevolution",ForeignPolicy,07.
06.
2010,http://www.
foreignpolicy.
com/articles/2010/06/07/the_twitter_revolution_that_wasnt(14.
08.
2011).
9.
1Literatur357Eshel,David(2010):IsraelAddsCyber-AttacktoIDF",AviationWeek'sDefenseTechnologyInter-national,10.
02.
2010,http://www.
military.
com/features/0,15240,210486,00.
html(09.
06.
2011).
Espiner,Tom(2011):UKCbersecuritySpendingPlansRevealed",ZDNetUK,20.
04.
2011,http://www.
zdnet.
co.
uk/news/security-management/2011/04/20/uk-cybersecurity-spending-plans-revealed-40092586/(27.
04.
2011).
Espiner,Tim/Klingler,Anita(2011):"KrawalleinLondon:RIMwillMessenger-DatenanPolizeiweitergeben",ZDNet,09.
08.
2011,http://www.
zdnet.
de/news/41555530/krawalle-in-london-rim-will-messenger-daten-an-polizei-weitergeben.
htm(13.
11.
2008).
Estes,AdamC.
(2011):"HackersRespondtoHackingArrestswithMoreHacking",TheAtlanticWire,26.
07.
2011,http://www.
theatlanticwire.
com/technology/2011/07/hackers-respond-hacking-arrests-more-hacking/40382/(08.
08.
2011).
Etling,Bruce/Faris,Robert/Palfrey,John(2010):"PoliticalChangeintheDigitalAge:TheFragilityandPromiseofOnlineOrganizing",TheBerkmanCenterforInternet&SocietyatHarvardUniversity,http://dash.
harvard.
edu/handle/1/4609956(10.
04.
2011).
EuropischesParlament(2011):"Exportevon'sensiblenGütern'beschrnken",Pressemitteilung,http://www.
europarl.
europa.
eu/pdfs/news/expert/infopress/20110927IPR27586/20110927IPR27586_de.
pdf(26.
10.
2011).
Evers,Joris(2003):"ChinaNexttoGetAccesstoMicrosoftSourceCode",InfoWorld,28.
02.
2003,http://www.
infoworld.
com/print/8026(03.
03.
2010).
Evron,Gadi(2009):"Authoratively,WhoWasBehindtheEstonianAttacks",darkreading.
com,17.
03.
2009,http://www.
darkreading.
com/blog/227700882/authoritatively-who-was-behind-the-estonian-attacks.
html(31.
05.
2011).
Evron,Gadi(2008):"BattlingBotnetsandOnlineMobs:Estonia'sDefenseEffortsduringtheInter-netWar",GeorgetownJournalofInternationalAffairs,9(1),121-126.
ExecutiveOfficeofthePresidentoftheUnitedStates(2008):TheComprehensiveNationalCyberse-curityInitiative,Auszügeunterhttp://www.
fas.
org/irp/eprint/cnci.
pdf(22.
11.
2010).
Facebook(2011a):Pressebereich:Statistiken,http://www.
facebook.
com/press/info.
phpstatistics(09.
04.
2011).
Facebook(2011b):StatementofRightsandResponsibilities,Stand:25.
03.
2011,http://www.
facebook.
com/terms.
php(15.
04.
2011).
Fahim,Kareem(2011):"SlaptoaMan'sPrideSetOffTumultinTunesia",TheNewYorkTimes,21.
01.
2011,http://www.
nytimes.
com/2011/01/22/world/africa/22sidi.
html(10.
04.
2011).
Falliere,Nicolas/O'Murchu,Liam/Chien,Eric(2011):W32.
StuxnetDossier,Symantec,http://www.
symantec.
com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.
pdf(15.
03.
2011).
Fallows,Deborah(2008):FewinChinaComplainaboutInternetControls",PewResearchCenter,27.
03.
2008,http://pewresearch.
org/pubs/776/china-internet(17.
08.
2011).
Farago,Yonit(2006):"IsraelBackedbyArmyofCyber-Soldiers",TheTimesOnline,28.
07.
2006,http://www.
timesonline.
co.
uk/tol/news/world/middle_east/article693911.
ece(07.
10.
2010).
Faris,Robertetal.
(2011):OnlineSecurityintheMiddleEastandNorthAfrica:ASurveyofPercep-tions,Knowledge,andPractice,Cambridge,MA:BerkmanCenterforInternetandSociety,http://cyber.
law.
harvard.
edu/sites/cyber.
law.
harvard.
edu/files/OnlineSecurityintheMiddleEastandNorthAfrica_August2011.
pdf(15.
08.
2011).
Faris,Robert/Villeneuve,Nart(2008):MeasuringGlobalInternetFiltering",in:RonaldDeibertetal.
(Hg.
):AccessDenied:ThePracticeandPolicyofGlobalInternetFiltering,Cambridge,MA:TheMITPress,5-27.
Farwell,JamesP.
(2010):"JihadiVideointhe'WarofIdeas'",Survival,52(6),127-150.
Farwell,JamesP.
/Rohozinski,Rafal(2011):StuxnetandtheFutureofCyberWar",Survival,53(1),23-40.
3589LiteraturFathi,Nazila(2009):"InaDeathSeenAroundtheWorld,aSymbolofIranianProtests",TheNewYorkTimes,23.
06.
2009,http://www.
nytimes.
com/2009/06/23/world/middleeast/23neda.
html(15.
03.
2011).
Fearon,JamesD.
/Wendt,Alexander(2002):"Rationalismv.
Constructivism:ASkepticalView",in:Carlsnaes,Walter/Risse,Thomas/Simmons,BethA.
(Hg.
):HandbookofInternationalRela-tions,London:Sage,52-72.
FederationofAmericanScientists(FAS)(2011a):AgenciesBoostSurveillanceofClassifiedNet-works",SecrecyNews,Issue24,14.
03.
2011.
FederationofAmericanScientists(FAS)(2011b):"SecrecyofCyberThreatsSaidtoCauseCompla-cency",SecrecyNews,18.
04.
2011,http://www.
fas.
org/blog/secrecy/2011/04(27.
04.
2011).
FederationofAmericanScientists(FAS)(2000):SecretInternetProtocolRouterNetwork(SIPRNET),http://www.
fas.
org/irp/program/disseminate/siprnet.
htm(15.
03.
2011).
Feezel,JessicaT.
/Conroy,Meredith/Guerrero,Mario(2009):"Facebookis.
.
.
FosteringPoliticalEngagement:AStudyofOnlineSocialNetworkingGroupsandOfflineParticipation",PaperforPresentationattheAmericanPoliticalScienceAssociationMeetinginToronto,Canada,September2009,http://irevolution.
files.
wordpress.
com/2009/09/apsa-feezell-2009.
pdf(10.
04.
2011).
Ferguson,AaronJ.
(2005):"FosteringEmailSecurityAwareness:TheWestPointCarronade",EducauseQuarterly,28(1),54-57.
Festinger,Leon(1957):ATheoryofCognitiveDissonance,Stanford,CA:StanfordUniversityPress.
Feuilherade,Peter(2007):"ChinaLeaderUrgesNetCrackdown",BBCMontoring,25.
04.
2007,http://news.
bbc.
co.
uk/2/hi/technology/6592003.
stm(03.
03.
2010).
Fey,Marco/Müller,Harald(2008):UnkontrollierbareRüstungsdynamikDieRMAalsharterBrocken'fürdieRüstungskontrolle",in:JanHelmig/NiklasSchrnig(Hg.
):DieTransformati-onderStreitkrfteim21.
Jahrhundert:MilitrischeundpolitischeDimensionenderaktuellen'RevolutioninMilitaryAffairs',FrankfurtamMain:Campus,203-223.
FinancialTimes(2007):USWarnsCyber-AttackswillIncrease",17.
05.
2007,http://www.
ft.
com/cms/s/0/324fa472-049e-11dc-80ed-000b5df10621.
html#axzz1Nej08Dbs(28.
05.
2011).
Finjan(2006):WebSecurityTrendsReportQ42006,SanJose,CA:FinjanMaliciousCodeResearchCenter,http://www.
m86security.
com/labs/web-security-trends-reports.
asp(13.
08.
2011).
Finkle,Jim(2011a):"U.
S.
GovernmentSaysStuxnetCouldMorphintonewThreat",MontrealGazette,29.
07.
2011,http://www.
montrealgazette.
com/technology/government+says+Stuxnet+could+morph+into+threat/5178616/story.
html(08.
08.
2011).
Finkle,Jim(2011b):"Biggest-everSeriesofCyberAttacksUncovered",Reuters,03.
08.
2011,http://www.
reuters.
com/article/2011/08/03/cyberattacks-idUSN1E76R26720110803(08.
08.
2011).
Finklea,KristinM.
(2011):TheInterplayofBorders,Turf,Cyberspace,andJurisdiction:IssuesConfrontingU.
S.
LawEnforcement,CongressionalResearchService,http://www.
fas.
org/sgp/crs/misc/R41927.
pdf(20.
08.
2011).
Finn,Peter(2007):CyberAssaultsonEstoniaTypifyaNewBattleTactic",TheWashingtonPost,19.
05.
2007,A01.
Finnemore,Martha(2011):CultivatingInternationalCyberNorms",in:KristinM.
Lord/TravisSharp(Hg.
):America'sCyberFuture:SecurityandProsperityintheInformationAge:VolumeII,Washington,DC:CenterforaNewAmericanSecurity,89-100.
Fischbach,Rainer(2005):MythosNetz:KommunikationjenseitsvonRaumundZeit,Zürich:Rot-punktVerlag.
Fischer,Frederik(2011):Syrien:HackergegendieRevolution",ZDFHyperland,09.
09.
2011,http://blog.
zdf.
de/hyperland/2011/09/syrien-hacker-gegen-die-revolution/(14.
09.
2011).
9.
1Literatur359Fisher,Max(2010):5ReasonstoDoubtAl-QaedaMagazine'sAuthenticity",TheAtlantic,01.
07.
2010,http://www.
theatlantic.
com/international/archive/2010/07/5-reasons-to-doubt-al-qaeda-magazines-authenticity/59035/(15.
04.
2011).
Fiske,SusanT.
/Taylor,ShelleyE.
(2010):SocialCognition:FromBrainstoCulture,Bostonetal.
:McGrawHill.
Fitzgerald,Patrick(2010):TheHackersbehindStuxnet",SymantecOfficialBlog,21.
07.
2010,http://www.
symantec.
com/connect/blogs/hackers-behind-stuxnet(15.
03.
2010).
Flade,Florian(2011):"WiederComputerspielerAridU.
zumMrderwurde",WeltOnlinet,05.
03.
2011,http://www.
welt.
de/politik/deutschland/article12707960/Wie-der-Computerspieler-Arid-U-zum-Moerder-wurde.
html(15.
03.
2011).
Flamm,Kenneth(1987):TargetingtheComputer:GovernmentSupportandInternationalCompeti-tion,WashingtonDC:TheBrookingsInstitution.
Fontaine,Richard/Rogers,Will(2011a):InternetFreedom:AForeignPolicyImperativeintheDigitalAge,Washington,DC:CenterforanewAmericanSecurity,http://www.
cnas.
org/files/documents/publications/CNAS_InternetFreedom_FontaineRogers_0.
pdf(01.
08.
2011).
Fontaine,Richard/Rogers,Will(2011b):"InternetFreedomanditsDiscontents:NavigatingtheTensionswithCyberSecurity",in:KristinM.
Lord/TravisSharp(Hg.
):America'sCyberFu-ture:SecurityandProsperityintheInformationAge:VolumeII,Washington,DC:CenterforaNewAmericanSecurity,145-164.
Ford,Peter(2001):"EuropeCringesatBushs'Crusade'againstTerrorists",ChristianScienceMoni-tor,19.
09.
2001,http://www.
csmonitor.
com/2001/0919/p12s2-woeu.
html(21.
05.
2011).
ForeignPolicy(2011):"TheFPSurvey:TheInternet",September/Oktober2011,90.
Foucault,Michel(1995):DisciplineandPunish:TheBirthofthePrison,NewYork,NY:VintageBooks.
FoxNews(2009):"PentagonOfficial:NorthKoreabehindWeekofCyberAttacks",09.
07.
2009,http://www.
foxnews.
com/story/0,2933,530781,00.
html(11.
08.
2011).
FoxNews(2006):"FBIBusts'RealDeal'TerrorPlotAimedatNYC-NJUndergroundTransitLink",07.
07.
2006,http://www.
foxnews.
com/story/0,2933,202518,00.
html(15.
03.
2011).
Franck,Georg(1998):konomiederAufmerksamkeit:EinEntwurf,München/Wien:CarlHanserVerlag.
Francis,Bob(2005):"KnowthyHacker:TheDollarsandCentsofHacking",InfoWorld,28.
01.
2005,http://www.
infoworld.
com/d/security-central/know-thy-hacker-534(22.
11.
2010).
Freedman,Lawrence(2004):Deterrence,Cambridge:PolityPress.
Frei,Daniel(1973):"Einführung:WozuTheorienderinternationalenPolitik",in:Ders.
(Hg.
):TheorienderinternationalenBeziehungen,München:Pieper,11-25.
Frey,Dieter(1997):"KognitiveTheorieninderSozialpsychologie",in:DieterFrey/SiegfriedGreif(Hg.
):Sozialpsychologie:EinHandbuchinSchlüsselbegriffen,4.
Auflage,Weinheim:Psy-chologieVerlagsunion,50-67.
Friedman,Thomas(2006):TheWorldisFlat:TheGlobalizedWorldintheTwenty-FirstCentury,NewYork/London:PenguinBooks.
Friedman,Thomas(2000):"CensorsBeware",TheNewYorkTimes,25.
07.
2000,25.
Friedman,Thomas(1999):TheLexusandtheOliveTree:UnderstandingGlobalisation,NewYork,NY:Farrar,StrausandGiroux.
Friscolanti,Michael/Gatehouse,Jonathan/Gillis,Charlie(2006):"HomegrownTerror:It'snotover",Macleans.
ca,19.
06.
2006,http://www.
macleans.
ca/canada/national/article.
jspcontent=20060619_128953_128953(15.
03.
2011).
3609LiteraturFritz,Jason(2009):"HackingNuclearCommandandControl",WorkingPaper,InternationalCom-missiononNuclearNonproliferationandDisarmament:Barton(Australia),http://www.
icnnd.
org/Documents/Jason_Fritz_Hacking_NC2.
pdf(15.
07.
2011).
Froomkin,MichaelA.
(1997):"TheInternetasSourceofRegulatoryArbitrage",in:BrianKa-hin/CharlesNesson(Hg.
):BordersinCyberspace,Cambridge,MA:TheMITPress,129-163.
Fukuyama,Francis(1999):TheGreatDisruption:HumanNatureandtheReconstitutionofSocialOrder,NewYork:FreePress.
Fulghum,DavidA.
(2007a):"TechnologyWillBeKeytoIraqBuildup",AviationWeek&SpaceTechnology,14.
01.
2007,http://www.
aviationweek.
com/aw/generic/story_channel.
jspchan-nel=defense&id=news/aw011507p2.
xml&headline=null&next=0(13.
08.
2011).
Fulghum,DavidA.
(2007b):"WhySyria'sAirDefensesFailedtoDetectIsraelis",AviationWeek&SpaceTechnology,03.
10.
2007,http://www.
aviationweek.
com/aw/blogs/defense/index.
jspplckControl-ler=Blog&plckScript=blogScript&plckElementId=blogDest&plckBlogPage=BlogViewPost&plckPostId=Blog%3a27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post%3a2710d024-5eda-416c-b117-ae6d649146cd(17.
11.
2010).
Fulghum,David(2004):"BattleforMinds",AviationWeek&SpaceTechnology,161(9),52-53.
Fulghum,David(2002):"InfowartoInvadeAirDefenseNetworks:TheU.
S.
CannowConductComputerNetworkAttackinSupportofPrecisionBombardment,orasanAlternative",Avia-tionWeek&SpaceTechnology,157(19),30.
Fulghum,DavidA.
/RoberWall(2001):"Cyber-ArsenalNeedsTesting",AviationWeek&SpaceTechnology,26.
02.
2001,52-53.
Fulghum,DavidA.
(1999):"YugoslaviaSuccessfullyAttackedbyComputers",AviationWeek&SpaceTechnology,23.
08.
1999,31-34.
Fulghum,DavidA.
/Wall,Robert(1999):"InformationWarfareIsn'tWhatYouThink",AviationWeek&SpaceTechnology,26.
02.
2001,52-53.
Gaouette,Nicole/Greely,Brendan(2011):"U.
S.
FundsHelpDemocracyActivistsEvadeInternetCrackdowns",BloombergNews,20.
04.
2011,http://www.
bloomberg.
com/news/2011-04-20/u-s-funds-help-democracy-activists-evade-internet-crackdowns.
html(27.
04.
2011).
Garden,Timothy(2002):"AirPower:TheoryandPractice",in:JohnBaylisetal.
(Hg.
):StrategyintheContemporaryWorld,Oxford:OxfordUniversityPress,137-157.
Gause,F.
Gregory(2011):"WhyMiddleEastStudiesMissedtheArabSpring",ForeignAffairs,Juli/August,81-90.
Gaycken,Sandro(2011):Cyberwar:DasInternetalsKriegsschauplatz,OpenSourcePress:Mün-chen.
Gaycken,Sandro(2010):Stuxnet:Werwar'sUndwozu",ZeitOnline,26.
11.
2010,http://www.
zeit.
de/2010/48/Computerwurm-Stuxnetpage=all&print=true(15.
03.
2011).
Gat,Azar(2007):"TheReturnoftheAuthoritarianGreatPowers",ForeignAffairs,86(4),59-69.
Gedmin,Jeffrey(2010):"Democracyisn'tjustaTweetaway",USAToday,22.
04.
2010,http://www.
usatoday.
com/news/opinion/forum/2010-04-23-gedmin22_ST_N.
htm(20.
08.
2011).
Geiger,Gebhard(2002):OffensiveInformationskriegsführung:Die'JointDoctrineforInformationOperations'derUS-Streitkrfte-SicherheitspolitischePerspektiven,Berlin:StiftungWissen-schaftundPolitik.
Gellmann,Barton(2002):Cyber-AttacksbyAlQaedaFeared",WashingtonPost,27.
06.
2002,A01.
Geist,Michael(2010):"Cyberlaw2.
0",BostonCollegeLawReview,44(2),323-358.
George,AlexanderL.
/Bennett,Andrew(2005):CaseStudiesandTheoryDevelopmentintheSocialSciences,Cambridge/London:TheMITPress.
George,Michael(2011):"BedingtAbwehrbereit",SüddeutscheZeitung,16.
/17.
07.
2011,V2/4.
9.
1Literatur361Gertz,Bill(2009):"ChinaBlocksU.
S.
fromCyberWarfare",TheWashingtonTimes,12.
05.
2009,http://www.
washingtontimes.
com/news/2009/may/12/china-bolsters-for-cyber-arms-race-with-us/(14.
05.
2009).
Geva,Nehemia/Mintz,Alex(Hg.
)(1997):DecisionMakingonWarandPeace:TheCognitive-RationalDebate,London:Lynne-Rienner.
Ghannam,Jeffrey(2011):SocialMediaintheArabWorld:LeadinguptotheUprisingsof2011,Washington,DC:CenterforInternationalMediaAssistance/NationalEndowmentforDemoc-racy,http://www.
humansecuritygateway.
com/documents/CIMA_SocialMediaintheArab-World_LeadinguptotheUprisingsof2011.
pdf(16.
06.
2011).
Gharbia,SamiB.
(2011):"TheInternetFreedomFallacyandtheArabDigitalActivism",SamiBenGharbia(Blog),17.
09.
2010,http://samibengharbia.
com/2010/09/17/the-internet-freedom-fallacy-and-the-arab-digital-activism/(16.
06.
2011).
Ghose,Jayati(2008):"Code-BlindDelhiDeaftoTerrorChatter",TheTelegraph(India),05.
12.
2008,erhaltendurchBBCMonitoringSouthAsia,06.
12.
2008.
Gibson,William(1984):Neuromancer,NewYork:AceBooks.
Gibson,William(1982):"BurningChrome",OmniMagazine,Juli1982.
Giglio,Mike(2011):"MiddleEastUprising:Facebook'sSecretRoleinEgypt",TheDailyBeast,24.
02.
2011,http://www.
thedailybeast.
com/blogs-and-stories/2011-02-24/middle-east-uprising-facebooks-back-channel-diplomacy/cid=hp:mainpromo6%23#(05.
05.
2011).
Gilder,George(1989):Microcosm:TheQuantumRevolutioninEconomicsandTechnology,NewYork,NY:Simon&Schuster.
Gillis,Kyle(2010):"FacebookCEODefendsCompanyinABCInterview",Business&MediaInstitute,22.
07.
2010,http://www.
mrc.
org/bmi/articles/2010/Facebook_CEO_Defends_Company_in_ABC_Interview_Advocates_Democracy.
html(15.
03.
2011).
Gilpin,Robert(1981):WarandChangeinWorldPolitics,Cambridge:CambridgeUniversityPress.
Gjelten,Tom(2011):"VolunteerCyberArmyEmergesinEstonia",04.
01.
2011,http://www.
npr.
org/2011/01/04/132634099/in-estonia-volunteer-cyber-army-defends-nation(09.
06.
2011).
Gjelten,Tom(2010a):"ShadowWars:Debating'Cyber'Disarmament'",WorldAffairsOnline,November/Dezember2010,http://www.
worldaffairsjournal.
org/articles/2010-NovDec/full-Gjelten-ND-2010.
html(12.
05.
2011).
Gjelten,Tom(2010b):"SeeingtheInternetasan'InformationWeapon',NationalPublicRadio,23.
10.
2010,http://www.
npr.
org/templates/story/story.
phpstoryId=130052701(22.
11.
2010).
Gladwell,Malcolm(2010):"SmallChange:WhytheRevolutionWillnotBeTweeted",TheNewYorker,04.
10.
2010,http://www.
newyorker.
com/reporting/2010/10/04/101004fa_fact_gladwell(10.
04.
2011).
Glanville,Jo(2008):"TheBigBusinessofNetCensorship",TheGuardian,17.
11.
2008,http://www.
guardian.
co.
uk/commentisfree/2008/nov/17/censorship-internet(03.
03.
2010).
Glanz,James/Markoff,John(2011a):"EgyptLeadersFound'OffSwitchforInternet",TheNewYorkTimes,15.
02.
2011,http://www.
nytimes.
com/2011/02/16/technology/16internet.
html(15.
03.
2011).
Glanz,James/Markoff,John(2011b):"U.
S.
UnderwritesInternetDetourAroundCensors",TheNewYorkTimes,12.
06.
2011,http://www.
nytimes.
com/2011/06/12/world/12internet.
html(17.
06.
2011).
Glenny,Misha(2011):"Canada'sWeaklingWebDefences",TheGlobeandMail,18.
05.
2011,http://www.
theglobeandmail.
com/news/opinions/opinion/canadas-weakling-web-defences/article2025517/(10.
06.
2011).
3629LiteraturGlobalNetworkInitiative(2008):ImplementationGuidelines,O.
A.
,http://www.
globalnetworkinitiative.
org/cms/uploads/1/GNI_-_Implementation_Guidelines_1_.
pdf(03.
03.
2010).
Goetz,John/Rosenbach,Marcel/Szandar,Alexander(2009):KriegderZukunft",DerSpiegel,Heft7/2009,34.
Goffman,Erving(1974):FrameAnalysis:AnEssayontheOrganizationofExperience,London:HarperandRow.
Goldman,EmilyO.
(1997):"ArmsControlintheInformationAge",ContemporarySecurityPolicy,18(2),25-50.
Goldsmith,Jack/Wu,Tim(2006):WhoControlstheInternetIllusionsofaBorderlessWorld,Ox-ford:OxfordUniversityPress.
Goldsmith,Jack(2007):TheTerrorPresidency:LawandJudgementinsidetheBushAdministration,NewYork:W.
W.
Norton&Company.
Goldsmith,Jack(2000):"UnilateralRegulationoftheInternet:AModestDefence",EuropeanJournalofInternationalLaw,11(1),135-148.
Goldsmith,Jack(1997):"TheInternetandtheAbidingSignificanceofTerritorialSovereignty",IndianaJournalofGlobalLegalStudies,5(2),475-491.
Goldstone,JackA.
(2011):"UnderstandingtheRevolutionsof2011:WeaknessandResilienceinMiddleEasternAutocracies",ForeignAffairs,90(3).
Gompert,D.
C.
(1999):"RightMakesMight.
FreedomandPowerintheInformationAge",In:ZalmayKhalilzadetal.
(Hg.
):StrategicAppraisal:TheChangingRoleofInformationinWar-fare.
SantaMonica,CA:RAND,45-73.
