Ameli, S. R., Hosseini, H. & Noori, F. (2019). Militarization of cyberspace, changing aspects of war in the 21
st century: The case of Stuxnet against Iran.
Iranian Review of Foreign Affairs, 10(1), 99-136. Retrieved from
https://irfajournal.csr.ir/article_126485_0e317d545f418eb25a18ee92bd0bc2f0.pdf
Banks, W. C. (2017). Cyber espionage and electronic surveillance: Beyond the media coverage.
Emory Law Journal, 66(3)
, 513-525. Retrieved from
https://law.emory.edu/elj/_documents/volumes/66/3/banks.pdf
Beach, D. & Pederson, R. B. (2013).
Process-tracing methods: Foundations and guidelines. The University of Michigan Press.
https://doi.org/10.3998/mpub.10072208
Ben-Israel, I. & Tabansky, L. (2014). An interdisciplinary look at security challenges in the information age. In G. Siboni (Ed.). Cyberspace and national security selected articles II (pp. 51-67). INSS Institute for National Security Studies.
Bennett, A. (2010). Process tracing and causal inference. In H. Brady & D. Collier (Eds.), Rethinking Social Inquiry (pp. 207-219). Rowman and Littlefield.
Bennett, A. & Checkel, J. T. (2012).
Process tracing: From philosophical roots to best practices. Simons Papers in Security and Development, No. 21/2012, School for International Studies, Simon Fraser University. Retrieved from
https://summit.sfu.ca/_flysystem/fedora/sfu_migrate/14884/SimonsWorkingPaper21.pdf
Braman, S. (2006). Change of state: Information, policy and power. The MIT Press.
Braman, S. (2011). Defining information policy, Journal of Information Policy, 1(1), 1-5. Retrieved from http://scholarlypublishingcollective.org/psup/information-policy/article-pdf/doi/10.5325/jinfopoli.1.2011.0001/1610440/jinfopoli_1_2011_1.pdf
Breslow, K. (2014).
Obama on mass government surveillance, then and now. Frontline. Retrieved from
https://www.pbs.org/wgbh/frontline/article/obama-on-mass-government-surveillance-then-and-now/
Brier, Jr., Th. F. (2017). Defining the limits of governmental access to personal data stored in the cloud: An analysis and critique of Microsoft Ireland.
Journal of Information Policy, 7, 327-371.
https://doi.org/10.5325/jinfopoli.7.2017.0327
Butler, D. L. (2001). Technogeopolitics and the struggle for control of world air routes, 1910-1928.
Political Geography, 20(5), 635–658.
https://doi.org/10.1016/S0962-6298(01)00006-3
Buzan, B. & Hansen, L. (2009).
The evolution of international security studies (eBook). Cambridge University Press. Retrieved from
http://103.214.54.122/repository/ The%20Evolution%20of%20International%20Security%20Studies.pdf
Buzan, B. & Little, R. (2000). International systems in world history: Remaking the study of international relations. Oxford University Press.
Buzan, B., Wæver, O. & de Wilde, J. (1998). Security: A New Framework for Analysis. London: Lynne Rienner.
Cavelty, M. D. (2007).
Cyber-security and threat politics: Us efforts to secure the information age (eBook). Taylor & Francis e-Library. Retrieved from
http://opac.lib.idu.ac.id/unhan-ebook/assets/uploads/files/530d1-cyber-security-and-threat-politics.pdf
Cayford, M. & Pieters, W. (2018). The effectiveness of surveillance technology: What intelligence officials are saying.
The Information Society, 34(2), 88-103.
https://doi.org/10.1080/01972243.2017.1414721
Choucri, N. & Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security.
Bulletin of the Atomic Scientists, 68(2), 70–77.
https://doi.org/10.1177/0096340212438696
Choukri, N. (2015).
