9 literatur - link.springer.com3a978-3-658-00228-2%2f… · 9 literatur - link.springer.com ... the...

56
9 Literatur 9.1 Literatur Abel, David (1999): “Hackers Kept Allies on the Defensive”, The Boston Globe, 20.06.1999, A25. Ackermann, Spencer (2011): “Trolls Pounce on Facebook’s Tahrir Square”, Wired, 04.02.2011, http://www.wired.com/dangerroom/2011/02/trolls-pounce-on-facebooks-tahrir-square/ (01.08.2011). Adamek, Sascha (2011): Die Facebook-Falle: Wie das soziale Netzwerk unser Leben verkauft, München: Heyne Verlag. Adams, James (2001): „Virtual Defense“, Foreign Affairs, 80 (3), 98-112. Aday, Sean et al. (2010): Blogs and Bullets: New Media and Contentious Politics, United States Institute for Peace, http://www.usip.org/files/resources/pw65.pdf (05.12.2011). Addley, Esther/Hallyday, Josh (2010): “WikiLeaks Supporters Disrupt Visa and MasterCard Sites in ‘Operation Payback’”, The Guardian, 09.12.2010, http://www.guardian.co.uk/world/2010/dec/08/WikiLeaks-visa-mastercard-operation-payback (15.03.2011). Adler, Emmanuel (1992): “The Emergence of Cooperation: National Epistemic Communities and the International Evolution of the Idea of Nuclear Arms Control”, International Organization, 46 (1), 101-145. Adler, Emmanuel/Haas, Peter M. (1992): “Conclusion: Epistemic Communities, World Order, and the Creation of a Reflective Research Program”, International Organization, 46 (1), 367-390. Agence France-Presse (2011): “Social Media Sites Stirring Vietnam-China Tensions”, 11.06.2011, http://www.leaderpost.com/technology/Social+media+sites+stirring+Vietnam+China+tensions/ 4930189/story.html (22.06.2011). Aid, Matthew M. (2010): The Secret Sentry: The Untold History of the NSA, New York/Berlin/London: Bloomsbury. Aitoro, Jill R. (2008): “National Cyber Security Initiative Will Have a Dozen Parts”, NextGov, 01.08.2008, http://www.nextgov.com/nextgov/ng_20080801_9053.php (12.08.2011). Akin, David (2004): “Arrests Key Win for NSA Hackers”, Globe and Mail, 06.04.2004, http://lists.jammed.com/ISN/2004/04/0016.html (15.03.2011). Akude, John E. et al. (2009): “Transformation politischer Ordnung: Ansätze zur Erweiterung des Transformationsbegriffes”, Zeitschrift für Politikwissenschaft, 56 (2), 142-161. Al-bab.com (2011): „Speech by President Bashar al-Assad at Damascus University”, 20.06.2011, http://www.al-bab.com/arab/docs/syria/bashar_assad_speech_110620.htm (26.06.2011). Alberts, David S./Hayes, Richard E. (2003): Power to the Edge: Command…Control…in the Infor- mation Age, CCRP Publication Series, Washington, DC: US Department of Defense, http://www.dodccrp.org/files/Alberts_Power.pdf (15.03.2011). Albright, David/Brannan, Paul/Walrond, Christina (2011): Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report, 15.02.2011, Washington, DC: Institute for Science and Inter- national Security, http://www.isis-online.org/uploads/isis- reports/documents/stuxnet_update_15Feb2011.pdf (15.03.2011). Al Lawati, Abas (2008): “Groups Hack Al Arabiya Website”, Gulfnews.com, 10.10.2008, http://gulfnews.com/news/gulf/uae/media/groups-hack-al-arabiya-website-1.136725 (17.11.2010). M. Hansel, Internationale Beziehungen im Cyberspace, DOI 10.1007/978-3-658-00228-2, © Springer Fachmedien Wiesbaden 2013

Upload: others

Post on 18-Jan-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 345

9 Literatur 9.1 Literatur

Abel, David (1999): “Hackers Kept Allies on the Defensive”, The Boston Globe, 20.06.1999, A25. Ackermann, Spencer (2011): “Trolls Pounce on Facebook’s Tahrir Square”, Wired, 04.02.2011,

http://www.wired.com/dangerroom/2011/02/trolls-pounce-on-facebooks-tahrir-square/ (01.08.2011).

Adamek, Sascha (2011): Die Facebook-Falle: Wie das soziale Netzwerk unser Leben verkauft, München: Heyne Verlag.

Adams, James (2001): „Virtual Defense“, Foreign Affairs, 80 (3), 98-112. Aday, Sean et al. (2010): Blogs and Bullets: New Media and Contentious Politics, United States

Institute for Peace, http://www.usip.org/files/resources/pw65.pdf (05.12.2011). Addley, Esther/Hallyday, Josh (2010): “WikiLeaks Supporters Disrupt Visa and MasterCard Sites in

‘Operation Payback’”, The Guardian, 09.12.2010, http://www.guardian.co.uk/world/2010/dec/08/WikiLeaks-visa-mastercard-operation-payback (15.03.2011).

Adler, Emmanuel (1992): “The Emergence of Cooperation: National Epistemic Communities and the International Evolution of the Idea of Nuclear Arms Control”, International Organization, 46 (1), 101-145.

Adler, Emmanuel/Haas, Peter M. (1992): “Conclusion: Epistemic Communities, World Order, and the Creation of a Reflective Research Program”, International Organization, 46 (1), 367-390.

Agence France-Presse (2011): “Social Media Sites Stirring Vietnam-China Tensions”, 11.06.2011, http://www.leaderpost.com/technology/Social+media+sites+stirring+Vietnam+China+tensions/4930189/story.html (22.06.2011).

Aid, Matthew M. (2010): The Secret Sentry: The Untold History of the NSA, New York/Berlin/London: Bloomsbury.

Aitoro, Jill R. (2008): “National Cyber Security Initiative Will Have a Dozen Parts”, NextGov, 01.08.2008, http://www.nextgov.com/nextgov/ng_20080801_9053.php (12.08.2011).

Akin, David (2004): “Arrests Key Win for NSA Hackers”, Globe and Mail, 06.04.2004, http://lists.jammed.com/ISN/2004/04/0016.html (15.03.2011).

Akude, John E. et al. (2009): “Transformation politischer Ordnung: Ansätze zur Erweiterung des Transformationsbegriffes”, Zeitschrift für Politikwissenschaft, 56 (2), 142-161.

Al-bab.com (2011): „Speech by President Bashar al-Assad at Damascus University”, 20.06.2011, http://www.al-bab.com/arab/docs/syria/bashar_assad_speech_110620.htm (26.06.2011).

Alberts, David S./Hayes, Richard E. (2003): Power to the Edge: Command…Control…in the Infor-mation Age, CCRP Publication Series, Washington, DC: US Department of Defense, http://www.dodccrp.org/files/Alberts_Power.pdf (15.03.2011).

Albright, David/Brannan, Paul/Walrond, Christina (2011): Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report, 15.02.2011, Washington, DC: Institute for Science and Inter-national Security, http://www.isis-online.org/uploads/isis-reports/documents/stuxnet_update_15Feb2011.pdf (15.03.2011).

Al Lawati, Abas (2008): “Groups Hack Al Arabiya Website”, Gulfnews.com, 10.10.2008, http://gulfnews.com/news/gulf/uae/media/groups-hack-al-arabiya-website-1.136725 (17.11.2010).

M. Hansel, Internationale Beziehungen im Cyberspace,DOI 10.1007/978-3-658-00228-2, © Springer Fachmedien Wiesbaden 2013

Page 2: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

346 9 Literatur

Almond, Kyle (2011): “How One Voice Can Tell the Story of an Entire Movement”, CNN.com, 01.04.2011, http://edition.cnn.com/2011/WORLD/meast/04/01/arab.unrest.faces/index.html (10.04.2011).

Allchin, Joseph (2011): “Cyber War Breaks new Ground”, Democratic Voice of Burma, 14.03.2011, http://www.dvb.no/news/cyber-war-breaks-new-ground/14727 (15.03.2011).

Allison, Graham/Zelikow, Philip (1999): Essence of Decision: Explaining the Cuban Missile Crsis, New York: Addison-Wesley Longman.

Alvestrand, Harald/Lie, Håkon Wium (2009): “Development of Core Internet Standards: The Work of IETF and W3C”, in: Lee A. Bygrave/Jon Bing (Hg.): Internet Governance: Infrastructure and Institutions, Oxford: Oxford University Press.

Alvey, Ruth (2001): “Russian Hackers for Hire: The Rise of the E-Mercenary”, Jane’s Intelligence Review, 30.07.2001.

Aly, Götz (2005): Hitlers Volksstaat: Raub, Rassenkrieg und nationaler Sozialismus, Frankfurt a.M.: Fischer Verlag.

Amoroso, Edward (2007): Cyber Security, Summit, NJ: Silicon Press. Anderson, Chris/Wolff, Michael (2010): “The Web is Dead: Long Live the Internet”, Wired,

17.08.2010, http://www.wired.com/magazine/2010/08/ff_webrip/all/1 (15.07.2011). Anderson, Lisa (2011): “Demystifying the Arab Spring: Parsing the Differences between Tunesia,

Egypt, and Libya”, Foreign Affairs, 90 (3). Anderson, Nate (2011): “Tweeting Tyrants out of Tunesia: Global Internet at its Best”, Ars Technica,

14.01.2011, http://arstechnica.com/tech-policy/news/2011/01/tweeting-tyrants-out-of-tunisia.ars (10.04.2011).

Anishchuk, Alexei (2011): “BlackBerry Firm Seeks Security ‘Balance’ in Russia”, Reuters, 25.04.2011, http://www.reuters.com/article/2011/04/25/us-blackberry-russia-idUSTRE73O1ZL20110425 (10.06.2011).

Apps, Peter/Prodhan, Georgina (2011): “Experts Skeptical on new Iran ‘Cyber Attack’ Claim”, Reuters, 05.05.2011, http://af.reuters.com/article/energyOilNews/idAFLDE74417H20110505 (10.05.2011).

Aranson, Jonathan D. (2005): “Causes and Consequences of the Communications and Internet Revo-lution”, in: John Baylis/Steve Smith (Hg.): The Globalization of World Politics: An Introduc-tion to International Studies, Oxford: Oxford University Press, 621-643.

Arkin, William M. (1999): “The Cyber Bomb in Yugoslavia”, 25.10.1999, Washington Post, http://www.washingtonpost.com/wp-srv/national/dotmil/arkin.htm (17.10.2010).

Armistead, Leigh (Hg.) (2007): Information Warfare: Separating Hype from Reality, Washington, DC: Potomac Books.

Armistead, Leigh (Hg.) (2004): Information Operations: Warfare and the Hard Reality of Soft Power, Washington, DC: Brassey’s.

Arquilla, John/Ronfeldt, David (2003): “Cyberwar is Coming!”, Comparative Strategy, 12 (2), 141-165.

Arquilla, John/Ronfeldt, David (Hg.) (1997): In Athena’s Camp: Preparing for Conflict in the Infor-mation Age, Santa Monica, CA: RAND.

Arrelano, Nestor E. (2011): “Canada’s Phishing Activity Booming, Report Warns”, itbusiness.ca, 10.05.2011, http://www.itbusiness.ca/it/client/en/home/News.asp?id=62413 (10.06.2011).

Asimov, Nanette et al. (2009): “Sabotage Attacks Knock out Phone Service”, San Francisco Chroni-cle, 10.04.2009, http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2009/04/10/MNP816VTE6.DTL&type=printable (03.03.2010).

Asmolov, Gregory (2011): “Russia: Internet Freedom as Cold War 2.0”, Global Voices, 26.02.2011, http://globalvoicesonline.org/2011/02/26/russia-internet-freedom-as-cold-war-2-0/ (04.06.2011).

Page 3: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 347

Assange, Julian (2010): “Interview with Time Magazine Editor via Skype”, Time Magazine, 01.12.2010, http://www.time.com/time/printout/0,8816,2034040,00.html (15.03.2011).

Assange, Julian (2006a): “State and Terrorist Conspiracies”, [email protected], 10.11.2006, abrufbar unter http://cryptome.org/0002/ja-conspiracies.pdf (15.03.2011).

Assange, Julian (2006b): “Conspiracy as Governance”, [email protected], 03.12.2006, abrufbar unter http://cryptome.org/0002/ja-conspiracies.pdf (15.03.2011).

Assange, Julian (2006c): “The Non-linear Effects of Leaks on Unjust Systems of Governance”, [email protected], 31.12.2006, abrufbar unter http://web.archive.org/web/20071020051936/http://iq.org/ (15.03.2011).

Associated Press (2011): “APNewsBreak: Leaked Study Shows Companies Advised Pentagon on Cyber-Sabotage against Libya”, The Washington Post, 13.06.2011, http://www.washingtonpost.com/business/technology/apnewsbreak-leaked-study-shows-companies-advised-pentagon-on-cyber-sabotage-against-libya/2011/06/13/AGHjJ6SH_story.html (17.06.2011).

Austen, Ian/Johnston, David (2006): “17 Held in Plot to Bomb Sites in Ontario”, The New York Times, 04.06.2006, http://www.nytimes.com/2006/06/04/world/americas/04toronto.html (15.03.2011).

Axelrod, Robert (2009) [1984]: Die Evolution der Kooperation, deutsche Übersetzung der Original-ausgabe, München: Oldenbourg.

Axelrod, Robert/Keohane, Robert O. (1993): “Achieving Cooperation Under Anarchy: Strategies and Institutions”, in: David A. Baldwin (Hg.): Neorealism and Neoliberalism: The Contemporary Debate, New York: Columbia University Press, 85-115.

Baker, Al/Rashbaum, Wiliam K. (2006): “3 Held Overseas in Plan to Bomb New York Target”, The New York Times, 08.07.2006, http://www.nytimes.com/2006/07/08/nyregion/08terror.html?fta=y (15.03.2011).

Baker, Stewart/Waterman, Shaun/Ivanov, George (2010): In the Crossfire: Critical Infrastructure in the Age of Cyberwar, Santa Clara, CA: McAfee, http://www.mcafee.com/us/resources/reports/rp-in-crossfire-critical-infrastructure-cyber-war.pdf (01.06.2011).

Baldor, Lolita C. (2010): “Hackers Hit Political Dissidents in Vietnam as Attacks Target Government Dissenters”, Winnipeg Free Press, 28.10.2010, http://www.winnipegfreepress.com/world/breakingnews/hackers-hit-political-dissidents-in-vietnam-as-attacks-target-government-dissenters-106101938.html (03.11.2010).

Baldwin, David A. (2002): “Power and International Relations”, in: Walter Carlsnaes et al. (Hg.): Handbook of International Relations, London et al.: Sage.

Bamford, James (2008): The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, New York: Anchor Books.

Baocun, Wang/Fei, Li (1995): Information Warfare, Exzerpt zweier Artikel aus der Liberation Army Daily, http://www.fas.org/irp/world/china/docs/iw_wang.htm (22.11.2010).

Barlow, John Perry (1996): A Declaration of the Independence of Cyberspace, Davos: Electronic Frontier Foundation, http://homes.eff.org/~barlow/Declaration-Final.html (15.03.2011).

Barbrook, Richard/Cameron, Andy (1997): The Californian Ideology, http://www.dinicola.it/socinfo/california.htm (10.04.2011).

Barme, Geremie R./Ye, Sang (1997): “The Great Firewall of China“, Wired, Juni 1997, http://www.wired.com/wired/archive/5.06/china.html (03.06.2011).

Barnes, Julian E. (2008): “Pentagon Computer Networks Attacked”, Los Angeles Times, 28.11.2008, http://articles.latimes.com/2008/nov/28/nation/na-cyberattack28 (17.11.2010).

Barnes, Julian E./Gorman, Siobhan (2011): “Cyberwar Plan Has New Focus on Deterrence”, The Wall Street Journal, 15.07.2011,

Page 4: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

348 9 Literatur

http://online.wsj.com/article/SB10001424052702304521304576446191468181966.html (25.08.2011).

Barnet, Belinda/Eldredge, Niles (2004): “Material Cultural Evolution: An Interview with Niles Eldredge”, The Fibreculture Journal, 3/2004, http://three.fibreculturejournal.org/fcj-017-material-cultural-evolution-an-interview-with-niles-eldredge/ (28.08.2011).

Barney, Darin (2000): Prometheus Wired: The Hope for Democracy in the Age of Network Technol-ogy, The University of Chicago Press: Chicago.

Bauer, Kevin et al. (2007): Low-Resource Routing Attacks against Tor, Boulder, CO: University of Colorado, http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf (10.08.2011).

Bayles, William J. (2001): “The Ethics of Computer Network Attack”, Parameters, 31 (1), 44-58. BBC (2010): “Siprnet: Where the Cables Came from”, 29.11.2010,

http://www.bbc.co.uk/news/world-us-canada-11863618 (15.03.2011). BBC (2009a): “Experts Unimpressed by Russian General Staff ‘Information War’ Prediction”,

Worldwide Monitoring Former Soviet Union, 10.03.2009, Original erschienen in Izvestiya vom 27.02.2009.

BBC (2009b): “India Says Attacks, Terrorism in Cyberspace Emerging as ‘New Threats’”, World-wide Monitoring South Asia, 27.03.2009, Original erschienen auf The Asian Age Website am 27.03.2009.

BBC (2009c): “UK ‘Has Cyber Attack Capability’”, 25.06.2009, http://news.bbc.co.uk/2/hi/uk_news/politics/8118729.stm (22.11.2010).

BBC (2009d): „S Korea to Create Cyber Warfare Command against N Korean Hackers”, Worldwide Monitoring, 26.06.2009, ursprünglich Yonhap News Agency.

BBC (2009e): “China News Agency Views Twitter’s Role in Iran Political Crisis”, BBC Worldwide Monitoring, 30.06.2009, ursprünglich Xinhua.

BBC (2009f): „China Military Paper Issues Warning over Twitter, YouTube ‘Subversion’”, World-wide Monitoring, 07.08.2009, ursprünglich South China Morning Post Website.

BBC (2003): “US Hackers Told to Leave Iraq alone”, BBC News, 14.02.2011, http://news.bbc.co.uk/2/hi/technology/2760899.stm (01.08.2011).

BBC World Service (2010): Four in Five Regard Internet Access as a Fundamental Right: Global Poll, http://www.worldpublicopinion.org/pipa/pdf/mar10/BBC_Internet_Poll.pdf (17.08.2011).

Becker, Maren/John, Stefanie/Schirm, Stefan A. (2007): Globalisierung und Global Governance, Paderborn: Wilhelm Fink.

Beckmann, Rasmus (2011): Clausewitz trifft Luhmann: Eine systemtheoretische Interpretation von Clausewitz’ Handlungstheorie, Wiesbaden: VS Verlag.

Beckmann, Rasmus (2009): Clausewitz trifft Luhmann – Überlegungen zur systemtheoretischen Interpretation von Clausewitz’ Handlungstheorie, Arbeitspapiere zur Internationalen Politik und Außenpolitik 4/2009, Köln: Universität zu Köln.

Beckstrom, Rod (2009): Resignation Letter, 05.03.2009, http://online.wsj.com/public/resources/documents/BeckstromResignation.pdf (22.08.2011).

Bell, Daniel (1973): The Coming of Post-Industrial Society: A Venture in Social Forecasting, New York, NY: Basic Books.

Bell, Melissa/Flock, Elizabeth (2011): “’A Gay Girl in Damaskus’ Comes Clean”, The Washington Post, 12.06.2011, http://www.washingtonpost.com/lifestyle/style/a-gay-girl-in-damascus-comes-clean/2011/06/12/AGkyH0RH_story.html?hpid=z2 (13.06.2011).

Bendrath, Ralf (2001): “Krieger in den Datennetzen: Die US-Streikräfte erobern den Cyberspace“, Telepolis, 17.06.2001, http://www.heise.de/tp/r4/artikel/7/7892/1.html (17.11.2010).

Bendrath, Ralf/Eriksson, Johan/Giacomello, Giampiero (2007): “From ‘Cyberterrorism’ to ‘Cyber-war’, back and forth: How the United States Securitized Cyberspace”, in: Johan Eriks-

Page 5: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 349

son/Giampiero Giacomello (Hg.): International Relations and Security in the Digital Age, London et al.: Routledge, 57-82.

Benkler, Yochai (2006): The Wealth of Networks: How Social Production Transforms Markets and Freedom, New Haven/London: Yale University Press.

Bentham, Jeremy (1995) [1787]: Panoptikum or the Inspection House, in: Ders.: The Panopticum Writings, editiert von Miran Bozovic, London: Verso, 29-95.

Berger, Jens (2011): “Aufrüsten im Kampf um die virtuelle Meinungshoheit im Netz”, Telepolis, 22.02.2011, http://www.heise.de/tp/r4/artikel/34/34240/1.html (15.03.2011).

Berger, Jonah/Milkman, Katherine L. (2011): “What Makes Online Content Viral?”, Journal of Marketing Research (im Erscheinen), http://marketing.wharton.upenn.edu/documents/research/virality.pdf (28.08.2011).

Berinato, Scott (2006): „Attack of the Bots“, Wired, November 2006, http://www.wired.com/wired/archive/14.11/botnet.html (31.05.2011).

Bernau, V./Kuh, J./Riedl, T. (2011): „Spielabbruch bei Sony“, Süddeutsche Zeitung, 28.04.2011, 17. Berners-Lee, Tim (1999): Weaving the Web: The Original Design and Ultimate Destiny of the World

Wide Web by its Inventor, San Francisco, CA: Harper. Best, Michael L./Wade, Keegan W. (2005): The Internet and Democracy: Global Catalyst or De-

mocratic Dud, Cambridge, MA: The Berkman Center for Internet & Society, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/12-InternetDemocracy.pdf (14.04.2011).

Bildt, Carl (2010): “Tear Down these Virtual Walls”, Washington Post, 25.01.2010, A17. Billing, Soren (2009): “Saudi Campaign to Clean up YouTube”, arabianbusiness.com, 13.08.2009,

http://www.arabianbusiness.com/saudi-campaign-clean-up-youtube-14834.html (10.06.2011). Billo, Charles/Chang, Welton (2004): Cyber Warfare: An Analysis of the Means and Motivations of

Selected Nation States, Institute for Security Technology Studies at Dartmouth College, Hano-ver, NH.

Bimber, Bruce (1994): “Three Faces of Technological Determinism”, in: Merritt R. Smith/Leo Marx (Hg.): Does Technology Drive History? The Dilemma of Technological Determinism, Cam-bridge, MA: The MIT Press, 79-100.

Bing, Jon (2009): “Building Cyberspace: A Brief History of the Internet”, in: Lee A. Bygrave/Jon Bing (Hg.): Internet Governance: Infrastructure and Institutions, Oxford: Oxford University Press.

Bizeul, David (2007): Russian Business Network Study, http://www.bizeul.org/files/RBN_study.pdf (10.06.2011).

Blainey, Geoffrey (1973): The Causes of War, London: Macmillan. Blancke, Stephan/Rosenke, Jens (2011): “Blut ist dicker als Wasser: Die chinesisch-nordkoreanische

Militär- und Geheimdienstkooperation”, Zeitschrift für Außen- und Sicherheitspolitik, 4 (2), 263-294.

Blouet, Brian W. (Hg.) (2005): Global Geostrategy: Mackinder and the Defence of the West, New York: Frank Cass.

Boas, Taylor C. (2000): “The Dictator’s Dilemma? The Internet and U.S. Policy toward Cuba”, The Washington Quarterly, 23 (3), 57-67.

Borchers, Detlef (2011): “Die Wurzeln von WikiLeaks”, in: Suhrkamp Verlag (Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequenzen, Berlin, 55-66.

Borchert, Heiko (Hg.) (2004): Vernetzte Sicherheit: Leitidee der Sicherheit im 21. Jahrhundert, Hamburg/Berlin/Bonn: Mittler & Sohn.

Borger, Julian (1999): „Pentagon Kept the Lid on Cyberwar in Kosovo”, Guardian, 09.11.1999, http://www.guardian.co.uk/world/1999/nov/09/balkans (10.10.2010).

Bork, Henrik (2009): „Dicker Luo, ganz leise“, Süddeutsche Zeitung, 16.01.2009, 15.

Page 6: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

350 9 Literatur

Bowie, Robert R. (1961): „Basic Requirements of Arms Control“, in: Donald G. Brennan (Hg.): Arms Control, Disarmament, and National Security, New York: George Braziller, 43-55.

Boyd, Danah M./Ellison, Nicole B. (2007): „Social Network Sites: Definition, History, and Scholar-ship”, Journal of Computer-Mediated Communication, 13 (1), http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html (15.03.2011).

Boyer, Mark A./Butler, Michael J. (2006): „Public Goods Liberalism: The Problems of Collective Actions“, in: Jennifer Sterling-Folker (Hg.): Making Sense of International Relations Theory, Boulder/London: Lynne Rienner, 75-91.

Bradbury, Danny (2009): “The Fog of Cyberwar”, The Guardian, 05.02.2009, http://www.guardian.co.uk/technology/2009/feb/05/kyrgyzstan-cyberattack-internet-access (17.11.2010).

Brenner, Susan W. (2002): “Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationsships”, North Carolina Journal of Law & Technology, 4 (1), 1-50.

Brewin, Bob (2008): “Air Force Looking to Build Cyber Weapons”, NextGov, 14.05.2008, http://www.nextgov.com/nextgov/ng_20080514_6745.php (22.11.2010).

Brewin, Bob (2007): “Army, Air Force Seek to Go on Offensive in Cyber War”, GovernmentExecu-tive, 13.06.2007, http://www.govexec.com/story_page.cfm?articleid=37185&printerfriendlyvers=1 (22.11.2010).

Briggs, Asa/Burke, Peter (2009): A Social History of the Media, Cambridge: Polity Press. Brill, Heinz (2008): Geopolitische Analysen: Beiträge zur deutschen und internationalen Sicher-

heitspolitik 1974-2008, 2. Aufl., Bissendorf: Biblio Verlag. Broad, William J. (2010): “Report Suggests Problems with Iran’s Nuclear Efforts”, 23.11.2010,

http://www.nytimes.com/2010/11/24/world/middleeast/24nuke.html (15.07.2011). Broad, William J./Markoff, John/Sanger, David E. (2011): “Israeli Test on Worm Called Crucial in

Iran Nuclear Delay”, The New York Times, 15.01.2011, http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html (15.03.2011).

Bröckerhoff, Daniel (2011): “Die Identitätsmörder von GooglePlus”, ZDF Hyperland, 22.07.2011, http://blog.zdf.de/hyperland/2011/07/die-identitaetsmoerder-von-googleplus/ (08.08.2011).

Brookes, Adam (2006): “US Plans to ‚Fight the Net’ Revealed”, BBC News, 27.01.2006, http://news.bbc.co.uk/2/hi/americas/4655196.stm (03.03.2010).

Brookes, Heather (2010): “WikiLeaks Cables: Saudi Princes Throw Parties Boasting Drinks, Drugs and Sex”, The Guardian, 07.12.2010, http://www.guardian.co.uk/world/2010/dec/07/WikiLeaks-cables-saudi-princes-parties (15.03.2011).

Brunker, Mike (2000): “FBI Agent Charged with Hacking”, MSNBC.com, 15.08.2000, http://www.msnbc.msn.com/id/3078784/ (15.03.2011).

Builder, Carl H./Banks, Steven C. (1990): The Etiology of European Change, Santa Monica, CA: RAND, http://www.rand.org/content/dam/rand/pubs/papers/2008/P7693.pdf (03.06.2011).

Bull, Hedley (1977): The Anarchical Society. A Study of Order in World Politics, London: Macmil-lan.

Bull, Hedley (1961): The Control of the Arms Race, London: Institute for Strategic Studies. Bulliet, Richard W. (1994): “Determinism and Pre-Industrial Technology”, in: Merritt R. Smith/Leo

Marx (Hg.): Does Technology Drive History? The Dilemma of Technological Determinism, Cambridge, MA: The MIT Press, 201-215.

Bundesamt für Sicherheit in der Informationstechnik (2005): Nationaler Plan zum Schutz der Kriti-schen Informationsinfrastrukturen, Bonn, http://www.eco.de/dokumente/Nationaler_Plan_Schutz_Informationsinfrastrukturen_%282%29.pdf (10.08.2011).

Page 7: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 351

Bundesministerium des Inneren (2011): Cyber-Sicherheitsstrategie für Deutschland, http://www.cio.bund.de/SharedDocs/Publikationen/DE/IT-Sicherheit/css_download.pdf?__blob=publicationFile (30.06.2011).

Burchill, Scott (2001): “Realism and Neo-realism”, in: Scott Burchill et al. (Hg.): Theories of Inter-national Relations, 2. Aufl., London: Palgrave, 70-102.

Burkitt, Laurie/Greenberg, Andy (2009): “Senators Push Digital Code of Conduct”, Forbes, 25.06.2009. http://www.forbes.com/2009/06/25/digital-code-iran-technology-business-mccain.html (03.03.2010).