Gorman,Siobhan/Barnes,JulianE.
(2011):"CyberCombat:ActofWar",TheWallStreetJournal,31.
05.
2011,http://online.
wsj.
com-/article/SB10001424052702304563104576355623135782718.
html(07.
06.
2011).
Gorman,Siobhan(2010):"ComputerWormHitsIranPowerPlant",TheWallStreetJournal,26.
09.
2010,http://online.
wsj.
com-/article/SB10001424052748704082104575515581009698978.
html(17.
11.
2010).
Gorman,Siobhan(2009a):"ElectricityGridinU.
S.
PenetratedbySpies",TheWallStreetJournal,08.
04.
2009,http://online.
wsj.
com/article/SB123914805204099085.
html(17.
11.
2010).
Gorman,Siobhan(2009b):GatestoNominateNSAChieftoHeadNewCyberCommand",TheWallStreetJournal,24.
04.
2009,http://online.
wsj.
com/article/SB124060266381953839.
html(22.
11.
2010).
Gorman,Siobhan(2009c):"SecurityCyberCzarStepsDown",TheWallStreetJournal,04.
08.
2009,http://online.
wsj.
com/article/SB124932480886002237.
htmlmod=sphere_ts&mod=sphere_wd(14.
04.
2011).
Graham,Bradley(2003):BushOrdersGuidelinesforConductingCyber-Warfare",WashingtonPost,07.
02.
2003,A01.
Graham,Bradley(2005):HackersAttackViaChineseWebSites",TheWashingtonPost,25.
08.
2005,http://www.
washingtonpost.
com/wp-dyn/content/article/2005/08/24/AR2005082402318.
html(17.
11.
2010).
Grant,Rebecca(2007):VictoryinCyberspace,Arlington,VA:AirForceAssociation,http://www.
afa.
org/media/reports/victorycyberspace.
pdf(14.
05.
2010).
Greely,Brendan(2011):"TheFallacyofFacebookDiplomacy",BloombergBusinessweek,02.
02.
2011,http://www.
businessweek.
com/print/magazine/content/11_07/b4215008414536.
htm(10.
04.
2011).
Green,DavidA.
(2011):"The12mQuestion:HowWikiLeaksGagsitsownStaff",NewStatesman,11.
05.
2011,http://www.
newstatesman.
com/blogs/david-allen-green/2011/05/WikiLeaks-information-legal(16.
05.
2011).
9.
1Literatur363Greenberg,Andy(2009):"Obama'sUnwillingCyberCzars",Forbes.
com,20.
07.
2009,http://www.
forbes.
com/2009/07/20/cybersecurity-obama-economy-technology-security-cybersecurity.
html(14.
04.
2011).
Grieco,JosephM.
(1990):CooperationamongNations:Europe,America,andnon-tariffBarrierstoTrade,Ithaca:CornellUniversityPress.
Grieco,JosephM.
(1988):AnarchyandtheLimitsofCooperation:ARealistCritiqueoftheNewestLiberalInstitutionalism",InternationalOrganization,42(3),485-507.
Grimmelmann,James(2009):"SavingFacebook",IowaLawReview,94,1137-1206,http://works.
bepress.
com/cgi/viewcontent.
cgiarticle=1019&context=james_grimmelmann(15.
03.
2011).
Grimmelmann,James(2005):"RegulationbySoftware",TheYaleLawJournal,114,1719-1758.
Grossman,LawrenceK.
(1995):TheElectronicRepublic:ReshapingDemocracyintheInformationAge,NewYorketal.
:VikingPenguin.
Gross-Stein,Janice(2002):"PsychologicalExplanationsofInternationalConflict",in:WalterCarls-naes/ThomasRisse/BethA.
Simmons(Hg.
):HandbookofInternationalRelations,Londonetal:SagePublications,292-308.
Gross-Stein,Janice/Welch,DavidA.
(1997):"RationalandPsychologicalApproachestotheStudyofInternationalConflict:ComparativeStrenghtsandWeaknesses",in:NehemiaGeva/AlexMintz(Hg.
):Decision-makingonWarandPeace:TheCognitive-RationalDebate,Boulder:LynneRienner,51-77.
Gray,ColinS.
(Hg.
)(1999):Geopolitics,GeographyandStrategy,London:FrankCass.
Greenwald,Glenn(2011):"TheLeakedCampaigntoAttackWikiLeaksanditsSupporters",Sa-lon.
com,11.
02.
2011,http://www.
salon.
com/news/opinion/glenn_greenwald/2011/02/11/campaigns(15.
03.
2011).
Grow,Brian/Epstein,Keith/Tschang,Chi-Chu(2008):"TheNewE-SpionageThreat",BusinessWeek,10.
04.
2008,http://www.
businessweek.
com/magazine/content/08_16/b4080032218430.
htm(22.
11.
2010).
Grzanna,Marcel(2011):"ChinaverschrftInternet-Zensur",SüddeutscheZeitung,27.
07.
2011,8.
Guadagno,RosannaE.
/Cialdini,RobertB.
/Evron,Gadi(2010):"StormingtheServers:ASocialPsychologicalAnalysisoftheFirstInternetWar",Cyberpsychology,Behavior,andSocialNetworking,13(4),447-453.
Gupta,Harish(2011):"AsCyberAttacksRise,IndiaSetsupCentralCommandtoFightBack",DailyNews&AnalysisIndia,15.
05.
2011,http://www.
dnaindia.
com/india/report_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352(09.
06.
2011).
Haas,PeterM.
(1992):"Introduction:EpistemicCommunitiesandInternationalPolicyCoordina-tion",InternationalOrganization,46(1),1-35.
Hachigan,Nina(2002):"TheInternetandPowerinOne-PartyEastAsianStates",TheWashingtonQuarterly,25(3),41-58.
Hafner,Katie&Lyon,Matthew(2006):WhereWizardsStayupLate:TheOriginsoftheInternet,NewYork,NY:Simon&Schuster.
Haggard,Stephan/Simmons,BethA.
(1987):"TheoriesofInternationalRegimes",InternationalOrganization,41(3),491-517.
Hales,Paul(2011):"AnonymousClaimsResponsibilityforSonyAttack",Thinq_,24.
04.
2011,http://www.
thinq.
co.
uk/2011/4/24/Anonymous-claims-responsibilty-sony-attack/(12.
05.
2011).
Halpin,Tony(2007):"EstoniaAccusesRussiaof'WagingCyberWar'",TimesOnline,17.
05.
2007,http://www.
timesonline.
co.
uk/tol/news/world/europe/article1802959.
ece(27.
05.
2011).
Hancock,Bill(1999):First'Official'Cyberwar:Kosovovs.
NATO",Computers&Security,18(7),557-558.
Hansen,Lene/Helen,Nissenbaum(2009):"DigitalDisaster,CyberSecurity,andtheCopenhagenSchool",InternationalStudiesQuarterly,53(4),1155-1175.
3649LiteraturHansel,Mischa(2010):NeueundalteBarrieren:HerrschaftundpolitischePartizipationimCyber-space",in:ZeitschriftfürAuen-undSicherheitspolitik,3(3),357-378.
Harden,Blaine(2006):"InMontana,CastingaWebforTerrorists",TheWashingtonPost,04.
06.
2006,http://www.
washingtonpost.
com/wp-dyn/content/article/2006/06/03/AR2006060300530_pf.
html(05.
05.
2011).
Harden,Blaine(2009):"SouthKoreanWebSitesAreHobbledinnewRoundofAttacks",TheWashingtonPost,10.
07.
2009,http://www.
washingtonpost.
com/wp-dyn/content/article/2009/07/09/AR2009070901106.
html(17.
11.
2010).
Harris,Leslieetal.
(2011):AnOpenLettertoCongressaboutInternetFreedom,14.
03.
2011,http://mobileactive.
tumblr.
com/(07.
06.
2011).
Harris,Shane(2009):"TheCyberDefensePerimeter",NationalJournal,02.
05.
2009,http://www.
nationaljournal.
com/njmagazine/id_20090502_5834.
php(22.
11.
2010).
Harvey,Mike(2009):"ContestAimstoTurnYoungHackersintoCyberSecurity'TopGuns'",TheSundayTimes,08.
10.
2009,http://technology.
timesonline.
co.
uk/tol/news/tech_and_web/article6865432.
ece(22.
11.
2010).
Hartwich,Hans-Hermann(Hg.
):PolitikunddieMachtderTechnik,Opladen:WestdeutscherVerlag.
Hasenclever,Andreas/Mayer,Peter/Rittberger,Volker(1997):TheoriesofInternationalRegimes,Cambridge:CambridgeUniversityPress.
Hasenclever,Andreas/Mayer,Peter/Rittberger,Volker(1996):"Interests,Power,Knowledge:TheStudyofInternationalRegimes",MershonInternationalStudiesReview,40(2),177-228.
Hauck,Mirjam/Kuhn,Johannes(2011):"Whistleblower-PlattformdrohtFinanzkollaps:WikileaksstelltEnthüllungenein",SüddeutscheZeitung,24.
10.
2011,http://www.
sueddeutsche.
de/digital/whistleblower-plattform-droht-finanzkollaps-wikileaks-stellt-enthuellungen-ein-1.
1172082(18.
12.
2011).
Hayashi,Mika(2007):"TheInformationRevolutionandtheRulesofJurisdictioninPublicInterna-tionalLaw",in:M.
Dunnetal.
(Hg.
):TheResurgenceoftheState:TrendsandProcessesinCyberspaceGovernance,Aldershot:Ashgate,59-84.
Heider,Fritz(1958):ThePsychologyofInterpersonalRelations,NewYork:Wiley.
HeinrichBllStiftung(2001):RüstungskontrolleimCyberspace,Berlin.
HeiseMedia(2010):FBI-BackdoorinIPSec-ImplementierungvonOpenBSD",15.
12.
2010,http://www.
heise.
de/security/meldung/FBI-Backdoor-in-IPSec-Implementierung-von-OpenBSD-1153180.
html(04.
08.
2010).
HeiseMedia(2008):CyberkriegimKaukasus",10.
08.
2008,http://www.
heise.
de/newsticker/meldung/Cyberkrieg-im-Kaukasus-194512.
html(10.
06.
2011).
HeiseMedia(2007a):AnonymisierungsnetzTorabgephisht'",10.
09.
2007,http://www.
heise.
de/security/meldung/Anonymisierungsnetz-Tor-abgephisht-173525.
html(10.
08.
2011).
HeiseMedia(2007b):"EstonianDDoS–AFinalAnalysis",31.
05.
2007,http://www.
h-online.
com/security/news/item/Estonian-DDoS-a-final-analysis-732971.
htmlview=print(17.
11.
2010).
Helmig,Jan/Schrnig,Niklas(Hg.
)(2008):DieTransformationderStreitkrfteim21.
Jahrhundert:MilitrischeundpolitischeDimensionenderaktuellen'RevolutioninMilitaryAffairs',Frank-furtamMain:Campus.
Hencke,David(2009):"WhitehallPlansNewCyberSecurityCentretoDeterForeignHackers",TheGuardianOnline,14.
06.
2009,http://www.
guardian.
co.
uk/technology/2009/jun/14/government-security-cyber-crime-hacking(22.
11.
2010).
Henderson,Scott(2007):TheDarkVisitor:InsidetheWorldofChineseHackers,o.
A.
:publiziertimEigenverlag.
9.
1Literatur365Herberg-Rothe,Andreas(2001):DasRtselClausewitz:PolitischeTheoriedesKriegesimWider-streit,München:Fink.
Herrera,Geoffrey.
L.
(2007):"CyberspaceandSovereignty:ThoughtsonPhysicalSpaceandDigitalSpace",in:MyriamDunn-Caveltyetal.
(Hg.
):PowerandSecurityintheInformationAge:In-vestigatingtheRoleoftheStateinCyberspace,Aldershot:Ashgate,67-94.
Hersh,SeymourM.
(2011):"Cyberwar:DieneueFront",BltterfürdeutscheundinternationalePolitik,1/2011,45-56.
Herz,JohnH.
(1961):WeltpolitikimAtomzeitalter,Stuttgart:W.
Kohlhammer.
Hindman,Matthew(2009):TheMythofDigitalDemocracy,Princeton,NJ:PrincetonUniversityPress.
Hinduja,Sameer/Patchin,Justin(2009):BullyingbeyondtheSchoolyard:PreventingandRespond-ingtoCyberbullying,ThousandOaks,CA:CorwinPress.
Hintze,Otto(1902):StaatenbildungundVerfassungsgeschichte",HistorischeZeitschrift,1,1-21.
Hobbes,Thomas(1999)[1651]:LeviathanoderStoff,FormundGewalteineskirchlichenundbür-gerlichenStaates,HerausgegebenundeingeleitetvonIringFetscher.
FrankfurtamMain:Suhrkamp.
Hofmann,Niklas(2011):"DerGegenverschwrer",in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequenzen,Berlin,47-54.
Hoffman,Bruce(2006):Terrorismus:DerunerklrteKrieg,Frankfurta.
M.
:Fischer.
Hoffman,Michael(2006):Israel,Hezbollah,andtheCyberwarof2006",DailyTech,03.
08.
2006,http://www.
dailytech.
com/Israel+Hezbollah+and+the+Cyberwar+of+2006/article3589.
htm(17.
01.
2010).
Holland,Steve/Mikkelsen,Randall(2009):"HasPowerGridBeenHackedU.
S.
Won'tSay",Reuters,08.
04.
2009,http://www.
reuters.
com/article/idUSN0850385920090408(17.
11.
2010).
Holsti,Kalevi(1996):TheState,War,andtheStateofWar,Cambridge:CambridgeUniversityPress.
Holton,Kate/Fayed,Shaimaa(2011):"VodafoneAccusesEgyptianGovernmentofCo-optingNet-work",Reuters,03.
02.
2011,http://www.
reuters.
com/article/2011/02/03/us-egypt-vodafone-idUSTRE7123KJ20110203(15.
03.
2011).
Hopkins,Curt(2011a):"'PakCyberArmy'AttacksDozensofIndianSites",ReadWriteWeb,10.
05.
2011,http://www.
readwriteweb.
com/archives/pakcyberarmy_attacks_dozens_of_indian_sites.
php(09.
06.
2011).
Hopkins,Curt(2011b):"Iran's'CyberArmy'HacksVoiceofAmerica",ReadWriteWeb,22.
02.
2011,http://www.
readwriteweb.
com/archives/irans_cyber_army_hacks_voice_of_america.
php(09.
06.
2011).
Hosenball,Mark(2011):"WikiLeaksPublishesTensofThousandsMoreCables",Reuters,25.
08.
2011,http://www.
reuters.
com/article/2011/08/25/idUSN1E77O1XL20110825(30.
08.
2011).
Hosenball,Mark(2009):"TheTurfWaroverCyberWar",Newsweek,25.
04.
2009,http://www.
newsweek.
com/2009/04/24/the-turf-war-over-cyberwar.
html#(17.
11.
2010).
Howard,PhilipN.
(2011):"TheCascadingEffectsoftheArabSpring",Miller-McCune,23.
02.
2011,http://www.
miller-mccune.
com/politics/the-cascading-effects-of-the-arab-spring-28575/(10.
04.
2011).
Hsu,SpencerS.
(2009):"APentagonCyber-CommandisintheWorks",WashingtonPost,22.
04.
2009,http://www.
washingtonpost.
com/wp-dyn/content/article/2009/04/22/AR2009042200029.
html(22.
11.
2010).
Hubbard,Amanda/Bygrave,LeeA.
(2009):"InternetGovernanceGoesGlobal",in:LeeA.
By-grave/JonBing(Hg.
):InternetGovernance:InfrastructureandInstitutions,Oxford:OxfordUniversityPress,213-235.
3669LiteraturHuffingtonPost(2011):"LibyaInternetShutdownAmidProtests,LaterRestored",18.
02.
2011,http://www.
huffingtonpost.
com/2011/02/18/libya-internet-shut-down-_n_825473.
html(10.
04.
2011).
Hughes,Rex(2010):"ATreatyforCyberspace",InternationalAffairs,86(2),523-541.
Hughes,ThomasP.
(1994):"TechnologicalMomentum",in:MerrittR.
Smith/LeoMarx(Hg.
):DoesTechnologyDriveHistoryTheDilemmaofTechnologicalDeterminism,Cambridge,MA:TheMITPress,101-113.
HumanRightsWatch(2006):RacetotheBottom':CorporateComplicityinChineseInternetCen-sorship,NewYork,NY,http://www.
hrw.
org/en/reports/2006/08/09/race-bottom-0(03.
03.
2010).
IndiaDefence(2008):"IndianArmyGearsUpforCyber,ElectronicWarfare",02.
05.
2008,http://www.
india-defence.
com/reports-3824(15.
06.
2011).
InformationOfficeoftheStateCouncilofthePeople'sRepublicofChina(2006):China'sNationalDefensein2006,Peking,http://www.
oss.
net/dynamaster/file_archive/070102/afddd85e6782a64dafd3f49ea6bfbc9f/2006%20White%20Paper%20on%20PRC%20National%20Defense.
pdf(22.
11.
2010).
InformationPolicy(2010):"RussianCybercrime:Geeks,notGangsters",24.
08.
2010,http://www.
i-policy.
org/2010/08/russian-cybercrime-geeks-not-gangsters.
html(13.
08.
2011).
InfowarMonitor(2011a):"CyberDissidents,InformationControlsandAttacks",25.
03.
2011,http://www.
infowar-monitor.
net/2011/03/6996/(08.
08.
2011).
InfowarMonitor(2011b):"SyrianElectronicArmy:DisruptiveAttacksandHypedTargets",25.
06.
2011,http://www.
infowar-monitor.
net/2011/06/syrian-electronic-army-disruptive-attacks-and-hyped-targets/(26.
06.
2011).
InfowarMonitor(2011c):"AmidUprisings,CyberattacksinSyria",06.
05.
2011,http://www.
infowar-monitor.
net/2011/05/amid-uprisings-cyberattacks-in-syria/(08.
08.
2011).
InfowarMonitor(2011d):"FakeFacebookPageTargetsPro-RevolutionSyrianUsers",29.
08.
2011,http://www.
infowar-monitor.
net/2011/08/fake-facebook-page-targets-pro-revolution-syrian-users/(31.
08.
2011).
Innis,HaroldA.
1995[1951]:TheBiasofCommunication,Toronto:UniversityofTorontoPress.
InsideFacebook(2011):FacebooksStats,01.
04.
2011,http://gold.
insidenetwork.
com/facebook/(15.
04.
2011).
InternationalBusinessTimes(2011):"Post-ShipwreckLulzSecisCorneredbyFBIandHackers–LeaderSabuOuted",29.
06.
2011,http://newyork.
ibtimes.
com/articles/171674/20110629/lulzsec-leader-sabu-identity-Anonymous-antisec-disband-topiary-outed.
htm(12.
07.
2011).
InternationalInstituteforStrategicStudies(2011):"Stuxnet:TargetingIran'sNuclearProgramme",IISSStrategicComments,17(6),http://www.
iiss.
org/publications/strategic-comments/past-issues/volume-17-2011/february/stuxnet-targeting-irans-nuclear-programme/(15.
03.
2011).
InternetBusinessLawServices(2008):"NATOAgreestoCreateCyberDefenseManagementAuthority",15.
05.
2008,http://www.
ibls.
com/internet_law_news_portal_view.
aspxs=latestnews&id=2054(22.
11.
2010).
Ischinger,Wolfgang(2011):"DasWikiLeaks-Paradox:WenigerTransparenz,mehrGeheimdiploma-tie",in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequen-zen,Berlin,155-163.
Isikoff,Michael(2008):TheFedWhoBlewtheWhistle",Newsweek,13.
12.
2008,http://www.
newsweek.
com/2008/12/12/the-fed-who-blew-the-whistle.
html#(14.
04.
2011).
ITU(2010):ICTFactsandFigures,Genf,http://www.
itu.
int/ITU-D/ict/material/FactsFigures2010.
pdf(29.
06.
2011).
9.
1Literatur367ITU(2007):ITUCybersecurityWorkProgrammetoAssistDevelopingCountries2007–2009,Genf,http://www.
itu.
int/ITU-D/cyb/cybersecurity/docs/itu-cybersecurity-work-programme-developing-countries.
pdf(17.
06.
2011).
Izvestiya(2009):"TheGeneralStaffisPreparingforaCyberWar",27.
02.
2009,bersetzungundBereitstellungdurchBBCWorldwideMonitoring,11.
03.
2009.
Jackson,David(2011):"Obama:ViolenceisNottheAnswer",USAToday,28.
01.
2011,http://content.
usatoday.
com/communities/theoval/post/2011/01/obama-violence-is-not-the-answer-in-egypt/1(01.
08.
2011).
Jackson,William(2011):"DHSRulesinWhiteHouseCyberPlan",FederalComputerWeek,13.
05.
2011,http://fcw.
com/Articles/2011/05/13/white-house-cyber-plan-puts-dhs-in-charge.
aspx(25.
08.
2011).
Jackson,William(2009):"DetailsEmergeaboutnewCyberCommand'sRole",DefenseSystems,15.
06.
2009,http://defensesystems.
com/Articles/2009/06/15/Web-DOD-cyber-command.
aspx(22.
11.
2010).
Jacobs,Andrew(2010):"JournalistsE-MailsHackedinChina",TheNewYorkTimes,30.
03.
2010,http://www.
nytimes.
com/2010/03/31/world/asia/31china.
html_r=2(17.
11.
2010).
Jacobs,Andrew(2009):"ChinaRequiresCensorshipSoftwareonNewPCs",TheNewYorkTimes,08.
06.
2009,http://www.
nytimes.
com/2009/06/09/world/asia/09china.
html(03.
03.
2010).
Jger,Thomas/Beckmann,Rasmus(2007):"DieinternationalenRahmenbedingungendeutscherAuenpolitik",in:ThomasJger/AlexanderHse/KaiOppermann(Hg.
):DeutscheAuenpoli-tik:Sicherheit,Wohlfahrt,InstitutionenundNormen,Wiesbaden:VSVerlag:13-39.
Janczewski,LechJ.
/Colarik,AndrewM.
(Hg.
)(2008):CyberWarfareandCyberTerrorism,Her-shey,PAetal.
:InformationScienceReferences.
JASON(2010):ScienceofCyber-Security,McLean,VA,http://www.
fas.
org/irp/agency/dod/jason/cyber.
pdf(14.
08.
2011).
Jervis,Robert(1988):"WarandMisperception",JournalofInterdisciplinaryHistory,18(4),675-700.
Jervis,Robert(1986):"CognitionandPoliticalBehavior",in:RichardR.
Lau/DavidO.
Sears(Hg.
):PoliticalCognition,Hillsdale,NJ:LawrenceErlbaumAssociates,319-337.
Jervis,Robert(1978):CooperationundertheSecurityDilemma",WorldPolitics,30(4),167-214.
Jervis,Robert(1976):PerceptionandMisperceptioninInternationalPolitics,Princeton,NJ:Prince-tonUniversityPress.
Joffe,Josef(2010):"FaustrechtDigital:WikiLeaksdientdemAbschottungsstaat,nichtderTranspa-renz",ZeitOnline,16.
12.
2010,http://www.
zeit.
de/2010/51/P-Zeitgeist(15.
03.
2011).
Johnson,Bobbie(2008):"TheInternet'sUnderseaWorld:HowOneClumsyShipCutofftheWebfor75MillionPeople",TheGuardian,01.
02.
2008,22.
Johnson,David/Post,David(1996):"LawandBorders.
TheRiseofLawinCyberspace",in:Stan-fordLawReview,48(5).
Jolly,David/Minder,Raphael(2011):"SpainDetains3inPlayStationCyberattacks",TheNewYorkTimes,10.
06.
2011,http://www.
nytimes.
com/2011/06/11/technology/11hack.
html_r=1&ref=global-home(10.
06.
2011).
Jonas,Jeff(2009):"Prediction:ChannelConsolidation",09.
06.
2009,http://jeffjonas.
typepad.
com/jeff_jonas/2009/06/prediction-channel-consolidation.
html(11.
08.
2011).
Jones,EdwardE.
/Nisbett,RichardE.
(1972):"TheActorandtheObserver:DivergentPerceptionsoftheCausesofBehavior",in:EdwardE.
Jonesetal.
(Hg.
):Attribution:PerceivingtheCausesofBehavior,Morristown,NJ:GeneralLearningPress,79-94.
3689LiteraturJoshi,Manoj(1999):"NowHyperWar:TheIndianArmyisPreparingforaWarMademoreLethalandIntensebytheDeadlyMicrochip",IndiaToday,10.
05.
1999,http://www.
india-today.
com/itoday/10051999/defence.
html(22.
11.
2010).
Kadi,May(1995):"WelcometoCyberia",UtneReader,68(Mrz/April),57-59.