Explorations in cyber international relations: A research collaboration of MIT and Harvard University. Massachusetts Institute of Technology Political Science Department, Research Paper No. 2016‐1. Retrieved from
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2727414
Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure (2009). Cybersecurity & Infrastructure Security Agency. Retrieved from
https://irp.fas.org/eprint/cyber-review.pdf
Darvishi, F. & Hatamzadeh, A. (2013). The process of US and EU confrontation with terrorism from different perceptions to collaboration. International Quarterly of Geopolitics, 9(2), 136-160. https://doi.org/20.1001.1.17354331.1392.9.30.5.8[in Persian].
Deeks, A. (2015). An international legal framework for surveillance.
Virginia Journal of International Law, 55(2), 291-368.
https://www.ilsa.org/Jessup/Jessup16/Batch%202/DeeksLegalFramework.pdf
Dunn, M. (2005, July). A Comparative Analysis of Cybersecurity Initiatives Worldwide. In
WSIS Thematic Meeting on Cybersecurity (pp. 1-32). International Telecommunications Union. Retrieved from
https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Background_Paper _Comparative_Analysis_Cybersecurity_Initiatives_Worldwide.pdf
Emmers, R. (2016). Securitization. In A. Collins (Ed.), Contemporary Security Studies (Fifth ed., originally in 2007) (pp. 168-181). oxford university press.
Etaat, J. & Dabiri, A. A. (2016). study of the spatial dimensions of terrorism.
International Quarterly of Geopolitics, 12(42), 24-47. Retrieved from
https://journal.iag.ir/article_55768_9a528a23ec4a4ffee7bc553b5922fdc1.pdf?lang=en
Executive Office of the President. (2012, Mar. 29). Obama Administration Unveils "Big Data" Initiative: Announces $200 Million in New R&D Investments. Retrieved from https://obamawhitehouse.archives.gov/the-press-office/2015/11/19/release-obama-administration-unveils-big-data-initiative-announces-200
Friedman, B. & Hendry, D. G. (2019). Value sensitive design: Shaping technology with moral imagination. The MIT Press.
Fuerth, L. (2009). Cyberpower from the presidential perspective. In F. D. Kramer, S. H. Starr, and L. K. Wentz,
Cyberpower and National Security (pp. 557-562). Center for Technology and National Security Policy, National Defense University Press, Potomac Books Inc. Retrieved from
https://ndupress.ndu.edu/Portals/68/Documents/Books/CTBSP-Exports/Cyberpower/Cyberpower-I-Chap-02.pdf?ver=2017-06-16-115052-210
Galante, L. (2024, Dec. 12).
Laura Galante, Intelligence Community’s Cyber Executive and Director of the Cyber Threat Intelligence Integration Center (CTIIC), Office of the Director for National Intelligence, United States [Interview/ Interviewer: A. R. Choudhury]. Retrieved from
https://govinsider.asia/intl-en/article/laura-galante-intelligence-communitys-cyber-executive-and-director-of-the-cyber-threat-intelligence-integration-center-ctiic-office-of-the-director-for-national-intelligence-united-states
Gilchrist, A. (Ed.). (2009). Information science in transition. Facet Publishing.
Gill, A. (2018). Data surveillance: Need for a policy to achieve equilibrium between state and individual interest.
Nirma University Law Journal, 6(2), 57-69.
https://ssrn.com/abstract=3442993
Greenwald, G. & MacAskill, E. (2013a, Jun. 7). NSA prism program taps in to user data of apple, Google, and others.
The Guardian. Retrieved from
https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
Greenwald, G., & MacAskill, E. (2013b, Jun. 11). Boundless informant: the NSA’s secret tool to track global surveillance data.
The Guardian. Retrieved from
https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining
Herrera, G. L. (2006). Technology and international transformation: The railroad, the atom bomb, and the politics of technological change. State University of New York Press.
Holt, J. & Malčić, S. (2015). The privacy ecosystem: Regulating digital identity in the United States and European Union.
