1. |
Branscomb, L., and Ryan E. (2013, June 13). Dangerous Cargo: Action Needed on Hazardous Materials. Power & Policy Blog. Belfer Center for Science and International Affairs, Harvard Kennedy School. |
link |
2. |
Choucri, N. (2013, Spring). Cyberpolitics in International Relations. précis Newsletter. MIT Center for International Studies. |
link |
3. |
Clark, D. D. (2011, January 28). Egypt unrest: How do you shut down Internet service in an entire country? The Christian Science Monitor. |
link |
4. |
Clarke, R. (2009, December 22). War from Cyberspace. The National Interest. |
link |
5. |
Clarke R. (2011, June 15). China's Cyberassault on America. The Wall Street Journal. |
link |
6. |
Clarke, R. (2011, July 31). The coming cyber wars: Obama’s cyber strategy is missing the strategy. The Boston Globe. |
link |
7. |
Ellis, R. (2013, July 24). Protecting US Critical Infrastructure: One Step Forward for Cybersecurity, One Back? Technology+Policy. |
link |
8. |
Ellis, R. (2013, March 13). Cyber Security: Defense and Intelligence Projects Podcast. Science, Technology, and Public Policy Program. Belfer Center for Science and International Affairs, Harvard Kennedy School. |
link |
9. |
Hathaway, M. E. (2010, October 5). Power Hackers: The U.S. Smart Grid Is Shaping Up to Be Dangerously Insecure. Scientific American Magazine. |
link |
10. |
Hathaway, M. E. (2011, January 14). Regulators Can Help Obama Secure IT. Inforisktoday.in |
link |
11. |
Hathaway, M. E. (2011, September 18). Dim Prospects for Cybersecurity Law in 2011. GovInfoSecurity.com. |
link |
12. |
Hathaway, M. E. (2012, February 1). Internet Service Providers are the Front Line of Cyber-defence. Europe's World. |
link |
13. |
Kello, L. (2013, October 28). The Skeptics Misconstrue the Cyber Revolution: A Response to Commentators on ISSF/H-Diplo and Elsewhere. H-Diplo/ISSF. |
link |
14. |
Mohan, V. (2013, May 15). Privacy Consciousness in the Big Data Era. Hive. |
link |
15. |
Mohan, V. (2013, April 12). Why the Government Matters: A Primer for Data-Minded Entrepreneurs. Hive. |
link |
16. |
Mohan, V. (2013, March 8). Scaling the Great Firewall. The Indian Express. |
link |
17. |
Mohan, V. (2012, December 7). Nothing to See Here. The Indian Express. |
link |
18. |
Nye, J. S. (2011, February 9). Power and Information in Egypt - and Beyond. The Huffington Post. |
link |
19. |
Nye J. S. (2012, April 10). Cyber War and Peace. Project Syndicate. |
link |
20. |
Nye J. S., (2011, February 27). Cyberspace Wars. The New York Times. |
link |
21. |
Odumosu, T. (2012, December 31). Technological Somnambulism Revisited: Sleeping through the New Invisible Surveillance Technologies.” Vignettes @ STS.Next.20. |
link |
22. |
Smith, J. F. (2013, Summer). Confronting Complex Cybersecurity Challenges. Belfer Center Newsletter, Belfer Center for Science and International Affairs, Harvard Kennedy School. |
link |
23. |
Tumin, Z. & William B. (2012, April 12). Viral By Design: Teams in the Networked World. Harvard Business Review. |
link |
24. |
Tumin, Z. (2012, June 27). Running Al Qaeda. Reuters Magazine. |
link |
25. |
Zittrain, J. (2010, December 2). Who Gets Priority on the Web? The New York Times. |
link |
26. |
Zittrain, J., & Sauter, M. (2010, December 9). Everything You Need to Know About Wikileaks. Technology Review. |
link |
27. |
Zittrain, J. (2011, March 1). Freedom and Anonymity: Keeping the Internet Open. Scientific American Magazine. |
link |