Burroughs, Oliver (2002): “Russians Wage Cyber War on Chechen Websites”, 14.11.2002, Reuters, http://www.infosecnews.org/hypermail/0211/6795.html (19.11.2010).

Bütikofer, Reinhard (2011): “Dual Use: Exportkontrolle ohne Zähne”, Blätter für deutsche und internationale Politik, 12/2011, 9-12.

Buxbaum, Peter A. (2008): “US Cyberwar Turf Battle Continues”, ISN Security Watch, 28.08.2008, abrufbar unter http://intellibriefs.blogspot.com/2008/08/us-cyberwar-turf-battle-continues.html (16.08.2011).

Buzan, Barry (1987): An Introduction to Strategic Studies: Military Technology and International Relations, Houndmills et al.: Macmillan/International Institute for Strategic Studies.

Buzan, Barry/Hansen, Lene (2009): The Evolution of International Security Studies, Cambridge: Cambridge University Press.

Buzan, Barry/Herring, Eric (1998): The Arms Dynamic in World Politics, Boulder/London: Lynne Rienner.

Buzan, Barry/Waever, Ole/de Wilde, Jaap (1997): Security: A New Framework for Analysis, Boulder, CO: Lynne-Rienner.

Bygrave, Lee A./Bing, Jon (Hg.) (2009): Internet Governance: Infrastructure and Institutions, Ox-ford: Oxford University Press.

Bygrave, Lee A./Michaelsen, Terje (2009): “Governors of the Internet”, in: Lee A. Bygrave/Jon Bing (Hg.): Internet Governance: Infrastructure and Institutions, Oxford: Oxford University Press, 92-125.

Cairncross, Frances (1997): The Death of Distance. How the Communications Revolution Will Change Our Lives, Boston, MA: Harvard Business School Press.

Calingaert, Daniel (2010): “Authoritarianism vs. the Internet”, Policy Review, No. 160, http://www.hoover.org/publications/policy-review/article/5269 (01.08.2011).

Campbell, Duncan (1999a): “How NSA Access Was Built into Windows”, Telepolis, 04.09.1999, http://www.heise.de/tp/artikel/5/5263/1.html (10.08.2011).

Campbell, Duncan (1999b): “Only NSA Can Listen, so It’s OK”, Telepolis, 01.06.1999, http://www.heise.de/tp/artikel/2/2898/1.html (10.08.2011).

Canada Centre for Global Security Studies/Munk School of Global Affairs (2011): Casting a Wider Net: Lessons Learned in Delivering BBC Content on the Censored Internet, 11.10.2011, Uni-versity of Toronto, http://munkschool.utoronto.ca/downloads/casting.pdf (14.12.2011).

Carr, Jeffrey (2010): Inside Cyber Warfare, Sebastopol, CA: O’Reilly. Carr, Niclas (2009): The Big Switch: Die Vernetzung der Welt von Edison bis Google. Heidelberg:

mitp. Castells, Manuel (2009): Communication Power, Oxford: Oxford University Press. Castells, Manuel et al. (2007): Mobile Communication and Society: A Global Perspective, Lon-

don/Cambridge, MA: The MIT Press. Castells, Manuel (1996): The Rise of the Network Society, Vol. 1: The Information Age: Economy,

Society and Culture, Malden, MA: Blackwell Publishers. CBS News (2010): “China Group: Facebook Used to Sow Unrest”, 09.07.2010,

http://www.cbsnews.com/stories/2010/07/09/tech/main6661575.shtml (04.06.2011).

Page 8: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

352 9 Literatur

CBS News (1999): “U.S. Admits to Computer Warfare: Enemy’s Air Defense Network Was Tar-geted”, 10.07.1999, http://www.cbsnews.com/stories/1999/10/07/tech/main65516.shtml (10.10.2010).

Chandler, Daniel (1995): Technological or Media Determinism, Aberystwyth: Aberystwyth Univer-sity, http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html (03.02.2011).

Checkel, Jeffrey T. (1998): “The Constructivist Turn in International Relations Theory”, World Politics, 50 (2), 324-348.

Chen, Adrian (2011): “Why Facebook Should Do More to Help Egypt’s Protesters”, Gawker (Blog), 05.02.2011, http://gawker.com/#!5752904/why-facebook-should-do-more-to-help-egypts-protesters (10.04.2011).

Chen, Cheng et al. (2011): “Battling the Internet Water Army: Detection of Hidden Paid Posters”, The Computing Research Repository, November 2011, http://arxiv.org/PS_cache/arxiv/pdf/1111/1111.4297v1.pdf (01.12.2011).

Cheng, Gracye (2010): Response to Questions Posed by CNAs on International Law & Internet Freedom, Cambridge, MA: Harvard University, http://www.law.harvard.edu/students/orgs/nsrc/CNAS-Final%20Draft-3.pdf (20.08.2011).

Cheng, Jacqui (2010): “’Deleted’ Facebook Photos Still not Deleted: A Followup”, Ars Technica, 11.10.2010, http://arstechnica.com/web/news/2010/10/facebook-may-be-making-strides.ars (15.03.2011).

China Daily (2011): “China Sets up State Internet Information Office”, 04.05.2011, http://www.chinadaily.com.cn/china/2011-05/04/content_12440782.htm (15.08.2011).

Chivers, Tom (2010): “WikiLeaks’ 10 Greatest Stories”, The Telegraph, 18.10.2010, http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/8070253/WikiLeaks-10-greatest-stories.html (15.03.2011).

Christensen, John (1999): “Bracing for Guerrilla Warfare in Cyberspace”, CNN Interactive, 06.04.1999, http://lists.jammed.com/ISN/1999/05/0029.html (17.11.2010).

Citizenlap (2011): Behind Blue Coat: Investigations of Commercial Filtering in Syria and Burma, 09.09.2011, University of Toronto, http://citizenlab.org/2011/11/behind-blue-coat/ (14.12.2011).

Clarke, Richard A./Knake, Robert K. (2010): Cyberwar: The Next Threat to National Security and What to Do about it, New York: Harper/Collins.

Clausewitz, Carl von (1980) [1832]: Vom Kriege: Hinterlassenes Werk des Generals Carl von Clau-sewitz, vollständige Ausgabe im Urtext, drei Teile in einem Band, Bonn: Dümmler.

Clayton, Mark (2011): „FBI Set to Kill Secret-Stealing Russian ‚Botnet’: Is Your Computer In-fected?“, The Christian Science Monitor, 06.05.2011, http://www.csmonitor.com/USA/2011/0506/FBI-set-to-kill-secret-stealing-Russian-botnet.-Is-your-computer-infected (18.07.2011).

Clayton, Mark (2010a): „Stuxnet Malware is ‚Weapon’ out to Destroy…Iran’s Bushehr Nuclear Plant?“, The Christian Science Monitor, 21.09.2010, http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant (15.03.2011).

Clayton, Mark (2010b): “Son of Stuxnet? Variants of the Cyberweapon Likely, Senators Told”, The Christian Science Monitor, 17.11.2010, http://www.csmonitor.com/USA/2010/1117/Son-of-Stuxnet-Variants-of-the-cyberweapon-likely-senators-told (14.08.2011).

Coleman, Kevin (2008): “The Cyber Arms Race Has Begun”, CSO Online, 28.01.2008, http://www.csoonline.com/article/216991/coleman-the-cyber-arms-race-has-begun?page=1 (10.08.2011).

CNN (2007): “Estonia Suspects Kremlin in Web Attacks”, 17.05.2007, http://www.industrialdefender.com/general_downloads/incidents/2007.05.17_estonia_suspects_kremlin_in_web_attacks.pdf (28.05.2011).

Page 9: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 353

Cohen, Dudi (2008): „Iranian ‚Spy’ Reveals Mossad Methods“, ynetnews, 07.07.2008, http://www.ynetnews.com/articles/0,7340,L-3565274,00.html (22.11.2010).

Cole, Jeffrey I. et al. (2003): The UCLA Internet Report: Surveying the Digital Future, Los Angeles, CA: UCLA Center for Communication Policy, http://www.digitalcenter.org/pdf/InternetReportYearThree.pdf (01.08.2011).

Coleman, Gabriella (2011): “Unberechenbar, mächtig und gefährlich”, Interview auf tagesschau.de, 28.02.2011, http://www.tagesschau.de/ausland/Anonymous100_page-2.html (15.03.2011).

Commission on Security & Cooperation in Europe (2009): Briefing: Twitter against Tyrants: New Media in Authoritarian Regimes, Washington, DC, http://csce.gov/index.cfm?FuseAction=ContentRecords.ViewTran-script&ContentRecord_id=462&ContentType=H,B&ContentRecord-Type=B&CFID=32177263&CFTOKEN=96274551 (03.06.2011).

Conetta, Carl (2005): Arms Control in an Age of Strategic and Military Revolution, Cambridge, MA: Commonwealth Institute.

Congressional Executive Commission on China (2002): Roundtable: China’s Cyber-Wall: Can Technology Break Through?, 04.11.2002, http://libweb.uoregon.edu/ec/e-asia/read/cybrchine.pdf (03.06.2011).

Connolly, Kate (2009): “Germany Accuses China of Industrial Espionage”, The Guardian, 22.07.2009, http://www.guardian.co.uk/world/2009/jul/22/germany-china-industrial-espionage (16.08.2011).

Coonan, Clifford (2010): “The Google War: China Calls US an ‘Information Imperialist’”, The Independent, 23.01.2010, http://www.independent.co.uk/news/world/asia/the-google-war-china-calls-us-an-information-imperialist-1876409.html (15.07.2011).

Copeland, Dale C. (2000): The Origins of Major War, Ithaca; London: Cornell University Press. Corera, Gordon (2009): “Cyber-security Strategy Launched”, BBC News, 25.06.2009,

http://news.bbc.co.uk/2/hi/uk_news/politics/8118348.stm (15.06.2011). Cottam, Martha L. et al. (2010): Introduction to Political Psychology, 2nd Edition, New York/Hove:

Psychology Press. Cronin, Audrey K. (2006): “Cyber-Mobilization: The New Levée en Masse”, Parameters, Sommer

2006, 77-87. Council of Europe (2003): Additional Protocol to the Convention on Cybercrime, Concerning the

Criminalisation of Acts of Racist and Xenophobic Nature Committed through Computer Sys-tems, Straßburg, http://conventions.coe.int/Treaty/en/Treaties/Html/189.htm (17.06.2011).

Council of Europe (2001): Convention on Cybercrime, Budapest, http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (17.06.2011).

Croen, Evan (2008): “Internet Filtering in Australia and New Zealand”, in: Ronald Deibert et al. (Hg.): Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge, MA: The MIT Press, 166-176.

CSIS (2011): Cybersecurity Two Years Later, Washington, DC, http://csis.org/files/publication/110128_Lewis_CybersecurityTwoYearsLater_Web.pdf (16.08.2011).

CSIS (2008): Securing Cyberspace for the 44th Presidency, Washington, DC, http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf (16.08.2011).

Czempiel, Ernst-Otto (1999): Kluge Macht: Außenpolitik für das 21. Jahrhundert, München: C. H. Beck.

Czempiel, Ernst-Otto (1996): „Internationale Beziehungen: Begriff, Gegenstand und Forschungsab-sicht”, in: Manfred Knapp/Gert Krell (Hg.): Einführung in die Internationale Politik: Studien-buch, München et al.: Oldenbourg, 3-26.

Czempiel, Ernst-Otto (1986): Friedensstrategien: Systemwandel durch Internationale Organisatio-nen, Demokratisierung und Wirtschaft, Paderborn: Schöningh.

Page 10: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

354 9 Literatur

Czempiel, Ernst-Otto (1975): „Friede und Konflikt in den Internationalen Beziehungen“, in: Helga Haftendorn (Hg.): Theorie der Internationalen Politik: Gegenstand und Methode der Internati-onalen Beziehungen, Hamburg: Hoffmann und Campe, 89-113.

Daase, Christopher (2010): Der erweiterte Sicherheitsbegriff, Working Paper, Frankfurt a.M.: Goe-the-Universität Frankfurt, http://www.sicherheitskultur.org/fileadmin/files/WorkingPapers/01-Daase.pdf (10.03.2011).

Dahlkamp, Jürgen (2007): „Prinzip Sandkorn“, Der Spiegel, Heft 35, 27.08.2007, 18. Damschke, Giesbert (2011): „Das DigiNotar-Desaster“, ZDF Hyperland, 12.09.2011,

http://blog.zdf.de/hyperland/2011/09/das-diginotar-desaster-oder-warum-sie-sich-vielleicht-sorgen-machen-sollten-2/ (14.09.2011).

Darnton, Geoffrey (2006): “Information Warfare and the Laws of War”, in: Edward Halpin et al. (Hg.): Cyberwar, Netwar and the Revolution in Military Affairs, Houndmills: Palgrave, 139-153.

Dauber, Cori E. (2009): Youtube War: Fighting in a World of Cameras in every Cell Phone and Photoshop on every Computer, Carlisle, PA: Strategic Studies Institute.

Daun, Anna (2011): Auge um Auge: Intelligence-Kooperation in den deutsch-amerikanischen Bezie-hungen, Wiesbaden: VS Verlag für Sozialwissenschaften.

Davis, Joshua (2007): “Hackers Take Down the Most Wired Country in Europe”, Wired, 21.08.2007, http://www.wired.com/politics/security/magazine/15-09/ff_estonia (28.05.2011).

Deibert, Ronald (2011): Cyber Security: Canada is Failing the World, 26.05.2011, http://www.infowar-monitor.net/2011/05/7334/ (10.06.2011).

Deibert, Ronald (2010): China’s Cyberspace Control Strategy: An Overview and Consideration of Issues for Canadian Policy, Toronto, ON: Canadian International Council.

Deibert, Ronald/Rohozinski, Rafal (2011): “The New Cyber Military-Industrial Complex”, The Globe and Mail, 28.03.2011, http://www.theglobeandmail.com/news/opinions/opinion/the-new-cyber-military-industrial-complex/article1957159/print/ (27.04.2011).

Deibert, Ronald/Rohozinski, Rafal (2010): “Control and Subversion in Russian Cyberspace”, in: Deibert, Ronald et al. (Hg.) (2010): Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, Cambridge, MA: The MIT Press, 15-34.

Deibert, Ronald et al. (Hg.) (2010): Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace, Cambridge, MA: The MIT Press.

Deibert, Ronald et al. (Hg.) (2008): Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge, MA: The MIT Press.

Delio, Michelle (2004): “Linux: Fewer Bugs than Rivals”, Wired, 14.12.2004, http://www.wired.com/software/coolapps/news/2004/12/66022 (10.08.2011).

DeNardis, Laura (2009): Protocol Politics: The Globalization of Internet Governance, Cambridge, MA: The MIT Press.

Denning, Dorothy E. (2001): “Obstacles and Options for Cyber Arms Control”, in: Heinrich-Böll-Stiftung (Hg.): Rüstungskontrolle im Cyberspace, Berlin, 36-39.

Denning, Dorothy E. (1999): Information Warfare and Security, Reading, MA: Addison-Wesley. DePalma, Anthony (2006): “Ontario Terrorism Suspects Face Lists of Charges in Plot”, The New

York Times, 06.06.2006, http://query.nytimes.com/gst/fullpage.html?res=9E05EEDC1431F935A35755C0A9609C8B63 (15.03.2011).

Derene, Glenn (2008): “Inside NSA Red Team Secret Ops with Government’s Top Hackers”, Popu-lar Mechanics, 30.06.2008, http://www.popularmechanics.com/technology/how-to/computer-security/4270420 (22.11.2010).

Der Standard (2007): “Lawrow: Estland bespuckt Gräber unserer Soldaten“, 02.05.2007, http://derstandard.at/2860303 (28.05.2011).

Page 11: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 355

De Sola Pool, Ithiel (1983): Technologies of Freedom: On Free Speech in an Electronic Age, Cam-bridge, MA: Harvard University Press.

De Sola Pool, Ithiel (1973): “Communication in Totalitarian Societies”, in: Ders. et al. (Hg.): Hand-book of Communication, Chicago, IL: Rand McNally College Publishing Company, 462-511.

Deutsch, Karl W. (1969) [1963]: Politische Kybernetic: Modelle und Perspektiven, Freiburg i.Br.: Verlag Rombach & Co.

Deutscher Bundestag (2011): Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Ulla Jelpke, Jan Korte, Dr. Petra Sitte, weiterer Abgeordneter und der Fraktion DIE LINKE, 14.07.2011, Drucksache 17/6587, Berlin, http://dipbt.bundestag.de/dip21/btd/17/065/1706587.pdf (11.08.2011).

DiCenso, David J. (1999): “IW Cyberlaw: The Legal Issues of Information Warfare”, Airpower Journal, Summer 1999, 85-102.

Diehl, Paul F. (1992): “What Are They Fighting For? The Importance of Issues in International Conflict Research”, Journal of Peace Research, 29 (3), 333-344.

Dolman, Everett C. (2002): Astropolitik: Classical Geopolitics in the Space Age, London: Frank Cass.

Domscheit-Berg (2011): Inside WikiLeaks: Meine Zeit bei der gefährlichsten Website der Welt, Berlin: Econ Verlag.

Donati, Madeleine (2011): „48 Jahre fehlender politischer Kultur“, Telepolis, 07.06.2011, http://www.heise.de/tp/druck/mb/artikel/34/34880/1.html (13.06.2011).

Donati, Paolo R. (2001): „Die Rahmenanalyse politischer Diskurse“, in: Reiner Keller et al. (Hg.): Handbuch Sozialwissenschaftliche Diskursanalyse, Bd. 1: Theorien und Methoden, Opladen: Leske + Budrich, 145-175.

Döring, Nicola (2003): Sozialpsychologie des Internet: Die Bedeutung des Internet für Kommunika-tionsprozesse, Identitäten, soziale Beziehungen und Gruppen, 2. Aufl., Göttingen et al.: Hogrefe.

Dougherty, James E./Pfaltzgraff, Robert L. (1997): Contending Theories of International Relations: A Comprehensive Survey, 4. Aufl., New York: Addison-Wesley Longman.

Douhet, Giulio (1998) [1942]: The Command of the Air, übersetzt von Dino Ferrari, Tuscaloosa: University of Alabama Press. Drew, Christopher/Markoff, John (2009): “Contractors Vie for Plum Work, Hacking for U.S.”, The

New York Times, 31.05.2009, 1. Dreyfus, Suelette (2003): “Hacktivism through the Eyes of an Infiltrator”, The Age (Melbourne),

08.05.2003, 10. Dreyfus, Suelette/Assange, Julian (2011) [1997]: Underground: Die Geschichte der frühen Hacker-

Elite, Berlin: Haffmans & Tolkemit. Drezner, Daniel W. (2007): All Politics is Global: Explaining International Regulatory Regimes,

Princeton/Oxford: Princeton University Press. Drucker, Peter F. (1989): The New Realities: In Government and Politics, in Economics and Busi-

ness, in Society and World View, New York, NY: Harper & Row. Ducker, James (1985): “Electronic Information – Impact of the Database”, Futures, 17 (2), 164-169. Dunn-Cavelty, Myriam (2008): Cyber-Security and Threat Politics: US Efforts to Secure the Infor-

mation Age, New York: Routledge. Dunn-Cavelty, Myriam/Kristensen, Kristian S. (Hg.) (2008): Securing the Homeland: Critical Infra-

structure, Risk and (In)Security, London: Routledge. Dunn-Cavelty, Myriam/Krishna-Hensel, Sai F./Mauer, Victor (Hg.) (2007): The Resurgence of the

State: Trends and Processes in Cyberspace Governance, Aldershot: Ashgate. Dunne, Tim/Schmidt, Brian C. (2001): “Realism”, in: John Baylis/Steve Smith (Hg.): The Globaliza-

tion of World Politics: An Introduction to International Relations, 2. Aufl., Oxford et al.: Ox-ford University Press, 141-161.

Page 12: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

356 9 Literatur

Duerr, Hans Peter (1995): Der Mythos vom Zivilisationsprozess: Band 3: Obszönität und Gewalt, Frankfurt a.M.: Suhrkamp.

Dyson, Esther et al. (1994): Cyberspace and the American Dream: A Magna Charta for the Knowl-edge Age, Washington, DC: Progress and Freedom Foundation.

Ebersole, Samuel (2007): Media Determinism in Cyberspace, Virginia Beach, VA: Regent Univer-sity, http://www.regent.edu/acad/schcom/rojc/mdic/md.html (02.02.2011).

Eckert, Paul/Magnowski, Daniel (2011): “Kissinger, Huntsman: U.S., China Need Cyber Detente“, Reuters, 14.06.2011, http://www.reuters.com/article/2011/06/14/us-china-kissinger-cyber-idUSTRE75D62Q20110614 (17.06.2011).

Efinger, Manfred/Rittberger, Volker/Zürn, Michael (1988): Internationale Regime in den Ost-West-Beziehungen: Ein Beitrag zur Erforschung der friedlichen Behandlung internationaler Konflik-te, Frankfurt am Main: Haag und Herchen Verlag.

Efinger, Manfred/Zürn, Michael (1990): “Explaining Conflict Management in East-West Relations: A Quantitative Test of Problem-Structural Typologies”, in: Volker Rittberger (Hg.): Interna-tional Regimes in East-West Politics, London/New York: Pinter Publishers.

El Deeb, Sarah/Michael, Maggie (2011): “Wael Ghonim, Freed Activist, Energizes Egyptian Pro-tests”, Huffington Post, 08.02.2011, http://www.huffingtonpost.com/2011/02/08/wael-ghonim-egypt-protests-google_n_820330.html (10.04.2011).

El Difraoui, Asiem/Steinberg, Guido (2011): “Der Feind in unserem Netz: Wie bekämpft man Al-Kaida & Co. im virtuellen Raum?“, Internationale Politik, Januar/Februar 2011, 20-25.

Electronic Frontier Foundation (2011): EEF to Obama Administration: Syrians Deserve Access to Communications and Information Tools, San Francisco, CA, http://www.eff.org/deeplinks/2011/07/eff-u-s-treasury-and-commerce-time-clarify-u-s (20.07.2011).

Electronic Frontier Foundation (2010): Better U.S. Net Rules for Iran, Cuba and Syria, San Fran-cisco, CA, http://www.eff.org/deeplinks/2010/03/better-u-s-net-rules-iran-cuba-and-syria (29.03.2010).

Elliott, David (2009): “Weighing the Case for a Convention to Limit Cyberwarfare”, Arms Control Today, 39 (9).

Ellul, Jacques (1964): The Technological Society, New York: Vintage Books. Elter, Andreas (2007): “Die RAF und die Medien: Ein Fallbeispiel für terroristische Kommunikati-

on“, in: Bundeszentrale für politische Bildung (Hg.): Dossier RAF, Bonn, abrufbar unter http://www.bpb.de/themen/XNP7ZG,0,0,Die_RAF_und_die_Medien.html (05.08.2011).

Emm, David (2010): “Schwachstelle Mensch”, Viruslist.com, 01.04.2010, http://www.viruslist.com/de/analysis?pubid=200883688 (15.03.2011).

ENISA (2010): First EU Cyber Security Exercise ‘Cyber Europe 2010’ with >320 ‘incidents’ suc-cessfully concluded”, 05.11.2010, http://www.enisa.europa.eu/media/press-releases/cyber-europe-20102019-cyber-security-exercise-with-320-2018incidents2019-successfully-concluded (16.08.2011).

Entman, Robert M. (1993): „Framing: Toward Clarification of a Fractured Paradigm“, Journal of Communication, 43 (4), 51-58.

Erdbrink, Thomas/Warrick, Joby (2011): „Iran: Country under Attack by Second Computer Virus“, The Washington Post, 25.04.2011, http://www.washingtonpost.com/world/iran-country-under-attack-by-second-computer-virus/2011/04/25/AFudkBjE_story.html (27.04.2011).

Eriksson, John/Giacomello, Giampiero (2009): “Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State”, International Studies Review, 11 (1), 205-230.

Esfandiari, Golnaz (2010): „The Twitter Devolution”, Foreign Policy, 07.06.2010, http://www.foreignpolicy.com/articles/2010/06/07/the_twitter_revolution_that_wasnt (14.08.2011).

Page 13: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 357

Eshel, David (2010): Israel Adds Cyber-Attack to IDF“, Aviation Week’s Defense Technology Inter-national, 10.02.2010, http://www.military.com/features/0,15240,210486,00.html (09.06.2011).

Espiner, Tom (2011): „UK Cbersecurity Spending Plans Revealed“, ZDNet UK, 20.04.2011, http://www.zdnet.co.uk/news/security-management/2011/04/20/uk-cybersecurity-spending-plans-revealed-40092586/ (27.04.2011).

Espiner, Tim/Klingler, Anita (2011): “Krawalle in London: RIM will Messenger-Daten an Polizei weitergeben”, ZDNet, 09.08.2011, http://www.zdnet.de/news/41555530/krawalle-in-london-rim-will-messenger-daten-an-polizei-weitergeben.htm (13.11.2008).

Estes, Adam C. (2011): “Hackers Respond to Hacking Arrests with More Hacking”, The Atlantic Wire, 26.07.2011, http://www.theatlanticwire.com/technology/2011/07/hackers-respond-hacking-arrests-more-hacking/40382/ (08.08.2011).

Etling, Bruce/Faris, Robert/Palfrey, John (2010): “Political Change in the Digital Age: The Fragility and Promise of Online Organizing”, The Berkman Center for Internet & Society at Harvard University, http://dash.harvard.edu/handle/1/4609956 (10.04.2011).

Europäisches Parlament (2011): “Exporte von ‘sensiblen Gütern’ beschränken”, Pressemitteilung, http://www.europarl.europa.eu/pdfs/news/expert/infopress/20110927IPR27586/20110927IPR27586_de.pdf (26.10.2011).

Evers, Joris (2003): “China Next to Get Access to Microsoft Source Code”, InfoWorld, 28.02.2003, http://www.infoworld.com/print/8026 (03.03.2010).

Evron, Gadi (2009): “Authoratively, Who Was Behind the Estonian Attacks?”, darkreading.com, 17.03.2009, http://www.darkreading.com/blog/227700882/authoritatively-who-was-behind-the-estonian-attacks.html (31.05.2011).

Evron, Gadi (2008): “Battling Botnets and Online Mobs: Estonia’s Defense Efforts during the Inter-net War”, Georgetown Journal of International Affairs, 9 (1), 121-126.

Executive Office of the President of the United States (2008): The Comprehensive National Cyberse-curity Initiative, Auszüge unter http://www.fas.org/irp/eprint/cnci.pdf (22.11.2010).

Facebook (2011a): Pressebereich: Statistiken, http://www.facebook.com/press/info.php?statistics (09.04.2011).

Facebook (2011b): Statement of Rights and Responsibilities, Stand: 25.03.2011, http://www.facebook.com/terms.php (15.04.2011).

Fahim, Kareem (2011): “Slap to a Man’s Pride Set Off Tumult in Tunesia”, The New York Times, 21.01.2011, http://www.nytimes.com/2011/01/22/world/africa/22sidi.html (10.04.2011).

Falliere, Nicolas/O’Murchu, Liam/Chien, Eric (2011): W32.Stuxnet Dossier, Symantec, http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf (15.03.2011).

Fallows, Deborah (2008): „Few in China Complain about Internet Controls“, Pew Research Center, 27.03.2008, http://pewresearch.org/pubs/776/china-internet (17.08.2011).

Farago, Yonit (2006): “Israel Backed by Army of Cyber-Soldiers”, The Times Online, 28. 07.2006, http://www.timesonline.co.uk/tol/news/world/middle_east/article693911.ece (07.10.2010).

Faris, Robert et al. (2011): Online Security in the Middle East and North Africa: A Survey of Percep-tions, Knowledge, and Practice, Cambridge, MA: Berkman Center for Internet and Society, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/OnlineSecurityintheMiddleEastandNorthAfrica_August2011.pdf (15.08.2011).

Faris, Robert/Villeneuve, Nart (2008): „Measuring Global Internet Filtering”, in: Ronald Deibert et al. (Hg.): Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge, MA: The MIT Press, 5-27.

Farwell, James P. (2010): “Jihadi Video in the ‘War of Ideas’”, Survival, 52 (6), 127-150. Farwell, James P./Rohozinski, Rafal (2011): „Stuxnet and the Future of Cyber War“, Survival, 53 (1),

23-40.

Page 14: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

358 9 Literatur

Fathi, Nazila (2009): “In a Death Seen Around the World, a Symbol of Iranian Protests”, The New York Times, 23.06.2009, http://www.nytimes.com/2009/06/23/world/middleeast/23neda.html (15.03.2011).

Fearon, James D./Wendt, Alexander (2002): “Rationalism v. Constructivism: A Skeptical View”, in: Carlsnaes, Walter/Risse, Thomas/Simmons, Beth A. (Hg.): Handbook of International Rela-tions, London: Sage, 52-72.