Kagan,Robert(2008):TheReturnofHistoryandtheEndofDreams,NewYork,NY:AlfredA.
Knopf.
Kahl,Martin/Mlling,Christian(2005):DieRevolutioninMilitaryAffairs'unddieBedingungenundMglichkeitenfürRüstungskontrolle",in:GtzNeuneck/ChristianMlling(Hg.
):DieZu-kunftderRüstungskontrolle,Baden-Baden:Nomos,341-353.
Kahn,Hermann(1960):OnThermonuclearWar,Princeton,NJ:PrincetonUniversityPress.
Kahn,Jeremy(2008):MumbaiTerroristsReliedonNewTechnologyforAttacks",TheNewYorkTimes,09.
12.
2008,http://www.
nytimes.
com/2008/12/09/world/asia/09mumbai.
html(15.
03.
2011).
Kahnemann,Daniel/Tversky,Amos(1972):"SubjectiveProbability:AJudgementofRepresenta-tiveness",CognitivePsychology,3,430-454.
Kalathil,Shanthi/Boas,TaylorC.
(2003):OpenNetwork,ClosedRegimes:TheImpactoftheInternetonAuthoritarianRule,Washington,DC:CarnegieEndowmentforInternationalPeace.
Kaplan,JeremyA.
(2011):"AnonymousHackersReleaseStuxnetWormOnline",FoxNews,15.
02.
2011,http://www.
foxnews.
com/scitech/2011/02/15/Anonymous-hackers-offer-stuxnet-worm-online/(14.
08.
2011).
Kartchner,KerryM.
(2009):"TheEvolvingInternationalContext",in:JeffreyA.
Larsen/JamesJ.
Wirtz(Hg.
):ArmsControlandCooperativeSecurity,Boulder/London:LynneRienner,39-66.
Katz,Jon(1997):BirthofaDigitalNation,http://www.
wired.
com/wired/archive/5.
04/netizen_pr.
html(03.
03.
2010).
Katz,Rita/Kern,Michael(2006):"Terrorist007:Exposed",TheWashingtonPost,26.
03.
2006,http://www.
washingtonpost.
com/wp-dyn/content/article/2006/03/25/AR2006032500020.
html(13.
08.
2011).
Katzer,Catarina(2009):"CyberbullyinginGermany:WhatHasBeenDoneandWhatIsGoingon",ZeitschriftfürPsychologie/JournalofPsychology,217(4),222-223.
Keck,Otto(1993):"TheNewInstitutionalismandtheRelative-Gains-Debate",in:FrankR.
Pfetsch(Hg.
):InternationalRelationsandPan-Europe:TheoreticalApproachesandEmpiricalFind-ings,Münster:LitVerlag.
Kedzie,Christopher(1997a):CommunicationandDemocracy:CoincidentRevolutionsandtheEmergentDictators,SantaMonica,CA:RAND.
Kedzie,Christopher(1997b):"TheThirdWaves",in:BrianKahin/CharlesNesson(Hg.
):BordersinCyberspace,Cambridge,MA:TheMITPress,106-128.
Keegan,John(2003):DerErsteWeltkrieg:EineeuropischeTragdie,2.
Aufl.
,ReinbeckbeiHam-burg:Rowohlt.
Keizer,Gregg(2009):"NSAHelpedwithWindows7Development",Computerworld,18.
11.
2009,http://www.
computerworld.
com/s/article/9141105/NSA_helped_with_Windows_7_development(10.
08.
2011).
Keller,Bill(2011):DealingwithAssangeandtheWikiLeaksSecrets",TheNewYorkTimes,26.
01.
2011,http://www.
nytimes.
com/2011/01/30/magazine/30WikiLeaks-t.
htmlpagewanted=all(15.
03.
2011).
Kelly,John/Etling,Bruce(2008):MappingIran'sOnlinePublic:PoliticsandCultureinthePersianBlogosphere,Cambridge,MA:BerkmanCenterforInternet&SocietyatHarvardUniversity,http://cyber.
law.
harvard.
edu/sites/cyber.
law.
harvard.
edu/files/Kelly&Etling_Mapping_Irans_Online_Public_2008.
pdf(03.
03.
2010).
Kelly,Kevin(2010):WhatTechnologyWants,NewYork,NY,Viking.
9.
1Literatur369Kennedy,Patrick(2011):StatementofAmbassadorPatrickKennedy,UndersecretaryforManage-mentU.
S.
DepartmentofState,beforetheSenateCommitteeonHomelandSecurityandGov-ernmentalAffairs,10.
03.
2011,Washington,DC,http://www.
ise.
gov/sites/default/files/TestimonyKennedy20110310.
pdf(15.
03.
2011).
Kennedy,Paul(1989):TheRiseandFalloftheGreatPowers:EconomicChangeandMilitaryConflictfrom1500to2000,NewYork:VintageBooks.
Keohane,RobertO.
(1993):"TheAnalysisofInternationalRegimes:TowardsaEuropean-AmericanResearchProgramme",in:VolkerRittberger(Hg.
):RegimeTheoryandInternationalRela-tions,Oxford:ClarendonPress,23-45.
Keohane,RobertO.
(1989):"NeoliberalInstitutionalism:APerspectiveonWorldPolitics",in:Ders.
(Hrsg.
):InternationalInstitutionsandStatePower:EssaysinInternationalRelationsTheory,Boulder,CO:WestviewPress,1-20.
Keohane,RobertO.
(1984):AfterHegemony:CooperationandDiscordintheWorldPoliticalEcon-omy,Princeton,NJ:PrincetonUniversityPress.
Keohane,RobertO.
/Nye,JosephS.
(1977):PowerandInterdependence:WorldPoliticsinTransi-tion,Boston/Toronto:Little,BrownandCompany.
Keohane,RobertO.
/Martin,LisaL.
(2003):"InstitutionalTheoryasaResearchProgramme",in:ColinElman/MiriamF.
Elman(Hg.
):ProgressinInternationalRelationsTheory,Cambridge,MA:MITPress,71-107.
Kern,HolgerL.
/Hainmueller,Jens(2009):"OpiumfortheMasses:HowForeignMediaCanStabi-lizeAuthoritarianRegimes",PoliticalAnalysis,17,377-399,http://www.
mit.
edu/~jhainm/Paper/OVM2009.
pdf(10.
04.
2011).
Kerner,SeanM.
(2009):"WhoWasbehindGhostnet",Internetnews.
com,07.
10.
2009,http://blog.
internetnews.
com/skerner/2009/10/-ghostnet-researcher-at-the.
html(17.
11.
2010).
Khalil,Ashraf(2011):"RoutetoRevolution",IndexonCensorship,23.
03.
2011,http://uncut.
indexoncensorship.
org/2011/03/route-to-revolution/(10.
04.
2011).
Khatchadourian,Raffi(2011):"KeineGeheimnisse:JulianAssangesMissiondertotalenTranspa-renz.
PortrteinesGetriebenen",in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequenzen,Berlin,11-46.
Khong,YuenF.
(1992):AnalogiesatWar:Korea,Munich,DienBienPhu,andtheVietnamDeci-sionsof1965,Princeton,NJ:PrincetonUniversityPress.
Kilroy,RichardJ.
(2008):"TheU.
S.
MilitaryResponsetoCyberWarfare",in:LechJ.
Janc-zewski/AndrewM.
Colarik(Hg.
):CyberWarfareandCyberTerrorism,InformationScienceReference:Hershey,439-445.
Kindleberger,CharlesP.
(1981):"DominanceandLeadershipintheInternationalEconomy:Exploi-tation,PublicGoods,andFreeRides",InternationalStudiesQuarterly,25(2),242-254.
King,Gary/Keohane,RobertO.
/Verba,Sidney(1994):DesigningSocialInquiry:ScientificInferenceinQualitativeResearch,Princeton,NJ:PrincetonUniversityPress.
Kirkpatrick,David(2011):"WiredandShrewd,YoungEgyptiansGuideRevolt",TheNewYorkTimes,09.
02.
2011,http://www.
nytimes.
com/2011/02/10/world/middleeast/10youth.
html(10.
04.
2011).
Kirkpatrick,David(2010):DerFacebook-Effekt:HinterdenKulissendesInternet-Giganten,Mün-chen:CarlHanserVerlag.
Kisljakow,Andrej(2007):"KampfderTrojaner,MilitrsentdeckenInternetalsKriegsschauplatz",RIANovosti,27.
09.
2007,http://de.
rian.
ru/analysis/20070926/81103083.
html(17.
11.
2010).
Klein,JohnJ.
(2006):SpaceWarfare:Strategy,PrinciplesandPolicy,NewYork:Routledge.
Kleinberg,Howard(2007):"OnWarinSpace",Astropolitics,5(1),1-27.
Kleinwchter,Wolfgang(2011):"WiereguliertmandenCyberspace",Telepolis,29.
05.
2011,http://www.
heise.
de/tp/artikel/34/34742/1.
html(14.
06.
2011).
Klimburg,Alexander(2011):MobilisingCyberPower",Survival,53(1),41-60.
3709LiteraturKlimburg,Alexander(2010):"Whole-of-NationCyberSecurity",in:JeffreyCarr(Hg.
)(2010):InsideCyberWarfare,Sebastopol,CA:O'Reilly,199-202.
Kobe,DonaldH.
(1962):"ATheoryofCatalyticWar",TheJournalofConflictResolution,6(2),125-142.
Kocks,Alexander(2010):"DieTheoriederglobalenffentlichenGüter:ForschungsstandundPer-spektiven",ZeitschriftfürInternationaleBeziehungen,17(2),235-265.
Kohler-Koch,Beate(Hg.
)(1986):TechnikundinternationalePolitik,Baden-Baden:Nomos.
Komov,Sergei/Korotkov,Sergei/Dylevski,Igor(2007):MilitaryAspectsofEnsuringInternationalInformationSecurityintheContextofElaboratingUniversallyAcknowledgedPrinciplesofIn-ternationalLaw",DisarmamentForum,3/2007,35-43,http://www.
unidir.
org/pdf/articles/pdf-art2645.
pdf(10.
05.
2011).
Kopytoff,Verne(2009):"ChinaCutsoffWebsites",SanFranciscoChronicle,03.
06.
2009,C1.
Koring,Paul(2011):"ObamaWantstoWidenIntrusiveDigitalIntercepts",TheGlobeandMail,28.
09.
2010,http://www.
theglobeandmail.
com/news/technology/obama-wants-to-widen-intrusive-digital-intercepts/article1729513/(08.
08.
2011).
Kraft,Steffen(2011):"LeckbeiWikiLeaks",DerFreitag,25.
08.
2011,http://www.
freitag.
de/politik/1134-nerds-ohne-nerven(29.
08.
2011).
Kramer,FranklinD.
(2009):"CyberpowerandNationalSecurity:PolicyRecommendationsforaStrategicFramework",in:Ders.
/StuartHStarr/LarryKWentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,3-23.
Kramer,FranklinD.
/Starr,StuartH.
/Wentz,LarryK.
(Hg.
)(2009):CyberpowerandNationalSecu-rity,Washington,DC:NationalDefenseUniversityPress.
Krasner,Stephen(1991):"GlobalCommunicationsandNationalPower:LifeontheParetoFrontier",WorldPolitics,43(3),336-366.
Krause,Till(2011):"Anonymous",SüddeutscheZeitungMagazin,Nummer20,40-44.
Kravets,David(2011):InternetKillSwitch'LegislationBackinPlay",Wired,28.
01.
2011,http://www.
wired.
com/threatlevel/2011/01/kill-switch-legislation/(01.
06.
2011).
Krebs,Brian(2010):"Cable:NoCyberAttackinBrazilian'09Blackout",KrebsonSecurity,03.
12.
2010,http://krebsonsecurity.
com/2010/12/cable-no-cyber-attack-in-brazilian-09-blackout/(13.
08.
2011).
Krell,Gert(2009):WeltbilderundWeltordung:EinführungindieTheoriederinternationalenBezie-hungen,4.
Aufl.
,Baden-Baden:Nomos.
Kremp,Matthias(2009):"AugmentedReality.
DasHandywirdzumWelt-Wissensfenster",SpiegelOnline,20.
11.
2009,http://www.
spiegel.
de/netzwelt/gadgets/0,1518,662380,00.
html(03.
03.
2010).
Krempl,Stefan(2011):KritikamgeplantenCyber-Abwehrzentrum",HeiseMedia,24.
02.
2011,http://www.
heise.
de/newsticker/meldung/Kritik-am-geplanten-Cyber-Abwehrzentrum-1196787.
html(15.
08.
2011).
Kristof,Nicholas(2009):TearDownthisCyberwall!
",TheNewYorkTimes,17.
06.
2009,http://www.
nytimes.
com/2009/06/18/opinion/18kristof.
html(01.
08.
2011).
Krüger,A.
(2010):"PerHandyfotoinsPrivatleben.
SoftwareerkenntGesichtundliefertDatenzurPerson",ZDFheute.
de,13.
03.
2010,http://www.
heute.
de/ZDFheute/inhalt/8/0,3672,8049928,00.
html(26.
03.
2010).
Kuehl,DanielT.
(2009):"FromCyberspacetoCyberpower:DefiningtheProblem",in:FranklinD.
Kramer/StuartHStarr/LarryKWentz(Hg.
):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,24-42.
Kugler,Jacek/Lemke,Douglas(Hg.
)(1996):ParityandWar,AnnArbor:UniversityofMichiganPress.
9.
1Literatur371Kugler,RichardL.
(2009):"DeterrenceofCyberattacks",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,309-340.
Kuhn,Jan(2005):DerSchutzkritischerInfrastrukturen:UnterbesondererBerücksichtigungvonkritischenInformationsinfrastrukturen,IFSH/IFARWorkingPaper5,Hamburg,http://www.
ifsh.
de/IFAR/pdf/wp5.
pdf(22.
11.
2010).
Kurczy,Stephen(2010):WillWikileak'sJulianAssange,nowArrested,Takethe'nuclear'Op-tion",TheChristianScienceMonitor,07.
12.
2010,http://www.
csmonitor.
com/World/Europe/2010/1207/Will-WikiLeaks-Julian-Assange-now-arrested-take-the-nuclear-option(15.
03.
2011).
Lachow,Irving(2009):"CyberTerrorism:MenaceorMyth",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,437-464.
Lake,DavidA.
(2009):HierarchyinInternationalRelations,Ithaca:CornellUniversityPress.
Lake,DavidA.
(2007):"EscapefromtheStateofNature:AuthorityandHierarchyinWorldPoli-tics",InternationalSecurity,32(1),47-79.
Lake,Eli(2011):"BritishFirmOfferedSpySoftwaretoEgypt",TheWashingtonTimes,25.
04.
2011,http://www.
washingtontimes.
com/news/2011/apr/25/british-firm-offered-spy-software-to-egypt/(02.
05.
2011).
Langhammer,Franziska(2009):"DigitaleDenunziationoderAufklrung",DieTageszeitung,30.
12.
2009,http://www.
taz.
de/1/netz/artikel/1/digitale-denunziation-oder-aufklaerung/(15.
03.
2011).
Landler,Mark/Stelter,Brian(2009):WashingtonTapsintoaPotentnewForceinDiplomacy",TheNewYorkTimes,16.
06.
2009,http://www.
nytimes.
com/2009/06/17/world/middleeast/17media.
html(04.
06.
2011).
Landler,Mark/Markoff,John(2007):DigitalFearsEmergeafterDataSiegeonEstonia",TheNewYorkTimes,29.
05.
2007,http://www.
nytimes.
com/2007/05/29/technology/29estonia.
htmlpagewanted=1(29.
05.
2011).
Lasker,John(2005):"U.
S.
Military'sEliteHackerCrew",Wired,18.
04.
2005,http://www.
wired.
com/politics/security/news/2005/04/67223(10.
11.
2010).
Lawson,Sean(2011):BeyondCyber-Doom:CyberattackScenariosandtheEvidenceofHistory,Fairfax,VA:GeorgeMasonUniversity,http://mercatus.
org/sites/default/files/publication/beyond-cyber-doom-cyber-attack-scenarios-evidence-history.
pdf(01.
07.
2011).
Lehmkuhl,Dirk(2007):"BetweenTransnationalTake-offandNationalLanding:JurisdictionalDynamicsintheDomainNameArea",in:MyriamDunnetal.
(Hg.
):TheResurgenceoftheState:TrendsandProcessesinCyberspaceGovernance,Aldershot:Ashgate,85-110.
Leisegang,Daniel(2010):"WikiLeaks:MachtundVerantwortung",Bltterfürdeutscheundinter-nationalePolitik,10/2010,http://www.
blaetter.
de/archiv/jahrgaenge/2010/oktober/WikiLeaks-macht-und-verantwortung(15.
03.
2011).
Lenk,Klaus(1997):"TheChallengeofCyberspatialFormsofHumanInteractiontoTerritorialGovernanceandPolicing",in:BrianD.
Loader(Hg.
):TheGovernanceofCyberspace:Poli-tics,TechnologyandGlobalRestructuring,London/NewYork:Routledge,126-135.
Leppard,David(2010):"ChinaBugsandBurglesBritain",TheSundayTimes,31.
01.
2010,http://www.
timesonline.
co.
uk/tol/news/uk/crime/article7009749.
ece(17.
11.
2010).
Lessig,Lawrence(2006):Code:Version2.
0,NewYork:BasicBooks.
Lessig,Lawrence(2000):"CodeisLaw:OnLibertyinCyberspace",HarvardMagazine,Januar/Februar,http://harvardmagazine.
com/2000/01/code-is-law.
html(18.
02.
2011).
Lessig,Lawrence(1999):"ZoningSpeechontheInternet:ALegalandTechnicalModel",MichiganLawReview,98(2),395-431.
3729LiteraturLevy,JackS.
(2003):"PoliticalPsychologyandForeignPolicy",in:DavidO.
Sears/LeonieHuddy/RobertJervis(Hg.
):OxfordHandbookofPoliticalPsychology,Oxford:OxfordUni-versityPress,253-284.
Levy,JackS.
(1998):"TheCausesofWarandtheConditionsofPeace",AnnualReviewofPoliticalScience,1(1),139-165.
Levy,JackS.
(1997):"ProspectTheoryandtheCognitive-RationalDebate",in:NehemiaGeva/AlexMintz(Hg.
):DecisionMakingonWarandPeace:TheCognitive-RationalDebate,Boul-der/London:LynneRienner,33-50.
Levy,JackS.
(1989):"TheCausesofWar:AReviewofTheoriesandEvidence",in:PhilipTetlocketal.
(Hg.
):Behavior,Society,andNuclearWar,Band1,NewYork:OxfordUniversityPress,209-333.
Levy,JackS.
/Thompson,WilliamR.
(2010):CausesofWar,Chichester:Wiley-Blackwell.
Lewis,Leo(2011):"China'sBlueArmyof30ComputerExpertsCouldDeployCyberWarfareonForeignPowers",TheAustralian,27.
05.
2011,http://www.
theaustralian.
com.
au/australian-it/chinas-blue-army-could-conduct-cyber-warfare-on-foreign-powers/story-e6frgakx-1226064132826(09.
06.
2011).
Lewis,JamesA.
(2011):"WhyPrivacyandCyberSecurityClash",in:KristinM.
Lord/TravisSharp(Hg.
):America'sCyberFuture:SecurityandProsperityintheInformationAge:VolumeII,Washington,DC:CenterforaNewAmericanSecurity,125-141.
Lewis,JamesA.
(2010):"MultilateralAgreementstoConstrainCyberconflict",ArmsControlToday,June2010,http://www.
armscontrol.
org/act/2010_06/Lewis(15.
05.
2011).
Lewis,James(2005):ComputerEspionage,TitanRainandChina,Washington,DC:CenterforStrategicandInternationalStudies,http://csis.
org/files/media/csis/pubs/051214_china_titan_rain.
pdf(01.
06.
2011).
Lewis,JamesA.
(2003a):CyberSecurity:TurningNationalSolutionsintoInternationalCoopera-tion,Washington,DC:CSISPress.
Lewis,JamesA.
(2003b):"Introduction",in:Ders.
(Hg.
):CyberSecurity:TurningNationalSolutionsintoInternationalCooperation,Washington,DC:CSISPress,xi-xxiii.
Lewis,JamesA.
(2003c):"OvercomingObstaclestoCooperation:TheCouncilofEuropeConven-tiononCybercrime",in:Ders.
(Hg.
):CyberSecurity:TurningNationalSolutionsintoInterna-tionalCooperation,Washington,DC:CSISPress,90-97.
Leyden,John(2011a):"FakeCertificateAttackTargetsFacebookUsersinSyria",TheRegister,06.
05.
2011,http://www.
theregister.
co.
uk/2011/05/06/syria_fake_certificate_facebook_attack/(08.
08.
2011).
Leyden,John(2011b):"CyberwarriorsontheEasternFront:IntheLineofPacketFloods.
FormerSeniorEstonianDefenceOfficialTalksCyberwar",TheRegister,25.
04.
2011,http://www.
theregister.
co.
uk/2011/04/25/estonia_cyberwar_interview/print.
html(25.
05.
2011).
Leyden,John(2009):"BelarusMediaSitesunderAttackbyZombies",TheRegister,12.
06.
2009,http://www.
theregister.
co.
uk/2009/06/12/belarus_ddos/(17.
11.
2010).
Liang,Guo(2007):SurveyingInternetUsageanditsImpactinSevenChineseCities,ChineseAcad-emyofSocialSciences,CenterforSocialDevelopment,http://www.
policyarchive.
org/handle/10207/bitstreams/16013.
pdf(17.
08.
2011).
Libicki,MartinC.
(2009):CyberdeterrenceandCyberwar,SantaMonica,CA:RAND.
Libicki,MartinC.
(2007):ConquestinCyberspace:NationalSecurityandInformationWarfare,Cambridge:CambridgeUniversityPress.
Lichtenstein,Jesse(2010):"DigitalDiplomacy",TheNewYorkTimes,16.
07.
2010,http://www.
nytimes.
com/2010/07/18/magazine/18web2-0-t.
htmlpagewanted=all(14.
12.
2011).
Link,Werner(1988):DerOst-West-Konflikt:DieOrganisationderinternationalenBeziehungenim20.
Jahrhundert,2.
Aufl.
,Stuttgartetal.
:VerlagW.
Kohlhammer.
9.
1Literatur373Link,Werner(1979):"berlegungenzumBegriff'Konflikt'indeninternationalenBeziehungen–VersucheinerBegriffsklrung",PolitischeVierteljahreszeitschrift,20(1),33-50.
Lipson,Charles(2003):ReliablePartners:HowDemocraciesHaveMadeaSeperatePeace,Prince-ton,NJ:PrincetonUniversityPress.
Lonsdale,DavidJ.
(1999):"InformationPower:Strategy,GeopoliticsandtheFifthDimension",in:ColinS.
Gray(Hg.
):Geopolitics,GeographyandStrategy,London:FrankCass,137-157.
Lonsdale,DavidJ.
(2004):TheNatureofWarintheInformationAge,London/NewYork:FrankCass.
Lord,KristinM.
(2006):ThePerilsandPromiseofGlobalTransparency,Albany,NY:StateUniver-sityofNewYorkPress.
Lord,KristinM.
/Sharp,Travis(2011):America'sCyberFuture:SecurityandProsperityintheInformationAge:VolumeI,Washington,DC:CenterforaNewAmericanSecurity.
Lotan,Giladetal.
(2011):"TheRevolutionsWereTweeted:InformationFlowsduringthe2011TunesianandEgyptianRevolutions",InternationalJournalofCommunication,5,1375-1405.
Lwenthal,Richard(1971):FreiheitderEigenentwicklung",in:UlrichScheuner(Hg.
):Auenpoliti-schePerspektivendeswestdeutschenStaats,Bd.
1:DasEndedesProvisoriums,Mün-chen/Wien:OldenbourgVerlag,11–18.
Lowi,TheodoreJ.
(1964):"AmericanBusiness,PublicPolicy,Case-Studies,andPoliticalTheory",WorldPolitics,16(4),677-715.
Luhmann,Niklas(2003)[1975]:Macht,3.
Aufl.
,Stuttgart:Lucius&Lucius.
Luhmann,Niklas(2000)[1968]:Vertrauen,4.
Aufl.
,Stuttgart:Lucius&Lucius.
Lupton,DavidE.
(1988):OnSpaceWarfare:ASpacePowerDoctrine,MaxwellAirForceBase:AirUniversityPress.
Luttwak,EdwardN.
(2001)[1987]:Strategy:TheLogicofWarandPeace,Cambridge/London:TheBelknapPress.
Luttwak,EdwardN.
(1974):ThePoliticalUsesofSeaPower,Baltimore/London:TheJohnsHopkinsUniversityPress.
Lynn-Jones,SeanM.