Journal of Information Policy, 5, 155-178.
https://doi.org/10.5325/jinfopoli.5.2015.0155
Issitt, M. L. & DiLascio, T. M. (2024). Government surveillance: overview. ebsco knowledge advantage. Retrieved from https://www.ebsco.com/research-starters/law/government-surveillance-overview
ITU (2019). Trends in the number of individuals using the internet, usage of mobile cellular phones, and active mobile broadband subscriptions. Retrieved from
https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx
Jones, K. M. L., Asher, A., Goben, A., Perry, M. R., Salo, D., Briney, K. A. & Robertshaw, M. B. (2020). “We're being tracked at all times”: Student perspectives of their privacy in relation to learning analytics in higher education. Journal of the Association for Information Science and Technology, 71(9), 1044–1059. http://dx.doi.org/10.2139/ssrn.3565553
Kiernan, C. J. & Mueller, M. L. (2021). Standardizing security: Surveillance, human rights, and the battle over Tls 1.3.
Journal of Information Policy, 11, 1-25.
https://doi.org/10.5325/jinfopoli.11.2021.0001
Königs, P. (2022). Government surveillance, privacy, and legitimacy.
Philosophy & Technology,
35(8), 1-22.
https://doi.org/10.1007/s13347-022-00503-9
Krauthamme, Ch. (1990/1991). The unipolar moment.
Foreign Affairs, 70(1), 23-33.
https://doi.org/10.2307/20044692
Kuehl, D. T. (2009). From cyberspace to cyberpower: Defining the problem. In F. D. Kramer, S. H. Starr and L. K. Wentz (eds)
Cyberpower and National Security (pp. 24-42). Center for Technology and National Security Policy, National Defense University Press, Potomac Books Inc. Retrieved from
https://ndupress.ndu.edu/Portals/68/Documents/Books/CTBSP-Exports/Cyberpower/Cyberpower-I-Chap-02.pdf?ver=2017-06-16-115052-210
Lashgari, E. (2016). Explanation of the strategic importance of cyber space management and geographic zone control.
International Quarterly of Geopolitics, 12(2), 105-123
. https://dor.org/20.1001.1.17354331.1395.12.42.5.3 [in Persian]
Layne, Ch. (1993). The unipolar illusion: Why new great powers will rise. International Security, 17(4), 5-51.
Lee, N. (2015).
Counterterrorism and cybersecurity. Total information awareness (2
nd Ed.). Ebook.
https://doi.org/10.1007/978-3-319-17244-6
Lynn III, W. F. (2010). Defending a new domain: The Pentagon’s cyberstrategy.
Foreign Affairs, 89(5), 79-108. Retrieved from
https://www.foreignaffairs.com/articles/united-states/2010-09-01/defending-new-domain
Marandi, M. & Halalkhor, M. (2016). America and the securitization of Iran after the Islamic Revolution, 1979-2013: Continuation or change?
International Quarterly of Geopolitics, 11(40), 85-116.
https//dor.org/20.1001.1.17354331.1394.11.40.4.1
McCarthy, D. R. (2013). Technology and ‘the international’ or: How I learned to stop worrying and love determinism.
Millennium: Journal of International Studies, 41(3), 470–490.
https://doi.org/10.1177/0305829813484636
McCarthy, J. A., Burrow, Ch, Dion, M. & Pacheco, O. (2009). Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts. In F. D. Kramer, S. H. Starr and L. K. Wentz (eds)
Cyberpower and National Security (pp. 543-556). Center for Technology and National Security Policy, National Defense University Press, Potomac Books Inc. Retrieved from
https://ndupress.ndu.edu/Portals/68/Documents/Books/CTBSP-Exports/Cyberpower/Cyberpower-I-Chap-02.pdf?ver=2017-06-16-115052-210
Mearsheimer, J. J. (1990).
Why we will soon miss the cold war.
The Atlantic Monthly, 266(2), 35-50
. Retrieved from
https://www.theatlantic.com/past/politics/foreign/mearsh.htm
Misa, T., J. (2008). Transforming the international system: Geoffrey L. Herrera’s Technology and international transformation.
Technology and Culture, 49(1), 230-233.
https://doi.org/10.1353/tech.2008.0028
National Security Strategy (NSS) (2010, May). Washington: The White House. Retrieved from
http://nssarchive.us/NSSR/2010.pdf
Nye Jr., J. S. (2004). Power in the Global Information Age: From Realism to Globalization. Routledge, Taylor & Francis.