Federation of American Scientists (FAS) (2011a): „Agencies Boost Surveillance of Classified Net-works“, Secrecy News, Issue 24, 14.03.2011.

Federation of American Scientists (FAS) (2011b): “Secrecy of Cyber Threats Said to Cause Compla-cency”, Secrecy News, 18.04.2011, http://www.fas.org/blog/secrecy/2011/04 (27.04.2011).

Federation of American Scientists (FAS) (2000): Secret Internet Protocol Router Network (SIPRNET), http://www.fas.org/irp/program/disseminate/siprnet.htm (15.03.2011).

Feezel, Jessica T./Conroy, Meredith/Guerrero, Mario (2009): “Facebook is... Fostering Political Engagement: A Study of Online Social Networking Groups and Offline Participation”, Paper for Presentation at the American Political Science Association Meeting in Toronto, Canada, September 2009, http://irevolution.files.wordpress.com/2009/09/apsa-feezell-2009.pdf (10.04.2011).

Ferguson, Aaron J. (2005): “Fostering Email Security Awareness: The West Point Carronade”, Educause Quarterly, 28 (1), 54-57.

Festinger, Leon (1957): A Theory of Cognitive Dissonance, Stanford, CA: Stanford University Press. Feuilherade, Peter (2007): “China Leader Urges Net Crackdown”, BBC Montoring, 25.04.2007,

http://news.bbc.co.uk/2/hi/technology/6592003.stm (03.03.2010). Fey, Marco/Müller, Harald (2008): „Unkontrollierbare Rüstungsdynamik? Die RMA als ‚harter

Brocken‘ für die Rüstungskontrolle“, in: Jan Helmig/Niklas Schörnig (Hg.): Die Transformati-on der Streitkräfte im 21. Jahrhundert: Militärische und politische Dimensionen der aktuellen ‘Revolution in Military Affairs’, Frankfurt am Main: Campus, 203-223.

Financial Times (2007): „US Warns Cyber-Attacks will Increase“, 17.05.2007, http://www.ft.com/cms/s/0/324fa472-049e-11dc-80ed-000b5df10621.html#axzz1Nej08Dbs (28.05.2011).

Finjan (2006): Web Security Trends Report Q4 2006, San Jose, CA: Finjan Malicious Code Research Center, http://www.m86security.com/labs/web-security-trends-reports.asp (13.08.2011).

Finkle, Jim (2011a): “U.S. Government Says Stuxnet Could Morph into new Threat”, Montreal Gazette, 29.07.2011, http://www.montrealgazette.com/technology/government+says+Stuxnet+could+morph+into+threat/5178616/story.html (08.08.2011).

Finkle, Jim (2011b): “Biggest-ever Series of Cyber Attacks Uncovered”, Reuters, 03.08.2011, http://www.reuters.com/article/2011/08/03/cyberattacks-idUSN1E76R26720110803 (08.08.2011).

Finklea, Kristin M. (2011): The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement, Congressional Research Service, http://www.fas.org/sgp/crs/misc/R41927.pdf (20.08.2011).

Finn, Peter (2007): „Cyber Assaults on Estonia Typify a New Battle Tactic”, The Washington Post, 19.05.2007, A01.

Finnemore, Martha (2011): Cultivating International Cyber Norms”, in: Kristin M. Lord/Travis Sharp (Hg.): America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, Washington, DC: Center for a New American Security, 89-100.

Fischbach, Rainer (2005): Mythos Netz: Kommunikation jenseits von Raum und Zeit?, Zürich: Rot-punkt Verlag.

Fischer, Frederik (2011): Syrien: Hacker gegen die Revolution“, ZDF Hyperland, 09.09.2011, http://blog.zdf.de/hyperland/2011/09/syrien-hacker-gegen-die-revolution/ (14.09.2011).

Page 15: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 359

Fisher, Max (2010): „5 Reasons to Doubt Al-Qaeda Magazine’s Authenticity“, The Atlantic, 01.07.2010, http://www.theatlantic.com/international/archive/2010/07/5-reasons-to-doubt-al-qaeda-magazines-authenticity/59035/ (15.04.2011).

Fiske, Susan T./Taylor, Shelley E. (2010): Social Cognition: From Brains to Culture, Boston et al.: McGraw Hill.

Fitzgerald, Patrick (2010): „The Hackers behind Stuxnet“, Symantec Official Blog, 21.07.2010, http://www.symantec.com/connect/blogs/hackers-behind-stuxnet (15.03.2010).

Flade, Florian (2011): “Wie der Computerspieler Arid U. zum Mörder wurde“, Welt Onlinet, 05.03.2011, http://www.welt.de/politik/deutschland/article12707960/Wie-der-Computerspieler-Arid-U-zum-Moerder-wurde.html (15.03.2011).

Flamm, Kenneth (1987): Targeting the Computer: Government Support and International Competi-tion, Washington DC: The Brookings Institution.

Fontaine, Richard/Rogers, Will (2011a): Internet Freedom: A Foreign Policy Imperative in the Digital Age, Washington, DC: Center for a new American Security, http://www.cnas.org/files/documents/publications/CNAS_InternetFreedom_FontaineRogers_0.pdf (01.08.2011).

Fontaine, Richard/Rogers, Will (2011b): “Internet Freedom and its Discontents: Navigating the Tensions with Cyber Security”, in: Kristin M. Lord/Travis Sharp (Hg.): America’s Cyber Fu-ture: Security and Prosperity in the Information Age: Volume II, Washington, DC: Center for a New American Security, 145-164.

Ford, Peter (2001): “Europe Cringes at Bushs ‘Crusade’ against Terrorists”, Christian Science Moni-tor, 19.09.2001, http://www.csmonitor.com/2001/0919/p12s2-woeu.html (21.05.2011).

Foreign Policy (2011): “The FP Survey: The Internet”, September/Oktober 2011, 90. Foucault, Michel (1995): Discipline and Punish: The Birth of the Prison, New York, NY: Vintage

Books. Fox News (2009): “Pentagon Official: North Korea behind Week of Cyber Attacks”, 09.07.2009,

http://www.foxnews.com/story/0,2933,530781,00.html (11.08.2011). Fox News (2006): “FBI Busts ‘Real Deal’ Terror Plot Aimed at NYC-NJ Underground Transit

Link”, 07.07.2006, http://www.foxnews.com/story/0,2933,202518,00.html (15.03.2011). Franck, Georg (1998): Ökonomie der Aufmerksamkeit: Ein Entwurf, München/Wien: Carl Hanser

Verlag. Francis, Bob (2005): “Know thy Hacker: The Dollars and Cents of Hacking”, InfoWorld, 28.01.2005,

http://www.infoworld.com/d/security-central/know-thy-hacker-534 (22.11.2010). Freedman, Lawrence (2004): Deterrence, Cambridge: Polity Press. Frei, Daniel (1973): “Einführung: Wozu Theorien der internationalen Politik?”, in: Ders. (Hg.):

Theorien der internationalen Beziehungen, München: Pieper, 11-25. Frey, Dieter (1997): “Kognitive Theorien in der Sozialpsychologie”, in: Dieter Frey/Siegfried Greif

(Hg.): Sozialpsychologie: Ein Handbuch in Schlüsselbegriffen, 4. Auflage, Weinheim: Psy-chologie Verlagsunion, 50-67.

Friedman, Thomas (2006): The World is Flat: The Globalized World in the Twenty-First Century, New York/London: Penguin Books.

Friedman, Thomas (2000): “Censors Beware”, The New York Times, 25.07.2000, 25. Friedman, Thomas (1999): The Lexus and the Olive Tree: Understanding Globalisation, New York,

NY: Farrar, Straus and Giroux. Friscolanti, Michael/Gatehouse, Jonathan/Gillis, Charlie (2006): “Homegrown Terror: It’s not over”,

Macleans.ca, 19.06.2006, http://www.macleans.ca/canada/national/article.jsp?content=20060619_128953_128953 (15.03.2011).

Page 16: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

360 9 Literatur

Fritz, Jason (2009): “Hacking Nuclear Command and Control”, Working Paper, International Com-mission on Nuclear Nonproliferation and Disarmament: Barton (Australia), http://www.icnnd.org/Documents/Jason_Fritz_Hacking_NC2.pdf (15.07.2011).

Froomkin, Michael A. (1997): “The Internet as Source of Regulatory Arbitrage”, in: Brian Ka-hin/Charles Nesson (Hg.): Borders in Cyberspace, Cambridge, MA: The MIT Press, 129-163.

Fukuyama, Francis (1999): The Great Disruption: Human Nature and the Reconstitution of Social Order, New York: Free Press.

Fulghum, David A. (2007a): “Technology Will Be Key to Iraq Buildup”, Aviation Week & Space Technology, 14.01.2007, http://www.aviationweek.com/aw/generic/story_channel.jsp?chan-nel=defense&id=news/aw011507p2.xml&headline=null&next=0 (13.08.2011).

Fulghum, David A. (2007b): “Why Syria’s Air Defenses Failed to Detect Israelis”, Aviation Week & Space Technology, 03.10.2007, http://www.aviationweek.com/aw/blogs/defense/index.jsp?plckControl-ler=Blog&plckScript=blogScript&plckElementId=blogDest&plckBlogPage=BlogViewPost&plckPostId=Blog%3a27ec4a53-dcc8-42d0-bd3a-01329aef79a7Post%3a2710d024-5eda-416c-b117-ae6d649146cd (17.11.2010).

Fulghum, David (2004): “Battle for Minds”, Aviation Week & Space Technology, 161 (9), 52-53. Fulghum, David (2002): “Infowar to Invade Air Defense Networks: The U.S. Can now Conduct

Computer Network Attack in Support of Precision Bombardment, or as an Alternative”, Avia-tion Week & Space Technology, 157 (19), 30.

Fulghum, David A./Rober Wall (2001): “Cyber-Arsenal Needs Testing”, Aviation Week & Space Technology, 26.02.2001, 52-53.

Fulghum, David A. (1999): “Yugoslavia Successfully Attacked by Computers”, Aviation Week & Space Technology, 23.08.1999, 31-34.

Fulghum, David A./Wall, Robert (1999): “Information Warfare Isn’t What You Think”, Aviation Week & Space Technology, 26.02.2001, 52-53.

Gaouette, Nicole/Greely, Brendan (2011): “U.S. Funds Help Democracy Activists Evade Internet Crackdowns”, Bloomberg News, 20.04.2011, http://www.bloomberg.com/news/2011-04-20/u-s-funds-help-democracy-activists-evade-internet-crackdowns.html (27.04.2011).

Garden, Timothy (2002): “Air Power: Theory and Practice”, in: John Baylis et al. (Hg.): Strategy in the Contemporary World, Oxford: Oxford University Press, 137-157.

Gause, F. Gregory (2011): “Why Middle East Studies Missed the Arab Spring”, Foreign Affairs, Juli/August, 81-90.

Gaycken, Sandro (2011): Cyberwar: Das Internet als Kriegsschauplatz, Open Source Press: Mün-chen.

Gaycken, Sandro (2010): „Stuxnet: Wer war’s? Und wozu?“, Zeit Online, 26.11.2010, http://www.zeit.de/2010/48/Computerwurm-Stuxnet?page=all&print=true (15.03.2011).

Gat, Azar (2007): “The Return of the Authoritarian Great Powers”, Foreign Affairs, 86 (4), 59-69. Gedmin, Jeffrey (2010): “Democracy isn’t just a Tweet away”, USA Today, 22.04.2010,

http://www.usatoday.com/news/opinion/forum/2010-04-23-gedmin22_ST_N.htm (20.08.2011).

Geiger, Gebhard (2002): Offensive Informationskriegsführung: Die 'Joint Doctrine for Information Operations' der US-Streitkräfte - Sicherheitspolitische Perspektiven, Berlin: Stiftung Wissen-schaft und Politik.

Gellmann, Barton (2002): „Cyber-Attacks by Al Qaeda Feared”, Washington Post, 27.06.2002, A01. Geist, Michael (2010): “Cyberlaw 2.0”, Boston College Law Review, 44 (2), 323-358. George, Alexander L./Bennett, Andrew (2005): Case Studies and Theory Development in the Social

Sciences, Cambridge/London: The MIT Press. George, Michael (2011): “Bedingt Abwehrbereit”, Süddeutsche Zeitung, 16./17.07.2011, V2/4.

Page 17: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 361

Gertz, Bill (2009): “China Blocks U.S. from Cyber Warfare”, The Washington Times, 12.05.2009, http://www.washingtontimes.com/news/2009/may/12/china-bolsters-for-cyber-arms-race-with-us/ (14.05.2009).

Geva, Nehemia/Mintz, Alex (Hg.) (1997): Decision Making on War and Peace: The Cognitive-Rational Debate, London: Lynne-Rienner.

Ghannam, Jeffrey (2011): Social Media in the Arab World: Leading up to the Uprisings of 2011, Washington, DC: Center for International Media Assistance/National Endowment for Democ-racy, http://www.humansecuritygateway.com/documents/CIMA_SocialMediaintheArab-World_LeadinguptotheUprisingsof2011.pdf (16.06.2011).

Gharbia, Sami B. (2011): “The Internet Freedom Fallacy and the Arab Digital Activism”, Sami Ben Gharbia (Blog), 17.09.2010, http://samibengharbia.com/2010/09/17/the-internet-freedom-fallacy-and-the-arab-digital-activism/ (16.06.2011).

Ghose, Jayati (2008): “Code-Blind Delhi Deaf to Terror Chatter”, The Telegraph (India), 05.12.2008, erhalten durch BBC Monitoring South Asia, 06.12.2008.

Gibson, William (1984): Neuromancer, New York: Ace Books. Gibson, William (1982): “Burning Chrome”, Omni Magazine, Juli 1982. Giglio, Mike (2011): “Middle East Uprising: Facebook's Secret Role in Egypt”, The Daily Beast,

24.02.2011, http://www.thedailybeast.com/blogs-and-stories/2011-02-24/middle-east-uprising-facebooks-back-channel-diplomacy/?cid=hp:mainpromo6%23# (05.05.2011).

Gilder, George (1989): Microcosm: The Quantum Revolution in Economics and Technology, New York, NY: Simon & Schuster.

Gillis, Kyle (2010): “Facebook CEO Defends Company in ABC Interview”, Business & Media Institute, 22.07.2010, http://www.mrc.org/bmi/articles/2010/Facebook_CEO_Defends_Company_in_ABC_Interview_Advocates_Democracy.html (15.03.2011).

Gilpin, Robert (1981): War and Change in World Politics, Cambridge: Cambridge University Press. Gjelten, Tom (2011): “Volunteer Cyber Army Emerges in Estonia”, 04.01.2011,

http://www.npr.org/2011/01/04/132634099/in-estonia-volunteer-cyber-army-defends-nation (09.06.2011).

Gjelten, Tom (2010a): “Shadow Wars: Debating ‘Cyber ‘Disarmament’”, World Affairs Online, November/Dezember 2010, http://www.worldaffairsjournal.org/articles/2010-NovDec/full-Gjelten-ND-2010.html (12.05.2011).

Gjelten, Tom (2010b): “Seeing the Internet as an ‘Information Weapon’, National Public Radio, 23.10.2010, http://www.npr.org/templates/story/story.php?storyId=130052701 (22.11.2010).

Gladwell, Malcolm (2010): “Small Change: Why the Revolution Will not Be Tweeted”, The New Yorker, 04.10.2010, http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell (10.04.2011).

Glanville, Jo (2008): “The Big Business of Net Censorship”, The Guardian, 17.11.2008, http://www.guardian.co.uk/commentisfree/2008/nov/17/censorship-internet (03.03.2010).

Glanz, James/Markoff, John (2011a): “Egypt Leaders Found ‘Off Switch for Internet”, The New York Times, 15.02.2011, http://www.nytimes.com/2011/02/16/technology/16internet.html (15.03.2011).

Glanz, James/Markoff, John (2011b): “U.S. Underwrites Internet Detour Around Censors”, The New York Times, 12.06.2011, http://www.nytimes.com/2011/06/12/world/12internet.html (17.06.2011).

Glenny, Misha (2011): “Canada’s Weakling Web Defences”, The Globe and Mail, 18.05.2011, http://www.theglobeandmail.com/news/opinions/opinion/canadas-weakling-web-defences/article2025517/ (10.06.2011).

Page 18: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

362 9 Literatur

Global Network Initiative (2008): Implementation Guidelines, O.A., http://www.globalnetworkinitiative.org/cms/uploads/1/GNI_-_Implementation_Guidelines_1_.pdf (03.03.2010).

Goetz, John/Rosenbach, Marcel/Szandar, Alexander (2009): „Krieg der Zukunft“, Der Spiegel, Heft 7/2009, 34.

Goffman, Erving (1974): Frame Analysis: An Essay on the Organization of Experience, London: Harper and Row.

Goldman, Emily O. (1997): “Arms Control in the Information Age”, Contemporary Security Policy, 18 (2), 25-50.

Goldsmith, Jack/Wu, Tim (2006): Who Controls the Internet? Illusions of a Borderless World, Ox-ford: Oxford University Press.

Goldsmith, Jack (2007): The Terror Presidency: Law and Judgement inside the Bush Administration, New York: W.W. Norton & Company.

Goldsmith, Jack (2000): “Unilateral Regulation of the Internet: A Modest Defence”, European Journal of International Law, 11 (1), 135-148.

Goldsmith, Jack (1997): “The Internet and the Abiding Significance of Territorial Sovereignty”, Indiana Journal of Global Legal Studies, 5 (2), 475-491.

Goldstone, Jack A. (2011): “Understanding the Revolutions of 2011: Weakness and Resilience in Middle Eastern Autocracies”, Foreign Affairs, 90 (3).

Gompert, D. C. (1999): “Right Makes Might. Freedom and Power in the Information Age”, In: Zalmay Khalilzad et al. (Hg.): Strategic Appraisal: The Changing Role of Information in War-fare. Santa Monica, CA: RAND, 45-73.

Gorman, Siobhan/Barnes, Julian E. (2011): “Cyber Combat: Act of War”, The Wall Street Journal, 31.05.2011, http://online.wsj.com-/article/SB10001424052702304563104576355623135782718.html (07.06.2011).

Gorman, Siobhan (2010): “Computer Worm Hits Iran Power Plant”, The Wall Street Journal, 26.09.2010, http://online.wsj.com-/article/SB10001424052748704082104575515581009698978.html (17.11.2010).

Gorman, Siobhan (2009a): “Electricity Grid in U.S. Penetrated by Spies”, The Wall Street Journal, 08.04.2009, http://online.wsj.com/article/SB123914805204099085.html (17.11.2010).

Gorman, Siobhan (2009b): Gates to Nominate NSA Chief to Head New Cyber Command”, The Wall Street Journal, 24.04.2009, http://online.wsj.com/article/SB124060266381953839.html (22.11.2010).

Gorman, Siobhan (2009c): “Security Cyber Czar Steps Down”, The Wall Street Journal, 04.08.2009, http://online.wsj.com/article/SB124932480886002237.html?mod=sphere_ts&mod=sphere_wd (14.04.2011).

Graham, Bradley (2003): „Bush Orders Guidelines for Conducting Cyber-Warfare”, Washington Post, 07.02.2003, A01.

Graham, Bradley (2005): „Hackers Attack Via Chinese Web Sites“, The Washington Post, 25.08.2005, http://www.washingtonpost.com/wp-dyn/content/article/2005/08/24/AR2005082402318.html (17.11.2010).

Grant, Rebecca (2007): Victory in Cyberspace, Arlington, VA: Air Force Association, http://www.afa.org/media/reports/victorycyberspace.pdf (14.05.2010).

Greely, Brendan (2011): “The Fallacy of Facebook Diplomacy”, Bloomberg Businessweek, 02.02.2011, http://www.businessweek.com/print/magazine/content/11_07/b4215008414536.htm (10.04.2011).

Green, David A. (2011): “The £12m Question: How WikiLeaks Gags its own Staff”, NewStatesman, 11.05.2011, http://www.newstatesman.com/blogs/david-allen-green/2011/05/WikiLeaks-information-legal (16.05.2011).

Page 19: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 363

Greenberg, Andy (2009): “Obama’s Unwilling Cyber Czars”, Forbes.com, 20.07.2009, http://www.forbes.com/2009/07/20/cybersecurity-obama-economy-technology-security-cybersecurity.html (14.04.2011).

Grieco, Joseph M. (1990): Cooperation among Nations: Europe, America, and non-tariff Barriers to Trade, Ithaca: Cornell University Press.

Grieco, Joseph M. (1988): „Anarchy and the Limits of Cooperation: A Realist Critique of the Newest Liberal Institutionalism“, International Organization, 42 (3), 485-507.

Grimmelmann, James (2009): “Saving Facebook”, Iowa Law Review, 94, 1137-1206, http://works.bepress.com/cgi/viewcontent.cgi?article=1019&context=james_grimmelmann (15.03.2011).

Grimmelmann, James (2005): “Regulation by Software”, The Yale Law Journal, 114, 1719-1758. Grossman, Lawrence K. (1995): The Electronic Republic: Reshaping Democracy in the Information

Age, New York et al.: Viking Penguin. Gross-Stein, Janice (2002): “Psychological Explanations of International Conflict”, in: Walter Carls-

naes/Thomas Risse/Beth A. Simmons (Hg.): Handbook of International Relations, London et al: Sage Publications, 292-308.

Gross-Stein, Janice/Welch, David A. (1997): “Rational and Psychological Approaches to the Study of International Conflict: Comparative Strenghts and Weaknesses”, in: Nehemia Geva/Alex Mintz (Hg.): Decision-making on War and Peace: The Cognitive-Rational Debate, Boulder: Lynne Rienner, 51-77.

Gray, Colin S. (Hg.) (1999): Geopolitics, Geography and Strategy, London: Frank Cass. Greenwald, Glenn (2011): “The Leaked Campaign to Attack WikiLeaks and its Supporters”, Sa-

lon.com, 11.02.2011, http://www.salon.com/news/opinion/glenn_greenwald/2011/02/11/campaigns (15.03.2011).

Grow, Brian/Epstein, Keith/Tschang, Chi-Chu (2008): “The New E-Spionage Threat”, Business Week, 10.04.2008, http://www.businessweek.com/magazine/content/08_16/b4080032218430.htm (22.11.2010).

Grzanna, Marcel (2011): “China verschärft Internet-Zensur”, Süddeutsche Zeitung, 27.07.2011, 8. Guadagno, Rosanna E./Cialdini, Robert B./Evron, Gadi (2010): “Storming the Servers: A Social

Psychological Analysis of the First Internet War”, Cyberpsychology, Behavior, and Social Networking, 13 (4), 447-453.

Gupta, Harish (2011): “As Cyber Attacks Rise, India Sets up Central Command to Fight Back”, Daily News & Analysis India, 15.05.2011, http://www.dnaindia.com/india/report_as-cyber-attacks-rise-india-sets-up-central-command-to-fight-back_1543352 (09.06.2011).

Haas, Peter M. (1992): “Introduction: Epistemic Communities and International Policy Coordina-tion”, International Organization, 46 (1), 1-35.

Hachigan, Nina (2002): “The Internet and Power in One-Party East Asian States”, The Washington Quarterly, 25 (3), 41-58.

Hafner, Katie & Lyon, Matthew (2006): Where Wizards Stay up Late: The Origins of the Internet, New York, NY: Simon & Schuster.

Haggard, Stephan/Simmons, Beth A. (1987): “Theories of International Regimes”, International Organization, 41 (3), 491-517.

Hales, Paul (2011): “Anonymous Claims Responsibility for Sony Attack”, Thinq_, 24.04.2011, http://www.thinq.co.uk/2011/4/24/Anonymous-claims-responsibilty-sony-attack/ (12.05.2011).

Halpin, Tony (2007): “Estonia Accuses Russia of ‘Waging Cyber War’”, Times Online, 17.05.2007, http://www.timesonline.co.uk/tol/news/world/europe/article1802959.ece (27.05.2011).

Hancock, Bill (1999): „First ‘Official’ Cyberwar: Kosovo vs. NATO”, Computers & Security, 18 (7), 557-558.

Hansen, Lene/Helen, Nissenbaum (2009): “Digital Disaster, Cyber Security, and the Copenhagen School”, International Studies Quarterly, 53 (4), 1155-1175.

Page 20: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

364 9 Literatur

Hansel, Mischa (2010): „Neue und alte Barrieren: Herrschaft und politische Partizipation im Cyber-space“, in: Zeitschrift für Außen- und Sicherheitspolitik, 3 (3), 357- 378.

Harden, Blaine (2006): “In Montana, Casting a Web for Terrorists”, The Washington Post, 04.06.2006, http://www.washingtonpost.com/wp-dyn/content/article/2006/06/03/AR2006060300530_pf.html (05.05.2011).

Harden, Blaine (2009): “South Korean Web Sites Are Hobbled in new Round of Attacks”, The Washington Post, 10.07.2009, http://www.washingtonpost.com/wp-dyn/content/article/2009/07/09/AR2009070901106.html (17.11.2010).

Harris, Leslie et al. (2011): An Open Letter to Congress about Internet Freedom, 14.03.2011, http://mobileactive.tumblr.com/ (07.06.2011).

Harris, Shane (2009): “The Cyber Defense Perimeter”, National Journal, 02.05.2009, http://www.nationaljournal.com/njmagazine/id_20090502_5834.php (22.11.2010).

Harvey, Mike (2009): “Contest Aims to Turn Young Hackers into Cyber Security ‘Top Guns’”, The Sunday Times, 08.10.2009, http://technology.timesonline.co.uk/tol/news/tech_and_web/article6865432.ece (22.11.2010).

Hartwich, Hans-Hermann (Hg.): Politik und die Macht der Technik, Opladen: Westdeutscher Verlag. Hasenclever, Andreas/Mayer, Peter/Rittberger, Volker (1997): Theories of International Regimes,

Cambridge: Cambridge University Press. Hasenclever, Andreas/Mayer, Peter/Rittberger, Volker (1996): “Interests, Power, Knowledge: The

Study of International Regimes”, Mershon International Studies Review, 40 (2), 177-228. Hauck, Mirjam/Kuhn, Johannes (2011): “Whistleblower-Plattform droht Finanzkollaps: Wikileaks

stellt Enthüllungen ein“, Süddeutsche Zeitung, 24.10.2011, http://www.sueddeutsche.de/digital/whistleblower-plattform-droht-finanzkollaps-wikileaks-stellt-enthuellungen-ein-1.1172082 (18.12.2011).

Hayashi, Mika (2007): “The Information Revolution and the Rules of Jurisdiction in Public Interna-tional Law”, in: M. Dunn et al. (Hg.): The Resurgence of the State: Trends and Processes in Cyberspace Governance, Aldershot: Ashgate, 59-84.

Heider, Fritz (1958): The Psychology of Interpersonal Relations, New York: Wiley. Heinrich Böll Stiftung (2001): Rüstungskontrolle im Cyberspace, Berlin. Heise Media (2010): „FBI-Backdoor in IPSec-Implementierung von OpenBSD?“, 15.12.2010,

http://www.heise.de/security/meldung/FBI-Backdoor-in-IPSec-Implementierung-von-OpenBSD-1153180.html (04.08.2010).

Heise Media (2008): „Cyberkrieg im Kaukasus“, 10.08.2008, http://www.heise.de/newsticker/meldung/Cyberkrieg-im-Kaukasus-194512.html (10.06.2011).

Heise Media (2007a): „Anonymisierungsnetz Tor ‚abgephisht’“, 10.09.2007, http://www.heise.de/security/meldung/Anonymisierungsnetz-Tor-abgephisht-173525.html (10.08.2011).

Heise Media (2007b): “Estonian DDoS – A Final Analysis”, 31.05.2007, http://www.h-online.com/security/news/item/Estonian-DDoS-a-final-analysis-732971.html?view=print (17.11.2010).

Helmig, Jan/Schörnig, Niklas (Hg.) (2008): Die Transformation der Streitkräfte im 21. Jahrhundert: Militärische und politische Dimensionen der aktuellen ‘Revolution in Military Affairs‘, Frank-furt am Main: Campus.

Hencke, David (2009): “Whitehall Plans New Cyber Security Centre to Deter Foreign Hackers”, The Guardian Online, 14.06.2009, http://www.guardian.co.uk/technology/2009/jun/14/government-security-cyber-crime-hacking (22.11.2010).

Henderson, Scott (2007): The Dark Visitor: Inside the World of Chinese Hackers, o.A.: publiziert im Eigenverlag.

Page 21: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 365

Herberg-Rothe, Andreas (2001): Das Rätsel Clausewitz: Politische Theorie des Krieges im Wider-streit, München: Fink.

Herrera, Geoffrey. L. (2007): “Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space”, in: Myriam Dunn-Cavelty et al. (Hg.): Power and Security in the Information Age: In-vestigating the Role of the State in Cyberspace, Aldershot: Ashgate, 67-94.

Hersh, Seymour M. (2011): “Cyberwar: Die neue Front”, Blätter für deutsche und internationale Politik, 1/2011, 45-56.