(1999):"RealismandSecurityStudies",in:CraigA.
Snyder(Hg.
):Contempo-rarySecurityandStrategy,Houndmillsetal.
:MacmillanPress,53-76.
MacKenzie,Donald/Wajcman,Judy(Hg.
)(1985):TheSocialShapingofTechnology:HowtheRefrigeratorGotitsHum,MiltonKeys:OpenUniversityPress.
MacKinnon,Rebecca(2008):"FlatterWorldandThickerWallsBlogs,CensorshipandCivicDis-courseinChina",PublicChoice,134,31-46.
Maclean,William(2010):"StuxnetStudySuggestsIranEnrichmentAim:Experts",Reuters,16.
11.
2010,http://www.
reuters.
com/article/idUSTRE6AF2F320101116utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:%20reuters/technologyNews%20%28News%20/%20US%20/%20Technology%29(17.
11.
2010).
Mahan,AlfredT.
(1898)[1890]:TheInfluenceofSeaPoweruponHistory1660–1783,Boston:Little,BrownandCompany.
Majumdar,Bappa/Tripathy,Devidutta(2010):"Google,Skype,RIMMustMeetSecurityNeeds",Reuters,13.
08.
2010,http://in.
reuters.
com/article/idINIndia-50820720100813(22.
10.
2010).
Mannes,Aaron/Hendler,James(2008):"TheFirstModernCyberwar",TheGuardian,22.
08.
2008,http://www.
guardian.
co.
uk/commentisfree/2008/aug/22/russia.
georgia1(17.
11.
2010).
Mansbach,RichardW.
/Vasquez,JohnA.
(1981):InSearchofTheory:ANewParadigmforGlobalPolitics,NewYork:ColumbiaUniversityPress.
Margolis,Michael/Resnick,David(2000):PoliticsasUsual:TheCyberspace'Revolution',Thou-sandOaks,CA:Sage.
Markle(2005):ChineseTurntoInternetforEntertainmentandConnectingwithOthers,asNumberofBroadbandConnectionsIncreaseinChina,17.
11.
2005,http://www.
markle.
org/news-3749Literaturevents/media-releases/chinese-turn-internet-entertainment-and-connecting-others-number-broadban(10.
04.
2011).
Markoff,John(2011):"TheAsymmetricalOnlineWar",TheNewYorkTimes,03.
04.
2011,http://bits.
blogs.
nytimes.
com/2011/04/03/the-asymmetrical-online-war/(15.
07.
2011).
Markoff,John(2009):"VastSpySystemLootsComputersin103Countries",TheNewYorkTimes,29.
03.
2009,http://www.
nytimes.
com/2009/03/29/technology/29spy.
html(17.
11.
2010).
Markoff,John(2008):"InternetAttacksAreGrowingMorePotentandComplex",NewYorkTimes,09.
11.
2008,http://www.
nytimes.
com/2008/11/10/technology/internet/10attacks.
html(22.
11.
2010).
Markoff,John/Sanger,DavidE.
(2010):"InaComputerWorm,aPossibleBiblicalClue",TheNewYorkTimes,29.
09.
2010,http://www.
nytimes.
com/2010/09/30/world/middleeast/30worm.
html_r=2&hpw=&pagewanted=1(26.
06.
2011).
Markoff,John/Sanger,DavidE.
/Shanker,Thom(2010):"InDigitalCombat,U.
S.
FindsNoEasyDeterrent",TheNewYorkTimes,26.
01.
2010,http://query.
nytimes.
com/gst/fullpage.
htmlres=9404E4DE123BF935A15752C0A9669D8B63(17.
11.
2010).
Markoff,John/Kramer,AndrewE.
(2009a):"U.
S.
andRussiaDifferonaTreatyforCyberspace",TheNewYorkTimes,28.
06.
2009,http://www.
nytimes.
com/2009/06/28/world/28cyber.
html(22.
11.
2010).
Markoff,John/Kramer,AndrewE.
(2009b):InShift,U.
S.
TalkstoRussiaonInternetSecurity,13.
12.
2009,NewYorkTimes,http://www.
nytimes.
com/2009/12/13/science/13cyber.
html.
Markoff,John/Barboza,David(2009):"AcademicPaperinChinaSetsOffAlarmsinU.
S.
",TheNewYorkTimes,20.
03.
2010,http://www.
nytimes.
com/2010/03/21/world/asia/21grid.
html(10.
08.
2011).
Markoff,John/Shanker,Thom(2009):"Halted03IraqPlanIllustratesU.
S.
FearofCyberwarRisk",TheNewYorkTimes,02.
08.
2009,http://www.
nytimes.
com/2009/08/02/us/politics/02cyber.
html(19.
11.
2010).
Marquand,Robert/Arnoldy,Ben(2007):"ChinaEmergesasLeaderinCyberwarfare",ChristianScienceMonitor,14.
09.
2007,1.
Martin,LisaL.
(1993):"TheRationalStateChoiceofMultilateralism",in:JohnG.
Ruggie(Hg.
):MultilateralismMatters:TheTheoryandPraxisofanInstitutionalForm,NewYork:Colum-biaUniversityPress,91-121.
Marx,Leo/Smith,MerrittR.
(1994):"Introduction",in:Dies.
(Hg.
):DoesTechnologyDriveHistoryTheDilemmaofTechnologicalDeterminism,Cambridge,MA:TheMITPress,ix-xv.
Mathews,JessicaT.
(1995):"PowerShift",ForeignAffairs,76(1),50-66.
Mathiason,John(2009):InternetGovernance:ThenewFrontierofGlobalInstitutions,London/NewYork:Routledge.
May,TimothyC.
(1988):TheCryptoAnarchistManifesto,abrufbarunterhttp://www.
activism.
net/cypherpunk/crypto-anarchy.
html(15.
03.
2011).
Malone,MichaelS.
(2009):"Cyber-TerrorismandHowWeShouldRespond",ABCNews,10.
07.
2009,http://abcnews.
go.
com/Business/Technology/storyid=8045546&page=1(11.
08.
2011).
Mander,Jerry(1978):FourArgumentsfortheEliminationofTelevision,NewYork:Morrow.
March,JamesG.
/Olson,JohanP.
(1998):"TheInstitutionalDynamicsofInternationalPoliticalOrders",InternationalOrganization,52(4),943-969.
Marquand,Robert/Arnoldy,Ben(2007):"ChinaEmergesasLeaderinCyberwarfare",in:ChristianScienceMonitor,14.
09.
2007,1.
Mazzetti,Mark(2010):"U.
S.
ExpandsRoleofDiplomatsinSpying",TheNewYorkTimes,28.
11.
2010,http://www.
nytimes.
com/2010/11/29/world/29spy.
html(15.
03.
2011).
9.
1Literatur375McAfee(2009):VirtualCriminologyReport2009:VirtuallyHere:TheAgeofCyberWarfare,http://www.
mcafee.
com/us/resources/reports/rp-virtual-criminology-report-2009.
pdf(10.
08.
2011).
McCants,Will(2011):"WhyDon'tJihadiOrgsTweet",Jihadica(Blog),30.
04.
2011,http://www.
jihadica.
com/why-dont-jihadi-orgs-tweet/(05.
05.
2011).
McConnell,Mike(2010):"ToWintheCyber-war,LooktotheColdWar",WashingtonPost,28.
02.
2010,B01.
McCullagh,Declan(2010):"SenatorsProposeGrantingPresidentEmergencyInternetPower",CNETNews,10.
06.
2010,http://news.
cnet.
com/8301-13578_3-20007418-38.
html(15.
03.
2011).
McDonald,Joe(2008):"U.
S.
Irked,WaryofChineseCyber-SecurityRules",AssociatedPress,15.
12.
2008,http://www.
nationalcybersecurity.
com/blogs/1514/US-irked-wary-of-Chinese-cyber-security-rules.
html(03.
03.
2010).
McGrew,Anthony(2005):"GlobalizationandGlobalPolitics",in:JohnBaylis/SteveSmith(Hg.
):TheGlobalizationofWorldPolitics:AnIntroductiontointernationalStudies,Oxford:OxfordUniversityPress,19-40.
McLean,Susan(2005):"ReportWarnsofOrganizedCybercrime",itWorldCanada,25.
08.
2005,http://www.
itworldcanada.
com/news/report-warns-of-organized-cyber-crime/112161(13.
08.
2011).
McLuhan,HerbertM.
etal.
(1967):TheMediumIstheMessage,NewYork,NY:RandomHouse.
McLuhan,HerbertM.
(2006)[1964]:"TheMediumistheMessage",in:Durham,MeenakshiG.
/Kellner,DouglasM.
(Hg.
):MediaandCulturalStudies:KeyWorks,Malden,MA:Black-well,107-116.
McMillan,Robert(2011):"AsViolenceEscalates,LibyaCutsofftheInternet",Computerworld,18.
11.
2011,http://www.
computerworld.
com/s/article/9210440/Update_As_violence_escalates_Libya_cuts_off_the_InternettaxonomyId=13(15.
03.
2011).
McMillan,Robert(2009):"ObamaPlanSaysCyberinfrastructureis'StrategicAsset'",Infoworld,23.
01.
2009,http://www.
infoworld.
com/d/security-central/obama-plan-says-cyberinfrastructure-strategic-asset-518(09.
08.
2011).
McMillan(2007):"AfterAttacks,U.
S.
GovernmentSendsTeamtoEstonia",PCWorld,03.
07.
2007,http://www.
pcworld.
com/article/134150/after_attacks_us_government_sends_team_to_estonia.
html(11.
05.
2011).
McNeill,WilliamH.
(1974):TheShapeofEuropeanHistory.
NewYork:OxfordUniversityPress.
Mearsheimer,JohnJ.
(2010):"StructuralRealism",in:TimDunne/MiljaKurki/SteveSmith(Hg.
):InternationalRelationsTheories:DisciplineandDiversity,2.
Aufl.
,Oxford:OxfordUniver-sityPress,77-94.
Mearsheimer,JohnJ.
(2001):TheTragedyofGreatPowerPolitics,NewYork/London:W.
W.
Nor-ton&Company.
Mearsheimer,JohnJ.
(1993):"TheFalsePromiseofInternationalInstitutions",InternationalSecu-rity,19(3),5-49.
MehrNewsAgency(2011):"IrantoEstablishFirstCyberCommand",16.
05.
2011,http://www.
mehrnews.
com/en/newsdetail.
aspxNewsID=1314554(09.
06.
2011).
Menn,Joseph(2010a):"RulesofEngagementforCyberwarsSeeslowProgress",FinancialTimes,28.
12.
2010,http://cachef.
ft.
com/cms/s/0/484ec672-12aa-11e0-b4c8-00144feabdc0.
html#axzz1M4A8pjcq(10.
05.
2011).
Menn,Joseph(2010b):"MoscowGetsToughonCybercrimeasIDTheftEscalates",FinancialTimes,22.
03.
2010,http://www.
ft.
com/cms/s/0/04e59450-3552-11df-9cfb-00144feabdc0.
html#axzz1V0jgwuMx(14.
08.
2011).
3769LiteraturMessmer,Ellen(2010):"12'WhiteHat'HackersYouShouldKnow",PCWorld,19.
04.
2010,http://www.
pcworld.
com/article/194467/12_white_hat_hackers_you_should_know.
html(11.
08.
2011).
Metzl,JamieF.
(1999):"TheInternationalPoliticsofOpeness",TheWashingtonQuarterly,22(3),11-16.
Meyer-Lucht,Robin(2007):"DieRevolutionredesWeb2.
0",Cicero(3),86-89.
Meyers,Reinhard(1997):GrundbegriffeundtheoretischePerspektivenderInternationalenBezie-hungen",in:BundeszentralefürpolitischeBildung(Hg.
):GrundwissenPolitik,3.
Aufl.
,Bonn,313-434.
Milani,Abbas(2010):"Iran'sHiddenCyberjihad",ForeignPolicy,180(Juli/August),110.
Miller,Rich(2010):TheWorld'sLargestDataCenters,SpecialReport,11.
04.
2010,http://www.
datacenterknowledge.
com/special-report-the-worlds-largest-data-centers/(22.
08.
2011).
Mills,Elinor/Kaden,Jan(2011):"RSA:HackerstehlenInformationenüberAuthentifizierungssystemSecurID",ZDNet,18.
03.
2011,http://www.
zdnet.
de/news/41550463/rsa-hacker-stehlen-informationen-ueber-authentifizierungssystem-securid.
htm(04.
08.
2011).
Minkwitz,Olivier(2003):OhneHemmungenindenKriegCyberwarunddieFolgen,FrankfurtamMain:HessischeStiftungfürFriedens-undKonfliktforschung(HSFK).
Minkwitz,Olivier/Schfbnker,Georg(2000):InformationWarfare:DieRüstungskontrollestehtvorneuenHerausforderungen,FoG:ISArbeitspapierNr.
2,Berlin:ForschungsgemeinschaftIn-formationsgesellschaftundSicherheitspolitik(FoG:IS).
Minnick,Wendell(2009):ChineseITFirmAccusedofLinkstoCyberwarfare",abrufbarunterhttp://ics.
leeds.
ac.
uk/papers/vp01.
cfmoutfit=gdr&folder=32&paper=777(16.
08.
2011).
Mintz,Alex(2003):IntegratingCognitiveandRationalTheoriesofForeignPolicyDecisionMak-ing,NewYork:PalgraveMacmillan.
Mite,Valentinas(2007):"AttacksSeenasFirstCaseof'Cyberwar'",RadioFreeEurope/RadioLiberty,30.
05.
2007,http://www.
rferl.
org/content/article/1076805.
html(25.
05.
2011).
Mitzen,Jennifer/Schweller,RandallL.
(2011):KnowingtheUnknownUnknowns:MisplacedCertaintyandtheOnsetofWar",SeurityStudies,20,2-35.
Moechel,Erich(2011a):"ExportvonberwachungstechnikanDikaturenlegal",ORF,25.
03.
2011,http://fm4.
orf.
at/stories/1679547/(14.
04.
2011).
Moechel,Erich(2011b):Exportkontrollenfürberwachungstechnologien",ORF,01.
04.
2011,http://fm4.
orf.
at/stories/1680286/(14.
04.
2011).
Moechel,Erich(2011c):EU:Meldepflichtfürberwachungsequipment",ORF,05.
04.
2011,http://fm4.
orf.
at/stories/1680548/(14.
04.
2011).
Mllers,Christoph(2011):"ZurDialektikderAufklrungderPolitik",in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequenzen,Berlin,193-200.
Mlling,Christian/Neuneck,Gtz(2002):"InformationskriegsführungunddasParadigmaderRevo-lutioninMilitaryAffairs:Konzepte,RisikenundProbleme",DieFriedenswarte,77(4),375-398.
Monroy,Matthias(2011):Digitaleberwachungstechnologie:AucheindeutscherExportschlager",Telepolis,14.
10.
2011,http://www.
heise.
de/tp/artikel/35/35689/1.
html(26.
10.
2011).
Moorstedt,Michael(2011a):NachrichtenausdemNetz",SüddeutscheZeitung,16.
08.
2011,11.
Moorstedt,Michael(2011b):DerSkandalimDatenhaufen:EinSelbstversuch"in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequenzen,Berlin,128-133.
Moran,Daniel(2007):"GeographyandStrategy",in:JohnBaylisetal.
(Hg.
):StrategyintheCon-temporaryWorld:AnIntroductiontoStrategicStudies,Oxford:OxfordUniversityPress,122-140.
Morgan,PatrickM.
(1983):Deterrence:AConceptualAnalysis,2.
Aufl.
,London:Sage.
9.
1Literatur377Morgenthau,HansJ.
(1989)[1963]:MachtundFrieden:GrundlegungeinerTheoriederinternatio-nalenPolitik,Gütersloh:Bertelsman.
Morozov,Evgeny(2011a):TheNetDellusion:HowtonotLiberatetheWorld,London:PenguinBooks.
Morozov,Evgeny(2011b):"KlugeDiktatoren:NichtdieZensur,dieBeherrschungdesInternetsistdiewahreGefahrfürdieDemokratie",SüddeutscheZeitung,12.
/13.
03.
2011,13.
Morozov,Evgeny(2011c):Tunesia,SocialMediaandthePoliticsofAttention",ForeignPolicy,14.
01.
2011,http://neteffect.
foreignpolicy.
com/posts/2011/01/14/tunisia_social_media_and_the_politics_of_attention(10.
04.
2011).
Morozov,Evgeny(2001d):"Freedom.
gov:WhyWashington'sSupportforOnlineDemocracyistheWorstThingevertoHappentotheInternet",ForeignPolicy,Jan.
/Feb.
2011,34.
Morozov,Evgeny(2010):WhyIt'sHardtoDuplicate",TheNewYorkTimes,RoomforDebate,11.
12.
2010,http://www.
nytimes.
com/roomfordebate/2010/12/09/what-has-WikiLeaks-started/WikiLeaks-relationship-with-the-media(15.
03.
2011).
Morozov,Evgeny(2008):"AnArmyofOnesandZeroes:HowIBecameaSoldierintheGeorgia-RussiaCyberwar",Slate.
com,14.
08.
2008,http://www.
slate.
com/id/2197514/(31.
05.
2011).
Mueller,MiltonL.
(2010):NetworksandStates:TheGlobalPoliticsofInternetGovernance,Cam-bridge,MA/London:TheMITPress.
Müller,Harald/Schrnig,Niklas(2006):RüstungsdynamikundRüstungskontrolle:Eineexemplari-scheEinführungindieinternationalenBeziehungen,Baden-Baden:Nomos.
Mulvenon,JamesC.
(2005a):ChineseInformationOperationsStrategiesinaTaiwanContingency,TestimonybeforetheU.
S.
-ChinaEconomicandSecurityReviewCommissionHearing,Wash-ington,DC,15.
09.
2005,http://www.
uscc.
gov/hearings/2005hearings/written_testimonies/05_09_15wrts/mulvenon.
pdf(22.
11.
2010).
Mulvenon,JamesC.
(2005b):"BreachingtheGreatFirewall",TestimonybeforetheU.
S.
-ChinaEconomicandSecurityReviewCommission,Washington,DC,http://www.
uscc.
gov/hearings/2005hearings/written_testimonies/05_04_14wrts/mulvenon_james_wrts.
pdf(07.
06.
2011).
Mumford,Lewis(1960):"AuthoritarianandDemocraticTechnics",TechnologyandCulture,5(1),1-8.
Münker,Stefan(2009):Emergenzdigitalerffentlichkeiten:DiesozialenMedienimWeb2.
0,Frank-furta.
M.
:Suhrkamp.
Murdoch,Steven.
J.
/Anderson,Ross(2008):"ToolsandTechnologiesofInternetFiltering",in:R.
Deibertetal.
(Hg.
):AccessDenied:ThePracticeandPolicyofGlobalInternetFiltering,Cambridge,MA:TheMITPress,57-72.
Myers,StevenL.
/Timmons,Heather(2011):"ClintonUrgesCountriesNottoStifleOnlineVoices",TheNewYorkTimes,08.
12.
2011,http://www.
nytimes.
com/2011/12/09/world/at-hague-hillary-rodham-clinton-urges-countries-not-to-restrict-internet.
html(14.
12.
2011).
Nagel,JackH.
(1975):TheDescriptiveAnalysisofPower,NewHaven:YaleUniversityPress.
Nakashima,Ellen(2011a):"ListofCyber-WeaponsDevelopedbyPentagontoStreamlineComputerWarfare",TheWashingtonPost,01.
06.
2011,http://www.
washingtonpost.
com/national/list-of-cyber-weapons-developed-by-pentagon-to-streamline-computer-warfare/2011/05/31/AGSublFH_story.
html(10.
06.
2011).
Nakashima,Ellen(2011b):"NSAAlieswithInternetCarrierstoThwartCyberAttacksagainstDefenseFirms",WashingtonPost,16.
06.
2011,http://www.
washingtonpost.
com/national/major-internet-service-providers-cooperating-with-nsa-on-monitoring-traffic/2011/06/07/AG2dukXH_story.
html(08.
08.
2011).
3789LiteraturNakashima,Ellen(2010a):"DismantlingofSaudi-CIAWebSiteIllustratesNeedforClearerCyber-warPolicies",WashingtonPost,19.
03.
2010,http://www.
washingtonpost.
com/wp-dyn/content/article/2010/03/18/AR2010031805464.
html(Zugriff:14.
05.
2010).
Nakashima,Ellen(2010b):"15NationsSignalWillingnesstoReduceCyberwarfareThreat",TheWashingtonPost,17.
07.
2010,A02.
Nakashima,Ellen/Mufson,Steven(2008):"HackersHaveAttackedForeignUtilities,CIAAnalystSays",TheWashingtonPost,19.
01.
2008,http://www.
washingtonpost.
com/wp-dyn/content/article/2008/01/18/AR2008011803277.
html(16.
08.
2011).
NanfangWeekend(2005):"Suqian:ThePracticalAspectsofDirectingInternetOpinion",19.
05.
2005,englischebersetzung,http://www.
zonaeuropa.
com/20050521_2.
htm(03.
03.
2010).
NationalCommissiononTerroristAttacksupontheUnitedStates(2004):The9/11CommissionReport,Washington,DC,http://govinfo.
library.
unt.
edu/911/report/911Report.
pdf(15.
03.
2011).
Naraine,Ryan(2011):"FacebookOffersHTTPSBrowsing,butnotyetbyDefault",ZeroDay(Blog),26.
01.
2011,http://www.
zdnet.
com/blog/security/facebook-offers-https-browsing-but-not-yet-by-default/8009(10.
04.
2011).
NATO(2011a):ActiveEngagement,ModernDefense,StrategicConceptfortheDefenceandSecu-rityoftheMembersoftheNorthAtlanticTreatyOrganisationadoptedbyHeadsofStateandGovernmentinLisbon,19.
11.
2010,http://www.
nato.
int/cps/en/natolive/official_texts_68580.
htm(10.
05.
2011).
NATO(2011b):"LisbonSummitDeclaration",20.
11.
2010,http://www.
nato.
int/cps/en/natolive/official_texts_68828.
htm(10.
05.
2011).
NATOParliamentaryAssembly(2009):NATOandCyberDefence,http://www.
nato-pa.
int/default.
aspSHORTCUT=1782(10.
06.
2011).
Naughton,John(2000):ABriefHistoryoftheFuture:TheOriginsoftheInternet,London:Phoenix.
Negroponte,Niclas(1995):BeingDigital,NewYork,NY:AlfredA.
Knopf.
Nelson,Billetal.
(1999):Cyberterror:ProspectsandImplications,WhitePaper,Monterey,CA:CenterfortheStudyofTerrorismandIrregularWarfare,http://www.
au.
af.
mil/au/awc/awcgate/nps/cyberterror_prospects.
pdf(Zugriff:14.
05.
2010).
Nelson,Michael(1997):WaroftheBlackHeavens:TheBattlesofWesternBroadcastingintheColdWar,NewYork:SyracuseUniversityPress.
Neustadt,RichardE.
/May,ErnestR.
(1986):ThinkinginTime:TheUsesofHistoryforDecisionMakers,NewYork:FreePress.
Newland,Erica(2010):"AtChineseUniversitiesThere'saFeefor'Free'",CenterforDemocracy&Technology,18.
11.
2010,http://www.
cdt.
org/blogs/erica-newland/chinese-universities-theres-fee-free(14.
04.
2011).
Nieburg,H.
L.
(1966):IntheNameofScience,Chicago:Quadrangle.
Noman,Helmi(2011):"TheEmergenceofOpenandOrganizedPro-GovernmentCyberAttacksintheMiddleEast:TheCaseoftheSyrianElectronicArmy",InformationWarfareMonitor,30.
05.
2011,http://www.
infowar-monitor.
net/2011/05/7349/(09.
06.
2011).
Noman,Helmi/YorkJilianC.
(2011):WestCensoringEast:TheUseofWesternTechnologiesbyMiddleEastCensors2010-2011,Toronto/Cambridge/Ottawa:OpenNetInitiative,http://opennet.
net/sites/opennet.
net/files/ONI_WestCensoringEast.
pdf(27.
04.
2011).
Nooman,Sean(2010):"ChinaanditsDouble-EdgedCyber-Sword",STRATFORGlobalIntelligence,09.
12.
2010,http://www.
stratfor.
com/weekly/20101208-china-and-its-double-edged-cyber-sword(15.
07.
2011).
Nosovitz,Dan(2010):"HowSecureisJulianAssange's'Thermonuclear'InsuranceFile",PopularScience,12.
07.
2010,http://www.
popsci.
com/technology/article/2010-12/how-secure-julian-assanges-thermonuclear-insurance-file(15.
03.
2011).
9.
1Literatur379Nye,JosephS.
(2011):"PowerandNationalSecurityinCyberspace",in:KristinM.
Lord/TravisSharp(Hg.
