Author:
Tomic Dusko,Saljic Eldar,Cupic Danilo
Publisher
Springer International Publishing
Reference16 articles.
1. Anderson, R. H., & Anthony, H. (1996). An exploration of cyberspace security R&D investment strategies for DARPA: “The day after… in cyberspace II”.
2. Butrimas, V. (2015). National security and international policy challenges in a post Stuxnet world. Lithuanian Annual Strategic Review. Lithuania: Ministry of Internal Affairs.
3. Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner.
4. Deibert, R. J. (2002). Dark guests and great firewalls: The Internet and Chinese security policy. Journal of Social Issues, 58, 143–159. https://doi.org/10.1111/1540-4560.00253 .
5. Deibert, R., & Crete‐Nishihata, M. (2011). Blurred boundaries: Probing the ethics of cyberspace research. Review of Policy Research, 28, 531–537. https://doi.org/10.1111/j.1541-1338.2011.00521.x .