Herz, John H. (1961): Weltpolitik im Atomzeitalter, Stuttgart: W. Kohlhammer. Hindman, Matthew (2009): The Myth of Digital Democracy, Princeton, NJ: Princeton University

Press. Hinduja, Sameer/Patchin, Justin (2009): Bullying beyond the Schoolyard: Preventing and Respond-

ing to Cyberbullying, Thousand Oaks, CA: Corwin Press. Hintze, Otto (1902): „Staatenbildung und Verfassungsgeschichte“, Historische Zeitschrift, 1, 1-21. Hobbes, Thomas (1999) [1651]: Leviathan oder Stoff, Form und Gewalt eines kirchlichen und bür-

gerlichen Staates, Herausgegeben und eingeleitet von Iring Fetscher. Frankfurt am Main: Suhrkamp.

Hofmann, Niklas (2011): “Der Gegenverschwörer”, in: Suhrkamp Verlag (Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequenzen, Berlin, 47-54.

Hoffman, Bruce (2006): Terrorismus: Der unerklärte Krieg, Frankfurt a.M.: Fischer. Hoffman, Michael (2006): „Israel, Hezbollah, and the Cyberwar of 2006“, DailyTech, 03.08.2006,

http://www.dailytech.com/Israel+Hezbollah+and+the+Cyberwar+of+2006/article3589.htm (17.01.2010).

Holland, Steve/Mikkelsen, Randall (2009): “Has Power Grid Been Hacked? U.S. Won’t Say”, Reuters, 08.04.2009, http://www.reuters.com/article/idUSN0850385920090408 (17.11.2010).

Holsti, Kalevi (1996): The State, War, and the State of War, Cambridge: Cambridge University Press. Holton, Kate/Fayed, Shaimaa (2011): “Vodafone Accuses Egyptian Government of Co-opting Net-

work”, Reuters, 03.02.2011, http://www.reuters.com/article/2011/02/03/us-egypt-vodafone-idUSTRE7123KJ20110203 (15.03.2011).

Hopkins, Curt (2011a): “’PakCyberArmy’ Attacks Dozens of Indian Sites”, Read Write Web, 10.05.2011, http://www.readwriteweb.com/archives/pakcyberarmy_attacks_dozens_of_indian_sites.php (09.06.2011).

Hopkins, Curt (2011b): “Iran’s ‘Cyber Army’ Hacks Voice of America”, Read Write Web, 22.02.2011, http://www.readwriteweb.com/archives/irans_cyber_army_hacks_voice_of_america.php (09.06.2011).

Hosenball, Mark (2011): “WikiLeaks Publishes Tens of Thousands More Cables”, Reuters, 25.08.2011, http://www.reuters.com/article/2011/08/25/idUSN1E77O1XL20110825 (30.08.2011).

Hosenball, Mark (2009): “The Turf War over Cyber War”, Newsweek, 25.04.2009, http://www.newsweek.com/2009/04/24/the-turf-war-over-cyberwar.html# (17.11.2010).

Howard, Philip N. (2011): “The Cascading Effects of the Arab Spring”, Miller-McCune, 23.02.2011, http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ (10.04.2011).

Hsu, Spencer S. (2009): “A Pentagon Cyber-Command is in the Works”, Washington Post, 22.04.2009, http://www.washingtonpost.com/wp-dyn/content/article/2009/04/22/AR2009042200029.html (22.11.2010).

Hubbard, Amanda/Bygrave, Lee A. (2009): “Internet Governance Goes Global”, in: Lee A. By-grave/Jon Bing (Hg.): Internet Governance: Infrastructure and Institutions, Oxford: Oxford University Press, 213-235.

Page 22: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

366 9 Literatur

Huffington Post (2011): “Libya Internet Shutdown Amid Protests, Later Restored”, 18.02.2011, http://www.huffingtonpost.com/2011/02/18/libya-internet-shut-down-_n_825473.html (10.04.2011).

Hughes, Rex (2010): “A Treaty for Cyberspace”, International Affairs, 86 (2), 523-541. Hughes, Thomas P. (1994): “Technological Momentum”, in: Merritt R. Smith/Leo Marx (Hg.): Does

Technology Drive History? The Dilemma of Technological Determinism, Cambridge, MA: The MIT Press, 101-113.

Human Rights Watch (2006): ‚Race to the Bottom’: Corporate Complicity in Chinese Internet Cen-sorship, New York, NY, http://www.hrw.org/en/reports/2006/08/09/race-bottom-0 (03.03.2010).

India Defence (2008): “Indian Army Gears Up for Cyber, Electronic Warfare”, 02.05.2008, http://www.india-defence.com/reports-3824 (15.06.2011).

Information Office of the State Council of the People's Republic of China (2006): China’s National Defense in 2006, Peking, http://www.oss.net/dynamaster/file_archive/070102/afddd85e6782a64dafd3f49ea6bfbc9f/2006%20White%20Paper%20on%20PRC%20National%20Defense.pdf (22.11.2010).

Information Policy (2010): “Russian Cybercrime: Geeks, not Gangsters”, 24.08.2010, http://www.i-policy.org/2010/08/russian-cybercrime-geeks-not-gangsters.html (13.08.2011).

Infowar Monitor (2011a): “Cyber Dissidents, Information Controls and Attacks”, 25.03.2011, http://www.infowar-monitor.net/2011/03/6996/ (08.08.2011).

Infowar Monitor (2011b): “Syrian Electronic Army: Disruptive Attacks and Hyped Targets”, 25.06.2011, http://www.infowar-monitor.net/2011/06/syrian-electronic-army-disruptive-attacks-and-hyped-targets/ (26.06.2011).

Infowar Monitor (2011c): “Amid Uprisings, Cyberattacks in Syria”, 06.05.2011, http://www.infowar-monitor.net/2011/05/amid-uprisings-cyberattacks-in-syria/ (08.08.2011).

Infowar Monitor (2011d): “Fake Facebook Page Targets Pro-Revolution Syrian Users”, 29.08.2011, http://www.infowar-monitor.net/2011/08/fake-facebook-page-targets-pro-revolution-syrian-users/ (31.08.2011).

Innis, Harold A. 1995 [1951]: The Bias of Communication, Toronto: University of Toronto Press. Inside Facebook (2011): Facebooks Stats, 01.04.2011, http://gold.insidenetwork.com/facebook/

(15.04.2011). International Business Times (2011): “Post-Shipwreck LulzSec is Cornered by FBI and Hackers –

Leader Sabu Outed”, 29.06.2011, http://newyork.ibtimes.com/articles/171674/20110629/lulzsec-leader-sabu-identity-Anonymous-antisec-disband-topiary-outed.htm (12.07.2011).

International Institute for Strategic Studies (2011): “Stuxnet: Targeting Iran’s Nuclear Programme”, IISS Strategic Comments, 17 (6), http://www.iiss.org/publications/strategic-comments/past-issues/volume-17-2011/february/stuxnet-targeting-irans-nuclear-programme/ (15.03.2011).

Internet Business Law Services (2008): “NATO Agrees to Create Cyber Defense Management Authority”, 15.05.2008, http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=2054 (22.11.2010).

Ischinger, Wolfgang (2011): “Das WikiLeaks-Paradox: Weniger Transparenz, mehr Geheimdiploma-tie”, in: Suhrkamp Verlag (Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequen-zen, Berlin, 155-163.

Isikoff, Michael (2008): „The Fed Who Blew the Whistle“, Newsweek, 13.12.2008, http://www.newsweek.com/2008/12/12/the-fed-who-blew-the-whistle.html# (14.04.2011).

ITU (2010): ICT Facts and Figures, Genf, http://www.itu.int/ITU-D/ict/material/FactsFigures2010.pdf (29.06.2011).

Page 23: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 367

ITU (2007): ITU Cybersecurity Work Programme to Assist Developing Countries 2007 – 2009, Genf, http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-cybersecurity-work-programme-developing-countries.pdf (17.06.2011).

Izvestiya (2009): “The General Staff is Preparing for a Cyber War”, 27.02.2009, Übersetzung und Bereitstellung durch BBC Worldwide Monitoring, 11.03.2009.

Jackson, David (2011): “Obama: Violence is Not the Answer”, USA Today, 28.01.2011, http://content.usatoday.com/communities/theoval/post/2011/01/obama-violence-is-not-the-answer-in-egypt/1 (01.08.2011).

Jackson, William (2011): “DHS Rules in White House Cyber Plan”, Federal Computer Week, 13.05.2011, http://fcw.com/Articles/2011/05/13/white-house-cyber-plan-puts-dhs-in-charge.aspx (25.08.2011).

Jackson, William (2009): “Details Emerge about new Cyber Command’s Role”, Defense Systems, 15.06.2009, http://defensesystems.com/Articles/2009/06/15/Web-DOD-cyber-command.aspx (22.11.2010).

Jacobs, Andrew (2010): “Journalists E-Mails Hacked in China”, The New York Times, 30.03.2010, http://www.nytimes.com/2010/03/31/world/asia/31china.html?_r=2 (17.11.2010).

Jacobs, Andrew (2009): “China Requires Censorship Software on New PCs”, The New York Times, 08.06.2009, http://www.nytimes.com/2009/06/09/world/asia/09china.html (03.03.2010).

Jäger, Thomas/Beckmann, Rasmus (2007): “Die internationalen Rahmenbedingungen deutscher Außenpolitik”, in: Thomas Jäger/Alexander Höse/Kai Oppermann (Hg.): Deutsche Außenpoli-tik: Sicherheit, Wohlfahrt, Institutionen und Normen, Wiesbaden: VS Verlag: 13-39.

Janczewski, Lech J./Colarik, Andrew M. (Hg.) (2008): Cyber Warfare and Cyber Terrorism, Her-shey, PA et al.: Information Science References.

JASON (2010): Science of Cyber-Security, McLean, VA, http://www.fas.org/irp/agency/dod/jason/cyber.pdf (14.08.2011).

Jervis, Robert (1988): “War and Misperception”, Journal of Interdisciplinary History, 18 (4), 675-700.

Jervis, Robert (1986): “Cognition and Political Behavior”, in: Richard R. Lau/David O. Sears (Hg.): Political Cognition, Hillsdale, NJ: Lawrence Erlbaum Associates, 319-337.

Jervis, Robert (1978): „Cooperation under the Security Dilemma“, World Politics, 30 (4), 167-214. Jervis, Robert (1976): Perception and Misperception in International Politics, Princeton, NJ: Prince-

ton University Press. Joffe, Josef (2010): “Faustrecht Digital: WikiLeaks dient dem Abschottungsstaat, nicht der Transpa-

renz”, Zeit Online, 16.12.2010, http://www.zeit.de/2010/51/P-Zeitgeist (15.03.2011). Johnson, Bobbie (2008): “The Internet’s Undersea World: How One Clumsy Ship Cut off the Web

for 75 Million People”, The Guardian, 01.02.2008, 22. Johnson, David/Post, David (1996): “Law and Borders. The Rise of Law in Cyberspace”, in: Stan-

ford Law Review, 48 (5). Jolly, David/Minder, Raphael (2011): “Spain Detains 3 in PlayStation Cyberattacks”, The New York

Times, 10.06.2011, http://www.nytimes.com/2011/06/11/technology/11hack.html?_r=1&ref=global-home (10.06.2011).

Jonas, Jeff (2009): “Prediction: Channel Consolidation”, 09.06.2009, http://jeffjonas.typepad.com/jeff_jonas/2009/06/prediction-channel-consolidation.html (11.08.2011).

Jones, Edward E./Nisbett, Richard E. (1972): “The Actor and the Observer: Divergent Perceptions of the Causes of Behavior”, in: Edward E. Jones et al. (Hg.): Attribution: Perceiving the Causes of Behavior, Morristown, NJ: General Learning Press, 79-94.

Page 24: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

368 9 Literatur

Joshi, Manoj (1999): “Now Hyper War: The Indian Army is Preparing for a War Made more Lethal and Intense by the Deadly Microchip”, India Today, 10.05.1999, http://www.india-today.com/itoday/10051999/defence.html (22.11.2010).

Kadi, May (1995): “Welcome to Cyberia”, Utne Reader, 68 (März/April), 57-59. Kagan, Robert (2008): The Return of History and the End of Dreams, New York, NY: Alfred A.

Knopf. Kahl, Martin/Mölling, Christian (2005): „Die ‚Revolution in Military Affairs‘ und die Bedingungen

und Möglichkeiten für Rüstungskontrolle“, in: Götz Neuneck/Christian Mölling (Hg.): Die Zu-kunft der Rüstungskontrolle, Baden-Baden: Nomos, 341-353.

Kahn, Hermann (1960): On Thermonuclear War, Princeton, NJ: Princeton University Press. Kahn, Jeremy (2008): „Mumbai Terrorists Relied on New Technology for Attacks”, The New York

Times, 09.12.2008, http://www.nytimes.com/2008/12/09/world/asia/09mumbai.html (15.03.2011).

Kahnemann, Daniel/Tversky, Amos (1972): “Subjective Probability: A Judgement of Representa-tiveness”, Cognitive Psychology, 3, 430-454.

Kalathil, Shanthi/Boas, Taylor C. (2003): Open Network, Closed Regimes: The Impact of the Internet on Authoritarian Rule, Washington, DC: Carnegie Endowment for International Peace.

Kaplan, Jeremy A. (2011): “Anonymous Hackers Release Stuxnet Worm Online”, Fox News, 15.02.2011, http://www.foxnews.com/scitech/2011/02/15/Anonymous-hackers-offer-stuxnet-worm-online/ (14.08.2011).

Kartchner, Kerry M. (2009): “The Evolving International Context”, in: Jeffrey A. Larsen/James J. Wirtz (Hg.): Arms Control and Cooperative Security, Boulder/London: Lynne Rienner, 39-66.

Katz, Jon (1997): Birth of a Digital Nation, http://www.wired.com/wired/archive/5.04/netizen_pr.html (03.03.2010).

Katz, Rita/Kern, Michael (2006): “Terrorist 007: Exposed”, The Washington Post, 26.03.2006, http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR2006032500020.html (13.08.2011).

Katzer, Catarina (2009): “Cyberbullying in Germany: What Has Been Done and What Is Going on”, Zeitschrift für Psychologie/Journal of Psychology, 217 (4), 222-223.

Keck, Otto (1993): “The New Institutionalism and the Relative-Gains-Debate”, in: Frank R. Pfetsch (Hg.): International Relations and Pan-Europe: Theoretical Approaches and Empirical Find-ings, Münster: Lit Verlag.

Kedzie, Christopher (1997a): Communication and Democracy: Coincident Revolutions and the Emergent Dictators, Santa Monica, CA: RAND.

Kedzie, Christopher (1997b): “The Third Waves”, in: Brian Kahin/Charles Nesson (Hg.): Borders in Cyberspace, Cambridge, MA: The MIT Press, 106-128.

Keegan, John (2003): Der Erste Weltkrieg: Eine europäische Tragödie, 2. Aufl., Reinbeck bei Ham-burg: Rowohlt.

Keizer, Gregg (2009): “NSA Helped with Windows 7 Development”, Computerworld, 18.11.2009, http://www.computerworld.com/s/article/9141105/NSA_helped_with_Windows_7_development (10.08.2011).

Keller, Bill (2011): Dealing with Assange and the WikiLeaks Secrets”, The New York Times, 26.01.2011, http://www.nytimes.com/2011/01/30/magazine/30WikiLeaks-t.html?pagewanted=all (15.03.2011).

Kelly, John/Etling, Bruce (2008): Mapping Iran’s Online Public: Politics and Culture in the Persian Blogosphere, Cambridge, MA: Berkman Center for Internet & Society at Harvard University, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Kelly&Etling_Mapping_Irans_Online_Public_2008.pdf (03.03.2010).

Kelly, Kevin (2010): What Technology Wants, New York, NY, Viking.

Page 25: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 369

Kennedy, Patrick (2011): Statement of Ambassador Patrick Kennedy, Undersecretary for Manage-ment U.S. Department of State, before the Senate Committee on Homeland Security and Gov-ernmental Affairs, 10.03.2011, Washington, DC, http://www.ise.gov/sites/default/files/TestimonyKennedy20110310.pdf (15.03.2011).

Kennedy, Paul (1989): The Rise and Fall of the Great Powers: Economic Change and Military Conflict from 1500 to 2000, New York: Vintage Books.

Keohane, Robert O. (1993): “The Analysis of International Regimes: Towards a European-American Research Programme”, in: Volker Rittberger (Hg.): Regime Theory and International Rela-tions, Oxford: Clarendon Press, 23-45.

Keohane, Robert O. (1989): “Neoliberal Institutionalism: A Perspective on World Politics”, in: Ders. (Hrsg.): International Institutions and State Power: Essays in International Relations Theory, Boulder, CO: Westview Press, 1-20.

Keohane, Robert O. (1984): After Hegemony: Cooperation and Discord in the World Political Econ-omy, Princeton, NJ: Princeton University Press.

Keohane, Robert O./Nye, Joseph S. (1977): Power and Interdependence: World Politics in Transi-tion, Boston/Toronto: Little, Brown and Company.

Keohane, Robert O./Martin, Lisa L. (2003): “Institutional Theory as a Research Programme”, in: Colin Elman/Miriam F. Elman (Hg.): Progress in International Relations Theory, Cambridge, MA: MIT Press, 71-107.

Kern, Holger L./Hainmueller, Jens (2009): “Opium for the Masses: How Foreign Media Can Stabi-lize Authoritarian Regimes“, Political Analysis, 17, 377-399, http://www.mit.edu/~jhainm/Paper/OVM2009.pdf (10.04.2011).

Kerner, Sean M. (2009): “Who Was behind Ghostnet?”, Internetnews.com, 07.10.2009, http://blog.internetnews.com/skerner/2009/10/-ghostnet-researcher-at-the.html (17.11.2010).

Khalil, Ashraf (2011): “Route to Revolution”, Index on Censorship, 23.03.2011, http://uncut.indexoncensorship.org/2011/03/route-to-revolution/ (10.04.2011).

Khatchadourian, Raffi (2011): “Keine Geheimnisse: Julian Assanges Mission der totalen Transpa-renz. Porträt eines Getriebenen“, in: Suhrkamp Verlag (Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequenzen, Berlin, 11-46.

Khong, Yuen F. (1992): Analogies at War: Korea, Munich, Dien Bien Phu, and the Vietnam Deci-sions of 1965, Princeton, NJ: Princeton University Press.

Kilroy, Richard J. (2008): “The U.S. Military Response to Cyber Warfare”, in: Lech J. Janc-zewski/Andrew M. Colarik (Hg.): Cyber Warfare and Cyber Terrorism, Information Science Reference: Hershey, 439-445.

Kindleberger, Charles P. (1981): “Dominance and Leadership in the International Economy: Exploi-tation, Public Goods, and Free Rides”, International Studies Quarterly, 25 (2), 242-254.

King, Gary/Keohane, Robert O./Verba, Sidney (1994): Designing Social Inquiry: Scientific Inference in Qualitative Research, Princeton, NJ: Princeton University Press.

Kirkpatrick, David (2011): “Wired and Shrewd, Young Egyptians Guide Revolt”, The New York Times, 09.02.2011, http://www.nytimes.com/2011/02/10/world/middleeast/10youth.html (10.04.2011).

Kirkpatrick, David (2010): Der Facebook-Effekt: Hinter den Kulissen des Internet-Giganten, Mün-chen: Carl Hanser Verlag.

Kisljakow, Andrej (2007): “Kampf der Trojaner, Militärs entdecken Internet als Kriegsschauplatz“, RIA Novosti, 27.09.2007, http://de.rian.ru/analysis/20070926/81103083.html (17.11.2010).

Klein, John J. (2006): Space Warfare: Strategy, Principles and Policy, New York: Routledge. Kleinberg, Howard (2007): “On War in Space”, Astropolitics, 5 (1), 1-27. Kleinwächter, Wolfgang (2011): “Wie reguliert man den Cyberspace?”, Telepolis, 29.05.2011,

http://www.heise.de/tp/artikel/34/34742/1.html (14.06.2011). Klimburg, Alexander (2011): „Mobilising Cyber Power“, Survival, 53 (1), 41-60.

Page 26: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

370 9 Literatur

Klimburg, Alexander (2010): “Whole-of-Nation Cyber Security”, in: Jeffrey Carr (Hg.) (2010): Inside Cyber Warfare, Sebastopol, CA: O’Reilly, 199-202.

Kobe, Donald H. (1962): “A Theory of Catalytic War”, The Journal of Conflict Resolution, 6 (2), 125-142.

Kocks, Alexander (2010): “Die Theorie der globalen öffentlichen Güter: Forschungsstand und Per-spektiven”, Zeitschrift für Internationale Beziehungen, 17 (2), 235-265.

Kohler-Koch, Beate (Hg.) (1986): Technik und internationale Politik, Baden-Baden: Nomos. Komov, Sergei/Korotkov, Sergei/Dylevski, Igor (2007): „Military Aspects of Ensuring International

Information Security in the Context of Elaborating Universally Acknowledged Principles of In-ternational Law”, Disarmament Forum, 3/2007, 35-43, http://www.unidir.org/pdf/articles/pdf-art2645.pdf (10.05.2011).

Kopytoff, Verne (2009): “China Cuts off Websites”, San Francisco Chronicle, 03.06.2009, C1. Koring, Paul (2011): “Obama Wants to Widen Intrusive Digital Intercepts”, The Globe and Mail,

28.09.2010, http://www.theglobeandmail.com/news/technology/obama-wants-to-widen-intrusive-digital-intercepts/article1729513/ (08.08.2011).

Kraft, Steffen (2011): “Leck bei WikiLeaks”, Der Freitag, 25.08.2011, http://www.freitag.de/politik/1134-nerds-ohne-nerven (29.08.2011).

Kramer, Franklin D. (2009): “Cyberpower and National Security: Policy Recommendations for a Strategic Framework”, in: Ders./Stuart H Starr/Larry K Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 3-23.

Kramer, Franklin D./Starr, Stuart H./Wentz, Larry K. (Hg.) (2009): Cyberpower and National Secu-rity, Washington, DC: National Defense University Press.

Krasner, Stephen (1991): “Global Communications and National Power: Life on the Pareto Frontier”, World Politics, 43 (3), 336-366.

Krause, Till (2011): “Anonymous”, Süddeutsche Zeitung Magazin, Nummer 20, 40-44. Kravets, David (2011): „Internet ‚Kill Switch’ Legislation Back in Play“, Wired, 28.01.2011,

http://www.wired.com/threatlevel/2011/01/kill-switch-legislation/ (01.06.2011). Krebs, Brian (2010): “Cable: No Cyber Attack in Brazilian ’09 Blackout”, KrebsonSecurity,

03.12.2010, http://krebsonsecurity.com/2010/12/cable-no-cyber-attack-in-brazilian-09-blackout/ (13.08.2011).

Krell, Gert (2009): Weltbilder und Weltordung: Einführung in die Theorie der internationalen Bezie-hungen, 4. Aufl., Baden-Baden: Nomos.

Kremp, Matthias (2009): “Augmented Reality. Das Handy wird zum Welt-Wissensfenster”, Spiegel Online, 20.11.2009, http://www.spiegel.de/netzwelt/gadgets/0,1518,662380,00.html (03.03.2010).

Krempl, Stefan (2011): „Kritik am geplanten Cyber-Abwehrzentrum“, Heise Media, 24.02.2011, http://www.heise.de/newsticker/meldung/Kritik-am-geplanten-Cyber-Abwehrzentrum-1196787.html (15.08.2011).

Kristof, Nicholas (2009): „Tear Down this Cyberwall!“, The New York Times, 17.06.2009, http://www.nytimes.com/2009/06/18/opinion/18kristof.html (01.08.2011).

Krüger, A. (2010): “Per Handyfoto ins Privatleben. Software erkennt Gesicht und liefert Daten zur Person”, ZDF heute.de, 13.03.2010, http://www.heute.de/ZDFheute/inhalt/8/0,3672,8049928,00.html (26.03.2010).

Kuehl, Daniel T. (2009): “From Cyberspace to Cyberpower: Defining the Problem”, in: Franklin D. Kramer/Stuart H Starr/Larry K Wentz (Hg.): Cyberpower and National Security, Washington, DC: National Defense University Press, 24-42.

Kugler, Jacek/Lemke, Douglas (Hg.) (1996): Parity and War, Ann Arbor: University of Michigan Press.

Page 27: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 371

Kugler, Richard L. (2009): “Deterrence of Cyberattacks”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 309-340.

Kuhn, Jan (2005): Der Schutz kritischer Infrastrukturen: Unter besonderer Berücksichtigung von kritischen Informationsinfrastrukturen, IFSH/IFAR Working Paper 5, Hamburg, http://www.ifsh.de/IFAR/pdf/wp5.pdf (22.11.2010).

Kurczy, Stephen (2010): „Will Wikileak’s Julian Assange, now Arrested, Take the ‘nuclear’ Op-tion?”, The Christian Science Monitor, 07.12.2010, http://www.csmonitor.com/World/Europe/2010/1207/Will-WikiLeaks-Julian-Assange-now-arrested-take-the-nuclear-option (15.03.2011).

Lachow, Irving (2009): “Cyber Terrorism: Menace or Myth”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 437-464.

Lake, David A. (2009): Hierarchy in International Relations, Ithaca: Cornell University Press. Lake, David A. (2007): “Escape from the State of Nature: Authority and Hierarchy in World Poli-

tics”, International Security, 32 (1), 47-79. Lake, Eli (2011): “British Firm Offered Spy Software to Egypt”, The Washington Times, 25.04.2011,

http://www.washingtontimes.com/news/2011/apr/25/british-firm-offered-spy-software-to-egypt/ (02.05.2011).

Langhammer, Franziska (2009): “Digitale Denunziation oder Aufklärung?”, Die Tageszeitung, 30.12.2009, http://www.taz.de/1/netz/artikel/1/digitale-denunziation-oder-aufklaerung/ (15.03.2011).

Landler, Mark/Stelter, Brian (2009): „Washington Taps into a Potent new Force in Diplomacy”, The New York Times, 16.06.2009, http://www.nytimes.com/2009/06/17/world/middleeast/17media.html (04.06.2011).

Landler, Mark/Markoff, John (2007): „Digital Fears Emerge after Data Siege on Estonia“, The New York Times, 29.05.2007, http://www.nytimes.com/2007/05/29/technology/29estonia.html?pagewanted=1 (29.05.2011).

Lasker, John (2005): “U.S. Military’s Elite Hacker Crew”, Wired, 18.04.2005, http://www.wired.com/politics/security/news/2005/04/67223 (10.11.2010).

Lawson, Sean (2011): Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History, Fairfax, VA: George Mason University, http://mercatus.org/sites/default/files/publication/beyond-cyber-doom-cyber-attack-scenarios-evidence-history.pdf (01.07.2011).

Lehmkuhl, Dirk (2007): “Between Transnational Take-off and National Landing: Jurisdictional Dynamics in the Domain Name Area”, in: Myriam Dunn et al. (Hg.): The Resurgence of the State: Trends and Processes in Cyberspace Governance, Aldershot: Ashgate, 85-110.

Leisegang, Daniel (2010): “WikiLeaks: Macht und Verantwortung”, Blätter für deutsche und inter-nationale Politik, 10/2010, http://www.blaetter.de/archiv/jahrgaenge/2010/oktober/WikiLeaks-macht-und-verantwortung (15.03.2011).

Lenk, Klaus (1997): “The Challenge of Cyberspatial Forms of Human Interaction to Territorial Governance and Policing”, in: Brian D. Loader (Hg.): The Governance of Cyberspace: Poli-tics, Technology and Global Restructuring, London/New York: Routledge, 126-135.

Leppard, David (2010): “China Bugs and Burgles Britain”, The Sunday Times, 31.01.2010, http://www.timesonline.co.uk/tol/news/uk/crime/article7009749.ece (17.11.2010).

Lessig, Lawrence (2006): Code: Version 2.0, New York: Basic Books. Lessig, Lawrence (2000): “Code is Law: On Liberty in Cyberspace”, Harvard Magazine,

Januar/Februar, http://harvardmagazine.com/2000/01/code-is-law.html (18.02.2011). Lessig, Lawrence (1999): “Zoning Speech on the Internet: A Legal and Technical Model”, Michigan

Law Review, 98 (2), 395-431.

Page 28: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

372 9 Literatur

Levy, Jack S. (2003): “Political Psychology and Foreign Policy”, in: David O. Sears/Leonie Huddy/Robert Jervis (Hg.): Oxford Handbook of Political Psychology, Oxford: Oxford Uni-versity Press, 253-284.

Levy, Jack S. (1998): “The Causes of War and the Conditions of Peace”, Annual Review of Political Science, 1 (1), 139-165.

Levy, Jack S. (1997): “Prospect Theory and the Cognitive-Rational Debate”, in: Nehemia Geva/Alex Mintz (Hg.): Decision Making on War and Peace: The Cognitive-Rational Debate, Boul-der/London: Lynne Rienner, 33-50.