Nye Jr, J. S. (2010).
Cyber Power. Belfer Center for Science and International Affairs. Harvard Kennedy School. Retrieved from
https://www.belfercenter.org/sites/default/files/legacy/files/cyber-power.pdf
O’Malley, C. (2016).
The cyber-industrial complex. Political Science Senior Thesis. Bemidji State University. Retrieved from
https://www.bemidjistate.edu/academics/political-science/wp-content/uploads/sites/40/2022/03/Omalley-Final.pdf
Obama, B. (2009, May 29). Remarks by the President on securing our nation’s cyber infrastructure. The White House
. Retrieved from
https://obamawhitehouse.archives.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure
Peirce, C. (1955). Abduction and Induction. In J. Buchler (Ed.), Philosophical Writings of Peirce (pp. 150-156). New York: Dover Publications Inc.
Presidential memorandum: Establishment of the CTIIC. (2015, Feb. 25). The White House Office of the Press Secretary. Retrieved from
https://www.dni.gov/files/CTIIC/documents/CTIIC-Presidential-Memorandum.pdf
Rifkin, J. (2011).
The third industrial revolution: How lateral power is transforming energy, the economy, and the world. London: Palgrave Macmillan. Retrieved from
https://edisciplinas.usp.br/pluginfile.php/8754049/mod_label/intro/epdf.pub_the-third-industrial-revolution.pdf
Risen, J. & Lictblau, E. (2005, Dec. 16). Bush lets U.S. spy on callers without courts.
The New York Times. Retrieved from
https://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html
Rog, J. (2018).
Updating securitization to the age of information: Revisiting security sectors by examining PRISM. Bachelor's Thesis. Retrieved from
https://studenttheses.uu.nl/handle/20.500.12932/31079
Rosenfeld, D. & Autery, R. (2024).
Senate approves massive expansion of government surveillance power; Brennan Center reacts. Brennan Center for Justice. Retrieved from
https://www.brennancenter.org/our-work/analysis-opinion/senate-approves-massive-expansion-government-surveillance-power-brennan
Savage, Ch. (2011, May 19).
Deal reached on extension of Patriot Act.
The New York Times.
Retrieved from
https://www.nytimes.com/2011/05/20/us/20patriot.html
The National Intelligence Strategy of the United States of America (2009). Washington: Office of the Director of National Intelligence. Retrieved from
https://climateandsecurity.org/wp-content/uploads/2019/01/national-intelligence-strategy-2009.pdf
The National Intelligence Strategy of the United States of America (2014). Washington: Office of the Director of National Intelligence. Retrieved from
https://climateandsecurity.org/wp-content/uploads/2019/01/national-intelligence-strategy-2014.pdf
The White House (2017).
National Security Strategy of the United States of America. Retrieved from
https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf
The White House (2021).
Interim national security strategic guidance. Retrieved from
https://nssarchive.us/wp-content/uploads/2021/03/2021_interim.pdf
Toomay, P. & Robinson, S. (2024 June). Mass surveillance is dangerous for American communities: Reforming the section 702 spying regime.
Human Rights Magazine. Retrieved from
https://www.americanbar.org/groups/crsj/resources/human-rights/2024-june/mass-surveillance-dangerous-american-communities-reforming-section-702/
Tummarello, K. (2017, January 12).
Obama expands surveillance powers on his way out.
Electronic Frontier Foundation (EFF).
Retrieved from
https://www.eff.org/deeplinks/2017/01/obama-expands-surveillance-powers-his-way-out
USA Patriot Act. (2001).
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA Patriot Act) Act of 2001. Public Law 107–56 —OCT. 26, 2001.
https://www.congress.gov/107/plaws/publ56/PLAW-107publ56.pdf
Yannakogeorgos, P. A. (2009).
Technogeopolitics of militarization and security in cyberspace. Doctoral Thesis. Rutgers University. Retrieved from
https://rucore.libraries.rutgers.edu/rutgers-lib/26118/PDF/1/