):America'sCyberFuture:SecurityandProsperityintheInformationAge:VolumeII,Washington,DC:CenterforaNewAmericanSecurity,7-23.
Nye,JosephS.
(2004):SoftPower:TheMeanstoSuccessinWorldPolitics,PublicAffairs,NewYork.
Nye,JosephS.
(2002):TheParadoxofAmericanPower,NewYork:OxfordUniversityPress.
Nye,JosephS.
(1991):ArmsControlandInternationalPolitics",Daedalus,120(1),145-165.
Nye,JosephS.
(1987):"NuclearLearningandU.
S.
–SovietSecurityRegimes",InternationalOr-ganization,41,371-402.
Oberg,JamesE.
(1999):SpacePowerTheory,Montgomery,AB:AirUniversityPress.
Obert,Mark(2011):"AridU.
:DerRtselhafte",FrankfurterRundschau,09.
03.
2011,http://www.
fr-online.
de/panorama/der-raetselhafte/-/1472782/7946296/-/item/2/-/index.
html(15.
03.
2011).
Ogburn,WilliamF.
(1964)[1957]:OnCultureandSocialChange:SelectedPapers,herausgegebenvonOtisDudleyDuncan,Chicago/London:TheUniversityofChicagoPress.
Olson,Mancur(1965):TheLogicofCollectiveAction:PublicGoodsandtheTheoryofGroups,Cambridge:HarvardUniversityPress.
Olson,Parmy(2011):"Egypt'sInternetBlackoutCostMorethanOECDEstimates",Forbes,03.
02.
2011,http://blogs.
forbes.
com/parmyolson/2011/02/03/how-much-did-five-days-of-no-internet-cost-egypt/(10.
04.
2011).
O'Murchu,Liam(2010):StuxnetUsingThreeAdditionalZero-DayVulnerabilities",SymantecOfficialBlog,14.
09.
2010,http://www.
symantec.
com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities(15.
03.
2011).
Onley,DawnS.
(2003):"U.
S.
AimstoMakeWaronIraq'sNetworks",GovernmentComputerNews,21.
02.
2003,http://www.
gcn.
com/Articles/2003/02/21/US-aims-to-make-war-on-Iraqs-networks.
aspx(19.
10.
2010).
Ono,Michael(2011):"U.
S.
SuspectsContaminatedForeign-MadeComponentsThreatenCyberSecurity",ABCNews,09.
07.
2011,http://abcnews.
go.
com/Politics/us-suspects-contaminated-foreign-made-components-threaten-cyber/storyid=14035692(25.
08.
2011).
OpenSourceCenter(2010):KremlinAllies'ExpandingControlofRunetProvokesonlyLimitedOpposition,DirectorofNationalIntelligence,WashingtonDC,http//www.
fas.
org/irp/dni/osc/runet.
pdf(18.
03.
2010).
Oppermann,Kai(2008):PrinzipaleundAgenteninZwei-Ebenen-Spielen.
DieinnerstaatlichenRestriktionenderEuropapolitikGrobritanniensunterTonyBlair,Wiesbaden:VSVerlag.
Oppermann,Kai/Viehrig,Henrike(Hg.
)(2011):IssueSalienceinInternationalPolitics,London:Routledge.
Oppermann,Kai/Hse,Alexander(2007):DieinnernpolitischenRestriktionendeutscherAuenpoli-tik",in:ThomasJger/AlexanderHse/KaiOppermann(Hg.
):DeutscheAuenpolitik:Sicher-heit,Wohlfahrt,InstitutionenundNormen,Wiesbaden:VSVerlag,40-68.
Organski,A.
F.
K.
(1968)[1958]:WorldPolitics,NewYork:AlfredA.
Knopf.
Organski,A.
F.
K.
/Kugler,Jacek(1980):TheWarLedger,Chicago/London:UniversityofChicagoPress.
Owens,WilliamA.
/Dam,KennethW.
/Lin,HerbertS.
(2009):Technology,Policy,Law,andEthicsRegardingU.
S.
AcquisitionandUseofCyberattackCapabilities,Washington,DC:TheNa-tionalAcademiesPress.
O'Connell,Kelly(2008):"OnlineCasinosWillExperienceCyber-ExtortionDuringSuperBowlBetting",InternetBusinessLawServices,28.
01.
2008,http://www.
ibls.
com/internet_law_news_portal_view.
aspxid=1967&s=latestnews(14.
08.
2011).
3809LiteraturO'Neil,WilliamD.
(2009):"CyberspaceandInfrastructure",in:FranklinD.
Kramer/StuartHStarr/LarryKWentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:Na-tionalDefenseUniversityPress,113-146.
Paarlberg,RobertL.
(2004):"KnowledgeasPower:Science,MilitaryDominance,andU.
S.
Secu-rity",InternationalSecurity,29(1),122-151.
Page,Lewis(2009):"NSAoffering'Billions'forSkypeEavesdropSolution",TheRegister,12.
02.
2009,http://www.
theregister.
co.
uk/2009/02/12/nsa_offers_billions_for_skype_pwnage/(10.
08.
2011).
Paget,Franois(2010):CybercrimeandHacktivim,McAfeeWhitePaper,http://www.
mcafee.
com/de/resources/white-papers/wp-cybercrime-hactivism.
pdf(20.
08.
2011).
Palfrey,Johnetal.
(2009):"ReadingTwitterinTehranWhytheRealRevolutionisontheStreet–andOffline",TheWashingtonPost,21.
06.
2009,http://www.
washingtonpost.
com/wp-dyn/content/article/2009/06/19/AR2009061901598.
html(03.
03.
2010).
Papp,DanielS.
/Alberts,David(1997):TheImpactsoftheInformationAgeonInternationalActorsandtheInternationalSystem",in:Dies.
(Hg.
):TheInformationAge:AnAnthologyofitsIm-pactandConsequences,Vol.
1,Washington,DC:NationalDefenseUniversityPress,285-296.
Pariser,Eli(2011):TheFilterBubble:WhattheInternetisHidingfromYou,London:Penguin.
Patel,Nilay(2010):"GoogleandVerizon'sNetNeutralityProposalExplained",Wired,09.
08.
2010,http://www.
engadget.
com/2010/08/09/google-and-verizons-net-neutrality-proposal-explained/(14.
04.
2011).
Pau,Aivar(2007):"StatementbytheForeignMinisterUrmasPaet",EestiPevaleht,01.
05.
2007,http://www.
epl.
ee/artikkel/384207(28.
05.
2011).
Penney,Jon(2011):"TimetoGetTransparentaboutCyberSecurity",InfowarMonitor,29.
07.
201,http://www.
infowar-monitor.
net/2011/07/time-to-get-transparent-about-cyber-security/(08.
08.
2011).
Peteranderl,Sonja(2010):"AufFacebook-Streife",DerFreitag,13.
08.
2010,http://www.
freitag.
de/politik/1032-staatsschutz-auf-facebook-streife(15.
03.
2011).
Peters,Ralph(2009):"CyberPeaceisnotRussia'sGoal",TheNewYorkPost,18.
12.
2009,http://www.
nypost.
com/p/news/opinion/opedcolumnists/cyperpeace_is_not_russia_goal_2UjRadkfm9EyglKYLIvuzH(22.
01.
2010).
PewResearchCenter(2011a):"PressCoverageandPublicInterests",11.
01.
2011,http://pewresearch.
org/pubs/1850/public-media-priorities-comparison-2010(17.
08.
2011).
PewReseachCenter(2011b):SocialNetworkingSitesandOurLives,16.
06.
2011,http://www.
pewinternet.
org/~/media/Files/Reports/2011/PIP%20-%20Social%20networking%20sites%20and%20our%20lives.
pdf(17.
08.
2011).
PewResearchCenter(2010a):"MixedPublicReactiontoWikiLeaks",03.
08.
2010,http://pewresearch.
org/pubs/1687/poll-WikiLeaks-serves-public-interest-harms-too-much-chelsea-clinton-coverage(16.
08.
2011).
PewResearchCenter(2010b):"PublicSeesWikiLeaksasHarmful",08.
12.
2010,http://pewresearch.
org/pubs/1823/poll-WikiLeaks-harm-serve-public-interest-press-handling(16.
08.
2011).
PewResearchCenter(2010c):"BlogsandTwitterTalkWikiLeaks",09.
12.
2010,http://pewresearch.
org/pubs/1825/WikiLeaks-blogs-twitter(17.
08.
2011).
PewResearchCenter(2010d):"Blogs:[AcronymDeleted]",29.
12.
2010,http://pewresearch.
org/pubs/1839/bloggers-WikiLeaks-task-force-wtf-cia(17.
08.
2011).
Pfeffer,Anshel(2009):"IsraelSufferedMassiveCyberAttackduringGazaOffensive",Haaretz,15.
06.
2009,http://www.
haaretz.
com/news/israel-suffered-massive-cyber-attack-during-gaza-offensive-1.
278094(17.
11.
2010).
9.
1Literatur381Philip,JojiThomas(2011):"'Suspicious'HuaweitoHelpSetupTelecomLabinIndia",TheEco-nomicTimes,23.
06.
2011,http://articles.
economictimes.
indiatimes.
com/2011-06-23/news/29694671_1_telecom-gear-telecom-equipment-chinese-vendors(01.
07.
2011).
Philip,JojiThomas/Harsimiran,Julka(2010):"GovtPlanstoCutInternetServicesinCaseofCyberAttacks",TheEconomicTimes,22.
10.
2010,http://articles.
economictimes.
indiatimes.
com/2010-10-22/news/27610856_1_cyber-attacks-cyber-security-internet-services(15.
03.
2011).
Physorg.
com(2010):"France,NetherlandsSeektoHaltInternetCensorship",http://www.
physorg.
com/news197815197.
html(16.
06.
2011).
Pierson,Paul/Skocpol,Theda(2002):"HistoricalInstitutionalisminContemporaryPoliticalSci-ence",in:IraKatznelson/HelenV.
Milner(Hg.
):PoliticalScience:TheStateoftheDiscipline,NewYork/London:W.
W.
Norton&Company,693-721.
Pilkington,Ed(2011):"OneinFourHackers'isanFBIInformer'",TheGuardian,06.
06.
2011,http://www.
guardian.
co.
uk/technology/2011/jun/06/us-hackers-fbi-informer(10.
06.
2011).
Pincus,Walter(2008):"TheNewArtofWar",WashingtonPost,03.
03.
2008,A15.
Pollet,Thomas/Roberts,Sam/Dunbar,Robin(2011):"UseofSocialNetworkSitesandInstantMes-sagingDoesnotLeadtoIncreasedOfflineSocialNetworkSize,ortoEmotionallyCloserRela-tionshipswithOfflineNetworkMembers",Cyberpschology,Behavior,andSocialNetworking,14(4),253-258.
Portnoy,Michael/Goodman,Seymour(Hg.
)(2009):GlobalInitiativestoSecureCyberspace:AnEmergingLandscape,Wien/NewYork:Springer.
Posen,BarryR.
(2003):"CommandoftheCommons:TheMilitaryFoundationofU.
S.
Hegemony",InternationalSecurity,28(1),5-46.
Postman,Neil(1993):Technopoly:TheSurrenderofCulturetoTechnology,NewYork:Vintage.
Postman,Neil(1988):WiramüsierenunszuTode:UrteilsbildungimZeitlalterderUnterhaltungsin-dustrie,Frankfurta.
M.
:FischerVerlag.
Potter,WilliamC.
(1980):"IssueAreaandForeignPolicyAnalysis",InternationalOrganization,34(3),405-427.
Poulsen,Kevin/Zetter,Kim(2010):"U.
S.
IntelligenceAnalystArrestedinWikiLeaksVideoProbe",Wired,06.
06.
2010,http://www.
wired.
com/threatlevel/2010/06/leak/(15.
03.
2011).
Poulsen,Kevon(2009):"Report:CyberAttacksCausedPowerOutagesinBrazil",Wired,07.
11.
2009,http://www.
wired.
com/threatlevel/2009/11/brazil/(13.
08.
2011).
Prensky,Marc(2001):"DigitalNatives,DigitalImmigrants",OntheHorizon,9(5),http://www.
marcprensky.
com/writing/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.
pdf(10.
04.
2011).
Preston,Jennifer(2011a):"MovementBeganwithOutrageandaFacebookPagethatGaveItanOutlet",TheNewYorkTimes,05.
02.
2011,http://www.
nytimes.
com/2011/02/06/world/middleeast/06face.
html(10.
04.
2011).
Preston,Jennifer(2011b):"SeekingtoDisruptProtesters,SyriaCracksDownonSocialMedia",TheNewYorkTimes,22.
05.
2011,http://www.
nytimes.
com/2011/05/23/world/middleeast/23facebook.
html(09.
06.
2011).
Prime,JohnA.
(2007):"SecretiveBarksdaleFocusedonCyber-warfare",AirForceTimes,12.
06.
2007,http://www.
airforcetimes.
com/news/2007/06/airforce_cyber_barksdale_070611/(22.
11.
2010).
Putnam,RobertD.
(2000):BowlingAlone:TheCollapseandRevivalofAmericanCommunity,NewYorketal.
:Simon&Schuster.
Qiang,Xiao(2008):"HowChina'sInternetPoliceControlsSpeechontheInternet",RadioFreeAsia,24.
11.
2008,http://www.
rfa.
org/english/commentaries/china_internet-11242008134108.
html(16.
08.
2011).
3829LiteraturQuinn,Andrew(2011):"U.
S.
Develops'PanicButton'forDemocracyActivists",Reuters,25.
03.
2011,http://www.
reuters.
com/article/2011/03/25/us-rights-usa-technology-idUSTRE72O6DH20110325(01.
08.
2011).
Radelat,Ana(2007):"CompetitionoverCyberMissiontoHeatupthisSummer",ShreveportTimes,11.
06.
2007,http://www.
shreveporttimes.
com/apps/pbcs.
dll/articleAID=/20070611/NEWS01/706110314(22.
11.
2010).
RadioFreeEurope/RadioLiberty(2007):"Russia:EstonianPresidentSaysMoscowSeesDemocracyasa'Threat'",05.
06.
2007,http://www.
rferl.
org/content/article/1076942.
html(27.
05.
2011).
Ragan,Steve(2011):"TunesianGovernmentHarvestingUsernamesandPasswords",TheTechHerald,04.
01.
2011,http://www.
thetechherald.
com/article.
php/201101/6651/Tunisian-government-harvesting-usernames-and-passwords(10.
04.
2011).
Raman,SriJ.
(2009):"AfterNuclearWar,India'sFarRightWantsCyberwar",TruthoutPerspective,05.
04.
2009,http://www.
truth-out.
org/040509D(22.
11.
2010).
Ranwsley,Adam(2011):"FishyChips:SpiesWanttoHack-ProofCircuits",Wired,24.
06.
2011,http://www.
wired.
com/dangerroom/2011/06/chips-oy-spies-want-to-hack-proof-circuits/#more-49990(03.
08.
2011).
Rathmell,Andrew(2001):"ControllingComputerNetworkOperations",InformationandSecurity,7(1),121-144.
Rattrey,Greg/Healey,Jason(2011):"Non-StateActorsandCyberConflict",in:KristinM.
Lord/TravisSharp(Hg.
):America'sCyberFuture:SecurityandProsperityintheInformationAge:VolumeII,Washington,DC:CenterforaNewAmericanSecurity,67-86.
Rattray,Greg(2009):"AnEnvironmentalApproachtoUnderstandingCyberpower",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,253-274.
Rattray,Greg(2001):StrategicWarfareinCyberspace,Cambridge,MA:TheMITPress.
Rauscher,KarlF.
/Yaschenko,Valery(2011):Russia-U.
S.
BilateralonCybersecurity:CriticalTer-minologyFoundations,NewYork/Moskau:EastWestInstitute/InformationSecurityInstitute.
Razumovskaya,Olga(2011):RussianSocialNetwork:FSBAskedittoBlockKremlinProtesters",TheWallStreetJournal,08.
12.
2011,http://blogs.
wsj.
com/emergingeurope/2011/12/08/russian-social-network-fsb-asked-it-to-block-kremlin-protesters/(14.
12.
2011).
Reuder,Bernd/Siekman,Sascha(2009):"WieCyber-KriminelleundGeheimdienstemitPhishinggezieltaufInformationsjagdgehen",crn.
de,03.
04.
2009,http://www.
crn.
de/security/artikel-7191.
html(10.
08.
2011).
Reid,Tim(2007):"China'sCyberArmyisPreparingtoMarchonAmerica,SaysPentagon",TheTimesOnline,08.
09.
2007,http://technology.
timesonline.
co.
uk/tol/news/tech_and_web/the_web/article2409865.
ece(22.
08.
2009).
ReporterswithoutBorders(2011):"WaveofArrestsofBloggersandActivists",07.
01.
2011,http://en.
rsf.
org/tunisia-wave-of-arrests-of-bloggers-and-07-01-2011,39238.
html(10.
04.
2011).
ReporterswithoutBorders(2009):InternetEnemies,Paris,http://www.
rsf.
org/IMG/pdf/Internet_enemies_2009_2_.
pdf(03.
03.
2010).
Resnick,David(1998):"PoliticsontheInternet.
TheNormalizationofCyberspace",in:ChrisTou-louse/TimothyW.
Luke(Hg.
):ThePoliticsofCyberspace:ANewPoliticalScienceReader,NewYork/London:Routledge,48-68.
Reuters(2009):"BritishSpyChief'sCoverBlownonFacebook",04.
07.
2009,http://www.
reuters.
com/article/2009/07/05/us-britain-mi-idUSTRE56403820090705(15.
03.
2011).
Rheingold,Howard(2002):SmartMobs:TheNextSocialRevolution,Cambridge,MA:BasicBooks.
9.
1Literatur383Rheingold,Howard(1993):TheVirtualCommunity:HomesteadingontheElectronicFrontier,Reading,MA:Addison-Wesley.
Rhoads,Christopher/Fassihi,Farnaz(2011):"IranVowstoUnplugInternet",TheWallStreetJour-nal,28.
05.
2011,http://online.
wsj.
com/article/SB10001424052748704889404576277391449002016.
html(09.
06.
2011).
Rhoads,Christopher/Chao,Loretta(2009):"Iran'sWebSpyingAidedbyWesternTechnology",TheWallStreetJournal,23.
06.
2009,http://online.
wsj.
com/article/SB124562668777335653.
html(03.
03.
2010).
RIANovosti(2007):"EstoniaHasnoEvidenceofKremlinInvolvementinCyberAttacks",06.
09.
2007,http://en.
rian.
ru/world/20070906/76959190.
html(27.
05.
2011).
Richmond,Riva(2011):"IranianHackersSuspectedinRecentSecurityBreach",TheNewYorkTimes,24.
03.
2011,http://bits.
blogs.
nytimes.
com/2011/03/24/iranian-hackers-suspected-in-recent-security-breach/(08.
08.
2011).
Rieger,Frank(2011):"EinamtlicherTrojaner:AnatomieeinesdigitalenUngeziefers",FrankfurterAllgemeineZeitung,09.
10.
2011,http://www.
faz.
net/aktuell/feuilleton/ein-amtlicher-trojaner-anatomie-eines-digitalen-ungeziefers-11486473.
html(27.
10.
2011).
Rieger,Frank(2010):"DerdigitaleErstschlagisterfolgt",FrankfurterAllgemeineZeitung,22.
09.
2010,http://www.
faz.
net/s/RubCEB3712D41B64C3094E31BDC1446D18E/Doc~E8A0D43832567452FBDEE07AF579E893C~ATpl~Ecommon~Scontent.
html(15.
03.
2011).
Roberts,Haletal.
(2010):2010CircumventionToolUsageReport,Cambridge,MA,BerkmanCenterforInternet&Society,http://cyber.
law.
harvard.
edu/sites/cyber.
law.
harvard.
edu/files/2010_Circumvention_Tool_Usage_Report.
pdf(22.
11.
2010).
Rockefeller,Happy(2011):"Updated:TheHBGaryEmailthatShouldConcernUsAll",TheDailyKos,16.
02.
2011,http://www.
dailykos.
com/story/2011/02/16/945768/-UPDATED:-The-HB-Gary-Email-That-Should-Concern-Us-All(15.
03.
2011).
Rodriguez,Salvador(2011):"HackerGrouptheA-TeamPublishesListofAllegedLulzSecMem-bers",LosAngelesTimes,27.
06.
2011,http://latimesblogs.
latimes.
com/technology/2011/06/hacker-group-claims-to-expose-identitites-of-lulzsec-members.
html(12.
07.
2011).
Rogers,Simon(2010):"TheUSEmbassyCables",GuardianDataBlog,03.
12.
2010,http://www.
guardian.
co.
uk/news/datablog/2010/nov/29/WikiLeaks-cables-data(15.
03.
2011).
Rohozinski,Rafal/Haralampieva,Vesselina(2008):"InternetFilteringintheCommonwealthofIndependentStates",in:RonaldDeibertetal.
(Hg.
):AccessDenied:ThePracticeandPolicyofGlobalInternetFiltering,Cambridge,MA:TheMITPress,177-185.
Ronfeldt,David(1991).
Cyberocracy,Cyberspace,andCyberology.
PoliticalEffectsoftheInforma-tionRevolution,SantaMonica,CA:RAND.
Ronfeldt,David/Arquilla,John(2001):"EmergenceandInfluenceoftheZapatistaSocialNetwar",in:JohnArquilla/DavidRonfeldt(Hg.
):NetworksandNetwar:TheFutureofTerror,CrimeandMilitancy,SantaMonica,CA:RAND,171-191.
Ronfeldt,Davidetal.
(1998):TheZapatistaSocialNetwarinMexico,SantaMonica,CA:RAND.
Ronfeldt,David/Martinez,Armando(1997):"ACommentontheZapatista'Netwar'",in:JohnArquilla/DavidRonfeldt(Hg.
):InAthena'sCamp:PreparingforConflictintheInformationAge,SantaMonica,CA:RAND,369-391.
Ropohl,Günter(1979):EineSystemtheoriederTechnik:ZurGrundlegungderAllgemeinenTechno-logie,München/Wien:Hanser.
3849LiteraturRosenau,JamesN.
(1999):"ThinkingTheoryThouroughly",in:PaulR.
Viotti/MarkV.
Kauppi(Hg.
):InternationalRelationsTheory:Realism,Pluralism,Globalism,andBeyond,3.
Auflage,Boston:AllynandBacon,29-37.
Rosenau,JamesN.
(1967):"ForeignPolicyasanIssue-Area",in:Ders.
(Hg.
):DomesticSourcesofForeignPolicy,NewYork:FreePress,11-50.
Rosenau,JamesN.
(1966):Pre-TheoriesandTheoriesofForeignPolicy",in:RobertB.
Farrell(Hg.
):ApproachestoComparativeandInternationalPolitics,Evanston,IL:NorthwesternUniversityPress,27-92.
Rosenbach,Marcel/Stark,Holger(2011):StaatsfeindWikiLeaks,München:DeutscheVerlags-Anstalt.
Rosenzweig,Paul(2010):TheOrganizationoftheUnitedStatesGovernmentandPrivateSectorforAchievingCyberDeterrence",in:ProceeedingsofaWorkshoponDeterringCyberAttacks,Washington,DC:TheNationalAcademiesPress,http://www.
cs.
brown.
edu/courses/csci1950-p/sources/lec26/Rosenzweig.
pdf(14.
08.
2011).
Ross,Brian/Cole,Matthew(2011):Egypt:TheFacethatLaunchedaRevolution",ABCNews,04.
02.
2011,http://abcnews.
go.
com/Blotter/egypt-face-launched-revolution/storyid=12841488(10.
04.
2011).
Ross,David(2003):PGP:BackdoorsandKeyEscrow,o.
A.
,http://www.
rossde.
com/PGP/pgp_backdoor.
html(04.
08.
2011).
Rtzer,Florian(2011a):"FrderungderInternetfreiheitmitHintertüren",Telepolis,14.
06.
2011,http://www.
heise.
de/tp/artikel/34/34936/1.
html(22.
06.
2011).
Rtzer,Florian(2011b):"Facebook,dieMenschenrechteundderSchutzderpolitischenAktivisten",Telepolis,18.
02.
2011,http://www.
heise.
de/tp/r4/artikel/34/34207/1.
html(10.
04.
2011).
Rtzer,Florian(2007):"HatdieisraelischeLuftwafferussischeLuftabwehrsystemeinSyrienausge-trickst",Telepolis,10.
10.
2007,http://www.
heise.
de/tp/r4/artikel/26/26358/1.
html(17.
11.
2010).
Rowe,NeilC.
(2008):"EthicsofCyberwarAttacks",in:LechJ.
Janczewski/AndrewM.
Colarik(Hg.
):CyberWarfareandCyberTerrorism,Hershey/NewYork:InformationScienceRefer-ences,106-111.