Levy, Jack S. (1989): “The Causes of War: A Review of Theories and Evidence”, in: Philip Tetlock et al. (Hg.): Behavior, Society, and Nuclear War, Band 1, New York: Oxford University Press, 209-333.

Levy, Jack S./Thompson, William R. (2010): Causes of War, Chichester: Wiley-Blackwell. Lewis, Leo (2011): “China’s Blue Army of 30 Computer Experts Could Deploy Cyber Warfare on

Foreign Powers”, The Australian, 27.05.2011, http://www.theaustralian.com.au/australian-it/chinas-blue-army-could-conduct-cyber-warfare-on-foreign-powers/story-e6frgakx-1226064132826 (09.06.2011).

Lewis, James A. (2011): “Why Privacy and Cyber Security Clash”, in: Kristin M. Lord/Travis Sharp (Hg.): America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, Washington, DC: Center for a New American Security, 125-141.

Lewis, James A. (2010): “Multilateral Agreements to Constrain Cyberconflict”, Arms Control Today, June 2010, http://www.armscontrol.org/act/2010_06/Lewis (15.05.2011).

Lewis, James (2005): Computer Espionage, Titan Rain and China, Washington, DC: Center for Strategic and International Studies, http://csis.org/files/media/csis/pubs/051214_china_titan_rain.pdf (01.06.2011).

Lewis, James A. (2003a): Cyber Security: Turning National Solutions into International Coopera-tion, Washington, DC: CSIS Press.

Lewis, James A. (2003b): “Introduction”, in: Ders. (Hg.): Cyber Security: Turning National Solutions into International Cooperation, Washington, DC: CSIS Press, xi-xxiii.

Lewis, James A. (2003c): “Overcoming Obstacles to Cooperation: The Council of Europe Conven-tion on Cybercrime”, in: Ders. (Hg.): Cyber Security: Turning National Solutions into Interna-tional Cooperation, Washington, DC: CSIS Press, 90-97.

Leyden, John (2011a): “Fake Certificate Attack Targets Facebook Users in Syria”, The Register, 06.05.2011, http://www.theregister.co.uk/2011/05/06/syria_fake_certificate_facebook_attack/ (08.08.2011).

Leyden, John (2011b): “Cyberwarriors on the Eastern Front: In the Line of Packet Floods. Former Senior Estonian Defence Official Talks Cyberwar”, The Register, 25.04.2011, http://www.theregister.co.uk/2011/04/25/estonia_cyberwar_interview/print.html (25.05.2011).

Leyden, John (2009): “Belarus Media Sites under Attack by Zombies”, The Register, 12.06.2009, http://www.theregister.co.uk/2009/06/12/belarus_ddos/ (17.11.2010).

Liang, Guo (2007): Surveying Internet Usage and its Impact in Seven Chinese Cities, Chinese Acad-emy of Social Sciences, Center for Social Development, http://www.policyarchive.org/handle/10207/bitstreams/16013.pdf (17.08.2011).

Libicki, Martin C. (2009): Cyberdeterrence and Cyberwar, Santa Monica, CA: RAND. Libicki, Martin C. (2007): Conquest in Cyberspace: National Security and Information Warfare,

Cambridge: Cambridge University Press. Lichtenstein, Jesse (2010): “Digital Diplomacy”, The New York Times, 16.07.2010,

http://www.nytimes.com/2010/07/18/magazine/18web2-0-t.html?pagewanted=all (14.12.2011).

Link, Werner (1988): Der Ost-West-Konflikt: Die Organisation der internationalen Beziehungen im 20. Jahrhundert, 2. Aufl., Stuttgart et al.: Verlag W. Kohlhammer.

Page 29: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 373

Link, Werner (1979): “Überlegungen zum Begriff ‘Konflikt’ in den internationalen Beziehungen – Versuch einer Begriffsklärung”, Politische Vierteljahreszeitschrift, 20 (1), 33-50.

Lipson, Charles (2003): Reliable Partners: How Democracies Have Made a Seperate Peace, Prince-ton, NJ: Princeton University Press.

Lonsdale, David J. (1999): “Information Power: Strategy, Geopolitics and the Fifth Dimension”, in: Colin S. Gray (Hg.): Geopolitics, Geography and Strategy, London: Frank Cass, 137-157.

Lonsdale, David J. (2004): The Nature of War in the Information Age, London/New York: Frank Cass.

Lord, Kristin M. (2006): The Perils and Promise of Global Transparency, Albany, NY: State Univer-sity of New York Press.

Lord, Kristin M./Sharp, Travis (2011): America’s Cyber Future: Security and Prosperity in the Information Age: Volume I, Washington, DC: Center for a New American Security.

Lotan, Gilad et al. (2011): “The Revolutions Were Tweeted: Information Flows during the 2011 Tunesian and Egyptian Revolutions”, International Journal of Communication, 5, 1375-1405.

Löwenthal, Richard (1971): „Freiheit der Eigenentwicklung“, in: Ulrich Scheuner (Hg.): Außenpoliti-sche Perspektiven des westdeutschen Staats, Bd. 1: Das Ende des Provisoriums, Mün-chen/Wien: Oldenbourg Verlag, 11–18.

Lowi, Theodore J. (1964): “American Business, Public Policy, Case-Studies, and Political Theory”, World Politics, 16 (4), 677-715.

Luhmann, Niklas (2003) [1975]: Macht, 3. Aufl., Stuttgart: Lucius & Lucius. Luhmann, Niklas (2000) [1968]: Vertrauen, 4. Aufl., Stuttgart: Lucius & Lucius. Lupton, David E. (1988): On Space Warfare: A Space Power Doctrine, Maxwell Air Force Base: Air

University Press. Luttwak, Edward N. (2001) [1987]: Strategy: The Logic of War and Peace, Cambridge/London: The

Belknap Press. Luttwak, Edward N. (1974): The Political Uses of Sea Power, Baltimore/London: The Johns Hopkins

University Press. Lynn-Jones, Sean M. (1999): “Realism and Security Studies”, in: Craig A. Snyder (Hg.): Contempo-

rary Security and Strategy, Houndmills et al.: Macmillan Press, 53-76. MacKenzie, Donald/Wajcman, Judy (Hg.) (1985): The Social Shaping of Technology: How the

Refrigerator Got its Hum, Milton Keys: Open University Press. MacKinnon, Rebecca (2008): “Flatter World and Thicker Walls? Blogs, Censorship and Civic Dis-

course in China”, Public Choice, 134, 31-46. Maclean, William (2010): “Stuxnet Study Suggests Iran Enrichment Aim: Experts”, Reuters,

16.11.2010, http://www.reuters.com/article/idUSTRE6AF2F320101116?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:%20reuters/technologyNews%20%28News%20/%20US%20/%20Technology%29 (17.11.2010).

Mahan, Alfred T. (1898) [1890]: The Influence of Sea Power upon History 1660 – 1783, Boston: Little, Brown and Company.

Majumdar, Bappa/Tripathy, Devidutta (2010): “Google, Skype, RIM Must Meet Security Needs”, Reuters, 13.08.2010, http://in.reuters.com/article/idINIndia-50820720100813 (22.10.2010).

Mannes, Aaron/Hendler, James (2008): “The First Modern Cyberwar”, The Guardian, 22.08.2008, http://www.guardian.co.uk/commentisfree/2008/aug/22/russia.georgia1 (17.11.2010).

Mansbach, Richard W./Vasquez, John A. (1981): In Search of Theory: A New Paradigm for Global Politics, New York: Columbia University Press.

Margolis, Michael/Resnick, David (2000): Politics as Usual: The Cyberspace ‘Revolution’, Thou-sand Oaks, CA: Sage.

Markle (2005): Chinese Turn to Internet for Entertainment and Connecting with Others, as Number of Broadband Connections Increase in China, 17.11.2005, http://www.markle.org/news-

Page 30: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

374 9 Literatur

events/media-releases/chinese-turn-internet-entertainment-and-connecting-others-number-broadban (10.04.2011).

Markoff, John (2011): “The Asymmetrical Online War”, The New York Times, 03.04.2011, http://bits.blogs.nytimes.com/2011/04/03/the-asymmetrical-online-war/ (15.07.2011).

Markoff, John (2009): “Vast Spy System Loots Computers in 103 Countries”, The New York Times, 29.03.2009, http://www.nytimes.com/2009/03/29/technology/29spy.html (17.11.2010).

Markoff, John (2008): “Internet Attacks Are Growing More Potent and Complex”, New York Times, 09.11.2008, http://www.nytimes.com/2008/11/10/technology/internet/10attacks.html (22.11.2010).

Markoff, John/Sanger, David E. (2010): “In a Computer Worm, a Possible Biblical Clue”, The New York Times, 29.09.2010, http://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?_r=2&hpw=&pagewanted=1 (26.06.2011).

Markoff, John/Sanger, David E./Shanker, Thom (2010): “In Digital Combat, U.S. Finds No Easy Deterrent”, The New York Times, 26.01.2010, http://query.nytimes.com/gst/fullpage.html?res=9404E4DE123BF935A15752C0A9669D8B63 (17.11.2010).

Markoff, John/Kramer, Andrew E. (2009a): “U.S. and Russia Differ on a Treaty for Cyberspace”, The New York Times, 28.06.2009, http://www.nytimes.com/2009/06/28/world/28cyber.html (22.11.2010).

Markoff, John/Kramer, Andrew E. (2009b): In Shift, U.S. Talks to Russia on Internet Security, 13.12.2009, New York Times, http://www.nytimes.com/2009/12/13/science/13cyber.html.

Markoff, John/Barboza, David (2009): “Academic Paper in China Sets Off Alarms in U.S.”, The New York Times, 20.03.2010, http://www.nytimes.com/2010/03/21/world/asia/21grid.html (10.08.2011).

Markoff, John/Shanker, Thom (2009): “Halted 03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk”, The New York Times, 02.08.2009, http://www.nytimes.com/2009/08/02/us/politics/02cyber.html (19.11.2010).

Marquand, Robert/Arnoldy, Ben (2007): “China Emerges as Leader in Cyberwarfare”, Christian Science Monitor, 14.09.2007, 1.

Martin, Lisa L. (1993): “The Rational State Choice of Multilateralism”, in: John G. Ruggie (Hg.): Multilateralism Matters: The Theory and Praxis of an Institutional Form, New York: Colum-bia University Press, 91-121.

Marx, Leo/Smith, Merritt R. (1994): “Introduction”, in: Dies. (Hg.): Does Technology Drive History? The Dilemma of Technological Determinism, Cambridge, MA: The MIT Press, ix-xv.

Mathews, Jessica T. (1995): “Power Shift”, Foreign Affairs, 76 (1), 50-66. Mathiason, John (2009): Internet Governance: The new Frontier of Global Institutions, London/New

York: Routledge. May, Timothy C. (1988): The Crypto Anarchist Manifesto, abrufbar unter

http://www.activism.net/cypherpunk/crypto-anarchy.html (15.03.2011). Malone, Michael S. (2009): “Cyber-Terrorism and How We Should Respond”, ABC News,

10.07.2009, http://abcnews.go.com/Business/Technology/story?id=8045546&page=1 (11.08.2011).

Mander, Jerry (1978): Four Arguments for the Elimination of Television, New York: Morrow. March, James G./Olson, Johan P. (1998): “The Institutional Dynamics of International Political

Orders”, International Organization, 52 (4), 943-969. Marquand, Robert/Arnoldy, Ben (2007): “China Emerges as Leader in Cyberwarfare”, in: Christian

Science Monitor, 14.09.2007, 1. Mazzetti, Mark (2010): “U.S. Expands Role of Diplomats in Spying”, The New York Times,

28.11.2010, http://www.nytimes.com/2010/11/29/world/29spy.html (15.03.2011).

Page 31: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 375

McAfee (2009): Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare, http://www.mcafee.com/us/resources/reports/rp-virtual-criminology-report-2009.pdf (10.08.2011).

McCants, Will (2011): “Why Don’t Jihadi Orgs Tweet?”, Jihadica (Blog), 30.04.2011, http://www.jihadica.com/why-dont-jihadi-orgs-tweet/ (05.05.2011).

McConnell, Mike (2010): “To Win the Cyber-war, Look to the Cold War”, Washington Post, 28.02.2010, B01.

McCullagh, Declan (2010): “Senators Propose Granting President Emergency Internet Power”, CNET News, 10.06.2010, http://news.cnet.com/8301-13578_3-20007418-38.html (15.03.2011).

McDonald, Joe (2008): “U.S. Irked, Wary of Chinese Cyber-Security Rules”, Associated Press, 15.12.2008, http://www.nationalcybersecurity.com/blogs/1514/US-irked-wary-of-Chinese-cyber-security-rules.html (03.03.2010).

McGrew, Anthony (2005): “Globalization and Global Politics”, in: John Baylis/Steve Smith (Hg.): The Globalization of World Politics: An Introduction to international Studies, Oxford: Oxford University Press, 19-40.

McLean, Susan (2005): “Report Warns of Organized Cybercrime”, itWorld Canada, 25.08.2005, http://www.itworldcanada.com/news/report-warns-of-organized-cyber-crime/112161 (13.08.2011).

McLuhan, Herbert M. et al. (1967): The Medium Is the Message, New York, NY: Random House. McLuhan, Herbert M. (2006) [1964]: “The Medium is the Message”, in: Durham, Meenakshi

G./Kellner, Douglas M. (Hg.): Media and Cultural Studies: Key Works, Malden, MA: Black-well, 107-116.

McMillan, Robert (2011): “As Violence Escalates, Libya Cuts off the Internet”, Computerworld, 18.11.2011, http://www.computerworld.com/s/article/9210440/Update_As_violence_escalates_Libya_cuts_off_the_Internet?taxonomyId=13 (15.03.2011).

McMillan, Robert (2009): “Obama Plan Says Cyberinfrastructure is ‘Strategic Asset’”, Infoworld, 23.01.2009, http://www.infoworld.com/d/security-central/obama-plan-says-cyberinfrastructure-strategic-asset-518 (09.08.2011).

McMillan (2007): “After Attacks, U.S. Government Sends Team to Estonia”, PC World, 03.07.2007, http://www.pcworld.com/article/134150/after_attacks_us_government_sends_team_to_estonia.html (11.05.2011).

McNeill, William H. (1974): The Shape of European History. New York: Oxford University Press. Mearsheimer, John J. (2010): “Structural Realism”, in: Tim Dunne/Milja Kurki/Steve Smith (Hg.):

International Relations Theories: Discipline and Diversity, 2. Aufl., Oxford: Oxford Univer-sity Press, 77-94.

Mearsheimer, John J. (2001): The Tragedy of Great Power Politics, New York/London: W.W. Nor-ton & Company.

Mearsheimer, John J. (1993): “The False Promise of International Institutions”, International Secu-rity, 19 (3), 5-49.

Mehr News Agency (2011): “Iran to Establish First Cyber Command”, 16.05.2011, http://www.mehrnews.com/en/newsdetail.aspx?NewsID=1314554 (09.06.2011).

Menn, Joseph (2010a): “Rules of Engagement for Cyberwars See slow Progress”, Financial Times, 28.12.2010, http://cachef.ft.com/cms/s/0/484ec672-12aa-11e0-b4c8-00144feabdc0.html#axzz1M4A8pjcq (10.05.2011).

Menn, Joseph (2010b): “Moscow Gets Tough on Cybercrime as ID Theft Escalates”, Financial Times, 22.03.2010, http://www.ft.com/cms/s/0/04e59450-3552-11df-9cfb-00144feabdc0.html#axzz1V0jgwuMx (14.08.2011).

Page 32: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

376 9 Literatur

Messmer, Ellen (2010): “12 ‘White Hat’ Hackers You Should Know”, PCWorld, 19.04.2010, http://www.pcworld.com/article/194467/12_white_hat_hackers_you_should_know.html (11.08.2011).

Metzl, Jamie F. (1999): “The International Politics of Openess”, The Washington Quarterly, 22 (3), 11-16.

Meyer-Lucht, Robin (2007): “Die Revolutionäre des Web 2.0”, Cicero (3), 86-89. Meyers, Reinhard (1997): „Grundbegriffe und theoretische Perspektiven der Internationalen Bezie-

hungen“, in: Bundeszentrale für politische Bildung (Hg.): Grundwissen Politik, 3. Aufl., Bonn, 313-434.

Milani, Abbas (2010): “Iran’s Hidden Cyberjihad”, Foreign Policy, 180 (Juli/August), 110. Miller, Rich (2010): The World’s Largest Data Centers, Special Report, 11.04.2010,

http://www.datacenterknowledge.com/special-report-the-worlds-largest-data-centers/ (22.08.2011).

Mills, Elinor/Kaden, Jan (2011): “RSA: Hacker stehlen Informationen über Authentifizierungssystem SecurID“, ZDNet, 18.03.2011, http://www.zdnet.de/news/41550463/rsa-hacker-stehlen-informationen-ueber-authentifizierungssystem-securid.htm (04.08.2011).

Minkwitz, Olivier (2003): Ohne Hemmungen in den Krieg? Cyberwar und die Folgen, Frankfurt am Main: Hessische Stiftung für Friedens- und Konfliktforschung (HSFK).

Minkwitz, Olivier/Schöfbänker, Georg (2000): Information Warfare: Die Rüstungskontrolle steht vor neuen Herausforderungen, FoG:IS Arbeitspapier Nr. 2, Berlin: Forschungsgemeinschaft In-formationsgesellschaft und Sicherheitspolitik (FoG:IS).

Minnick, Wendell (2009): „Chinese IT Firm Accused of Links to Cyberwarfare”, abrufbar unter http://ics.leeds.ac.uk/papers/vp01.cfm?outfit=gdr&folder=32&paper=777 (16.08.2011).

Mintz, Alex (2003): Integrating Cognitive and Rational Theories of Foreign Policy Decision Mak-ing, New York: Palgrave Macmillan.

Mite, Valentinas (2007): “Attacks Seen as First Case of ‘Cyberwar’”, Radio Free Europe/Radio Liberty, 30.05.2007, http://www.rferl.org/content/article/1076805.html (25.05.2011).

Mitzen, Jennifer/Schweller, Randall L. (2011): „Knowing the Unknown Unknowns: Misplaced Certainty and the Onset of War“, Seurity Studies, 20, 2-35.

Moechel, Erich (2011a): “Export von Überwachungstechnik an Dikaturen legal”, ORF, 25.03.2011, http://fm4.orf.at/stories/1679547/ (14.04.2011).

Moechel, Erich (2011b): „Exportkontrollen für Überwachungstechnologien“, ORF, 01.04.2011, http://fm4.orf.at/stories/1680286/ (14.04.2011).

Moechel, Erich (2011c): „EU: Meldepflicht für Überwachungsequipment“, ORF, 05.04.2011, http://fm4.orf.at/stories/1680548/ (14.04.2011).

Möllers, Christoph (2011): “Zur Dialektik der Aufklärung der Politik”, in: Suhrkamp Verlag (Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequenzen, Berlin, 193-200.

Mölling, Christian/Neuneck, Götz (2002): “Informationskriegsführung und das Paradigma der Revo-lution in Military Affairs: Konzepte, Risiken und Probleme“, Die Friedenswarte, 77 (4), 375-398.

Monroy, Matthias (2011): „Digitale Überwachungstechnologie: Auch ein deutscher Exportschlager“, Telepolis, 14.10.2011, http://www.heise.de/tp/artikel/35/35689/1.html (26.10.2011).

Moorstedt, Michael (2011a): „Nachrichten aus dem Netz“, Süddeutsche Zeitung, 16.08.2011, 11. Moorstedt, Michael (2011b): „Der Skandal im Datenhaufen: Ein Selbstversuch“ in: Suhrkamp Verlag

(Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequenzen, Berlin, 128-133. Moran, Daniel (2007): “Geography and Strategy”, in: John Baylis et al. (Hg.): Strategy in the Con-

temporary World: An Introduction to Strategic Studies, Oxford: Oxford University Press, 122-140.

Morgan, Patrick M. (1983): Deterrence: A Conceptual Analysis, 2. Aufl., London: Sage.

Page 33: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 377

Morgenthau, Hans J. (1989) [1963]: Macht und Frieden: Grundlegung einer Theorie der internatio-nalen Politik, Gütersloh: Bertelsman.

Morozov, Evgeny (2011a): The Net Dellusion: How to not Liberate the World, London: Penguin Books.

Morozov, Evgeny (2011b): “Kluge Diktatoren: Nicht die Zensur, die Beherrschung des Internets ist die wahre Gefahr für die Demokratie”, Süddeutsche Zeitung, 12./13.03.2011, 13.

Morozov, Evgeny (2011c): „Tunesia, Social Media and the Politics of Attention“, Foreign Policy, 14.01.2011, http://neteffect.foreignpolicy.com/posts/2011/01/14/tunisia_social_media_and_the_politics_of_attention (10.04.2011).

Morozov, Evgeny (2001d): “Freedom.gov: Why Washington’s Support for Online Democracy is the Worst Thing ever to Happen to the Internet”, Foreign Policy, Jan./Feb. 2011, 34.

Morozov, Evgeny (2010): „Why It’s Hard to Duplicate“, The New York Times, Room for Debate, 11.12.2010, http://www.nytimes.com/roomfordebate/2010/12/09/what-has-WikiLeaks-started/WikiLeaks-relationship-with-the-media (15.03.2011).

Morozov, Evgeny (2008): “An Army of Ones and Zeroes: How I Became a Soldier in the Georgia-Russia Cyberwar”, Slate.com, 14.08.2008, http://www.slate.com/id/2197514/ (31.05.2011).

Mueller, Milton L. (2010): Networks and States: The Global Politics of Internet Governance, Cam-bridge, MA/London: The MIT Press.

Müller, Harald/Schörnig, Niklas (2006): Rüstungsdynamik und Rüstungskontrolle: Eine exemplari-sche Einführung in die internationalen Beziehungen, Baden-Baden: Nomos.

Mulvenon, James C. (2005a): Chinese Information Operations Strategies in a Taiwan Contingency, Testimony before the U.S.-China Economic and Security Review Commission Hearing, Wash-ington, DC, 15.09.2005, http://www.uscc.gov/hearings/2005hearings/written_testimonies/05_09_15wrts/mulvenon.pdf (22.11.2010).

Mulvenon, James C. (2005b): “Breaching the Great Firewall”, Testimony before the U.S.-China Economic and Security Review Commission, Washington, DC, http://www.uscc.gov/hearings/2005hearings/written_testimonies/05_04_14wrts/mulvenon_james_wrts.pdf (07.06.2011).

Mumford, Lewis (1960): “Authoritarian and Democratic Technics”, Technology and Culture, 5 (1), 1-8.

Münker, Stefan (2009): Emergenz digitaler Öffentlichkeiten: Die sozialen Medien im Web 2.0, Frank-furt a.M.: Suhrkamp.

Murdoch, Steven. J./Anderson, Ross (2008): “Tools and Technologies of Internet Filtering”, in: R. Deibert et al. (Hg.): Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge, MA: The MIT Press, 57-72.

Myers, Steven L./Timmons, Heather (2011): “Clinton Urges Countries Not to Stifle Online Voices”, The New York Times, 08.12.2011, http://www.nytimes.com/2011/12/09/world/at-hague-hillary-rodham-clinton-urges-countries-not-to-restrict-internet.html (14.12.2011).

Nagel, Jack H. (1975): The Descriptive Analysis of Power, New Haven: Yale University Press. Nakashima, Ellen (2011a): “List of Cyber-Weapons Developed by Pentagon to Streamline Computer

Warfare”, The Washington Post, 01.06.2011, http://www.washingtonpost.com/national/list-of-cyber-weapons-developed-by-pentagon-to-streamline-computer-warfare/2011/05/31/AGSublFH_story.html (10.06.2011).

Nakashima, Ellen (2011b): “NSA Alies with Internet Carriers to Thwart Cyber Attacks against Defense Firms”, Washington Post, 16.06.2011, http://www.washingtonpost.com/national/major-internet-service-providers-cooperating-with-nsa-on-monitoring-traffic/2011/06/07/AG2dukXH_story.html (08.08.2011).

Page 34: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

378 9 Literatur

Nakashima, Ellen (2010a): “Dismantling of Saudi-CIA Web Site Illustrates Need for Clearer Cyber-war Policies”, Washington Post, 19.03.2010, http://www.washingtonpost.com/wp-dyn/content/article/2010/03/18/AR2010031805464.html (Zugriff: 14.05.2010).

Nakashima, Ellen (2010b): “15 Nations Signal Willingness to Reduce Cyberwarfare Threat”, The Washington Post, 17.07.2010, A02.

Nakashima, Ellen/Mufson, Steven (2008): “Hackers Have Attacked Foreign Utilities, CIA Analyst Says”, The Washington Post, 19.01.2008, http://www.washingtonpost.com/wp-dyn/content/article/2008/01/18/AR2008011803277.html (16.08.2011).

Nanfang Weekend (2005): “Suqian: The Practical Aspects of Directing Internet Opinion”, 19.05.2005, englische Übersetzung, http://www.zonaeuropa.com/20050521_2.htm (03.03.2010).

National Commission on Terrorist Attacks upon the United States (2004): The 9/11 Commission Report, Washington, DC, http://govinfo.library.unt.edu/911/report/911Report.pdf (15.03.2011).

Naraine, Ryan (2011): “Facebook Offers HTTPS Browsing, but not yet by Default”, Zero Day (Blog), 26.01.2011, http://www.zdnet.com/blog/security/facebook-offers-https-browsing-but-not-yet-by-default/8009 (10.04.2011).

NATO (2011a): Active Engagement, Modern Defense, Strategic Concept for the Defence and Secu-rity of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon, 19.11.2010, http://www.nato.int/cps/en/natolive/official_texts_68580.htm (10.05.2011).

NATO (2011b): “Lisbon Summit Declaration”, 20.11.2010, http://www.nato.int/cps/en/natolive/official_texts_68828.htm (10.05.2011).

NATO Parliamentary Assembly (2009): NATO and Cyber Defence, http://www.nato-pa.int/default.asp?SHORTCUT=1782 (10.06.2011).

Naughton, John (2000): A Brief History of the Future: The Origins of the Internet, London: Phoenix. Negroponte, Niclas (1995): Being Digital, New York, NY: Alfred A. Knopf. Nelson, Bill et al. (1999): Cyberterror: Prospects and Implications, White Paper, Monterey, CA:

Center for the Study of Terrorism and Irregular Warfare, http://www.au.af.mil/au/awc/awcgate/nps/cyberterror_prospects.pdf (Zugriff: 14.05.2010).

Nelson, Michael (1997): War of the Black Heavens: The Battles of Western Broadcasting in the Cold War, New York: Syracuse University Press.

Neustadt, Richard E./May, Ernest R. (1986): Thinking in Time: The Uses of History for Decision Makers, New York: Free Press.

Newland, Erica (2010): “At Chinese Universities There’s a Fee for ‘Free’”, Center for Democracy & Technology, 18.11.2010, http://www.cdt.org/blogs/erica-newland/chinese-universities-theres-fee-free (14.04.2011).

Nieburg, H. L. (1966): In the Name of Science, Chicago: Quadrangle. Noman, Helmi (2011): “The Emergence of Open and Organized Pro-Government Cyber Attacks in

the Middle East: The Case of the Syrian Electronic Army”, Information Warfare Monitor, 30.05.2011, http://www.infowar-monitor.net/2011/05/7349/ (09.06.2011).

Noman, Helmi/York Jilian C. (2011): West Censoring East: The Use of Western Technologies by Middle East Censors 2010-2011, Toronto/Cambridge/Ottawa: Open Net Initiative, http://opennet.net/sites/opennet.net/files/ONI_WestCensoringEast.pdf (27.04.2011).

Nooman, Sean (2010): “China and its Double-Edged Cyber-Sword”, STRATFOR Global Intelligence, 09.12.2010, http://www.stratfor.com/weekly/20101208-china-and-its-double-edged-cyber-sword (15.07.2011).

Nosovitz, Dan (2010): “How Secure is Julian Assange’s ‘Thermonuclear’ Insurance File?”, Popular Science, 12.07.2010, http://www.popsci.com/technology/article/2010-12/how-secure-julian-assanges-thermonuclear-insurance-file (15.03.2011).

Page 35: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 379

Nye, Joseph S. (2011): “Power and National Security in Cyberspace”, in: Kristin M. Lord/Travis Sharp (Hg.): America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, Washington, DC: Center for a New American Security, 7-23.

Nye, Joseph S. (2004): Soft Power: The Means to Success in World Politics, PublicAffairs, New York.

Nye, Joseph S. (2002): The Paradox of American Power, New York: Oxford University Press. Nye, Joseph S. (1991): „Arms Control and International Politics“, Daedalus, 120 (1), 145-165. Nye, Joseph S. (1987): “Nuclear Learning and U.S. – Soviet Security Regimes”, International Or-

ganization, 41, 371-402. Oberg, James E. (1999): Space Power Theory, Montgomery, AB: Air University Press. Obert, Mark (2011): “Arid U.: Der Rätselhafte”, Frankfurter Rundschau, 09.03.2011, http://www.fr-

online.de/panorama/der-raetselhafte/-/1472782/7946296/-/item/2/-/index.html (15.03.2011). Ogburn, William F. (1964) [1957]: On Culture and Social Change: Selected Papers, herausgegeben

von Otis Dudley Duncan, Chicago/London: The University of Chicago Press. Olson, Mancur (1965): The Logic of Collective Action: Public Goods and the Theory of Groups,

Cambridge: Harvard University Press. Olson, Parmy (2011): “Egypt’s Internet Blackout Cost More than OECD Estimates”, Forbes,

03.02.2011, http://blogs.forbes.com/parmyolson/2011/02/03/how-much-did-five-days-of-no-internet-cost-egypt/ (10.04.2011).

O’Murchu, Liam (2010): „Stuxnet Using Three Additional Zero-Day Vulnerabilities”, Symantec Official Blog, 14.09.2010, http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities (15.03.2011).

Onley, Dawn S. (2003): “U.S. Aims to Make War on Iraq’s Networks”, Government Computer News, 21.02.2003, http://www.gcn.com/Articles/2003/02/21/US-aims-to-make-war-on-Iraqs-networks.aspx (19.10.2010).

Ono, Michael (2011): “U.S. Suspects Contaminated Foreign-Made Components Threaten Cyber Security”, ABC News, 09.07.2011, http://abcnews.go.com/Politics/us-suspects-contaminated-foreign-made-components-threaten-cyber/story?id=14035692 (25.08.2011).

Open Source Center (2010): Kremlin Allies’ Expanding Control of Runet Provokes only Limited Opposition, Director of National Intelligence, Washington DC, http//www.fas.org/irp/dni/osc/runet.pdf (18.03.2010).

Oppermann, Kai (2008): Prinzipale und Agenten in Zwei-Ebenen-Spielen. Die innerstaatlichen Restriktionen der Europapolitik Großbritanniens unter Tony Blair, Wiesbaden: VS Verlag.

Oppermann, Kai/Viehrig, Henrike (Hg.) (2011): Issue Salience in International Politics, London: Routledge.

Oppermann, Kai/Höse, Alexander (2007): „Die innernpolitischen Restriktionen deutscher Außenpoli-tik“, in: Thomas Jäger/Alexander Höse/Kai Oppermann (Hg.): Deutsche Außenpolitik: Sicher-heit, Wohlfahrt, Institutionen und Normen, Wiesbaden: VS Verlag, 40-68.

Organski, A. F. K. (1968) [1958]: World Politics, New York: Alfred A. Knopf. Organski, A. F. K./Kugler, Jacek (1980): The War Ledger, Chicago/London: University of Chicago

Press. Owens, William A./Dam, Kenneth W./Lin, Herbert S. (2009): Technology, Policy, Law, and Ethics

Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Washington, DC: The Na-tional Academies Press.

O’Connell, Kelly (2008): “Online Casinos Will Experience Cyber-Extortion During SuperBowl Betting”, Internet Business Law Services, 28.01.2008, http://www.ibls.com/internet_law_news_portal_view.aspx?id=1967&s=latestnews (14.08.2011).

Page 36: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

380 9 Literatur

O’Neil, William D. (2009): “Cyberspace and Infrastructure”, in: Franklin D. Kramer/Stuart H Starr/Larry K Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: Na-tional Defense University Press, 113-146.

Paarlberg, Robert L. (2004): “Knowledge as Power: Science, Military Dominance, and U.S. Secu-rity”, International Security, 29 (1), 122-151.

Page, Lewis (2009): “NSA offering ‘Billions’ for Skype Eavesdrop Solution”, The Register, 12.02.2009, http://www.theregister.co.uk/2009/02/12/nsa_offers_billions_for_skype_pwnage/ (10.08.2011).

Paget, François (2010): Cybercrime and Hacktivim, McAfee White Paper, http://www.mcafee.com/de/resources/white-papers/wp-cybercrime-hactivism.pdf (20.08.2011).

Palfrey, John et al. (2009): “Reading Twitter in Tehran? Why the Real Revolution is on the Street – and Offline”, The Washington Post, 21.06.2009, http://www.washingtonpost.com/wp-dyn/content/article/2009/06/19/AR2009061901598.html (03.03.2010).

Papp, Daniel S./Alberts, David (1997): „The Impacts of the Information Age on International Actors and the International System“, in: Dies. (Hg.): The Information Age: An Anthology of its Im-pact and Consequences, Vol. 1, Washington, DC: National Defense University Press, 285-296.

Pariser, Eli (2011): The Filter Bubble: What the Internet is Hiding from You, London: Penguin. Patel, Nilay (2010): “Google and Verizon’s Net Neutrality Proposal Explained”, Wired, 09.08.2010,

http://www.engadget.com/2010/08/09/google-and-verizons-net-neutrality-proposal-explained/ (14.04.2011).

Pau, Aivar (2007): “Statement by the Foreign Minister Urmas Paet”, Eesti Päevaleht, 01.05.2007, http://www.epl.ee/artikkel/384207 (28.05.2011).

Penney, Jon (2011): “Time to Get Transparent about Cyber Security”, Infowar Monitor, 29.07.201, http://www.infowar-monitor.net/2011/07/time-to-get-transparent-about-cyber-security/ (08.08.2011).

Peteranderl, Sonja (2010): “Auf Facebook-Streife”, Der Freitag, 13.08.2010, http://www.freitag.de/politik/1032-staatsschutz-auf-facebook-streife (15.03.2011).

Peters, Ralph (2009): “Cyber Peace is not Russia’s Goal”, The New York Post, 18.12.2009, http://www.nypost.com/p/news/opinion/opedcolumnists/cyperpeace_is_not_russia_goal_2UjRadkfm9EyglKYLIvuzH (22.01.2010).

Pew Research Center (2011a): “Press Coverage and Public Interests”, 11.01.2011, http://pewresearch.org/pubs/1850/public-media-priorities-comparison-2010 (17.08.2011).

Pew Reseach Center (2011b): Social Networking Sites and Our Lives, 16.06.2011, http://www.pewinternet.org/~/media/Files/Reports/2011/PIP%20-%20Social%20networking%20sites%20and%20our%20lives.pdf (17.08.2011).

Pew Research Center (2010a): “Mixed Public Reaction to WikiLeaks”, 03.08.2010, http://pewresearch.org/pubs/1687/poll-WikiLeaks-serves-public-interest-harms-too-much-chelsea-clinton-coverage (16.08.2011).

Pew Research Center (2010b): “Public Sees WikiLeaks as Harmful”, 08.12.2010, http://pewresearch.org/pubs/1823/poll-WikiLeaks-harm-serve-public-interest-press-handling (16.08.2011).

Pew Research Center (2010c): “Blogs and Twitter Talk WikiLeaks”, 09.12.2010, http://pewresearch.org/pubs/1825/WikiLeaks-blogs-twitter (17.08.2011).

Pew Research Center (2010d): “Blogs: [Acronym Deleted]”, 29.12.2010, http://pewresearch.org/pubs/1839/bloggers-WikiLeaks-task-force-wtf-cia (17.08.2011).

Pfeffer, Anshel (2009): “Israel Suffered Massive Cyber Attack during Gaza Offensive”, Haaretz, 15.06.2009, http://www.haaretz.com/news/israel-suffered-massive-cyber-attack-during-gaza-offensive-1.278094 (17.11.2010).

Page 37: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 381

Philip, Joji Thomas (2011): “’Suspicious’ Huawei to Help Set up Telecom Lab in India”, The Eco-nomic Times, 23.06.2011, http://articles.economictimes.indiatimes.com/2011-06-23/news/29694671_1_telecom-gear-telecom-equipment-chinese-vendors (01.07.2011).

Philip, Joji Thomas/Harsimiran, Julka (2010): “Govt Plans to Cut Internet Services in Case of Cyber Attacks”, The Economic Times, 22.10.2010, http://articles.economictimes.indiatimes.com/2010-10-22/news/27610856_1_cyber-attacks-cyber-security-internet-services (15.03.2011).

Physorg.com (2010): “France, Netherlands Seek to Halt Internet Censorship”, http://www.physorg.com/news197815197.html (16.06.2011).

Pierson, Paul/Skocpol, Theda (2002): “Historical Institutionalism in Contemporary Political Sci-ence”, in: Ira Katznelson/Helen V. Milner (Hg.): Political Science:The State of the Discipline, New York/London: W.W. Norton & Company, 693-721.

Pilkington, Ed (2011): “One in Four Hackers ‘is an FBI Informer’”, The Guardian, 06.06.2011, http://www.guardian.co.uk/technology/2011/jun/06/us-hackers-fbi-informer (10.06.2011).

Pincus, Walter (2008): “The New Art of War”, Washington Post, 03.03.2008, A15. Pollet, Thomas/Roberts, Sam/Dunbar, Robin (2011): “Use of Social Network Sites and Instant Mes-

saging Does not Lead to Increased Offline Social Network Size, or to Emotionally Closer Rela-tionships with Offline Network Members”, Cyberpschology, Behavior, and Social Networking, 14 (4), 253-258.

Portnoy, Michael/Goodman, Seymour (Hg.) (2009): Global Initiatives to Secure Cyberspace: An Emerging Landscape, Wien/New York: Springer.

Posen, Barry R. (2003): “Command of the Commons: The Military Foundation of U.S. Hegemony”, International Security, 28 (1), 5-46.

Postman, Neil (1993): Technopoly: The Surrender of Culture to Technology, New York: Vintage. Postman, Neil (1988): Wir amüsieren uns zu Tode: Urteilsbildung im Zeitlalter der Unterhaltungsin-

dustrie, Frankfurt a.M.: Fischer Verlag. Potter, William C. (1980): “Issue Area and Foreign Policy Analysis”, International Organization, 34

(3), 405-427. Poulsen, Kevin/Zetter, Kim (2010): “U.S. Intelligence Analyst Arrested in WikiLeaks Video Probe”,

Wired, 06.06.2010, http://www.wired.com/threatlevel/2010/06/leak/ (15.03.2011). Poulsen, Kevon (2009): “Report: Cyber Attacks Caused Power Outages in Brazil”, Wired,

07.11.2009, http://www.wired.com/threatlevel/2009/11/brazil/ (13.08.2011). Prensky, Marc (2001): “Digital Natives, Digital Immigrants”, On the Horizon, 9 (5),

http://www.marcprensky.com/writing/Prensky%20-%20Digital%20Natives,%20Digital%20Immigrants%20-%20Part1.pdf (10.04.2011).

Preston, Jennifer (2011a): “Movement Began with Outrage and a Facebook Page that Gave It an Outlet”, The New York Times, 05.02.2011, http://www.nytimes.com/2011/02/06/world/middleeast/06face.html (10.04.2011).

Preston, Jennifer (2011b): “Seeking to Disrupt Protesters, Syria Cracks Down on Social Media”, The New York Times, 22.05.2011, http://www.nytimes.com/2011/05/23/world/middleeast/23facebook.html (09.06.2011).

Prime, John A. (2007): “Secretive Barksdale Focused on Cyber-warfare”, Air Force Times, 12.06.2007, http://www.airforcetimes.com/news/2007/06/airforce_cyber_barksdale_070611/ (22.11.2010).

Putnam, Robert D. (2000): Bowling Alone: The Collapse and Revival of American Community, New York et al.: Simon & Schuster.

Qiang, Xiao (2008):”How China’s Internet Police Controls Speech on the Internet”, Radio Free Asia, 24.11.2008, http://www.rfa.org/english/commentaries/china_internet-11242008134108.html (16.08.2011).

Page 38: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

382 9 Literatur

Quinn, Andrew (2011): “U.S. Develops ‘Panic Button’ for Democracy Activists”, Reuters, 25.03.2011, http://www.reuters.com/article/2011/03/25/us-rights-usa-technology-idUSTRE72O6DH20110325 (01.08.2011).

Radelat, Ana (2007): “Competition over Cyber Mission to Heat up this Summer”, Shreveport Times, 11.06.2007, http://www.shreveporttimes.com/apps/pbcs.dll/article?AID=/20070611/NEWS01/706110314 (22.11.2010).

Radio Free Europe/Radio Liberty (2007): “Russia: Estonian President Says Moscow Sees Democracy as a ‘Threat’”, 05.06.2007, http://www.rferl.org/content/article/1076942.html (27.05.2011).

Ragan, Steve (2011): “Tunesian Government Harvesting Usernames and Passwords”, The Tech Herald, 04.01.2011, http://www.thetechherald.com/article.php/201101/6651/Tunisian-government-harvesting-usernames-and-passwords (10.04.2011).

Raman, Sri J. (2009): “After Nuclear War, India’s Far Right Wants Cyberwar”, Truthout Perspective, 05.04.2009, http://www.truth-out.org/040509D (22.11.2010).

Ranwsley, Adam (2011): “Fishy Chips: Spies Want to Hack-Proof Circuits”, Wired, 24.06.2011, http://www.wired.com/dangerroom/2011/06/chips-oy-spies-want-to-hack-proof-circuits/#more-49990 (03.08.2011).

Rathmell, Andrew (2001): “Controlling Computer Network Operations”, Information and Security, 7 (1), 121-144.

Rattrey, Greg/Healey, Jason (2011): “Non-State Actors and Cyber Conflict”, in: Kristin M. Lord/Travis Sharp (Hg.): America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, Washington, DC: Center for a New American Security, 67-86.

Rattray, Greg (2009): “An Environmental Approach to Understanding Cyberpower”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 253-274.

Rattray, Greg (2001): Strategic Warfare in Cyberspace, Cambridge, MA: The MIT Press. Rauscher, Karl F./Yaschenko, Valery (2011): Russia-U.S. Bilateral on Cybersecurity: Critical Ter-

minology Foundations, New York/Moskau: East West Institute/Information Security Institute. Razumovskaya, Olga (2011): „Russian Social Network: FSB Asked it to Block Kremlin Protesters”,

The Wall Street Journal, 08.12.2011, http://blogs.wsj.com/emergingeurope/2011/12/08/russian-social-network-fsb-asked-it-to-block-kremlin-protesters/ (14.12.2011).

Reuder, Bernd/Siekman, Sascha (2009): “Wie Cyber-Kriminelle und Geheimdienste mit Phishing gezielt auf Informationsjagd gehen“, crn.de, 03.04.2009, http://www.crn.de/security/artikel-7191.html (10.08.2011).

Reid, Tim (2007): “China’s Cyber Army is Preparing to March on America, Says Pentagon”, The Times Online, 08.09.2007, http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article2409865.ece (22.08.2009).

Reporters without Borders (2011): “Wave of Arrests of Bloggers and Activists”, 07.01.2011, http://en.rsf.org/tunisia-wave-of-arrests-of-bloggers-and-07-01-2011,39238.html (10.04.2011).

Reporters without Borders (2009): Internet Enemies, Paris, http://www.rsf.org/IMG/pdf/Internet_enemies_2009_2_.pdf (03.03.2010).

Resnick, David (1998): “Politics on the Internet. The Normalization of Cyberspace”, in: Chris Tou-louse/Timothy W. Luke (Hg.): The Politics of Cyberspace: A New Political Science Reader, New York/London: Routledge, 48-68.

Reuters (2009): “British Spy Chief’s Cover Blown on Facebook”, 04.07.2009, http://www.reuters.com/article/2009/07/05/us-britain-mi-idUSTRE56403820090705 (15.03.2011).

Rheingold, Howard (2002): Smart Mobs: The Next Social Revolution, Cambridge, MA: Basic Books.

Page 39: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 383

Rheingold, Howard (1993): The Virtual Community: Homesteading on the Electronic Frontier, Reading, MA: Addison-Wesley.

Rhoads, Christopher/Fassihi, Farnaz (2011): “Iran Vows to Unplug Internet”, The Wall Street Jour-nal, 28.05.2011, http://online.wsj.com/article/SB10001424052748704889404576277391449002016.html (09.06.2011).

Rhoads, Christopher/Chao, Loretta (2009): “Iran’s Web Spying Aided by Western Technology”, The Wall Street Journal, 23.06.2009, http://online.wsj.com/article/SB124562668777335653.html (03.03.2010).

RIA Novosti (2007): “Estonia Has no Evidence of Kremlin Involvement in Cyber Attacks”, 06.09.2007, http://en.rian.ru/world/20070906/76959190.html (27.05.2011).

Richmond, Riva (2011): “Iranian Hackers Suspected in Recent Security Breach”, The New York Times, 24.03.2011, http://bits.blogs.nytimes.com/2011/03/24/iranian-hackers-suspected-in-recent-security-breach/ (08.08.2011).

Rieger, Frank (2011): “Ein amtlicher Trojaner: Anatomie eines digitalen Ungeziefers”, Frankfurter Allgemeine Zeitung, 09.10.2011, http://www.faz.net/aktuell/feuilleton/ein-amtlicher-trojaner-anatomie-eines-digitalen-ungeziefers-11486473.html (27.10.2011).

Rieger, Frank (2010): “Der digitale Erstschlag ist erfolgt”, Frankfurter Allgemeine Zeitung, 22.09.2010, http://www.faz.net/s/RubCEB3712D41B64C3094E31BDC1446D18E/Doc~E8A0D43832567452FBDEE07AF579E893C~ATpl~Ecommon~Scontent.html (15.03.2011).

Roberts, Hal et al. (2010): 2010 Circumvention Tool Usage Report, Cambridge, MA, Berkman Center for Internet & Society, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_Circumvention_Tool_Usage_Report.pdf (22.11.2010).

Rockefeller, Happy (2011): “Updated: The HB Gary Email that Should Concern Us All”, The Daily Kos, 16.02.2011, http://www.dailykos.com/story/2011/02/16/945768/-UPDATED:-The-HB-Gary-Email-That-Should-Concern-Us-All (15.03.2011).

Rodriguez, Salvador (2011): “Hacker Group the A-Team Publishes List of Alleged LulzSec Mem-bers”, Los Angeles Times, 27.06.2011, http://latimesblogs.latimes.com/technology/2011/06/hacker-group-claims-to-expose-identitites-of-lulzsec-members.html (12.07.2011).

Rogers, Simon (2010): “The US Embassy Cables”, Guardian Data Blog, 03.12.2010, http://www.guardian.co.uk/news/datablog/2010/nov/29/WikiLeaks-cables-data (15.03.2011).

Rohozinski, Rafal/Haralampieva, Vesselina (2008): “Internet Filtering in the Commonwealth of Independent States”, in: Ronald Deibert et al. (Hg.): Access Denied: The Practice and Policy of Global Internet Filtering, Cambridge, MA: The MIT Press, 177-185.

Ronfeldt, David (1991). Cyberocracy, Cyberspace, and Cyberology. Political Effects of the Informa-tion Revolution, Santa Monica, CA: RAND.

Ronfeldt, David/Arquilla, John (2001): “Emergence and Influence of the Zapatista Social Netwar”, in: John Arquilla/David Ronfeldt (Hg.): Networks and Netwar: The Future of Terror, Crime and Militancy, Santa Monica, CA: RAND, 171-191.

Ronfeldt, David et al. (1998): The Zapatista Social Netwar in Mexico, Santa Monica, CA: RAND. Ronfeldt, David/Martinez, Armando (1997): “A Comment on the Zapatista ‘Netwar’”, in: John

Arquilla/David Ronfeldt (Hg.): In Athena’s Camp: Preparing for Conflict in the Information Age, Santa Monica, CA: RAND, 369-391.

Ropohl, Günter (1979): Eine Systemtheorie der Technik: Zur Grundlegung der Allgemeinen Techno-logie, München/Wien: Hanser.

Page 40: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

384 9 Literatur

Rosenau, James N. (1999): “Thinking Theory Thouroughly”, in: Paul R. Viotti/Mark V. Kauppi (Hg.): International Relations Theory: Realism, Pluralism, Globalism, and Beyond, 3. Auflage, Boston: Allyn and Bacon, 29-37.

Rosenau, James N. (1967): “Foreign Policy as an Issue-Area”, in: Ders. (Hg.): Domestic Sources of Foreign Policy, New York: Free Press, 11-50.

Rosenau, James N. (1966): „Pre-Theories and Theories of Foreign Policy”, in: Robert B. Farrell (Hg.): Approaches to Comparative and International Politics, Evanston, IL: Northwestern University Press, 27-92.

Rosenbach, Marcel/Stark, Holger (2011): Staatsfeind WikiLeaks, München: Deutsche Verlags-Anstalt.

Rosenzweig, Paul (2010): „The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence”, in: Proceeedings of a Workshop on Deterring Cyber Attacks, Washington, DC: The National Academies Press, http://www.cs.brown.edu/courses/csci1950-p/sources/lec26/Rosenzweig.pdf (14.08.2011).

Ross, Brian/Cole, Matthew (2011): Egypt: The Face that Launched a Revolution“, ABC News, 04.02.2011, http://abcnews.go.com/Blotter/egypt-face-launched-revolution/story?id=12841488 (10.04.2011).

Ross, David (2003): PGP: Backdoors and Key Escrow, o.A., http://www.rossde.com/PGP/pgp_backdoor.html (04.08.2011).

Rötzer, Florian (2011a): “Förderung der Internetfreiheit mit Hintertüren?“, Telepolis, 14.06.2011, http://www.heise.de/tp/artikel/34/34936/1.html (22.06.2011).

Rötzer, Florian (2011b): “Facebook, die Menschenrechte und der Schutz der politischen Aktivisten”, Telepolis, 18.02.2011, http://www.heise.de/tp/r4/artikel/34/34207/1.html (10.04.2011).

Rötzer, Florian (2007): “Hat die israelische Luftwaffe russische Luftabwehrsysteme in Syrien ausge-trickst?“, Telepolis, 10.10.2007, http://www.heise.de/tp/r4/artikel/26/26358/1.html (17.11.2010).

Rowe, Neil C. (2008): “Ethics of Cyberwar Attacks”, in: Lech J. Janczewski/Andrew M. Colarik (Hg.): Cyber Warfare and Cyber Terrorism, Hershey/New York: Information Science Refer-ences, 106-111.

Rushe, Dominic (2011): “Google Accuses China of Interfering with Gmail Email System”, The Guardian, 20.03.2011, http://www.guardian.co.uk/technology/2011/mar/20/google-gmail (04.08.2011).

Samuelson, Paul A. (1954): “The Pure Theory of Public Expenditures”, Review of Economics and Statistics, 36 (4), 387-389.

Sandler, Todd (1997): Global Challenges: An Approach to Environmental, Political, and Economic Problems, Cambridge: Cambridge University Press.

Sands, David R. (2008): “Hacking on Hill Traced to China. Human Rights Data Targeted”, The Washington Times, 12.06.2008, A01.

Sanger, Favid E. (2012): “Obama Order Sped up Wave of Cyberattacks against Iran”, The New York Times. 01.06.2012, http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all (05.06.2012).

Sanger, David E. (2010): “Iran Fights Malware Attacking Computers”, The New York Times, 25.09.2010, http://www.nytimes.com/2010/09/26/world/middleeast/26iran.html (17.11.2010).

Sanger, David E./Glanz, James/Becker, Jo (2010): „Around the World, Distress over Iran“, The New York Times, 28.11.2010, http://www.nytimes.com/2010/11/29/world/middleeast/29iran.html?pagewanted=1 (15.03.2011).

Sanger, David E./Markoff, John/Shanker, Thom (2009): “US Steps up Efforts on Digital Defenses”, The New York Times, 27.04.2009, http://www.nytimes.com/2009/04/28/us/28cyber.html?_r=2 (15.03.2011).

Page 41: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 385

Savage, Charlie (2010): “U.S. Tries to Make it Easier to Wiretap the Internet”, The New York Times, 27.09.2010, http://www.nytimes.com/2010/09/27/us/27wiretap.html (15.03.2011).

Scharpf, Fritz (1970): Demokratietheorie zwischen Utopie und Anpassung, Konstanz: Universitäts-verlag.

Schenk, Michael (2007): Medienwirkungsforschung, 3. Aufl, Tübingen: Mohr Siebeck. Schelling, Thomas C. (1984): Choice and Consequence, Cambridge/London: Harvard University

Press. Schelling, Thomas C. (1980) [1960]: The Strategy of Conflict, Cambridge/London: Harvard Univer-

sity Press. Schelling, Thomas C./Halperin, Morton H. (1961): Strategy and Arms Control, New York: Twentieth

Century Fund. Schleifer, Yigal (2009): “Blogs, YouTube: The New Battleground of Gaza Conflict”, Christian

Science Monitor, 23.01.2009, http://www.csmonitor.com/2009/0123/p04s03-wome.html (03.03.2010).

Schmid, Thomas (2010): “Ermittlungen in sozialen Netzwerken”, taz.de, 22.02.2010, http://www.taz.de/1/netz/netzpolitik/artikel/1/moechtest-du-polizei-als-freund-hinzufuegen/ (15.03.2011).

Schmitt, Michael M. (1999): „Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework“, Columbia Journal of Transnational Law, 37 (885).

Schmitt, Richard B. (2008): “Chinese Suspected in Capitol Hacking Cases”, Los Angeles Times, 12.06.2008, 10.

Schneier, Bruce (2007): “Did NSA Put a Secret Backdoor in New Encryption Standard?”, Wired, 15.11.2007, http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 (04.08.2011).

Schoenfeld, Gabriel (2010): “Warfare Through ‘a Soda Straw’”, The Hudson Institute/The Wall Street Journal, 23.06.2010, http://www.hudson.org/index.cfm?fuseaction=publication_details&id=7096 (17.08.2011).

Schröder, Thorsten/Zacharakis, Zacharias (2010): “Assange lässt ‘New York Times’ auflaufen”, Financial Times Deutschland, 01.12.2010, http://www.ftd.de/it-medien/medien-internet/:WikiLeaks-gruender-assange-laesst-new-york-times-auflaufen/50200574.html (15.03.2011).

Schroeder, Christopher M. (2011): “The Unprecedented Economic Risks of Network Insecurity”, in: Kristin M. Lord/Travis Sharp (Hg.): America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, Washington, DC: Center for a New American Security, 167-181.

Schulze, Tillmann (2006): Bedingt abwehrbereit: Schutz kritischer Informationsinfrastrukturen in Deutschland und den USA, Wiesbaden: Verlag für Sozialwissenschaften.

Schulzki-Haddouti (2011): „Dschihad-Webseite ‚Inspire’ inspiriert Journalisten“, ZDF Hyperland (Blog), 05.05.2011, http://blog.zdf.de/hyperland/2011/05/dschihad-website-inspire-inspiriert-journalisten/ (05.05.2011).

Schwartau, Winn (1994): Information Warfare: Chaos on the Electronic Superhighway, New York: Thunder’s Mouth Press.

Schöfbänker, Georg (2001): “Rüstungskontrolle im IT-Zeitalter”, in: Heinrich-Böll-Stiftung (Hg.): Rüstungskontrolle im Cyberspace, Berlin, 22-30.

Scott, Charney (2002): „Transition between Law Enforcement and National Defense“, in: US Con-gress Joint Economic Committee (Hg.): Security in the Information Age: New: Challenges, new Strategies, Washington, DC, 52-62, http://www.house.gov/jec/security.pdf (14.04.2011).

Sengupta, Kim/Morris, Nigel (2009): “New Cyber Chief to Protect against Computer Attacks”, The Independent, 24.06.2009, http://www.independent.co.uk/news/uk/home-news/new-cyber-chief-to-protect-against-computer-attacks-1715969.html (22.11.2010).

Page 42: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

386 9 Literatur

Sennett, Richard (2002) [1977]: The Fall of Public Man, London et al.: Penguin Books. Senor, Dan/Whiton, Christian (2009): “Five Ways Obama Could Promote Freedom in Iran”, The

Wall Street Journal, 17.06.2009, http://online.wsj.com/article/SB124520276223621661.html (03.06.2011).

Sevastopulo, Demetri (2007): “Beware: Enemy Attacks in Cyberspace”, Financial Times, 03.09.2007, http://www.ft.com/cms/s/0/a89c1c88-5a38-11dc-9bcd-0000779fd2ac.html#axzz15j5F5W9k (17.11.2010).

Shachtman, Noah (2009a): “Air Force Aims for ‘Full Control’ of ‘Any and All’ Computers”, Wired, 13.05.2008, http://www.wired.com/dangerroom/2008/05/air-force-mater/ (22.11.2010).

Shachtman, Noah (2009b): “Exclusive: U.S. Spies Buy Stake in Firm that Monitors Blogs, Tweets”, Wired, 19.10.2009, http://www.wired.com/dangerroom/2009/10/exclusive-us-spies-buy-stake-in-twitter-blog-monitoring-firm/ (15.03.2011).

Shachtman, Noah (2009c): “Wage Cyberwar against Hamas, Surrender your PC”, Wired, 08.01.2009, http://www.wired.com/dangerroom/2009/01/israel-dns-hack/ (17.11.2010).