Rushe,Dominic(2011):"GoogleAccusesChinaofInterferingwithGmailEmailSystem",TheGuardian,20.
03.
2011,http://www.
guardian.
co.
uk/technology/2011/mar/20/google-gmail(04.
08.
2011).
Samuelson,PaulA.
(1954):"ThePureTheoryofPublicExpenditures",ReviewofEconomicsandStatistics,36(4),387-389.
Sandler,Todd(1997):GlobalChallenges:AnApproachtoEnvironmental,Political,andEconomicProblems,Cambridge:CambridgeUniversityPress.
Sands,DavidR.
(2008):"HackingonHillTracedtoChina.
HumanRightsDataTargeted",TheWashingtonTimes,12.
06.
2008,A01.
Sanger,FavidE.
(2012):"ObamaOrderSpedupWaveofCyberattacksagainstIran",TheNewYorkTimes.
01.
06.
2012,http://www.
nytimes.
com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.
htmlpagewanted=all(05.
06.
2012).
Sanger,DavidE.
(2010):"IranFightsMalwareAttackingComputers",TheNewYorkTimes,25.
09.
2010,http://www.
nytimes.
com/2010/09/26/world/middleeast/26iran.
html(17.
11.
2010).
Sanger,DavidE.
/Glanz,James/Becker,Jo(2010):AroundtheWorld,DistressoverIran",TheNewYorkTimes,28.
11.
2010,http://www.
nytimes.
com/2010/11/29/world/middleeast/29iran.
htmlpagewanted=1(15.
03.
2011).
Sanger,DavidE.
/Markoff,John/Shanker,Thom(2009):"USStepsupEffortsonDigitalDefenses",TheNewYorkTimes,27.
04.
2009,http://www.
nytimes.
com/2009/04/28/us/28cyber.
html_r=2(15.
03.
2011).
9.
1Literatur385Savage,Charlie(2010):"U.
S.
TriestoMakeitEasiertoWiretaptheInternet",TheNewYorkTimes,27.
09.
2010,http://www.
nytimes.
com/2010/09/27/us/27wiretap.
html(15.
03.
2011).
Scharpf,Fritz(1970):DemokratietheoriezwischenUtopieundAnpassung,Konstanz:Universitts-verlag.
Schenk,Michael(2007):Medienwirkungsforschung,3.
Aufl,Tübingen:MohrSiebeck.
Schelling,ThomasC.
(1984):ChoiceandConsequence,Cambridge/London:HarvardUniversityPress.
Schelling,ThomasC.
(1980)[1960]:TheStrategyofConflict,Cambridge/London:HarvardUniver-sityPress.
Schelling,ThomasC.
/Halperin,MortonH.
(1961):StrategyandArmsControl,NewYork:TwentiethCenturyFund.
Schleifer,Yigal(2009):"Blogs,YouTube:TheNewBattlegroundofGazaConflict",ChristianScienceMonitor,23.
01.
2009,http://www.
csmonitor.
com/2009/0123/p04s03-wome.
html(03.
03.
2010).
Schmid,Thomas(2010):"ErmittlungeninsozialenNetzwerken",taz.
de,22.
02.
2010,http://www.
taz.
de/1/netz/netzpolitik/artikel/1/moechtest-du-polizei-als-freund-hinzufuegen/(15.
03.
2011).
Schmitt,MichaelM.
(1999):ComputerNetworkAttackandtheUseofForceinInternationalLaw:ThoughtsonaNormativeFramework",ColumbiaJournalofTransnationalLaw,37(885).
Schmitt,RichardB.
(2008):"ChineseSuspectedinCapitolHackingCases",LosAngelesTimes,12.
06.
2008,10.
Schneier,Bruce(2007):"DidNSAPutaSecretBackdoorinNewEncryptionStandard",Wired,15.
11.
2007,http://www.
wired.
com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115(04.
08.
2011).
Schoenfeld,Gabriel(2010):"WarfareThrough'aSodaStraw'",TheHudsonInstitute/TheWallStreetJournal,23.
06.
2010,http://www.
hudson.
org/index.
cfmfuseaction=publication_details&id=7096(17.
08.
2011).
Schrder,Thorsten/Zacharakis,Zacharias(2010):"Assangelsst'NewYorkTimes'auflaufen",FinancialTimesDeutschland,01.
12.
2010,http://www.
ftd.
de/it-medien/medien-internet/:WikiLeaks-gruender-assange-laesst-new-york-times-auflaufen/50200574.
html(15.
03.
2011).
Schroeder,ChristopherM.
(2011):"TheUnprecedentedEconomicRisksofNetworkInsecurity",in:KristinM.
Lord/TravisSharp(Hg.
):America'sCyberFuture:SecurityandProsperityintheInformationAge:VolumeII,Washington,DC:CenterforaNewAmericanSecurity,167-181.
Schulze,Tillmann(2006):Bedingtabwehrbereit:SchutzkritischerInformationsinfrastruktureninDeutschlandunddenUSA,Wiesbaden:VerlagfürSozialwissenschaften.
Schulzki-Haddouti(2011):Dschihad-WebseiteInspire'inspiriertJournalisten",ZDFHyperland(Blog),05.
05.
2011,http://blog.
zdf.
de/hyperland/2011/05/dschihad-website-inspire-inspiriert-journalisten/(05.
05.
2011).
Schwartau,Winn(1994):InformationWarfare:ChaosontheElectronicSuperhighway,NewYork:Thunder'sMouthPress.
Schfbnker,Georg(2001):"RüstungskontrolleimIT-Zeitalter",in:Heinrich-Bll-Stiftung(Hg.
):RüstungskontrolleimCyberspace,Berlin,22-30.
Scott,Charney(2002):TransitionbetweenLawEnforcementandNationalDefense",in:USCon-gressJointEconomicCommittee(Hg.
):SecurityintheInformationAge:New:Challenges,newStrategies,Washington,DC,52-62,http://www.
house.
gov/jec/security.
pdf(14.
04.
2011).
Sengupta,Kim/Morris,Nigel(2009):"NewCyberChieftoProtectagainstComputerAttacks",TheIndependent,24.
06.
2009,http://www.
independent.
co.
uk/news/uk/home-news/new-cyber-chief-to-protect-against-computer-attacks-1715969.
html(22.
11.
2010).
3869LiteraturSennett,Richard(2002)[1977]:TheFallofPublicMan,Londonetal.
:PenguinBooks.
Senor,Dan/Whiton,Christian(2009):"FiveWaysObamaCouldPromoteFreedominIran",TheWallStreetJournal,17.
06.
2009,http://online.
wsj.
com/article/SB124520276223621661.
html(03.
06.
2011).
Sevastopulo,Demetri(2007):"Beware:EnemyAttacksinCyberspace",FinancialTimes,03.
09.
2007,http://www.
ft.
com/cms/s/0/a89c1c88-5a38-11dc-9bcd-0000779fd2ac.
html#axzz15j5F5W9k(17.
11.
2010).
Shachtman,Noah(2009a):"AirForceAimsfor'FullControl'of'AnyandAll'Computers",Wired,13.
05.
2008,http://www.
wired.
com/dangerroom/2008/05/air-force-mater/(22.
11.
2010).
Shachtman,Noah(2009b):"Exclusive:U.
S.
SpiesBuyStakeinFirmthatMonitorsBlogs,Tweets",Wired,19.
10.
2009,http://www.
wired.
com/dangerroom/2009/10/exclusive-us-spies-buy-stake-in-twitter-blog-monitoring-firm/(15.
03.
2011).
Shachtman,Noah(2009c):"WageCyberwaragainstHamas,SurrenderyourPC",Wired,08.
01.
2009,http://www.
wired.
com/dangerroom/2009/01/israel-dns-hack/(17.
11.
2010).
Shachtman,Noah(2009d):"TopGeorgianOffical:MoscowCyberAttackedUs–WeJustCan'tProveit",Wired,11.
03.
2009,http://www.
wired.
com/dangerroom/2009/03/georgia-blames/(31.
05.
2011).
Shatchtman,Noah(2009e):"IsraelisTakeoverHamas'TVStation",Wired,05.
01.
2009,http://www.
wired.
com/dangerroom/2009/01/israelis-take-o/(16.
08.
2011).
Shane,Scott(2011a):"WikiLeaksLeavesNamesofDiplomaticSourcesinCables",TheNewYorkTimes,29.
08.
2011,http://www.
nytimes.
com/2011/08/30/us/30WikiLeaks.
html_r=1&ref=global-home(30.
08.
2011).
Shane,Scott(2011b):"WikiLeaksPromptsnewDiplomaticUproar",TheNewYorkTimes,31.
08.
2011,http://www.
nytimes.
com/2011/09/01/us/01wikileaks.
html_r=1&ref=global-home(01.
09.
2011).
Shane,Scott(2010):"WikiLeaksFounderWarnsaboutmoreDispatches",TheNewYorkTimes,06.
12.
2010,http://www.
nytimes.
com/2010/12/07/world/europe/07assange.
html(15.
03.
2011).
Shane,Scott(2005):DismantlingUtopia:HowInformationEndedtheSovietUnion,Chicago:IvanR.
Dee.
Shane,Scott/Mazzetti,Mark/Filkins,Dexter(2010):"CablesDepictAfghanGraft,StartingatTop",TheNewYorkTimes,02.
12.
2010,http://www.
nytimes.
com/2010/12/03/world/asia/03WikiLeaks-corruption.
html(15.
03.
2011).
Shapiro,AndrewL.
(1999a):TheControlRevolution:HowtheInternetisPuttingIndividualsinChargeandChangingtheWorldWeKnow,NewYork,NY:PublicAffairs.
Shapiro,AndrewL.
(1999b):"ThinkAgain:TheInternet",ForeignPolicy,Summer,14-27.
Shanker,Thom/Richtel,Matt(2011):"InNewMilitary,DataOverloadCanBeDeadly",TheNewYorkTimes,16.
01.
2011,http://www.
nytimes.
com/2011/01/17/technology/17brain.
htmlpagewanted=all(29.
08.
2011).
Sharidan,MaryB.
(2011):"U.
S.
WarnsagainstBlockingSocialMedia,ElevatesInternetFreedomPolicies",TheWashingtonPost,28.
01.
2011,http://www.
washingtonpost.
com/wp-dyn/content/article/2011/01/28/AR2011012804554.
htmlsid=ST2011012806871(16.
06.
2011).
Shirk,SusanL.
(2007):"ChangingMedia,ChangingForeignPolicyinChina",JapaneseJournalofPoliticalScience,8(1),43-70.
Shirky,Clay(2011):"ThePoliticalPowerofSocialMedia",ForeignAffairs,90(1),28-41.
Shirky,Clay(2008):HereComesEverybody:ThePowerofOrganizingwithoutOrganizations,NewYork:PenguinBooks.
Siedschlag,Alexander(2003):"PolitologischeAnnherungenandiedigitaleDemokratie",in:ArnoRogg(Hg.
):WiedasInternetdiePolitikverndert,Opladen:LeskeundBudrich,9-20.
9.
1Literatur387Siegel,Matt(2008):GovernmentComputersFaceAnti-EspionageRestrictions",TheMoscowTimes,21.
03.
2008,http://archive.
cert.
uni-stuttgart.
de/isn/2008/03/msg00086.
html(14.
04.
2011).
SiemensAG(2010):'DigitalGraffiti'gewinntPreisfüreBusiness",30.
01.
2010,http://www.
siemens.
com/innovation/de/news_events/ct_pressemitteilun-gen/index/research_news/2010/022_resnews_1003_1.
htm(03.
03.
2010).
Silver,Vernon/Elgin,Ben(2011):TortureinBahrainBecomesRoutinewithHelpfromNokiaSiemens",Bloomberg,22.
08.
2011,http://www.
bloomberg.
com/news/2011-08-22/torture-in-bahrain-becomes-routine-with-help-from-nokia-siemens-networking.
html(25.
08.
2011).
Silverstein,Richard(2009):HasbaraSpamAlert:WithIsrael'sForeignMinistryOrganisingVolun-teerstoFloodNewsWebsiteswithPro-IsraeliComments,Propaganda2.
0ishere",TheGuardian,09.
01.
2009,http://www.
guardian.
co.
uk/commentisfree/2009/jan/09/israel-foreign-ministry-media(03.
03.
2010).
Simon,HerbertA.
(1985):"HumanNatureinPolitics:TheDialogueofPsychologywithPoliticalScience",AmericanPoliticalScienceReview,79(2),293-304.
Simon,HerbertA.
(1957):ModelsofMan:MathematicalEssaysonRationalHumanBehaviorinaSocialSetting,NewYork,NY:JohnWiley&Sons.
Singer,David/Bremer,Stuart/Stuckey,John(1979):"CapabilityDistribution,UncertaintyandMajorPowerWar,1820-1965",in:DavidSinger(Hg.
):ExplainingWar:SelectedPapersfromtheCorrelatesofWarProject,BeverlyHills,CA:Sage.
Sklerov,MatthewJ.
(2010):"RespondingtoInternationalCyberAttacksasActsofWar",in:JeffreyCarr(Hg.
):InsideCyberWarfare,Sabastopol,CA:O'ReillyMedia.
Skolnikoff,EugeneB.
(1993):TheElusiveTransformation:Science,Technology,andtheEvolutionofInternationalPolitics,Princeton:PrincetonUniversityPress.
Skoudis,Edward(2009a):"InformationSecurityIssuesinCyberspace",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,171-205.
Skoudis,Edward(2009b):"EvolutionaryTrendsinCyberspace",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,147-170.
Sly,Liz(2011):"SyrianRevoltStillSpontaneousandLeaderless",TheWashingtonPost,29.
07.
2011,http://www.
washingtonpost.
com/world/middle-east/syrian-revolt-still-spontaneous-and-leaderless/2011/07/27/gIQAHvltfI_story.
html(01.
08.
2011).
Smith,Catharine(2011):"Egypt'sFacebookRevolution:WaelGhonimThankstheSocialNetwork,HuffingtonPost,11.
02.
2011,http://www.
huffingtonpost.
com/2011/02/11/egypt-facebook-revolution-wael-ghonim_n_822078.
html(10.
04.
2011).
Smith,CraigS.
(2001):"May6-12,TheFirstWorldHackerWar",TheNewYorkTimes,13.
05.
2001,http://www.
nytimes.
com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.
htmlref=craig_s_smith(19.
11.
2010).
Smith,MerrittR.
(1994):"TechnologicalDeterminisminAmericanCulture",in:Dies.
/LeoMarx(Hg.
)(1994):DoesTechnologyDriveHistoryTheDilemmaofTechnologicalDeterminism,Cambridge,MA:TheMITPress,1-35.
Smith,MerrittR.
/Marx,Leo(Hg.
)(1994):DoesTechnologyDriveHistoryTheDilemmaofTechno-logicalDeterminism,Cambridge,MA:TheMITPress.
Smith,Michael(2009):"SpyChiefsFearChineseCyberAttack",TheSundayTimes,29.
03.
2009,http://www.
timesonline.
co.
uk/tol/news/uk/article5993156.
ece(15.
03.
2011).
Snidal,Duncan(1985):"CoordinationversusPrisoners'Dilemma:ImplicationsforInternationalCooperationandRegimes",AmericanPoliticalScienceReview,79(4),923-942.
Snyder,Glenn(1984):"TheSecurityDilemmainAlliancePolitics",WorldPolitics,36(4),461-495.
3889LiteraturSocialMediaSchweiz(2011a):Facebook:DieWeltimberblick,31.
03.
2011,http://www.
socialmediaschweiz.
ch/Facebook_-_Die_Welt__Update_Marz_2011_.
pdf(15.
04.
2011).
SocialMediaSchweiz(2011b):DiewichtigstenSocialMediaPlattformenRusslandsimberblick,http://www.
socialmediaschweiz.
ch/html/russland_social_media.
html(10.
04.
2011).
Sofaer,AbrahamD.
/Clark,David/Diffie,Whitfield(2010):CyberSecurityandInternationalAgreements",in:NationalResearchCouncil(Hg.
):ProceedingsofaWorkshoponDeterringCyberattacks:InformingStrategiesandDevelopingOptionsforU.
S.
Policy,Washington,DC:TheNationalAcademiesPress,179-206.
Solum,LawrenceB.
(2009):"ModelsofInternetGovernance",in:LeeA.
Bygrave/JonBing(Hg.
):InternetGoverance:InfrastructureandInstitutions,Oxford:OxfordUniversityPress,48-91.
Sonne,Paul/Stecklow,Steve(2011):"U.
S.
ProductsHelpBlockMideastWeb",TheWallStreetJournal,28.
03.
2011,http://online.
wsj.
com/article/SB10001424052748704438104576219190417124226.
html(01.
08.
2011).
Sosa,GilbertC.
(2009):"CountryReportonCybercrime:ThePhillipines",in:UnitedNationsAsiaandFarEastInstituteforthePreventionofCrimeandtheTreatmentofOffenders(UNAFEI)(Hg.
):WorkProductofthe104thInternationalTrainingCourse'TheCrminalJusticeResponsetoCybercrime',Tokio,80-86,http://www.
unafei.
or.
jp/english/pdf/RS_No79/No79_12PA_Sosa.
pdf(17.
06.
2011).
Spacewar.
com(2008):"NATOLaunchesCyberDefenceCentreinEstonia",14.
05.
2008,http://www.
spacewar.
com/reports/NATO_launches_cyber_defence_centre_in_Estonia_999.
html(22.
11.
2010).
Specter,Alen(2009):"AttacktheCyberwalls!
",PittsburghPost-Gazette,07.
07.
2009,http://www.
post-gazette.
com/pg/09188/982158-109.
stm(03.
06.
2011).
Speller,Ian(2008):"NavalWarfare",in:DavidJordanetal.
(Hg.
):UnderstandingModernWarfare,Cambridge:CambridgeUniversityPress,122-177.
Stalder,Felix(2011):WikiLeaksunddieneuekologiederNachrichtenmedien",in:SuhrkampVerlag(Hg.
):WikiLeaksunddieFolgen:DieHintergründe,dieKonsequenzen,Berlin,96-108.
Stanoevska-Slavbeva,Katarina(2008):Web2.
0–Grundlagen,AuswirkungenundzukünftigeTrends",in:MiriamMeckel/KatarinaStanoevska-Slavbeva(Hg.
):Web2.
0:DienchsteGene-rationInternet,Baden-Baden:Nomos,13-38.
Stegbauer,Christian(2008):RaumzeitlicheStrukturimInternet",AusPolitikundZeitgeschichte,39/2008,3-9.
Steidel,JohannesS:/Mueller,Philipp/Meshkova,Ksenia(2008):Security2.
0:TheEstonian-RussianCyberwar2007,DraftPaper,ErfurtSchoolofPublicPolicy,http://www.
globalize.
de/wp-content/uploads/2008/12/2008-002.
pdf(27.
05.
2011).
Stein,Arthur(1993):"CoordinationandCollaboration:RegimesinanAnarchicWorld",in:DavidA.
Baldwin(Hg.
):NeorealismandNeoliberalism:TheContemporaryDebate,NewYork:Co-lumbiaUniversityPress,29-59.
Steinmo,Sven/Thelen,Kathleen/Longstreth,Frank(Hg.
):StructuringPolitics:HistoricalInstitution-alisminComparativeAnalysis,Cambridge:CambridgeUniversityPress.
Sternstein,Aliya(2011):"DefenseFundingforCybersecurityisHardtoPinDown",NextGov,29.
03.
2011,http://www.
nextgov.
com/nextgov/ng_20110329_4961.
php(14.
04.
2011).
Stone,CorinR.
(2011):StatementfortheRecordofCorinR.
Stone,IntelligenceCommunityInforma-tionSharingExecutiveOfficeoftheDirectorofNationalIntelligence,beforetheSenateHome-landSecurityandGovernmentalAffairsCommittee,Washington,DC,10.
03.
2011,http://www.
fas.
org/irp/congress/2011_hr/031011stone.
pdf(15.
03.
2011).
StopBadwareInc.
(2011):TheStateofBadware,Cambridge,MA,http://stopbadware.
org/pdfs/state-of-badware-june-2011.
pdf(14.
08.
2011).
9.
1Literatur389Streitfeld,David(2011):"PentagonSeeksaFewGoodSocialNetworkers",TheNewYorkTimes,02.
08.
2011,http://bits.
blogs.
nytimes.
com/2011/08/02/pentagon-seeks-social-networking-experts/(08.
08.
2011).
Sunstein,CassR.
(2007).
Republic2.
0,Princeton/Oxford:PrincetonUniversityPress.
SüddeutscheZeitung(2010a):"Computer-VirusStuxnettrifftdeutscheIndustrie",02.
10.
2010,http://www.
sueddeutsche.
de/digital/gefaehrliches-schadprogramm-computer-virus-stuxnet-trifft-deutsche-industrie-1.
1007379(15.
03.
2011).
SüddeutscheZeitung(2010b):USAdüpierenVerbündeteweltweit",28.
11.
2010,http://www.
sueddeutsche.
de/politik/WikiLeaks-enthuellungen-im-netz-unberechenbar-und-mit-begrenztem-horizont-1.
1029368(15.
03.
2011).
SüddeutscheZeitung(2010c):Putin,derAlpha-Rüde'",28.
11.
2010,http://www.
sueddeutsche.
de/politik/WikiLeaks-enthuellungen-im-netz-unberechenbar-und-mit-begrenztem-horizont-1.
1029368-2(15.
03.
2011).
Svensson,Peter(2008):PakistanCausesWorldwideYouTubeOutage",Msnbc.
com,25.
02.
2008,http://www.
msnbc.
msn.
com/id/23339712/ns/technology_and_science-internet/t/pakistan-causes-worldwide-youtube-outage/(07.
07.
2011).
Swayne,Jon(2008):Georgia:RussiaConductingCyberwar'",TheTelegraph,11.
08.
2008,http://www.
telegraph.
co.
uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.
html(31.
05.
2011).
Symantec(o.
A.
):DerStuxnetWurm,http://www.
symantec.
com/de/de/business/theme.
jspthemeid=stuxnet(15.
03.
2011).
Tagesschau.
de(2009):MarkieredieGesichterdeinerFreunde!
",10.
07.
2009,http://www.
tagesschau.
de/ausland/iran638.
html(14.
01.
2011).
Takai,Teresa/Ferguson,Thomas(2011):JointStatementfortheRecord,SenateHomelandSecurityandGovernmentalAffairsCommittee,10.
03.
2011,http://www.
fas.
org/irp/congress/2011_hr/031011takai.
pdf(15.
03.
2011).
Tang,Ruoji(2010):"ChinaPoll:AreChineseOffcialsAfraidoftheInternet",EconomicObserver,17.
11.
2010,http://www.
eeo.
com.
cn/ens/Observer/opinion_analysis/2010/11/17/186143.
shtml(17.
08.
2011).
Tangredi,SamJ.
(2002):"SeaPower:TheoryandPractice",in:JohnBaylisetal.
(Hg.
):StrategyintheContemporaryWorld:AnIntroductiontoStrategicStudies,Oxford:OxfordUniversityPress,113-136.
Temkin,Ilya/Eldredge,Niles(2007):"PhylogeneticsandMaterialCulturalEvolution",CurrentAntrophology,48(1),146-154.
Tetlock,PhilipE.
(1998):"SocialPsychologyandWorldPolitics",in:DanielT.
Gilbert/SusanFiske/GardnerLindzey(Hg.
):TheHandbookofSocialPsychology,Vol.
II,Boston,MA:McGraw-Hill,868-912.
Tetlock,PhilipE.
/McGuire,Charles(1986):CognitivePerspectivesonForeignPolicy",in:SamuelLong(Hg.
):PoliticalBehaviorAnnual(Volume1),London:WestviewPress,147-179.
Teusch,Ulrich(2000):"TechnikundinternationalePolitik",in:WichardWoyke(Hg.
):Handwrter-buchInternationalePolitik,8.
Aufl.
,Opladen:Leske+Budrich,407-416.
TheAge(2007):"EUShouldClassCyberAttacksasTerrorism:Estonia",08.
06.
2007,http://www.
theage.
com.
au/news/Technology/EU-should-class-cyber-attacks-as-terrorism-Estonia/2007/06/08/1181089253367.
html(28.
05.
2011).
TheAssociatedPress(2009):"OfficialsSayNorthKoreaBelievedbehindCyberAttacksonSKo-rean,USWebSites",08.
07.
2009,http://www.
trurodaily.
com/Living/World/2009-07-08/article-353120/Officials-say-North-Korea-believed-behind-cyber-attacks-on-SKorean,-US-Web-sites/1(11.
08.
2011).
3909LiteraturTheChinaPost(2011):"Cross-StraitCooperationCitedasKeyinFightagainstCrime:Police",03.
03.