Shachtman, Noah (2009d): “Top Georgian Offical: Moscow Cyber Attacked Us – We Just Can’t Prove it”, Wired, 11.03.2009, http://www.wired.com/dangerroom/2009/03/georgia-blames/ (31.05.2011).

Shatchtman, Noah (2009e): “Israelis Take over Hamas’ TV Station”, Wired, 05.01.2009, http://www.wired.com/dangerroom/2009/01/israelis-take-o/ (16.08.2011).

Shane, Scott (2011a): “WikiLeaks Leaves Names of Diplomatic Sources in Cables”, The New York Times, 29.08.2011, http://www.nytimes.com/2011/08/30/us/30WikiLeaks.html?_r=1&ref=global-home (30.08.2011).

Shane, Scott (2011b): “WikiLeaks Prompts new Diplomatic Uproar”, The New York Times, 31.08.2011, http://www.nytimes.com/2011/09/01/us/01wikileaks.html?_r=1&ref=global-home (01.09.2011).

Shane, Scott (2010): “WikiLeaks Founder Warns about more Dispatches”, The New York Times, 06.12.2010, http://www.nytimes.com/2010/12/07/world/europe/07assange.html (15.03.2011).

Shane, Scott (2005): Dismantling Utopia: How Information Ended the Soviet Union, Chicago: Ivan R. Dee.

Shane, Scott/Mazzetti, Mark/Filkins, Dexter (2010): “Cables Depict Afghan Graft, Starting at Top”, The New York Times, 02.12.2010, http://www.nytimes.com/2010/12/03/world/asia/03WikiLeaks-corruption.html (15.03.2011).

Shapiro, Andrew L. (1999a): The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know, New York, NY: PublicAffairs.

Shapiro, Andrew L. (1999b): "Think Again: The Internet", Foreign Policy, Summer, 14-27. Shanker, Thom/Richtel, Matt (2011): “In New Military, Data Overload Can Be Deadly”, The New

York Times, 16.01.2011, http://www.nytimes.com/2011/01/17/technology/17brain.html?pagewanted=all (29.08.2011).

Sharidan, Mary B. (2011): “U.S. Warns against Blocking Social Media, Elevates Internet Freedom Policies”, The Washington Post, 28.01.2011, http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012804554.html?sid=ST2011012806871 (16.06.2011).

Shirk, Susan L. (2007): “Changing Media, Changing Foreign Policy in China”, Japanese Journal of Political Science, 8 (1), 43-70.

Shirky, Clay (2011): “The Political Power of Social Media”, Foreign Affairs, 90 (1), 28-41. Shirky, Clay (2008): Here Comes Everybody: The Power of Organizing without Organizations, New

York: Penguin Books. Siedschlag, Alexander (2003): “Politologische Annäherungen an die digitale Demokratie“, in: Arno

Rogg (Hg.): Wie das Internet die Politik verändert, Opladen: Leske und Budrich, 9-20.

Page 43: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 387

Siegel, Matt (2008): „Government Computers Face Anti-Espionage Restrictions”, The Moscow Times, 21.03.2008, http://archive.cert.uni-stuttgart.de/isn/2008/03/msg00086.html (14.04.2011).

Siemens AG (2010): „‘Digital Graffiti’ gewinnt Preis für eBusiness“, 30.01.2010, http://www.siemens.com/innovation/de/news_events/ct_pressemitteilun-gen/index/research_news/2010/022_resnews_1003_1.htm (03.03.2010).

Silver, Vernon/Elgin, Ben (2011): „Torture in Bahrain Becomes Routine with Help from Nokia Siemens”, Bloomberg, 22.08.2011, http://www.bloomberg.com/news/2011-08-22/torture-in-bahrain-becomes-routine-with-help-from-nokia-siemens-networking.html (25.08.2011).

Silverstein, Richard (2009): „Hasbara Spam Alert: With Israel’s Foreign Ministry Organising Volun-teers to Flood News Websites with Pro-Israeli Comments, Propaganda 2.0 is here”, The Guardian, 09.01.2009, http://www.guardian.co.uk/commentisfree/2009/jan/09/israel-foreign-ministry-media (03.03.2010).

Simon, Herbert A. (1985): “Human Nature in Politics: The Dialogue of Psychology with Political Science”, American Political Science Review, 79 (2), 293-304.

Simon, Herbert A. (1957): Models of Man: Mathematical Essays on Rational Human Behavior in a Social Setting, New York, NY: John Wiley & Sons.

Singer, David/Bremer, Stuart/Stuckey, John (1979): “Capability Distribution, Uncertainty and Major Power War, 1820-1965”, in: David Singer (Hg.): Explaining War: Selected Papers from the Correlates of War Project, Beverly Hills, CA: Sage.

Sklerov, Matthew J. (2010): “Responding to International Cyber Attacks as Acts of War”, in: Jeffrey Carr (Hg.): Inside Cyber Warfare, Sabastopol, CA: O’Reilly Media.

Skolnikoff, Eugene B. (1993): The Elusive Transformation: Science, Technology, and the Evolution of International Politics, Princeton: Princeton University Press.

Skoudis, Edward (2009a): “Information Security Issues in Cyberspace”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 171-205.

Skoudis, Edward (2009b): “Evolutionary Trends in Cyberspace”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 147-170.

Sly, Liz (2011): “Syrian Revolt Still Spontaneous and Leaderless”, The Washington Post, 29.07.2011, http://www.washingtonpost.com/world/middle-east/syrian-revolt-still-spontaneous-and-leaderless/2011/07/27/gIQAHvltfI_story.html (01.08.2011).

Smith, Catharine (2011): “Egypt’s Facebook Revolution: Wael Ghonim Thanks the Social Network, Huffington Post, 11.02.2011, http://www.huffingtonpost.com/2011/02/11/egypt-facebook-revolution-wael-ghonim_n_822078.html (10.04.2011).

Smith, Craig S. (2001): “May 6-12, The First World Hacker War”, The New York Times, 13.05.2001, http://www.nytimes.com/2001/05/13/weekinreview/may-6-12-the-first-world-hacker-war.html?ref=craig_s_smith (19.11.2010).

Smith, Merritt R. (1994): “Technological Determinism in American Culture”, in: Dies./Leo Marx (Hg.) (1994): Does Technology Drive History? The Dilemma of Technological Determinism, Cambridge, MA: The MIT Press, 1-35.

Smith, Merritt R./Marx, Leo (Hg.) (1994): Does Technology Drive History? The Dilemma of Techno-logical Determinism, Cambridge, MA: The MIT Press.

Smith, Michael (2009): “Spy Chiefs Fear Chinese Cyber Attack”, The Sunday Times, 29.03.2009, http://www.timesonline.co.uk/tol/news/uk/article5993156.ece (15.03.2011).

Snidal, Duncan (1985): “Coordination versus Prisoners’ Dilemma: Implications for International Cooperation and Regimes”, American Political Science Review, 79 (4), 923-942.

Snyder, Glenn (1984): “The Security Dilemma in Alliance Politics”, World Politics, 36 (4), 461-495.

Page 44: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

388 9 Literatur

Social Media Schweiz (2011a): Facebook: Die Welt im Überblick, 31.03.2011, http://www.socialmediaschweiz.ch/Facebook_-_Die_Welt__Update_Marz_2011_.pdf (15.04.2011).

Social Media Schweiz (2011b): Die wichtigsten Social Media Plattformen Russlands im Überblick, http://www.socialmediaschweiz.ch/html/russland_social_media.html (10.04.2011).

Sofaer, Abraham D./Clark, David/Diffie, Whitfield (2010): „Cyber Security and International Agreements“, in: National Research Council (Hg.): Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Washington, DC: The National Academies Press, 179-206.

Solum, Lawrence B. (2009): “Models of Internet Governance”, in: Lee A. Bygrave/Jon Bing (Hg.): Internet Goverance: Infrastructure and Institutions, Oxford: Oxford University Press, 48-91.

Sonne, Paul/Stecklow, Steve (2011): “U.S. Products Help Block Mideast Web”, The Wall Street Journal, 28.03.2011, http://online.wsj.com/article/SB10001424052748704438104576219190417124226.html (01.08.2011).

Sosa, Gilbert C. (2009): “Country Report on Cybercrime: The Phillipines”, in: United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) (Hg.): Work Product of the 104th International Training Course ‘The Crminal Justice Response to Cybercrime’, Tokio, 80-86, http://www.unafei.or.jp/english/pdf/RS_No79/No79_12PA_Sosa.pdf (17.06.2011).

Spacewar.com (2008): “NATO Launches Cyber Defence Centre in Estonia”, 14.05.2008, http://www.spacewar.com/reports/NATO_launches_cyber_defence_centre_in_Estonia_999.html (22.11.2010).

Specter, Alen (2009): “Attack the Cyberwalls!”, Pittsburgh Post-Gazette, 07.07.2009, http://www.post-gazette.com/pg/09188/982158-109.stm (03.06.2011).

Speller, Ian (2008): “Naval Warfare”, in: David Jordan et al. (Hg.): Understanding Modern Warfare, Cambridge: Cambridge University Press, 122-177.

Stalder, Felix (2011): „WikiLeaks und die neue Ökologie der Nachrichtenmedien“, in: Suhrkamp Verlag (Hg.): WikiLeaks und die Folgen: Die Hintergründe, die Konsequenzen, Berlin, 96-108.

Stanoevska-Slavbeva, Katarina (2008): „Web 2.0 – Grundlagen, Auswirkungen und zukünftige Trends“, in: Miriam Meckel/Katarina Stanoevska-Slavbeva (Hg.): Web 2.0: Die nächste Gene-ration Internet, Baden-Baden: Nomos, 13-38.

Stegbauer, Christian (2008): „Raumzeitliche Struktur im Internet“, Aus Politik und Zeitgeschichte, 39/2008, 3-9.

Steidel, Johannes S:/Mueller, Philipp/Meshkova, Ksenia (2008): Security 2.0: The Estonian-Russian Cyberwar 2007, Draft Paper, Erfurt School of Public Policy, http://www.globalize.de/wp-content/uploads/2008/12/2008-002.pdf (27.05.2011).

Stein, Arthur (1993): “Coordination and Collaboration: Regimes in an Anarchic World”, in: David A. Baldwin (Hg.): Neorealism and Neoliberalism: The Contemporary Debate, New York: Co-lumbia University Press, 29-59.

Steinmo, Sven/Thelen, Kathleen/Longstreth, Frank (Hg.): Structuring Politics: Historical Institution-alism in Comparative Analysis, Cambridge: Cambridge University Press.

Sternstein, Aliya (2011): “Defense Funding for Cybersecurity is Hard to Pin Down”, NextGov, 29.03.2011, http://www.nextgov.com/nextgov/ng_20110329_4961.php (14.04.2011).

Stone, Corin R. (2011): Statement for the Record of Corin R. Stone, Intelligence Community Informa-tion Sharing Executive Office of the Director of National Intelligence, before the Senate Home-land Security and Governmental Affairs Committee, Washington, DC, 10.03.2011, http://www.fas.org/irp/congress/2011_hr/031011stone.pdf (15.03.2011).

StopBadware Inc. (2011): The State of Badware, Cambridge, MA, http://stopbadware.org/pdfs/state-of-badware-june-2011.pdf (14.08.2011).

Page 45: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 389

Streitfeld, David (2011): “Pentagon Seeks a Few Good Social Networkers”, The New York Times, 02.08.2011, http://bits.blogs.nytimes.com/2011/08/02/pentagon-seeks-social-networking-experts/ (08.08.2011).

Sunstein, Cass R. (2007). Republic 2.0, Princeton/Oxford: Princeton University Press. Süddeutsche Zeitung (2010a): “Computer-Virus Stuxnet trifft deutsche Industrie”, 02.10.2010,

http://www.sueddeutsche.de/digital/gefaehrliches-schadprogramm-computer-virus-stuxnet-trifft-deutsche-industrie-1.1007379 (15.03.2011).

Süddeutsche Zeitung (2010b): „USA düpieren Verbündete weltweit“, 28.11.2010, http://www.sueddeutsche.de/politik/WikiLeaks-enthuellungen-im-netz-unberechenbar-und-mit-begrenztem-horizont-1.1029368 (15.03.2011).

Süddeutsche Zeitung (2010c): „Putin, der ‚Alpha-Rüde’“, 28.11.2010, http://www.sueddeutsche.de/politik/WikiLeaks-enthuellungen-im-netz-unberechenbar-und-mit-begrenztem-horizont-1.1029368-2 (15.03.2011).

Svensson, Peter (2008): „Pakistan Causes Worldwide YouTube Outage“, Msnbc.com, 25.02.2008, http://www.msnbc.msn.com/id/23339712/ns/technology_and_science-internet/t/pakistan-causes-worldwide-youtube-outage/ (07.07.2011).

Swayne, Jon (2008): „Georgia: ‚Russia Conducting Cyberwar’“, The Telegraph, 11.08.2008, http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html (31.05.2011).

Symantec (o.A.): Der Stuxnet Wurm, http://www.symantec.com/de/de/business/theme.jsp?themeid=stuxnet (15.03.2011).

Tagesschau.de (2009): „Markiere die Gesichter deiner Freunde!“, 10.07.2009, http://www.tagesschau.de/ausland/iran638.html (14.01.2011).

Takai, Teresa/Ferguson, Thomas (2011): Joint Statement for the Record, Senate Homeland Security and Governmental Affairs Committee, 10.03.2011, http://www.fas.org/irp/congress/2011_hr/031011takai.pdf (15.03.2011).

Tang, Ruoji (2010): “China Poll: Are Chinese Offcials Afraid of the Internet?”, Economic Observer, 17.11.2010, http://www.eeo.com.cn/ens/Observer/opinion_analysis/2010/11/17/186143.shtml (17.08.2011).

Tangredi, Sam J. (2002): “Sea Power: Theory and Practice”, in: John Baylis et al. (Hg.): Strategy in the Contemporary World: An Introduction to Strategic Studies, Oxford: Oxford University Press, 113-136.

Temkin, Ilya/Eldredge, Niles (2007): “Phylogenetics and Material Cultural Evolution”, Current Antrophology, 48 (1), 146-154.

Tetlock, Philip E. (1998): “Social Psychology and World Politics”, in: Daniel T.Gilbert/Susan Fiske/Gardner Lindzey (Hg.): The Handbook of Social Psychology, Vol. II, Boston, MA: McGraw-Hill, 868-912.

Tetlock, Philip E./McGuire, Charles (1986): „Cognitive Perspectives on Foreign Policy”, in: Samuel Long (Hg.): Political Behavior Annual (Volume 1), London: Westview Press, 147-179.

Teusch, Ulrich (2000): “Technik und internationale Politik”, in: Wichard Woyke (Hg.): Handwörter-buch Internationale Politik, 8. Aufl., Opladen: Leske + Budrich, 407-416.

The Age (2007): “EU Should Class Cyber Attacks as Terrorism: Estonia”, 08.06.2007, http://www.theage.com.au/news/Technology/EU-should-class-cyber-attacks-as-terrorism-Estonia/2007/06/08/1181089253367.html (28.05.2011).

The Associated Press (2009): “Officials Say North Korea Believed behind Cyber Attacks on SKo-rean, US Web Sites”, 08.07.2009, http://www.trurodaily.com/Living/World/2009-07-08/article-353120/Officials-say-North-Korea-believed-behind-cyber-attacks-on-SKorean,-US-Web-sites/1 (11.08.2011).

Page 46: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

390 9 Literatur

The China Post (2011): “Cross-Strait Cooperation Cited as Key in Fight against Crime: Police”, 03.03.2011, http://www.chinapost.com.tw/taiwan/china-taiwan-relations/2011/03/03/293186/Cross-strait-cooperation.htm (14.08.2011).

The Citizen Lap (2007): Everyone’s Guide to By-Passing Internet Censorship for Citizens World-wide, Toronto, ON: University of Toronto.

The Economist (2009a): “A Chinese Ghost in the Machine?”, 02.04.2009, http://www.economist.com/world/international/displaystory.cfm?story_id=13416219 (17.11.2010).

The Economist (2009b): “Battle is Joined”, 23.04.2009, http://www.economist.com/node/-13527677?story_id=13527677 (17.11.2010).

The Economist (2008): “Marching off to Cyberwar”, 04.12.2008, http://www.economist.com/node/-12673385 (17.11.2010).

The Economist (2007): “A World Wide Web of Terror – Internet Jihad”, 14.07.2007, http://www.economist.com/node/9472498 (15.03.2011).

The Global Times (2011): “Poll: China Should Boost Cyber Defenses”, 21.06.2011, http://www.globaltimes.cn/NEWS/tabid/99/articleType/ArticleView/articleId/662619/Poll-China-should-boost-cyber-defenses.aspx (17.08.2011).

The Guardian (2011): “Government Plans Cyber Weapons Programme”, 31.05.2011, http://www.guardian.co.uk/government-computing-network/2011/may/31/government-plans-cyber-weapons-programme (09.06.2011).

The New York Times (2011a): “Bradley E. Manning”, 03.03.2011, http://topics.nytimes.com-/top/reference/timestopics/people/m/bradley_e_manning/index.html?scp=4&sq=cables&st=cse (15.03.2011).

The New York Times (2011b): “A Selection from the Cache of Diplomatic Dispatches: Afghan Insider Explains Corruption”, 24.03.2011, http://www.nytimes.com/interactive/2010/11/28/world/20101128-cables-viewer.html#report/corruption-09KABUL3714 (30.03.2011).

The New York Times (2011c): “A Selection from the Cache of Diplomatic Dispatches: Biden Doubts Pakistan’s Support for U.S. Goals”, 24.03.2011, http://www.nytimes.com/interactive/2010/11/28/world/20101128-cables-viewer.html#report/pakistan-09ISLAMABAD270 (30.03.2011).

The New York Times (2011d): “A Selection from the Cache of Diplomatic Dispatches: Yemeni President on U.S. Missile Strikes”, 24.03.2011, http://www.nytimes.com/interactive/2010/11/28/world/20101128-cables-viewer.html#report/yemen-10SANAA4 (30.03.2011).

The New York Times (2011e): “A Selection from the Cache of Diplomatic Dispatches: An Inside Account of Tunesian Corruption”, 24.03.2011, http://www.nytimes.com/interactive/2010/11/28/world/20101128-cables-viewer.html#report/tunisia-09TUNIS372 (30.03.2011).

The New York Times (2011f): “A Selection from the Cache of Diplomatic Dispatches: Chinese Ties to the World of Computer Hackers”, http://www.nytimes.com/interactive/2010/11/28/world/20101128-cables-viewer.html#report/china-09STATE67105 (14.04.2011).

The New York Times (2011g): “A Selection from the Cache of Diplomatic Dispatches: “Chinese Government Singles out Google”, http://www.nytimes.com/interactive/2010/11/28/world/20101128-cables-viewer.html#report/china-99BEIJING999 (07.06.2011).

The New York Times (2010a): “Text of a Selection of the Secret Dispatches”, http://www.nytimes.com/interactive/world/26warlogs.html (15.03.2011).

Page 47: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 391

The New York Times (2010b): “Secret Dispatches from the War in Iraq”, http://www.nytimes.com/interactive/world/iraq-war-logs.html (15.03.2011).

Theohary, Catherine A./Rollins, John (2011): Terrorist Use of the Internet: Information Operations in Cyberspace, Washington, DC: Congressional Research Service, http://www.fas.org/sgp/crs/terror/R41674.pdf (05.05.2011).

The SecDev Group (2011): Collusion and Collision: Searching for Guidance in Chinese Cyberspace, 20.09.2011, http://www.scribd.com/doc/65531793/Collusion-Collision (14.12.2011).

The SecDev Group/The Citizen Lab (2009): Tracking Ghost Net: Investigating a Cyber Espionage Network, Toronto/Ottawa, http://www.nartv.org/mirror/ghostnet.pdf (03.03.2010).

The Sidney Morning Herald (2011): “Libya Goes Dark as Internet Shut Down”, 05.03.2011, http://www.smh.com.au/technology/technology-news/libya-goes-dark-as-internet-shut-down-20110305-1bijf.html (10.04.2011).

The Wall Street Journal (2011): “Communication Block Cost Egypt $90 Million – OECD”, 03.02.2011, http://online.wsj.com/article/BT-CO-20110203-718927.html (15.03.2011).

The Washington Times (2009): “Iran’s Twitter Revolution”, 16.06.2009, http://www.washingtontimes.com/news/2009/jun/16/irans-twitter-revolution/ (10.04.2011).

The Washington Times (2008): “Hacking on Hill Traced to China”, 12.06.2008, http://www.washingtontimes.com/news/2008/jun/12/hacking-on-hill-traced-to-china/?page=all (16.08.2011).

The White House (2011a): International Strategy for Cyberspace: Prosperity, Security, and Openess in a Networked World, May 2011, http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf (13.06.2011).

The White House (2011b): Joint Statement by Cybersecurity Coordinator Schmidt and Deputy Secre-tary Klimashin, Washington, DC, http://www.whitehouse.gov/sites/default/files/uploads/2011_klimashin_schmidt_cyber_joint_statement.pdf (25.08.2011).

The White House (2011c): Executive Order 13587: Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information, 07.10.2011, http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-structural-reforms-improve-security-classified-networks- (14.12.2011).

The White House (2009a): Remarks by the President on Securing our Nation’s Cyber Infrastructure, Washington, DC, http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/ (22.11.2010).

The White House (2009b): Cyberspace Policy Review, Washington, DC, http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf (10.05.2011).

Thiele, Rolf (2008): „Vernetzte Sicherheit. Über die Konzeptionen gesamtstaatlichen Zusammenwir-kens“, Österreichische Militärische Zeitschrift, 48 (3), 299-308.

Thomas, Thomas K. (2010): „Govt Bans Import of Chinese Telecom Equipment”, The Hindu Busi-ness Line, 28.04.2010, http://www.thehindubusinessline.com/todays-paper/article990404.ece?ref=archive (01.07.2011).

Thomas, Timothy L. (2009a): “PLA Computer Network Operations: Scenarios, Doctrine, Organiza-tions and Capability”, in: Roy Kamphausen/David Lai/Andrew Scobell (Hg.): Beyond the Strait: PLA Missions other than Taiwan, Carlisle, PA: Strategic Studies Institute, 253-285.

Thomas, Timothy L. (2009b): “Nation-state Cyber Strategies: Examples from China and Russia”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Se-curity, Washington, DC: National Defense University Press, 465-488.

Thomas, Timothy L. (2001a): “China’s Electronic Strategies”, Military Review, Mai/Juni 2001, 47-54.

Page 48: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

392 9 Literatur

Thomas, Timothy L. (2001b): “The Russian Understanding of Information Operations and Informa-tion Warfare”, in: David S. Alberts/David S. Papp (Hg.): Information Age Anthology: Volume III: The Information Age Military, Washington, DC: Department of Defense: 777-815.

Thomas, Timothy L. (2000): Like Adding Wings to the Tiger: Chinese Information War Theory and Practice, Foreign Military Studies Office, Fort Leavenworth, KS, http://libweb.uoregon.edu/ec/e-asia/read/tigerwings.pdf (22.11.2010).

Thomas, Timothy L. (1996): “Russian Views on Information Based Warfare”, Airpower Journal, Special Edition, http://www.airpower.au.af.mil/airchronicles/apj/apj96/spec96/thomas.html (11.08.2011).

Thompson, Bill (2011): “Freedom Sacrificed for an Easy Life, in Apple’s Brave New World”, Index on Censorship, 07.03.2011, http://www.indexoncensorship.org/2011/03/freedom-sacrficed-for-an-easy-life-in-apples-brave-new-world/ (15.03.2011).

Thompson, Mark/Waller, Douglas (1995): “Onward Cyber Soldiers“, Time, 21.08.1995, http://www.time.com/time/magazine/article/0,9171,983318,00.html (17.11.2010).

Thompson, Paul (2010): “Obama to Be Given the Right to Shut Down the Internet with ‘Kill Switch’”, Daily Mail, 25.06.2010, http://www.dailymail.co.uk/sciencetech/article-1287695/Obama-given-right-shut-internet-kill-switch.html (01.06.2011).

Thomson, Amy/Hutton, Robert (2011): “U.K. May Block Twitter, Blackberry Messaging Services in Future Riots”, Bloomberg, 11.08.2011, http://www.bloomberg.com/news/2011-08-11/u-k-may-block-twitter-blackberry-messaging-services-in-future-riots.html (13.08.2011).

Thornburg, Nathan (2005): “The Invasion of Chinese Cyberspies”, Time, 29.08.2005, http://www.time.com/time/magazine/article/0,9171,1098961,00.html (17.11.2010).

Thornton, Rod (2007): Asymmetric Warfare: Threat and Response in the Twenty-First Century, Cambridge: Polity Press.

Tkacik, John (2008): Trojan Dragon: China’s Cyber Threat, Washington, DC: The Heritage Founda-tion, http://www.heritage.org/research/reports/2008/02/trojan-dragon-chinas-cyber-threat#_ftn11 (22.11.2010).

Toffler, Alvin (1990) [1980]: The Third Wave, New York, NY et al.: Bantam Books. Toffler, Alvin (1970): Future Shock, New York: Random House. Tomlinson, Chris (2001): “Vision of Warfare Future as US and China Swap Cyber Attacks”, Bir-

mingham Post, 08.05.2001, 21. Traynor, Ian (2007): “Russia Accused of Unleashing Cyberwar to Disable Estonia”, The Guardian,

17.05.2007, http://www.guardian.co.uk/world/2007/may/17/topstories3.russia (28.05.2011). Trendle, Giles (2002): “The E-Jihad against Western Business“, IT-Director.com, 05.04.2002,

http://www.it-director.com/content.php?cid=2707 (19.11.2010). Triepel, Heinrich (1938): Die Hegemonie: Ein Buch von führenden Staaten, Stuttgart: Kohlhammer. Tripathy, Devidutta/Mukherjee, Krittivas (2010): RIM Allows Interim Data Interception in India”,

The Globe and Mail, 29.10.2010, http://www.theglobeandmail.com/news/technology/rim-allows-interim-data-interception-in-india/article1777880/ (04.11.2010).

Tsui, Lokman (2008): The Great Firewall as Iron Curtain 2.0: The Implications of China’s Internet most Dominant Metaphor for U.S. Foreign Policy, Philadelphia, PA: University of Philadel-phia, http://jmsc.hku.hk/blogs/circ/files/2008/06/tsui_lokman.pdf (03.06.2011).

Turner, Fred (2006): From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Net-work, and the Rise of Digital Utopianism, Chicago, IL: University of Chicago Press.

Tversky, Amos/Kahnemann, Daniel (1982): “Judgments of and by Representativeness”, in: Daniel Kahnemann/Paul Slovic/Amos Tversky (Hg.): Judgement under Uncertainty: Heuristics and Biases, New York: Cambridge University Press, 84-100.

Tversky, Amos/Kahnemann, Daniel (1974): “Judgement under Uncertainty: Heuristics and Biases”, Science, 185, 1124-1131.

Page 49: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 393

Tversky, Amos/Kahnemann, Daniel (1973): “Availability: A Heuristic for Judging Frequency and Probability”, Cognitive Psychology, 5, 207-232.

T-online.de (2011): “RSA tauscht nach Hackerangriff 40 Millionen Sicherheitsschlüssel aus“, 08.06.2011, http://computer.t-online.de/rsa-superschluessel-geknackt-millionen-computersysteme-unsicher/id_47050104/index (04.08.2011).

Ungerleider, Neal (2011): “India Turns to China to Fight Cyberspies”, Fastcompany.com, 28.06.2011, http://www.fastcompany.com/1763715/india-turns-to-china-to-fight-cyberspies?partner=rss (01.07.2011).

Ungoed-Thomas, Jonathan (1998): “How ‘Datastream Cowboy’ Took U.S. to the Brink of War”, Toronto Star, 21.04.1998, A10.

United Nations General Assembly (2010): Report of the Group of Governmental Experts on Devel-opments in the Field of Information and Telecommunications in the Context of International Security, A/65/201, 30.07.2010, http://unhq-appspub-01.un.org/UNODA/Library.nsf (10.05.2011).

United Nations General Assembly (2000): Developments in the Field of Information and Telecom-munications in the Context of International Security: Report of the Secretary-General, A/55/140, http://www.un.org/documents/ga/docs/55/a55140.pdf (12.08.2011).

United Nations General Assembly (1998): Developments in the Field of Information and Telecom-munications in the Context of International Security, Draft Resolution/Draft Decision: A/C.1/53/L.17/Rev.1, http://unhq-appspub-01.un.org/UNODA/vote.nsf (12.05.2011).

UPI (2010): “Israel’s New Strategic Arm: Cyberwarfare”, 19.03.2010, http://www.upi.com/Business_News/Security-Industry/2010/03/19/Israels-new-strategic-arm-Cyberwarfare/UPI-29701269021452/ (22.11.2010).

US Air Force (2011): Legal Reviews of Weapons and Cyber Capabilities, 27.07.2011, Washington, DC, http://www.fas.org/irp/doddir/usaf/afi51-402.pdf (12.08.2011).

US Air Force (1998): Information Operations, Air Force Doctrine Document 2.5, Washington, DC, http://www.dtic.mil/doctrine/jel/service_pubs/afd2_5.pdf (22.11.2010).

US Air Force (1997): Air Force Basic Doctrine, Washington, DC, http://www.globalsecurity.org/military/library/policy/usaf/afdd/afdd1.pdf (22.11.2010).

US Air Force (1995): Cornerstones of Information Warfare, Washington, DC, http://www.c4i.org/cornerstones.html (22.11.2010).

US Armed Services Committee (2010): Advance Questions for Lieutenant General Keith Alexander, USA Nominee for Commander, United States Cyber Command, Washington, DC, http://www.fas.org/irp/congress/2010_hr/041510alexander-qfr.pdf (12.08.2011).

US Army (2005): Training and Doctrine Command, Cyber Operations and Cyber Terrorism, Fort Leavenworth, KS, http://www.fas.org/irp/threat/terrorism/sup2.pdf (14.04.2011).

US Army (1996): Information Operations, Field Manual 100-6, Washington, DC, http://www.iwar.org.uk/iwar/resources/usarmyio/fm100-6.pdf (22.11.2010).

US Congress (2002): A Bill to Develop and Deploy Technologies to Defeat Internet Jamming and Censorship, H.R. 5524, introduced by Tom Lantos and Christopher Cox, http://www.gpo.gov/fdsys/pkg/BILLS-107hr5524ih/pdf/BILLS-107hr5524ih.pdf (07.06.2011).

US Department of Agriculture (o.A.): Hacking U.S. Government Computers from Overseas, http://www.da.usda.gov/pdsd/Security%20Guide/Spystory/Hacking.htm#hacking (19.11.2010).

US Department of Commerce (2011): Remarks at U.S. Chamber of Commerce on Global Flow of Information on the Internet, 16.06.2011, http://www.commerce.gov/news/secretary-speeches/2011/06/16/remarks-us-chamber-commerce-global-flow-information-internet (25.06.2011).

US Department of Defense (2011): Department of Defense Strategy for Operating in Cyberspace, July 2011, Washington, DC, http://www.defense.gov/news/d20110714cyber.pdf (01.08.2011).

Page 50: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

394 9 Literatur

US Department of Defense (2010): Quadrennial Defense Review, Washington, DC, http://www.defense.gov/QDR/QDR%20as%20of%2029JAN10%201600.pdf (22.11.2010).

US Department of Defense (2006a): Quadrennial Defense Review, Washington, DC, http://www.globalsecurity.org/military/library/policy/dod/qdr-2006-report.pdf (22.11.2010).

US Department of Defense (2006b): The National Military Strategy for Cyberspace Operations, Washington, DC, http://www.bits.de/NRANEU/others/strategy/07-F-2105doc1.pdf (14.08.2011).

US Department of Defense (2006c): Information Operations, DoD Directive 0-3600.1, Washington, DC, http://ia600401.us.archive.org/1/items/InformationOperations/info_ops.pdf (19.08.2011).

US Department of Defense (2003): Information Operations Roadmap, Washington, DC, http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf (03.03.2010).

US Department of Defense (2001a): Quadrennial Defense Review, Washington, DC, http://www.defenselink.mil/pubs/pdfs/qdr2001.pdf (22.11.2010).

US Department of Defense (2001b): Nuclear Posture Review, Washington, DC, Auszüge unter http://www.globalsecurity.org/wmd/library/policy/dod/npr.htm (22.11.2010).

US Department of Defense (1999): An Assessment of International Legal Issues in Information Operations, Washington, DC.

US Department of Defense (1998): Joint Doctrine for Information Operations, Joint Pub 3-13, Washington, DC, http://www.c4i.org/jp3_13.pdf (03.03.2010).

US Department of Defense (1997): Quadrennial Defense Review, Washington, DC, http://www.fas.org/man/docs/qdr/ (22.11.2010).

US Department of Defense (1996a): Information Warfare: A Strategy for Peace – The Decisive Edge for War, Washington, DC, http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA318379&Location=U2&doc=GetTRDoc.pdf (22.11.2010).

US Department of Defense (1996b): Joint Vision 2010, Washington, DC, http://www.dtic.mil/jv2010/jv2010.pdf (22.11.2010).

US Department of Homeland Security (2010): Memorandum of Agreement between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity, Washington, DC, http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf (15.08.2011).

US Department of Justice (2011): The Federal Bureau of Investigation’s Ability to Address the National Security Cyber Intrusion Threat, Washington, DC, http://www.justice.gov/oig/reports/FBI/a1122r.pdf (22.08.2011).

US Department of State (2011): “Internet Rights and Wrongs: Choices & Challenges in a Networked World”, Secretary of State Hillary Rodham Clinton, 15.02.2011, http://www.state.gov/secretary/rm/2011/02/156619.htm (04.06.2011).

US Department of State (2010a): “Remarks on Internet Freedom”, Secretary of State Hillary Rodham Clinton, 21.01.2010, http://www.state.gov/secretary/rm/2010/01/135519.htm (17.11.2010).

US Department of State (2010b): “Briefing on Internet Freedom and 21st Century Statecraft”, Mi-chael H. Posner/Alec Ross, 22.01.2010, http://www.state.gov/g/drl/rls/rm/2010/134306.htm (03.06.2011).

US Embassy Tallinn (2007a): Estonia’s Cyber Attacks: World’s First Virtual Attack against Nation State, 04.06.2007, Cable veröffentlich durch WikiLeaks, abrufbar unter http://WikiLeaks.ch/cable/2007/06/07TALLINN366.html (28.05.2011).

US Embassy Tallinn (2007b): Estonia: GOE Officials on the Bronze Solider, Russia and Integration, 11.05.2007, Cable veröffentlicht durch WikiLeaks, abrufbar unter http://aebr.home.xs4all.nl/wl/tallinn/07Talinn/07TALLINN310.html (28.05.2011).

US Embassy Tallinn (2007c): Russian Bear Hug Squeezes Estonian Economy, 24.05.2007, Cable veröffentlicht durch WikiLeaks, abrufbar unter http://77aebr.home.xs4all.nl/wl/tallinn/07TALLINN347.html (28.05.2011).

Page 51: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 395

US Embassy Tallinn (2007d): Estonia’s Cyber Attacks: Lessons Learned, 06.06.2007, Cable veröf-fenlicht durch WikiLeaks, abrufbar unter http://WikiLeaks.ch/cable/2007/06/07TALLINN375.html (30.05.2011).

US Government Accountability Office (2010): Cyberspace: United States Faces Challenges in Adressing Global Cybersecurity and Governance, GAO-10-606, Washington, DC, http://www.gao.gov/new.items/d10606.pdf (10.05.2011).

US Government Accountability Office (2005): Internet Management: Prevalence of False Contact Information for registered Domain Names, Washington, DC, http://www.gao.gov/new.items/d06165.pdf (11.08.2011).

US Government Printing Office (2001): Nomination of Colin S. Powell to be Secretary of State: Hearing before the Committee on Foreign Relations, United States Senate, 17.01.2001, http://www.gpo.gov/fdsys/pkg/CHRG-107shrg71536/pdf/CHRG-107shrg71536.pdf (02.06.2011).

US Government Printing Office (2000): Public Papers of the Presidents of the United States: Wil-liam J. Clinton, Buch 1, http://www.gpo.gov/fdsys/pkg/PPP-2000-book1/html/PPP-2000-book1-doc-pg404.htm (02.06.2011).

Usocial (o.A.a): Facebook Marketing Services, http://usocial.net/facebook_marketing/ (15.03.2011). Usocial (o.A.b): Twitter Marketing Services, http://usocial.net/twitter_marketing/ (15.03.2011). Vaidhyanathan, Siva (2011): The Googlization of Everything (and Why We Should Worry), Berke-

ley/Los Angeles, CA: University of California Press. Van Creveld, Martin (1985): Command in War, Cambridge/London: Harvard University Press. Vascellaro, Jessica E./Dean, Jason/Gorman, Siobhan (2010): “Google Warns of China Exit over

Hacking”, The Wall Street Journal, 13.0.2010, http://online.wsj.com/article/SB126333757451026659.html (03.03.2010).

Vasquez, John A. (1983): “The Tangibility of Issue and Global Conflict: A Test of Rosenau`s Issue Area Typology”, Journal of Peace Research, 20 (2), 179-192.

Vatis, Micheal V. (2010): “The Council of Europe Convention on Cybercrime”, in: National Re-search Council (Hg.): Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Washington, DC: The National Academies Press, 207-224.

Vatis, Michael V. (2003): “International Cyber-Security Cooperation: Informal Bilateral Models”, in James A. Lewis (Hg.): Cyber Security: Turning National Solutions into International Coopera-tion, Washington, DC: CSIS Press, 1-12.

Verenkotte, Clemens (2010): “Warum sich Israel über WikiLeaks freut”, tagesschau.de, 01.12.2010, http://www.tagesschau.de/ausland/WikiLeaks230.html (15.03.2011).

Vertzberger, Yaacov Y.I. (1990): The World in their Minds: Information Processing, Cognition, and Perception in Foreign Policy Decision Making, Stanford, CA: Stanford University Press.

Vijayan, Jaikumar (2009): “Internet Warfare: Are We Focusing on the Wrong Things?”, Computer World, 27.04.2009, http://www.computerworld.com/s/article/9131050/Internet_war-fare_Are_we_focusing_on_the_wrong_things_?taxonomyId=13&pageNumber=1 (16.08.2011).

Vicary, Simon/Sandler, Todd (2002): „Weakest-Link Public Goods: Giving In-kind or Transferring Money“, European Economic Review, 46 (8), 1501-1520.

Villeneuve, Nart (2010a): “Barriers to Cooperation: An Analysis of the Origins of International Efforts to Protect Children Online”, in: Ronald Deibert et al. (Hg.): Access Controlled: The Shaping of Power, Rights and Rule in Cyberspace, Cambridge, MA: The MIT Press, 55-70.

Villeneuve, Nart (2010b): Koobface: Inside a Crimeware Network, TheSecDevGroup/Infowar Moni-tor, http://www.infowar-monitor.net/reports/iwm-koobface.pdf (14.08.2011).

Page 52: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

396 9 Literatur

Vollrath, Ernst (1993): “Carl von Clausewitz: Eine mit dem Handeln befreundete Theorie”, in: Gerhard Vowinckel (Hg.): Clausewitz-Kolloqium – Theorie des Krieges als Sozialwissenschaft, Berlin: Duncker & Humblot, 63-78.

Voss, James F./Dorsey, Ellen (1992): “Perception and International Relations: An Overview”, in: Eric Singer/Valerie M. Hudson (Hg.): Political Psychology and Foreign Policy, Boulder, CO: Westview Press, 3-30.

Waever, Ole (1995): “Securitization and Desecuritization”, in: Ronnie D. Lipschutz (Hg.): On Secu-rity, New York: Columbia University Press, 46-86.

Waldmann, Peter (2005): Terrorismus: Provokation der Macht, Hamburg: Murmann Verlag. Walker, George K. (2000): „Information Warfare and Neutrality“, Vanderbilt Journal of Transna-

tional Law, 33 (5), 1079-1200. Walsh, Declan (2010): “Pakistani Media Publish Fake WikiLeaks Cables Attacking India”, The

Guardian, 09.12.2010, http://www.guardian.co.uk/world/2010/dec/09/pakistani-newspaper-fake-leaks-india (15.03.2011).

Walton, Gregory (2008): “Year of the Gh0st RAT”, in: Beijing Olympics 2008: Winning Press Freedom, Paris Conference, http://www.beijing2008conference.com/articles.php?id=101#3 (10.06.2011).

Waltz, Edward (1998): Information Warfare: Principles and Operations, Norwood, MA: Artech House.

Waltz, Kenneth N. (2001) [1959]: Man, the State, and War, 2. Aufl., Columbia University Press, New York.

Waltz, Kenneth N. (2000): “Structural Realism after the Cold War”, International Security, 25 (1), 5-41.

Waltz, Kennth N. (1990): “Realist Thought and Neorealist Theory”, Journal of International Affairs, 44 (1), 21-37.

Waltz, Kenneth N. (1986): “A Response to my Critics”, in: Robert O. Keohane (Hg.): Neorealism and its Critics, New York: Columbia University Press.

Waltz, Kenneth N. (1979): Theory of International Politics, New York: McGraw-Hill. Wang, Jian-Wei/Rong, Li-Li (2009): “Cascade-based Attack Vulnerability on the US Power Grid”,

Safety Science, 47 (10), 1332-1336. Wang, Shaojung S./Hong, Junhao (2010): “Discourse behind the Forbidden Realm: Internet Surveil-

lance and its Implications on China’s Blogosphere”, Telematics and Informatics, 27 (1), 67-78. Warren, Pete (2009): “US and UK Prepare Fightback against Eastern Hackers”, The Guardian,

04.06.2009, http://www.guardian.co.uk/technology/2009/jun/04/hacking-security-authorities (16.08.2011).

Warrick, Joby (2011): “Iran’s Natanz Nuclear Facility Recovered Quickly from Stuxnet Cyberat-tack”, The Washington Post, 16.02.2011, http://www.washingtonpost.com/wp-dyn/content/article/2011/02/15/AR2011021505395.html (15.03.2011).

Warrick, Joby/Pegoraro, Rob (2010): “WikiLeaks Avoids Shutdown as Supporters Worldwide Go on the Offensive”, The Washington Post, 08.12.2010, http://www.washingtonpost.com/wp-dyn/content/article/2010/12/08/AR2010120804038.html?hpid=topnews (15.03.2011).

Washington Times (2008): “Online Warfare Research Outlined”, 15.05.2008, http://www.washingtontimes.com/news/2008/may/15/online-warfare-research-outlined/ (22.11.2010).

Waterman, Shaun (2009): “July 4 Cyberattack Called ‚very minor’”, The Washington Times, http://www.washingtontimes.com/news/2009/jul/16/july-4-cyberattack-called-very-minor/ (17.11.2010).

Waterman, Shaun (2008): “Analysis: Russia-Georgia Cyberwar Doubted”, Spacewar.com, http://www.spacewar.com/reports/Analysis_Russia-Georgia_cyberwar_doubted_999.html (31.05.2011).

Page 53: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 397

Watts, Jonathan (2009): “China Orders PC Makers to Install Blocking Software”, The Guardian, 08.06.2009, http://www.guardian.co.uk/world/2009/jun/08/web-blocking-software-china (09.06.2011).

Weber, Max (1980) [1921/22]: Wirtschaft und Gesellschaft: Grundriß der verstehenden Soziologie, Tübingen: J.C.B. Mohr.

Weber, Max (1984) [1921]: Soziologische Grundbegriffe, Tübingen: J.C.B. Mohr. Webster, Stephen C. (2011): „Revealed: Air Force Ordered Software to Manage Army of Fake

Virtual People“, The Raw Story, 18.02.2011, http://www.rawstory.com/rs/2011/02/18/revealed-air-force-ordered-software-to-manage-army-of-fake-virtual-people/ (15.03.2011).

Weimann, Gabriel (2006): Terror on the Internet: The New Arena, the New Challenges. Washington, DC: United States Institute for Peace Press.

Weinberger, Sharon (2010): “What is SIPRnet?”, Popular Mechanics, 01.12.2010, http://www.popularmechanics.com/technology/how-to/computer-security/what-is-siprnet-and-WikiLeaks-4085507 (15.03.2011).

Weiner, Tim (2008): CIA: Die ganze Geschichte, Frankfurt a.M.: S. Fischer. Weiße, Günther (2011): Totale Überwachung: Staat, Wirtschaft und Geheimdienste im Informations-

krieg des 21. Jahrhunderts, Graz: Ares Verlag. Weiße, Günther (2007): Informationskrieg + Cyber War: Die unbekannte Gefahr, Stuttgart: Motor-

buch-Verlag. Weiss, Aaron (2005): „The Power of Collective Intelligence“, networker, 9 (3),

http://delivery.acm.org/10.1145/1090000/1086763/p16-weiss.pdf?key1=1086763&key2=0152998921&coll=DL&dl=ACM&ip=134.95.40.14&CFID=10806503&CFTOKEN=48483332 (01.03.2011).

Weitz, Richard (2011): “State Department Goes on Cyber Offensive”, Second Line of Defense, 05.05.2011, http://www.sldinfo.com/state-department-goes-on-cyber-offensive/ (19.09.2011).

Welchering, Peter (2010): “Weggelöscht und Abgedreht: Die Ereignisse um die Webpräsenz von WikiLeaks”, Deutschlandfunk, 04.12.2010, http://www.dradio.de/dlf/sendungen/computer/1334653/ (15.03.2011).

Welch-Larson, Deborah (1988): „The Psychology of Reciprocity in international Relations“, Nego-tiation Journal, 4 (3), 281-301.

Werber, Niklas (2007): Die Geopolitik der Literatur: Eine Vermessung der medialen Weltraumord-nung, München: Hanser.

White, Leslie (1949): The Science of Culture, New York: Farrar, Strauss & Giroux. WikiLeaks (2011): Veröffentlichung der Präsentation ‘The WikiLeaks Threat’,

http://WikiLeaks.ch/IMG/pdf/WikiLeaks_Response_v6.pdf (15.03.2011). Wilhelm, Anthony G. (2000): Democracy in the Digital Age: Challenges to Political Life in Cyber-

space, New York: Routledge. Williams, Chris (2009): “UK already ‘Major World Power’ in Cyberwar”, The Register, 01.10.2009,

http://www.theregister.co.uk/2009/10/01/borg_cyberwar/ (22.11.2010). Williams, Dan (2009): “Wary of Naked Force, Israelis Eye Cyberwar on Iran”, Reuters, 07.07.2009,

http://www.alertnet.org/thenews/newsdesk/LV83872.htm (22.11.2010). Williamson, Charles W. (2008): “Carpet Bombing in Cyberspace: Why America Needs a Military

Botnet”, Armed Forces Journal, http://www.armedforcesjournal.com/2008/05/3375884 (16.08.2011).

Wilson, Clay (2009): “Cyber Crime”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 415-436.

Wilson, Clay (2003): Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress, Washington, DC: Congressional Research Service, http://www.fas.org/irp/crs/RL32114.pdf (22.11.2010).

Page 54: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

398 9 Literatur

Wingfield, Thomas C. (2009): “International Law and Information Operations”, in: Franklin D. Kramer/Stuart H.Starr/Larry K. Wentz (Hg.) (2009): Cyberpower and National Security, Washington, DC: National Defense University Press, 525-542.

Winner, Langdon (1986): The Whale and the Reactor: A Search for Limits in an Age of High Tech-nology, Chicago/London: University of Chicago Press.

Winner, Langdon (1977): Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought, Cambridge, MA: The MIT Press.

Wolff, Reinhard (2010): “Was sich leakt, das neckt sich”, Die Tageszeitung, 26.12.2010, http://www.taz.de/!63352/ (30.08.2011).

Wong, Edward (2010): “China Rebuffs Clinton on Internet Warning”, The New York Times, 22.01.2010, http://www.nytimes.com/2010/01/23/world/asia/23diplo.html (12.07.2011).

Woodcock, Bill (2011): Overview of the Egyptian Internet Shotdown, DHS Infosec Technology Transition Council, http://www.pch.net/resources/misc/Egypt-PCH-Overview.pdf (10.04.2011).

WorldPublicOpinion.org (2008): World Public Opinion on Freedom of the Media, University of Maryland, http://www.worldpublicopinion.org-/pipa/pdf/apr09/WPO_PressFreedom_Apr09_packet.pdf (17.08.2011).

Wortham, Jenna (2010): “Apple Bans Some Apps for Sex-Tinged Content”, The New York Times, 23.02.2010, http://www.nytimes.com/2010/02/23/technology/23apps.html (03.03.2010).

Wortzel, Larry M. (2010): China’s Approach to Cyber Operations: Inplications for the United States, Testimony before the Committee on Foreign Affairs, 10.03.2010, Washington, DC, http://www.internationalrelations.house.gov/111/wor031010.pdf (10.08.2011).

Wriston, Walter B. (1997): “Bits, Bytes, and Diplomacy”, Foreign Affairs, September/Oktober 1997, http://www.foreignaffairs.com/articles/53397/walter-b-wriston/bits-bytes-and-diplomacy (14.04.2011).

Wu, Shaomei et al. (2011): “Who Says What to Whom on Twitter”, International World Wide Web Conference Committee (IW3C2), Hyderabad (India), http://research.yahoo.com/pub/3386 (10.04.2011).

Wu, Tim (2011): The Master Switch: The Rise and Fall of Information Empires, New York: Alfred A. Knopf.

Xinhua (2011): “China Becomes major Victim of Cyberattacks”, 10.08.2011, http://www.china.org.cn/china/2011-08/10/content_23182277.htm (16.08.2011).

York, Jillian C. (2010a): “WikiLeaks and the Hazards of ‘Intermediary Censorship’”, Index on Censorhip, 03.12.2010, http://www.indexoncensorship.org/2010/12/WikiLeaks-intermediary-censorship/ (15.03.2011).

York, Jilian C. (2010b): Policing Content in the Quasi-Public Sphere, Cambridge, MA: Open Net Initiative, http://opennet.net/sites/opennet.net/files/PolicingContent.pdf (15.03.2011).

Young, Oran R. (1999): Governance in World Affairs, London: Cornell University Press. Young, Oran R. (1982): “Regime Dynamics: The Rise and Fall of international Regimes”, Interna-

tional Organization, 36 (2), 277-297. Yu, Quincy (2011): “Aborted Chinese ‘Jasmine Revolution’ a Trap Says Analysts”, Epoch Times,

22.02.2011, http://www.theepochtimes.com/n2/china/aborted-chinese-jasmine-revolution-a-trap-say-analysts-51732.html (01.08.2011).

Zimmerman, William (1973): “Issue Area and Foreign-Policy Process: A Research Note in Search of a General Theory”, American Political Science Review, 67 (4), 1204-1212.

Zangl, Bernhard (1999): Interessen auf zwei Ebenen: Internationale Regime in der Agrarhandels-, Währungs- und Walfangpolitik , Baden Baden: Nomos.

Zanini, Michele/Edwards, Sean J.A. (2001): „The Networking of Terror in the Information Age“, in: John Arquilla/David Ronfeldt (Hg.): Networks and Netwar: The Future of Terror, Crime and Militancy, Santa Monica, CA: RAND, 29-63.

Page 55: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 399

Zartman, William (1995): Collapsed States: The Disintegration and Restoration of Legitimate Au-thority, Boulder, CO: Lynne Rienner.

Zeit Online (2011): „Assange-Anwalt macht Domscheit-Berg Vorwürfe“, 01.09.2011, http://www.zeit.de/digital/internet/2011-08/anwalt-assange-domscheit-berg/seite-1 (01.09.2011).

Zekri, Sonja (2011): “Wikilaks in Russland: Wenn Piraten in Putins Palast surfen“, Süddeutsche Zeitung, 23.01.2011, http://www.sueddeutsche.de/digital/WikiLeaks-in-russland-piraten-und-palastsurfer-1.1050064 (01.07.2011).

Zetter, Kim (2011): „Exclusive: Comedy of Errors Led to False ‚Water-Pump Hack’ Report“, Wired, 30.11.2011, http://www.wired.com/threatlevel/2011/11/water-pump-hack-mystery-solved/ (02.12.2011).

Zetter, Kim (2010): “Countries Should be Held Responsible for Cyber Attacks”, Wired, 30.07.2010, http://www.wired.co.uk/news/archive/2010-07/30/cyber-attack-countries (10.06.2011).

Zetter, Kim (2009a): “Lawmaker Wants ‘Show of Force’ against North Korea for Website Attacks”, Wired, 10.07.2009, http://www.wired.com/threatlevel/2009/07/show-of-force/ (11.08.2011).

Zetter, Kim (2009b): “Lazy Hacker and Little Worm Set Off Cyberwar Fenzy”, Wired, 08.07.2009, http://www.wired.com/threatlevel/2009/07/mydoom/ (11.08.2011).

Zittrain, Jonathan (2008): The Future of the Internet - and How to Stop It, London: Penguin Books. Zittrain, Jonathan/Palfrey, John (2008): “Introduction”, in: Ronald Deibert et al. (Hg.): Access De-

nied: The Practice and Policy of Global Internet Filtering, Cambridge, MA: The MIT Press, 1-4.

Zuckerman, Ethan (2011): “The First Twitter Revolution?”, Foreign Policy, 14.01.2011, http://www.foreignpolicy.com/articles/2011/01/14/the_first_twitter_revolution (10.04.2011).

Zuckerman, Ethan (2010): “Intermediary Censorship”, in: Ronald Deibert et al. (Hg.): Access Con-trolled: The Shaping of Power, Rights and Rule in Cyberspace, Cambridge, MA: The MIT Press, 71-85.

Zuckerman, Ethan (2008): “The Cute Cat Theory Talk at ETech”, My Heart's in Accra (Blog), 08.03.2008, http://www.ethanzuckerman.com/blog/2008/03/08/the-cute-cat-theory-talk-at-etech/ (10.04.2011).

Zuckerman, Ethan et al. (2010): Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites, Cambridge, MA: The Berkman Center for Internet & Society, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf, Anhang unter http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/DDoS%20Survey%20Public%20Results_0.pdf (15.04.2011).

Zuckerman, M.J. (1998): “Hacker Pair Illustrate Pentagon’s Vulnerability”, USA Today, 23.03.1996, 3A.

Zürn, Michael (1993): „Problematic Social Situations and International Institutions: On the Use of Game Theory in International Politics”, in: Frank R. Pfetsch (Hg.): International Relations and Pan-Europe: Theoretical Approaches and Empirical Findings, Münster/Hamburg: LIT-Verlag, 63-84.

Zürn, Michael (1992): Interessen und Institutionen in der internationalen Politik: Grundlegung und Anwendungen des situationsstrukturellen Ansatzes, Opladen: Leske und Budrich.

Zürn, Michael/Wolf, Klaus-Dieter/Efinger, Manfred (1990): „Problemfelder und Situationsstrukturen in der Analyse internationaler Politik: Eine Brücke zwischen den Polen?”, in: Volker Rittber-ger (Hg.): Theorien der internationalen Beziehungen: Bestandsaufnahme und Forschungsper-spektiven, Sonderheft der Politischen Vierteljahresschrift (PVS), 151-174.

Page 56: 9 Literatur - link.springer.com3A978-3-658-00228-2%2F… · 9 Literatur - link.springer.com ... The ,

9.1 Literatur 401

10 Interviews 13.08.2009 Experteninterview mit ehemaligem deutschen Verbindungsbeamten in US-

Sicherheitsbehörde, Washington, DC. 27.08.2009, Experteninterview mit einem Mitarbeiter eines US-Kongressausschusses, Washington,

DC. 28.08.2009, Experteninterview mit einem Mitarbeiter eines US-Kongressausschusses, Washington,

DC. 31.08.2009 Experteninterview mit Martin Libicki/Roger C. Molander/Stuart Johnson, RAND, Wa-

shington, DC. 31.08.2009 Experteninterview (telephonisch) mit einem Experten einer Nichtregierungsorganisation

in Kalifornien. 17.09.2009 Experteninterview mit Vertreter eines privaten Nachrichtendienstes, Washington, DC. 17.09.2009 Experteninterview mit Vertretern einer US-Behörde, Washington, DC. 21.09.2009, Experteninterview mit einem Mitarbeiter eines US-Kongressausschusses, Washington,

DC. 22.09.2009 Experteninterview mit David E.Collins/Neil J. O’Callaghan/Roger Osborn, US-

Heimatschutzministerium, Cyber Crimes Center, Fairfax, VA. 23.09.2009 Experteninterview mit Jena McNeill, Heritage Foundation, Washington, DC. 24.09.2009, Experteninterview mit Letitia M. King/Jeffrey N. Trimble, Broadcasting Board of Gov-

ernors (BBG), Washington, DC. 29.09.2009 Experteninterview mit Brian Weeden, Secure World Foundation, Washington, DC. 01.10.2009 Experteninterview mit Jim Harper, Cato Institute, Washington, DC. 02.10.2009 Experteninterview mit Cynthia M. Wong, Center for Democracy and Technology (CDT),

Washington, DC. 03.05.2011 Experteninterview mit Vertreter einer deutschen Sicherheitsbehörde. 30.05.2011 Experteninterview mit ehemaligem Vertreter einer deutschen Sicherheitsbehörde. 20.06.2011 Experteninterview mit Vertreter einer deutschen Sicherheitsbehörde. 21.06.2011 Experteninterview mit Vertreter einer deutschen Sicherheitsbehörde. 01.07.2011 Experteninterview (telephonisch) mit Vertreter einer deutschen Sicherheitsbehörde.

M. Hansel, Internationale Beziehungen im Cyberspace,DOI 10.1007/978-3-658-00228-2, © Springer Fachmedien Wiesbaden 2013