2011,http://www.
chinapost.
com.
tw/taiwan/china-taiwan-relations/2011/03/03/293186/Cross-strait-cooperation.
htm(14.
08.
2011).
TheCitizenLap(2007):Everyone'sGuidetoBy-PassingInternetCensorshipforCitizensWorld-wide,Toronto,ON:UniversityofToronto.
TheEconomist(2009a):"AChineseGhostintheMachine",02.
04.
2009,http://www.
economist.
com/world/international/displaystory.
cfmstory_id=13416219(17.
11.
2010).
TheEconomist(2009b):"BattleisJoined",23.
04.
2009,http://www.
economist.
com/node/-13527677story_id=13527677(17.
11.
2010).
TheEconomist(2008):"MarchingofftoCyberwar",04.
12.
2008,http://www.
economist.
com/node/-12673385(17.
11.
2010).
TheEconomist(2007):"AWorldWideWebofTerror–InternetJihad",14.
07.
2007,http://www.
economist.
com/node/9472498(15.
03.
2011).
TheGlobalTimes(2011):"Poll:ChinaShouldBoostCyberDefenses",21.
06.
2011,http://www.
globaltimes.
cn/NEWS/tabid/99/articleType/ArticleView/articleId/662619/Poll-China-should-boost-cyber-defenses.
aspx(17.
08.
2011).
TheGuardian(2011):"GovernmentPlansCyberWeaponsProgramme",31.
05.
2011,http://www.
guardian.
co.
uk/government-computing-network/2011/may/31/government-plans-cyber-weapons-programme(09.
06.
2011).
TheNewYorkTimes(2011a):"BradleyE.
Manning",03.
03.
2011,http://topics.
nytimes.
com-/top/reference/timestopics/people/m/bradley_e_manning/index.
htmlscp=4&sq=cables&st=cse(15.
03.
2011).
TheNewYorkTimes(2011b):"ASelectionfromtheCacheofDiplomaticDispatches:AfghanInsiderExplainsCorruption",24.
03.
2011,http://www.
nytimes.
com/interactive/2010/11/28/world/20101128-cables-viewer.
html#report/corruption-09KABUL3714(30.
03.
2011).
TheNewYorkTimes(2011c):"ASelectionfromtheCacheofDiplomaticDispatches:BidenDoubtsPakistan'sSupportforU.
S.
Goals",24.
03.
2011,http://www.
nytimes.
com/interactive/2010/11/28/world/20101128-cables-viewer.
html#report/pakistan-09ISLAMABAD270(30.
03.
2011).
TheNewYorkTimes(2011d):"ASelectionfromtheCacheofDiplomaticDispatches:YemeniPresidentonU.
S.
MissileStrikes",24.
03.
2011,http://www.
nytimes.
com/interactive/2010/11/28/world/20101128-cables-viewer.
html#report/yemen-10SANAA4(30.
03.
2011).
TheNewYorkTimes(2011e):"ASelectionfromtheCacheofDiplomaticDispatches:AnInsideAccountofTunesianCorruption",24.
03.
2011,http://www.
nytimes.
com/interactive/2010/11/28/world/20101128-cables-viewer.
html#report/tunisia-09TUNIS372(30.
03.
2011).
TheNewYorkTimes(2011f):"ASelectionfromtheCacheofDiplomaticDispatches:ChineseTiestotheWorldofComputerHackers",http://www.
nytimes.
com/interactive/2010/11/28/world/20101128-cables-viewer.
html#report/china-09STATE67105(14.
04.
2011).
TheNewYorkTimes(2011g):"ASelectionfromtheCacheofDiplomaticDispatches:"ChineseGovernmentSinglesoutGoogle",http://www.
nytimes.
com/interactive/2010/11/28/world/20101128-cables-viewer.
html#report/china-99BEIJING999(07.
06.
2011).
TheNewYorkTimes(2010a):"TextofaSelectionoftheSecretDispatches",http://www.
nytimes.
com/interactive/world/26warlogs.
html(15.
03.
2011).
9.
1Literatur391TheNewYorkTimes(2010b):"SecretDispatchesfromtheWarinIraq",http://www.
nytimes.
com/interactive/world/iraq-war-logs.
html(15.
03.
2011).
Theohary,CatherineA.
/Rollins,John(2011):TerroristUseoftheInternet:InformationOperationsinCyberspace,Washington,DC:CongressionalResearchService,http://www.
fas.
org/sgp/crs/terror/R41674.
pdf(05.
05.
2011).
TheSecDevGroup(2011):CollusionandCollision:SearchingforGuidanceinChineseCyberspace,20.
09.
2011,http://www.
scribd.
com/doc/65531793/Collusion-Collision(14.
12.
2011).
TheSecDevGroup/TheCitizenLab(2009):TrackingGhostNet:InvestigatingaCyberEspionageNetwork,Toronto/Ottawa,http://www.
nartv.
org/mirror/ghostnet.
pdf(03.
03.
2010).
TheSidneyMorningHerald(2011):"LibyaGoesDarkasInternetShutDown",05.
03.
2011,http://www.
smh.
com.
au/technology/technology-news/libya-goes-dark-as-internet-shut-down-20110305-1bijf.
html(10.
04.
2011).
TheWallStreetJournal(2011):"CommunicationBlockCostEgypt$90Million–OECD",03.
02.
2011,http://online.
wsj.
com/article/BT-CO-20110203-718927.
html(15.
03.
2011).
TheWashingtonTimes(2009):"Iran'sTwitterRevolution",16.
06.
2009,http://www.
washingtontimes.
com/news/2009/jun/16/irans-twitter-revolution/(10.
04.
2011).
TheWashingtonTimes(2008):"HackingonHillTracedtoChina",12.
06.
2008,http://www.
washingtontimes.
com/news/2008/jun/12/hacking-on-hill-traced-to-china/page=all(16.
08.
2011).
TheWhiteHouse(2011a):InternationalStrategyforCyberspace:Prosperity,Security,andOpenessinaNetworkedWorld,May2011,http://www.
whitehouse.
gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.
pdf(13.
06.
2011).
TheWhiteHouse(2011b):JointStatementbyCybersecurityCoordinatorSchmidtandDeputySecre-taryKlimashin,Washington,DC,http://www.
whitehouse.
gov/sites/default/files/uploads/2011_klimashin_schmidt_cyber_joint_statement.
pdf(25.
08.
2011).
TheWhiteHouse(2011c):ExecutiveOrder13587:StructuralReformstoImprovetheSecurityofClassifiedNetworksandtheResponsibleSharingandSafeguardingofClassifiedInformation,07.
10.
2011,http://www.
whitehouse.
gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks-(14.
12.
2011).
TheWhiteHouse(2009a):RemarksbythePresidentonSecuringourNation'sCyberInfrastructure,Washington,DC,http://www.
whitehouse.
gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/(22.
11.
2010).
TheWhiteHouse(2009b):CyberspacePolicyReview,Washington,DC,http://www.
whitehouse.
gov/assets/documents/Cyberspace_Policy_Review_final.
pdf(10.
05.
2011).
Thiele,Rolf(2008):VernetzteSicherheit.
berdieKonzeptionengesamtstaatlichenZusammenwir-kens",sterreichischeMilitrischeZeitschrift,48(3),299-308.
Thomas,ThomasK.
(2010):GovtBansImportofChineseTelecomEquipment",TheHinduBusi-nessLine,28.
04.
2010,http://www.
thehindubusinessline.
com/todays-paper/article990404.
eceref=archive(01.
07.
2011).
Thomas,TimothyL.
(2009a):"PLAComputerNetworkOperations:Scenarios,Doctrine,Organiza-tionsandCapability",in:RoyKamphausen/DavidLai/AndrewScobell(Hg.
):BeyondtheStrait:PLAMissionsotherthanTaiwan,Carlisle,PA:StrategicStudiesInstitute,253-285.
Thomas,TimothyL.
(2009b):"Nation-stateCyberStrategies:ExamplesfromChinaandRussia",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSe-curity,Washington,DC:NationalDefenseUniversityPress,465-488.
Thomas,TimothyL.
(2001a):"China'sElectronicStrategies",MilitaryReview,Mai/Juni2001,47-54.
3929LiteraturThomas,TimothyL.
(2001b):"TheRussianUnderstandingofInformationOperationsandInforma-tionWarfare",in:DavidS.
Alberts/DavidS.
Papp(Hg.
):InformationAgeAnthology:VolumeIII:TheInformationAgeMilitary,Washington,DC:DepartmentofDefense:777-815.
Thomas,TimothyL.
(2000):LikeAddingWingstotheTiger:ChineseInformationWarTheoryandPractice,ForeignMilitaryStudiesOffice,FortLeavenworth,KS,http://libweb.
uoregon.
edu/ec/e-asia/read/tigerwings.
pdf(22.
11.
2010).
Thomas,TimothyL.
(1996):"RussianViewsonInformationBasedWarfare",AirpowerJournal,SpecialEdition,http://www.
airpower.
au.
af.
mil/airchronicles/apj/apj96/spec96/thomas.
html(11.
08.
2011).
Thompson,Bill(2011):"FreedomSacrificedforanEasyLife,inApple'sBraveNewWorld",IndexonCensorship,07.
03.
2011,http://www.
indexoncensorship.
org/2011/03/freedom-sacrficed-for-an-easy-life-in-apples-brave-new-world/(15.
03.
2011).
Thompson,Mark/Waller,Douglas(1995):"OnwardCyberSoldiers",Time,21.
08.
1995,http://www.
time.
com/time/magazine/article/0,9171,983318,00.
html(17.
11.
2010).
Thompson,Paul(2010):"ObamatoBeGiventheRighttoShutDowntheInternetwith'KillSwitch'",DailyMail,25.
06.
2010,http://www.
dailymail.
co.
uk/sciencetech/article-1287695/Obama-given-right-shut-internet-kill-switch.
html(01.
06.
2011).
Thomson,Amy/Hutton,Robert(2011):"U.
K.
MayBlockTwitter,BlackberryMessagingServicesinFutureRiots",Bloomberg,11.
08.
2011,http://www.
bloomberg.
com/news/2011-08-11/u-k-may-block-twitter-blackberry-messaging-services-in-future-riots.
html(13.
08.
2011).
Thornburg,Nathan(2005):"TheInvasionofChineseCyberspies",Time,29.
08.
2005,http://www.
time.
com/time/magazine/article/0,9171,1098961,00.
html(17.
11.
2010).
Thornton,Rod(2007):AsymmetricWarfare:ThreatandResponseintheTwenty-FirstCentury,Cambridge:PolityPress.
Tkacik,John(2008):TrojanDragon:China'sCyberThreat,Washington,DC:TheHeritageFounda-tion,http://www.
heritage.
org/research/reports/2008/02/trojan-dragon-chinas-cyber-threat#_ftn11(22.
11.
2010).
Toffler,Alvin(1990)[1980]:TheThirdWave,NewYork,NYetal.
:BantamBooks.
Toffler,Alvin(1970):FutureShock,NewYork:RandomHouse.
Tomlinson,Chris(2001):"VisionofWarfareFutureasUSandChinaSwapCyberAttacks",Bir-minghamPost,08.
05.
2001,21.
Traynor,Ian(2007):"RussiaAccusedofUnleashingCyberwartoDisableEstonia",TheGuardian,17.
05.
2007,http://www.
guardian.
co.
uk/world/2007/may/17/topstories3.
russia(28.
05.
2011).
Trendle,Giles(2002):"TheE-JihadagainstWesternBusiness",IT-Director.
com,05.
04.
2002,http://www.
it-director.
com/content.
phpcid=2707(19.
11.
2010).
Triepel,Heinrich(1938):DieHegemonie:EinBuchvonführendenStaaten,Stuttgart:Kohlhammer.
Tripathy,Devidutta/Mukherjee,Krittivas(2010):RIMAllowsInterimDataInterceptioninIndia",TheGlobeandMail,29.
10.
2010,http://www.
theglobeandmail.
com/news/technology/rim-allows-interim-data-interception-in-india/article1777880/(04.
11.
2010).
Tsui,Lokman(2008):TheGreatFirewallasIronCurtain2.
0:TheImplicationsofChina'sInternetmostDominantMetaphorforU.
S.
ForeignPolicy,Philadelphia,PA:UniversityofPhiladel-phia,http://jmsc.
hku.
hk/blogs/circ/files/2008/06/tsui_lokman.
pdf(03.
06.
2011).
Turner,Fred(2006):FromCounterculturetoCyberculture:StewartBrand,theWholeEarthNet-work,andtheRiseofDigitalUtopianism,Chicago,IL:UniversityofChicagoPress.
Tversky,Amos/Kahnemann,Daniel(1982):"JudgmentsofandbyRepresentativeness",in:DanielKahnemann/PaulSlovic/AmosTversky(Hg.
):JudgementunderUncertainty:HeuristicsandBiases,NewYork:CambridgeUniversityPress,84-100.
Tversky,Amos/Kahnemann,Daniel(1974):"JudgementunderUncertainty:HeuristicsandBiases",Science,185,1124-1131.
9.
1Literatur393Tversky,Amos/Kahnemann,Daniel(1973):"Availability:AHeuristicforJudgingFrequencyandProbability",CognitivePsychology,5,207-232.
T-online.
de(2011):"RSAtauschtnachHackerangriff40MillionenSicherheitsschlüsselaus",08.
06.
2011,http://computer.
t-online.
de/rsa-superschluessel-geknackt-millionen-computersysteme-unsicher/id_47050104/index(04.
08.
2011).
Ungerleider,Neal(2011):"IndiaTurnstoChinatoFightCyberspies",Fastcompany.
com,28.
06.
2011,http://www.
fastcompany.
com/1763715/india-turns-to-china-to-fight-cyberspiespartner=rss(01.
07.
2011).
Ungoed-Thomas,Jonathan(1998):"How'DatastreamCowboy'TookU.
S.
totheBrinkofWar",TorontoStar,21.
04.
1998,A10.
UnitedNationsGeneralAssembly(2010):ReportoftheGroupofGovernmentalExpertsonDevel-opmentsintheFieldofInformationandTelecommunicationsintheContextofInternationalSecurity,A/65/201,30.
07.
2010,http://unhq-appspub-01.
un.
org/UNODA/Library.
nsf(10.
05.
2011).
UnitedNationsGeneralAssembly(2000):DevelopmentsintheFieldofInformationandTelecom-municationsintheContextofInternationalSecurity:ReportoftheSecretary-General,A/55/140,http://www.
un.
org/documents/ga/docs/55/a55140.
pdf(12.
08.
2011).
UnitedNationsGeneralAssembly(1998):DevelopmentsintheFieldofInformationandTelecom-municationsintheContextofInternationalSecurity,DraftResolution/DraftDecision:A/C.
1/53/L.
17/Rev.
1,http://unhq-appspub-01.
un.
org/UNODA/vote.
nsf(12.
05.
2011).
UPI(2010):"Israel'sNewStrategicArm:Cyberwarfare",19.
03.
2010,http://www.
upi.
com/Business_News/Security-Industry/2010/03/19/Israels-new-strategic-arm-Cyberwarfare/UPI-29701269021452/(22.
11.
2010).
USAirForce(2011):LegalReviewsofWeaponsandCyberCapabilities,27.
07.
2011,Washington,DC,http://www.
fas.
org/irp/doddir/usaf/afi51-402.
pdf(12.
08.
2011).
USAirForce(1998):InformationOperations,AirForceDoctrineDocument2.
5,Washington,DC,http://www.
dtic.
mil/doctrine/jel/service_pubs/afd2_5.
pdf(22.
11.
2010).
USAirForce(1997):AirForceBasicDoctrine,Washington,DC,http://www.
globalsecurity.
org/military/library/policy/usaf/afdd/afdd1.
pdf(22.
11.
2010).
USAirForce(1995):CornerstonesofInformationWarfare,Washington,DC,http://www.
c4i.
org/cornerstones.
html(22.
11.
2010).
USArmedServicesCommittee(2010):AdvanceQuestionsforLieutenantGeneralKeithAlexander,USANomineeforCommander,UnitedStatesCyberCommand,Washington,DC,http://www.
fas.
org/irp/congress/2010_hr/041510alexander-qfr.
pdf(12.
08.
2011).
USArmy(2005):TrainingandDoctrineCommand,CyberOperationsandCyberTerrorism,FortLeavenworth,KS,http://www.
fas.
org/irp/threat/terrorism/sup2.
pdf(14.
04.
2011).
USArmy(1996):InformationOperations,FieldManual100-6,Washington,DC,http://www.
iwar.
org.
uk/iwar/resources/usarmyio/fm100-6.
pdf(22.
11.
2010).
USCongress(2002):ABilltoDevelopandDeployTechnologiestoDefeatInternetJammingandCensorship,H.
R.
5524,introducedbyTomLantosandChristopherCox,http://www.
gpo.
gov/fdsys/pkg/BILLS-107hr5524ih/pdf/BILLS-107hr5524ih.
pdf(07.
06.
2011).
USDepartmentofAgriculture(o.
A.
):HackingU.
S.
GovernmentComputersfromOverseas,http://www.
da.
usda.
gov/pdsd/Security%20Guide/Spystory/Hacking.
htm#hacking(19.
11.
2010).
USDepartmentofCommerce(2011):RemarksatU.
S.
ChamberofCommerceonGlobalFlowofInformationontheInternet,16.
06.
2011,http://www.
commerce.
gov/news/secretary-speeches/2011/06/16/remarks-us-chamber-commerce-global-flow-information-internet(25.
06.
2011).
USDepartmentofDefense(2011):DepartmentofDefenseStrategyforOperatinginCyberspace,July2011,Washington,DC,http://www.
defense.
gov/news/d20110714cyber.
pdf(01.
08.
2011).
3949LiteraturUSDepartmentofDefense(2010):QuadrennialDefenseReview,Washington,DC,http://www.
defense.
gov/QDR/QDR%20as%20of%2029JAN10%201600.
pdf(22.
11.
2010).
USDepartmentofDefense(2006a):QuadrennialDefenseReview,Washington,DC,http://www.
globalsecurity.
org/military/library/policy/dod/qdr-2006-report.
pdf(22.
11.
2010).
USDepartmentofDefense(2006b):TheNationalMilitaryStrategyforCyberspaceOperations,Washington,DC,http://www.
bits.
de/NRANEU/others/strategy/07-F-2105doc1.
pdf(14.
08.
2011).
USDepartmentofDefense(2006c):InformationOperations,DoDDirective0-3600.
1,Washington,DC,http://ia600401.
us.
archive.
org/1/items/InformationOperations/info_ops.
pdf(19.
08.
2011).
USDepartmentofDefense(2003):InformationOperationsRoadmap,Washington,DC,http://www.
gwu.
edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.
pdf(03.
03.
2010).
USDepartmentofDefense(2001a):QuadrennialDefenseReview,Washington,DC,http://www.
defenselink.
mil/pubs/pdfs/qdr2001.
pdf(22.
11.
2010).
USDepartmentofDefense(2001b):NuclearPostureReview,Washington,DC,Auszügeunterhttp://www.
globalsecurity.
org/wmd/library/policy/dod/npr.
htm(22.
11.
2010).
USDepartmentofDefense(1999):AnAssessmentofInternationalLegalIssuesinInformationOperations,Washington,DC.
USDepartmentofDefense(1998):JointDoctrineforInformationOperations,JointPub3-13,Washington,DC,http://www.
c4i.
org/jp3_13.
pdf(03.
03.
2010).
USDepartmentofDefense(1997):QuadrennialDefenseReview,Washington,DC,http://www.
fas.
org/man/docs/qdr/(22.
11.
2010).
USDepartmentofDefense(1996a):InformationWarfare:AStrategyforPeace–TheDecisiveEdgeforWar,Washington,DC,http://www.
dtic.
mil/cgi-bin/GetTRDocAD=ADA318379&Location=U2&doc=GetTRDoc.
pdf(22.
11.
2010).
USDepartmentofDefense(1996b):JointVision2010,Washington,DC,http://www.
dtic.
mil/jv2010/jv2010.
pdf(22.
11.
2010).
USDepartmentofHomelandSecurity(2010):MemorandumofAgreementbetweentheDepartmentofHomelandSecurityandtheDepartmentofDefenseRegardingCybersecurity,Washington,DC,http://www.
dhs.
gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.
pdf(15.
08.
2011).
USDepartmentofJustice(2011):TheFederalBureauofInvestigation'sAbilitytoAddresstheNationalSecurityCyberIntrusionThreat,Washington,DC,http://www.
justice.
gov/oig/reports/FBI/a1122r.
pdf(22.
08.
2011).
USDepartmentofState(2011):"InternetRightsandWrongs:Choices&ChallengesinaNetworkedWorld",SecretaryofStateHillaryRodhamClinton,15.
02.
2011,http://www.
state.
gov/secretary/rm/2011/02/156619.
htm(04.
06.
2011).
USDepartmentofState(2010a):"RemarksonInternetFreedom",SecretaryofStateHillaryRodhamClinton,21.
01.
2010,http://www.
state.
gov/secretary/rm/2010/01/135519.
htm(17.
11.
2010).
USDepartmentofState(2010b):"BriefingonInternetFreedomand21stCenturyStatecraft",Mi-chaelH.
Posner/AlecRoss,22.
01.
2010,http://www.
state.
gov/g/drl/rls/rm/2010/134306.
htm(03.
06.
2011).
USEmbassyTallinn(2007a):Estonia'sCyberAttacks:World'sFirstVirtualAttackagainstNationState,04.
06.
2007,CableverffentlichdurchWikiLeaks,abrufbarunterhttp://WikiLeaks.
ch/cable/2007/06/07TALLINN366.
html(28.
05.
2011).
USEmbassyTallinn(2007b):Estonia:GOEOfficialsontheBronzeSolider,RussiaandIntegration,11.
05.
2007,CableverffentlichtdurchWikiLeaks,abrufbarunterhttp://aebr.
home.
xs4all.
nl/wl/tallinn/07Talinn/07TALLINN310.
html(28.
05.
2011).
USEmbassyTallinn(2007c):RussianBearHugSqueezesEstonianEconomy,24.
05.
2007,CableverffentlichtdurchWikiLeaks,abrufbarunterhttp://77aebr.
home.
xs4all.
nl/wl/tallinn/07TALLINN347.
html(28.
05.
2011).
9.
1Literatur395USEmbassyTallinn(2007d):Estonia'sCyberAttacks:LessonsLearned,06.
06.
2007,Cableverf-fenlichtdurchWikiLeaks,abrufbarunterhttp://WikiLeaks.
ch/cable/2007/06/07TALLINN375.
html(30.
05.
2011).
USGovernmentAccountabilityOffice(2010):Cyberspace:UnitedStatesFacesChallengesinAdressingGlobalCybersecurityandGovernance,GAO-10-606,Washington,DC,http://www.
gao.
gov/new.
items/d10606.
pdf(10.
05.
2011).
USGovernmentAccountabilityOffice(2005):InternetManagement:PrevalenceofFalseContactInformationforregisteredDomainNames,Washington,DC,http://www.
gao.
gov/new.
items/d06165.
pdf(11.
08.
2011).
USGovernmentPrintingOffice(2001):NominationofColinS.
PowelltobeSecretaryofState:HearingbeforetheCommitteeonForeignRelations,UnitedStatesSenate,17.
01.
2001,http://www.
gpo.
gov/fdsys/pkg/CHRG-107shrg71536/pdf/CHRG-107shrg71536.
pdf(02.
06.
2011).
USGovernmentPrintingOffice(2000):PublicPapersofthePresidentsoftheUnitedStates:Wil-liamJ.
Clinton,Buch1,http://www.
gpo.
gov/fdsys/pkg/PPP-2000-book1/html/PPP-2000-book1-doc-pg404.
htm(02.
06.
2011).
Usocial(o.
A.
a):FacebookMarketingServices,http://usocial.
net/facebook_marketing/(15.
03.
2011).
Usocial(o.
A.
b):TwitterMarketingServices,http://usocial.
net/twitter_marketing/(15.
03.
2011).
Vaidhyanathan,Siva(2011):TheGooglizationofEverything(andWhyWeShouldWorry),Berke-ley/LosAngeles,CA:UniversityofCaliforniaPress.
VanCreveld,Martin(1985):CommandinWar,Cambridge/London:HarvardUniversityPress.
Vascellaro,JessicaE.
/Dean,Jason/Gorman,Siobhan(2010):"GoogleWarnsofChinaExitoverHacking",TheWallStreetJournal,13.
0.
2010,http://online.
wsj.
com/article/SB126333757451026659.
html(03.
03.
2010).
Vasquez,JohnA.
(1983):"TheTangibilityofIssueandGlobalConflict:ATestofRosenau`sIssueAreaTypology",JournalofPeaceResearch,20(2),179-192.
Vatis,MichealV.
(2010):"TheCouncilofEuropeConventiononCybercrime",in:NationalRe-searchCouncil(Hg.
):ProceedingsofaWorkshoponDeterringCyberattacks:InformingStrategiesandDevelopingOptionsforU.
S.
Policy,Washington,DC:TheNationalAcademiesPress,207-224.
Vatis,MichaelV.
(2003):"InternationalCyber-SecurityCooperation:InformalBilateralModels",inJamesA.
Lewis(Hg.
):CyberSecurity:TurningNationalSolutionsintoInternationalCoopera-tion,Washington,DC:CSISPress,1-12.
Verenkotte,Clemens(2010):"WarumsichIsraelüberWikiLeaksfreut",tagesschau.
de,01.
12.
2010,http://www.
tagesschau.
de/ausland/WikiLeaks230.
html(15.
03.
2011).
Vertzberger,YaacovY.
I.
(1990):TheWorldintheirMinds:InformationProcessing,Cognition,andPerceptioninForeignPolicyDecisionMaking,Stanford,CA:StanfordUniversityPress.
Vijayan,Jaikumar(2009):"InternetWarfare:AreWeFocusingontheWrongThings",ComputerWorld,27.
04.
2009,http://www.
computerworld.
com/s/article/9131050/Internet_war-fare_Are_we_focusing_on_the_wrong_things_taxonomyId=13&pageNumber=1(16.
08.
2011).
Vicary,Simon/Sandler,Todd(2002):Weakest-LinkPublicGoods:GivingIn-kindorTransferringMoney",EuropeanEconomicReview,46(8),1501-1520.
Villeneuve,Nart(2010a):"BarrierstoCooperation:AnAnalysisoftheOriginsofInternationalEffortstoProtectChildrenOnline",in:RonaldDeibertetal.
(Hg.
):AccessControlled:TheShapingofPower,RightsandRuleinCyberspace,Cambridge,MA:TheMITPress,55-70.
Villeneuve,Nart(2010b):Koobface:InsideaCrimewareNetwork,TheSecDevGroup/InfowarMoni-tor,http://www.
infowar-monitor.
net/reports/iwm-koobface.
pdf(14.
08.
2011).
3969LiteraturVollrath,Ernst(1993):"CarlvonClausewitz:EinemitdemHandelnbefreundeteTheorie",in:GerhardVowinckel(Hg.
):Clausewitz-Kolloqium–TheoriedesKriegesalsSozialwissenschaft,Berlin:Duncker&Humblot,63-78.
Voss,JamesF.
/Dorsey,Ellen(1992):"PerceptionandInternationalRelations:AnOverview",in:EricSinger/ValerieM.
Hudson(Hg.
):PoliticalPsychologyandForeignPolicy,Boulder,CO:WestviewPress,3-30.
Waever,Ole(1995):"SecuritizationandDesecuritization",in:RonnieD.
Lipschutz(Hg.
):OnSecu-rity,NewYork:ColumbiaUniversityPress,46-86.
Waldmann,Peter(2005):Terrorismus:ProvokationderMacht,Hamburg:MurmannVerlag.
Walker,GeorgeK.
(2000):InformationWarfareandNeutrality",VanderbiltJournalofTransna-tionalLaw,33(5),1079-1200.
Walsh,Declan(2010):"PakistaniMediaPublishFakeWikiLeaksCablesAttackingIndia",TheGuardian,09.
12.
2010,http://www.
guardian.
co.
uk/world/2010/dec/09/pakistani-newspaper-fake-leaks-india(15.
03.
2011).
Walton,Gregory(2008):"YearoftheGh0stRAT",in:BeijingOlympics2008:WinningPressFreedom,ParisConference,http://www.
beijing2008conference.
com/articles.
phpid=101#3(10.
06.
2011).
Waltz,Edward(1998):InformationWarfare:PrinciplesandOperations,Norwood,MA:ArtechHouse.
Waltz,KennethN.
(2001)[1959]:Man,theState,andWar,2.
Aufl.
,ColumbiaUniversityPress,NewYork.
Waltz,KennethN.
(2000):"StructuralRealismaftertheColdWar",InternationalSecurity,25(1),5-41.
Waltz,KennthN.
(1990):"RealistThoughtandNeorealistTheory",JournalofInternationalAffairs,44(1),21-37.
Waltz,KennethN.
(1986):"AResponsetomyCritics",in:RobertO.
Keohane(Hg.
):NeorealismanditsCritics,NewYork:ColumbiaUniversityPress.
Waltz,KennethN.
(1979):TheoryofInternationalPolitics,NewYork:McGraw-Hill.
Wang,Jian-Wei/Rong,Li-Li(2009):"Cascade-basedAttackVulnerabilityontheUSPowerGrid",SafetyScience,47(10),1332-1336.
Wang,ShaojungS.
/Hong,Junhao(2010):"DiscoursebehindtheForbiddenRealm:InternetSurveil-lanceanditsImplicationsonChina'sBlogosphere",TelematicsandInformatics,27(1),67-78.
Warren,Pete(2009):"USandUKPrepareFightbackagainstEasternHackers",TheGuardian,04.
06.
2009,http://www.
guardian.
co.
uk/technology/2009/jun/04/hacking-security-authorities(16.
08.
2011).
Warrick,Joby(2011):"Iran'sNatanzNuclearFacilityRecoveredQuicklyfromStuxnetCyberat-tack",TheWashingtonPost,16.
02.
2011,http://www.
washingtonpost.
com/wp-dyn/content/article/2011/02/15/AR2011021505395.
html(15.
03.
2011).
Warrick,Joby/Pegoraro,Rob(2010):"WikiLeaksAvoidsShutdownasSupportersWorldwideGoontheOffensive",TheWashingtonPost,08.
12.
2010,http://www.
washingtonpost.
com/wp-dyn/content/article/2010/12/08/AR2010120804038.
htmlhpid=topnews(15.
03.
2011).
WashingtonTimes(2008):"OnlineWarfareResearchOutlined",15.
05.
2008,http://www.
washingtontimes.
com/news/2008/may/15/online-warfare-research-outlined/(22.
11.
2010).
Waterman,Shaun(2009):"July4CyberattackCalledveryminor'",TheWashingtonTimes,http://www.
washingtontimes.
com/news/2009/jul/16/july-4-cyberattack-called-very-minor/(17.
11.
2010).
Waterman,Shaun(2008):"Analysis:Russia-GeorgiaCyberwarDoubted",Spacewar.
com,http://www.
spacewar.
com/reports/Analysis_Russia-Georgia_cyberwar_doubted_999.
html(31.
05.
2011).
9.
1Literatur397Watts,Jonathan(2009):"ChinaOrdersPCMakerstoInstallBlockingSoftware",TheGuardian,08.
06.
2009,http://www.
guardian.
co.
uk/world/2009/jun/08/web-blocking-software-china(09.
06.
2011).
Weber,Max(1980)[1921/22]:WirtschaftundGesellschaft:GrundriderverstehendenSoziologie,Tübingen:J.
C.
B.
Mohr.
Weber,Max(1984)[1921]:SoziologischeGrundbegriffe,Tübingen:J.
C.
B.
Mohr.
Webster,StephenC.
(2011):Revealed:AirForceOrderedSoftwaretoManageArmyofFakeVirtualPeople",TheRawStory,18.
02.
2011,http://www.
rawstory.
com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/(15.
03.
2011).
Weimann,Gabriel(2006):TerrorontheInternet:TheNewArena,theNewChallenges.
Washington,DC:UnitedStatesInstituteforPeacePress.
Weinberger,Sharon(2010):"WhatisSIPRnet",PopularMechanics,01.
12.
2010,http://www.
popularmechanics.
com/technology/how-to/computer-security/what-is-siprnet-and-WikiLeaks-4085507(15.
03.
2011).
Weiner,Tim(2008):CIA:DieganzeGeschichte,Frankfurta.
M.
:S.
Fischer.
Weie,Günther(2011):Totaleberwachung:Staat,WirtschaftundGeheimdiensteimInformations-kriegdes21.
Jahrhunderts,Graz:AresVerlag.
Weie,Günther(2007):Informationskrieg+CyberWar:DieunbekannteGefahr,Stuttgart:Motor-buch-Verlag.
Weiss,Aaron(2005):ThePowerofCollectiveIntelligence",networker,9(3),http://delivery.
acm.
org/10.
1145/1090000/1086763/p16-weiss.
pdfkey1=1086763&key2=0152998921&coll=DL&dl=ACM&ip=134.
95.
40.
14&CFID=10806503&CFTOKEN=48483332(01.
03.
2011).
Weitz,Richard(2011):"StateDepartmentGoesonCyberOffensive",SecondLineofDefense,05.
05.
2011,http://www.
sldinfo.
com/state-department-goes-on-cyber-offensive/(19.
09.
2011).
Welchering,Peter(2010):"WeggelschtundAbgedreht:DieEreignisseumdieWebprsenzvonWikiLeaks",Deutschlandfunk,04.
12.
2010,http://www.
dradio.
de/dlf/sendungen/computer/1334653/(15.
03.
2011).
Welch-Larson,Deborah(1988):ThePsychologyofReciprocityininternationalRelations",Nego-tiationJournal,4(3),281-301.
Werber,Niklas(2007):DieGeopolitikderLiteratur:EineVermessungdermedialenWeltraumord-nung,München:Hanser.
White,Leslie(1949):TheScienceofCulture,NewYork:Farrar,Strauss&Giroux.
WikiLeaks(2011):VerffentlichungderPrsentation'TheWikiLeaksThreat',http://WikiLeaks.
ch/IMG/pdf/WikiLeaks_Response_v6.
pdf(15.
03.
2011).
Wilhelm,AnthonyG.
(2000):DemocracyintheDigitalAge:ChallengestoPoliticalLifeinCyber-space,NewYork:Routledge.
Williams,Chris(2009):"UKalready'MajorWorldPower'inCyberwar",TheRegister,01.
10.
2009,http://www.
theregister.
co.
uk/2009/10/01/borg_cyberwar/(22.
11.
2010).
Williams,Dan(2009):"WaryofNakedForce,IsraelisEyeCyberwaronIran",Reuters,07.
07.
2009,http://www.
alertnet.
org/thenews/newsdesk/LV83872.
htm(22.
11.
2010).
Williamson,CharlesW.
(2008):"CarpetBombinginCyberspace:WhyAmericaNeedsaMilitaryBotnet",ArmedForcesJournal,http://www.
armedforcesjournal.
com/2008/05/3375884(16.
08.
2011).
Wilson,Clay(2009):"CyberCrime",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,415-436.
Wilson,Clay(2003):ComputerAttackandCyberTerrorism:VulnerabilitiesandPolicyIssuesforCongress,Washington,DC:CongressionalResearchService,http://www.
fas.
org/irp/crs/RL32114.
pdf(22.
11.
2010).
3989LiteraturWingfield,ThomasC.
(2009):"InternationalLawandInformationOperations",in:FranklinD.
Kramer/StuartH.
Starr/LarryK.
Wentz(Hg.
)(2009):CyberpowerandNationalSecurity,Washington,DC:NationalDefenseUniversityPress,525-542.
Winner,Langdon(1986):TheWhaleandtheReactor:ASearchforLimitsinanAgeofHighTech-nology,Chicago/London:UniversityofChicagoPress.
Winner,Langdon(1977):AutonomousTechnology:Technics-out-of-ControlasaThemeinPoliticalThought,Cambridge,MA:TheMITPress.
Wolff,Reinhard(2010):"Wassichleakt,dasnecktsich",DieTageszeitung,26.
12.
2010,http://www.
taz.
de/!
63352/(30.
08.
2011).
Wong,Edward(2010):"ChinaRebuffsClintononInternetWarning",TheNewYorkTimes,22.
01.
2010,http://www.
nytimes.
com/2010/01/23/world/asia/23diplo.
html(12.
07.
2011).
Woodcock,Bill(2011):OverviewoftheEgyptianInternetShotdown,DHSInfosecTechnologyTransitionCouncil,http://www.
pch.
net/resources/misc/Egypt-PCH-Overview.
pdf(10.
04.
2011).
WorldPublicOpinion.
org(2008):WorldPublicOpiniononFreedomoftheMedia,UniversityofMaryland,http://www.
worldpublicopinion.
org-/pipa/pdf/apr09/WPO_PressFreedom_Apr09_packet.
pdf(17.
08.
2011).
Wortham,Jenna(2010):"AppleBansSomeAppsforSex-TingedContent",TheNewYorkTimes,23.
02.
2010,http://www.
nytimes.
com/2010/02/23/technology/23apps.
html(03.
03.
2010).
Wortzel,LarryM.
(2010):China'sApproachtoCyberOperations:InplicationsfortheUnitedStates,TestimonybeforetheCommitteeonForeignAffairs,10.
03.
2010,Washington,DC,http://www.
internationalrelations.
house.
gov/111/wor031010.
pdf(10.
08.
2011).
Wriston,WalterB.
(1997):"Bits,Bytes,andDiplomacy",ForeignAffairs,September/Oktober1997,http://www.
foreignaffairs.
com/articles/53397/walter-b-wriston/bits-bytes-and-diplomacy(14.
04.
2011).
Wu,Shaomeietal.
(2011):"WhoSaysWhattoWhomonTwitter",InternationalWorldWideWebConferenceCommittee(IW3C2),Hyderabad(India),http://research.
yahoo.
com/pub/3386(10.
04.
2011).
Wu,Tim(2011):TheMasterSwitch:TheRiseandFallofInformationEmpires,NewYork:AlfredA.
Knopf.
Xinhua(2011):"ChinaBecomesmajorVictimofCyberattacks",10.
08.
2011,http://www.
china.
org.
cn/china/2011-08/10/content_23182277.
htm(16.
08.
2011).
York,JillianC.
(2010a):"WikiLeaksandtheHazardsof'IntermediaryCensorship'",IndexonCensorhip,03.
12.
2010,http://www.
indexoncensorship.
org/2010/12/WikiLeaks-intermediary-censorship/(15.
03.
2011).
York,JilianC.
(2010b):PolicingContentintheQuasi-PublicSphere,Cambridge,MA:OpenNetInitiative,http://opennet.
net/sites/opennet.
net/files/PolicingContent.
pdf(15.
03.
2011).
Young,OranR.
(1999):GovernanceinWorldAffairs,London:CornellUniversityPress.
Young,OranR.
(1982):"RegimeDynamics:TheRiseandFallofinternationalRegimes",Interna-tionalOrganization,36(2),277-297.
Yu,Quincy(2011):"AbortedChinese'JasmineRevolution'aTrapSaysAnalysts",EpochTimes,22.
02.
2011,http://www.
theepochtimes.
com/n2/china/aborted-chinese-jasmine-revolution-a-trap-say-analysts-51732.
html(01.
08.
2011).
Zimmerman,William(1973):"IssueAreaandForeign-PolicyProcess:AResearchNoteinSearchofaGeneralTheory",AmericanPoliticalScienceReview,67(4),1204-1212.
Zangl,Bernhard(1999):InteressenaufzweiEbenen:InternationaleRegimeinderAgrarhandels-,Whrungs-undWalfangpolitik,BadenBaden:Nomos.
Zanini,Michele/Edwards,SeanJ.
A.
(2001):TheNetworkingofTerrorintheInformationAge",in:JohnArquilla/DavidRonfeldt(Hg.
):NetworksandNetwar:TheFutureofTerror,CrimeandMilitancy,SantaMonica,CA:RAND,29-63.
9.
1Literatur399Zartman,William(1995):CollapsedStates:TheDisintegrationandRestorationofLegitimateAu-thority,Boulder,CO:LynneRienner.
ZeitOnline(2011):Assange-AnwaltmachtDomscheit-BergVorwürfe",01.
09.
2011,http://www.
zeit.
de/digital/internet/2011-08/anwalt-assange-domscheit-berg/seite-1(01.
09.
2011).
Zekri,Sonja(2011):"WikilaksinRussland:WennPirateninPutinsPalastsurfen",SüddeutscheZeitung,23.
01.
2011,http://www.
sueddeutsche.
de/digital/WikiLeaks-in-russland-piraten-und-palastsurfer-1.
1050064(01.
07.
2011).
Zetter,Kim(2011):Exclusive:ComedyofErrorsLedtoFalseWater-PumpHack'Report",Wired,30.
11.
2011,http://www.
wired.
com/threatlevel/2011/11/water-pump-hack-mystery-solved/(02.
12.
2011).
Zetter,Kim(2010):"CountriesShouldbeHeldResponsibleforCyberAttacks",Wired,30.
07.
2010,http://www.
wired.
co.
uk/news/archive/2010-07/30/cyber-attack-countries(10.
06.
2011).
Zetter,Kim(2009a):"LawmakerWants'ShowofForce'againstNorthKoreaforWebsiteAttacks",Wired,10.
07.
2009,http://www.
wired.
com/threatlevel/2009/07/show-of-force/(11.
08.
2011).
Zetter,Kim(2009b):"LazyHackerandLittleWormSetOffCyberwarFenzy",Wired,08.
07.
2009,http://www.
wired.
com/threatlevel/2009/07/mydoom/(11.
08.
2011).
Zittrain,Jonathan(2008):TheFutureoftheInternet-andHowtoStopIt,London:PenguinBooks.
Zittrain,Jonathan/Palfrey,John(2008):"Introduction",in:RonaldDeibertetal.
(Hg.
):AccessDe-nied:ThePracticeandPolicyofGlobalInternetFiltering,Cambridge,MA:TheMITPress,1-4.
Zuckerman,Ethan(2011):"TheFirstTwitterRevolution",ForeignPolicy,14.
01.
2011,http://www.
foreignpolicy.
com/articles/2011/01/14/the_first_twitter_revolution(10.
04.
2011).
Zuckerman,Ethan(2010):"IntermediaryCensorship",in:RonaldDeibertetal.
(Hg.
):AccessCon-trolled:TheShapingofPower,RightsandRuleinCyberspace,Cambridge,MA:TheMITPress,71-85.
Zuckerman,Ethan(2008):"TheCuteCatTheoryTalkatETech",MyHeart'sinAccra(Blog),08.
03.
2008,http://www.
ethanzuckerman.
com/blog/2008/03/08/the-cute-cat-theory-talk-at-etech/(10.
04.
2011).
Zuckerman,Ethanetal.
(2010):DistributedDenialofServiceAttacksAgainstIndependentMediaandHumanRightsSites,Cambridge,MA:TheBerkmanCenterforInternet&Society,http://cyber.
law.
harvard.
edu/sites/cyber.
law.
harvard.
edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.
pdf,Anhangunterhttp://cyber.
law.
harvard.
edu/sites/cyber.
law.
harvard.
edu/files/DDoS%20Survey%20Public%20Results_0.
pdf(15.
04.
2011).
Zuckerman,M.
J.
(1998):"HackerPairIllustratePentagon'sVulnerability",USAToday,23.
03.
1996,3A.
Zürn,Michael(1993):ProblematicSocialSituationsandInternationalInstitutions:OntheUseofGameTheoryinInternationalPolitics",in:FrankR.
Pfetsch(Hg.
):InternationalRelationsandPan-Europe:TheoreticalApproachesandEmpiricalFindings,Münster/Hamburg:LIT-Verlag,63-84.
Zürn,Michael(1992):InteressenundInstitutioneninderinternationalenPolitik:GrundlegungundAnwendungendessituationsstrukturellenAnsatzes,Opladen:LeskeundBudrich.
Zürn,Michael/Wolf,Klaus-Dieter/Efinger,Manfred(1990):ProblemfelderundSituationsstruktureninderAnalyseinternationalerPolitik:EineBrückezwischendenPolen",in:VolkerRittber-ger(Hg.
):TheorienderinternationalenBeziehungen:BestandsaufnahmeundForschungsper-spektiven,SonderheftderPolitischenVierteljahresschrift(PVS),151-174.
9.
1Literatur40110Interviews13.
08.
2009ExperteninterviewmitehemaligemdeutschenVerbindungsbeamteninUS-Sicherheitsbehrde,Washington,DC.
27.
08.
2009,ExperteninterviewmiteinemMitarbeitereinesUS-Kongressausschusses,Washington,DC.
28.
08.
2009,ExperteninterviewmiteinemMitarbeitereinesUS-Kongressausschusses,Washington,DC.
31.
08.
2009ExperteninterviewmitMartinLibicki/RogerC.
Molander/StuartJohnson,RAND,Wa-shington,DC.
31.
08.
2009Experteninterview(telephonisch)miteinemExperteneinerNichtregierungsorganisationinKalifornien.
17.
09.
2009ExperteninterviewmitVertretereinesprivatenNachrichtendienstes,Washington,DC.
17.
09.
2009ExperteninterviewmitVertreterneinerUS-Behrde,Washington,DC.
21.
09.
2009,ExperteninterviewmiteinemMitarbeitereinesUS-Kongressausschusses,Washington,DC.
22.
09.
2009ExperteninterviewmitDavidE.
Collins/NeilJ.
O'Callaghan/RogerOsborn,US-Heimatschutzministerium,CyberCrimesCenter,Fairfax,VA.
23.
09.
2009ExperteninterviewmitJenaMcNeill,HeritageFoundation,Washington,DC.
24.
09.
2009,ExperteninterviewmitLetitiaM.
King/JeffreyN.
Trimble,BroadcastingBoardofGov-ernors(BBG),Washington,DC.
29.
09.
2009ExperteninterviewmitBrianWeeden,SecureWorldFoundation,Washington,DC.
01.
10.
2009ExperteninterviewmitJimHarper,CatoInstitute,Washington,DC.
02.
10.
2009ExperteninterviewmitCynthiaM.
Wong,CenterforDemocracyandTechnology(CDT),Washington,DC.
03.
05.
2011ExperteninterviewmitVertretereinerdeutschenSicherheitsbehrde.
30.
05.
2011ExperteninterviewmitehemaligemVertretereinerdeutschenSicherheitsbehrde.
20.
06.
2011ExperteninterviewmitVertretereinerdeutschenSicherheitsbehrde.
21.
06.
2011ExperteninterviewmitVertretereinerdeutschenSicherheitsbehrde.
01.
07.
2011Experteninterview(telephonisch)mitVertretereinerdeutschenSicherheitsbehrde.
M.
Hansel,InternationaleBeziehungenimCyberspace,DOI10.
1007/978-3-658-00228-2,SpringerFachmedienWiesbaden2013
轻云互联成立于2018年的国人商家,广州轻云互联网络科技有限公司旗下品牌,主要从事VPS、虚拟主机等云计算产品业务,适合建站、新手上车的值得选择,香港三网直连(电信CN2GIA联通移动CN2直连);美国圣何塞(回程三网CN2GIA)线路,所有产品均采用KVM虚拟技术架构,高效售后保障,稳定多年,高性能可用,网络优质,为您的业务保驾护航。官方网站:点击进入广州轻云网络科技有限公司活动规则:1.用户购...
UCloud优刻得近日针对全球大促活动进行了一次改版,这次改版更加优惠了,要比之前的优惠价格还要低一些,并且新增了1核心1G内存的快杰云服务器,2元/首年,47元/年,这个价格应该是目前市面上最低最便宜的云服务器产品了,有需要国内外便宜VPS云服务器的朋友可以关注一下。UCloud好不好,UCloud服务器怎么样?UCloud服务器值不值得购买UCloud是优刻得科技股份有限公司旗下拥有的云计算服...
今天父亲节我们有没有陪伴家人一起吃个饭,还是打个电话问候一下。前一段时间同学将网站账户给我说可以有空更新点信息确保他在没有时间的时候还能保持网站有一定的更新内容。不过,他这个网站之前采用的主题也不知道来源哪里,总之各种不合适,文件中很多都是他多年来手工修改的主题拼接的,并非完全适应WordPress已有的函数,有些函数还不兼容最新的PHP版本,于是每次出现问题都要去排查。于是和他商量后,就抽时间把...
lulzsec为你推荐
摩拜超15分钟加钱首次 微信扫 摩拜单车 需要 付压金吗地图应用什么地图导航最好用最准确777k7.comwww.777tk.com.怎么打不 开杨丽晓博客明星的最新博文机器蜘蛛有谁知道猎人的机械蜘蛛在哪捉的www.175qq.com最炫的qq分组www.1diaocha.com请问网络上可以做兼职赚钱吗?现在骗子比较多,不敢盲目相信。请大家推荐下关键词分析如何进行关键词指数分析222cc.com求都市后宫小说、越多越好bihaiyinshaBailo 是什么意思?
二级域名申请 n点虚拟主机管理系统 免费cn域名 bandwagonhost 美国翻墙 全球付 国外idc 表单样式 免费网站监控 网页背景图片 ibox官网 免费个人空间申请 帽子云 日本bb瘦 免费全能主机 100m独享 服务器硬件防火墙 卡巴斯基免费试用版 美国盐湖城 域名转入 更多