диссертация (1169141), страница 70
Текст из файла (страница 70)
Drake. – N.Y.: UN, ICT TaskForceSeries,2005.URL:http://www.wgig.org/docs/book/Wolfgang_Kleinwa%CC%88chter.html410.KleinwächterW.InternetCo-Governance.TowardsaMultilayerMultiplayer Mechanism of Consultation, Coordination and Cooperation (M3C3) //E–Learning.-2006.-No.3(3).357URL:http://www.wwwords.co.uk/pdf/viewpdf.asp?j=elea&vol=3&issue=3&year=2006&article=18_Kleinwachter_ELEA_3_3_web&id=212.16.10.52411.Klimburg A. The Internet Yalta: Commentary // Center for New AmericanSecurity.
- 5.02.2013. URL:http://www.cnas.org/theinternetyalta412.Klimburg A. Mobilising Cyber Power. // Survival. – 2011. - №1. - P. 41–60.413.Kratochwil F. International Organization: A State of the Art and an Art ofthe State / F. Kratochwil, J. Ruggie // International Organization. - 1986. - No. 40(4).
- P. 753–775.414.Levy M. The Study of International Regimes / M. Levy, O. Young, M.Zuern // European Journal of International Relations. - 1995. - № 3(1). - P. 267330.415.Lewis J. Confidence-building and international agreement in cybersecurity //DisarmamentForum.-2011.-№4.-P.51-60.URL:https://citizenlab.ca/cybernorms2012/Lewis2011.pdf416.Lewis J. Cybersecurity and Cyberwarfare: Preliminary Assessment ofNational Doctrine and Organization. / J.Lewis, K.Timlin // UNIDIR.
- 2011. URL:http://unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfarepreliminary-assessment-of-national-doctrine-and-organization-380.pdf417.Libicki M. Expectations of cyber deterrence // Strategic Studies Quarterly. –2018. - № 4. –P. 44 – 57.418.Libicki M. What is Information Warfare? // Strategic Forum. - 1995. - № 28.URL: http://www.dodccrp.org/files/Libicki_What_Is.pdf409. Lieberthal K. Cybersecurity and U.S. - China Relations.
/ K.Lieberthal, P. Singer.- Jonh L. Torton China Institute in Brookings, 2012. - 52 p. URL:https://www.brookings.edu/wpcontent/uploads/2016/06/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf420.Lindsay J. Stuxnet and the Limits of Cyber Warfare // Security Studies. –2013. - № 3. – P. 365 – 404.358421.Lindsay J. R. The impact of China on cybersecurity: Fiction and friction //International Security. - 2015. - №. 3. - P. 7-47.422.Lund S. Defending digital globalization: Let the data flow / S. Lund, J.Manyika//ForeignAffairs.–2017.–Т.20.URL:https://www.foreignaffairs.com/articles/world/2017-04-20/defending-digitalglobalization423.Lukasik S. J.
A Framework for Thinking About Cyber Conflict and CyberDeterrence with Possible Declaratory Policies for These Domains // Proceedings ofa Workshop on Deterring Cyber Attacks: Informing Strategies and DevelopingOptions for US Policy. - 2010. - Т. 2. - P.
99-122.424.Maas M. M. How viable is international arms control for military artificialintelligence? Three lessons from nuclear weapons //Contemporary Security Policy.– 2019. – P. 1-27.425.Mačák K. From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers //Leiden Journal of International Law. – 2017. – Т. 30. – №. 4. – P. 877899.426.Manjikian M. From Global Village to Virtual Battlespace: The Colonizingof the Internet and the Extension of Realpolitik // International Studies Quarterly. –2010. - № 2. - Р. 381–401.427.Mayer M.
The global governance of large technical systems / M.Mayer,M.Acuto //Millennium. - 2015. - Т. 43. - №. 2. - P. 660-683.428.McLaughlin L. What is Bottom-up about Global Internet Governance? / L.McLaughlin, V. Pickard // Global Media and Communication. – 2005.- № 1(3). P. 357–373.429.Mearsheimer J. The False Promise of International Institutions //International Security. - 1994. - No. 15. - P. 5–49.430.Menthe D. Jurisdiction in Cyberspace: A Theory of International Spaces //MichmannTelecommunicationTechnicalRevue.URL:http://www.law.umich.edu/mttlr/vol-four/menthe.html-№69.359431.Mueller M.
Making Sense of Internet Governance: Defining Principles andNorms in a Policy Context / M.Mueller, J.Mathiason, L.McKnight // InternetGovernance Project, 2004. URL:http://dcc.syr.edu/reports.htm432.Mueller M. The Internet and Global Governance: Principles and Norms for aNew Regime / M.Mueller, J.Mathiason, H.Klein // Global Governance. – 2007. –№13.URL:http://www.atypon-link.com/LRP/doi/abs/10.5555/ggov.2007.13.2.237433.Neuneck G. Civilian and military cyberthreats: shifting identities anattribution. // The Cyber Index. International Security Trends and Realities. UNIDIR, 2013. URL:http://www.unidir.org/files/publications/pdfs/cyber-index2013-en-463.pdf434.Nye J.
Deterrence and Dissuasion in Cyberspace // International Security. -2017. - Т. 41. - №. 3. - P. 44-71.435.Nye J. How sharp power threatens soft power. The Right and Wrong Waysto Respond to Authoritarian Influence // Foreign Affairs. - 2018. - Snapshot.January 24. URL: https://www.foreignaffairs.com/articles/china/2018-01-24/howsharp-power-threatens-soft-power436.Nye J. Nuclear lessons for cyber security // Strategic Studies Quarterly. –2011.
– № 31. – Winter. – P. 20 -38.437.Nye J. Soft power //Foreign policy. - 1990. - №. 80. – P. 153-171.438.Nye J. Cyberpower // Belfer center for science in international affairs, 2010.URL:http://www.dtic.mil/dtic/tr/fulltext/u2/a522626.pdf439.Nye J. The regime complex for managing global cyber activities // GlobalCommissiononInternetGovernancePaperSeries,2014.–URL:https://dash.harvard.edu/bitstream/handle/1/12308565/Nye-GlobalCommission.pdf440.PankeD.Lock-inStrategiesinInternationalNegotiations:TheDeconstruction of Bargaining Power //Millennium-Journal of International Studies.- 2015. - №.
2. - P. 375-391.360441.Pickard V. Neoliberal Visions and Revisions in Global CommunicationsPolicy From NWICO to WSIS // Journal of Communication Inquiry. - 2007. - №2(31). - P. 118-139.442.Price M. The market for loyalties: Electronic media and the globalcompetition for allegiances // Yale Law Journal. - 1994. - P. 667-705.443.Raboy M. The World Summit on the Information Society and its Legacy forGlobal Governance // The International Journal for Communication Studies.
2004. - № 3-4 (66). - P. 225–232.444.Rauscher K. Russia–US Bilateral on Cyber Security: Critical TerminologyFoundations / K. F. Rauscher, V. Yaschenko // NY: EastWest Institute. 2011.445.Rauscher K. Working towards rules for governing cyber conflict. RenderingGeneva and Hague conventions in cyberspace / K. Rauscher, A.
Korotkov // NY:East-Westinstitute,2011.URL:http://www.ewi.info/working-towards-rules-governing-cyber-conflict446.Reardon R. The Role of Cyberspace in International Relations: A View ofthe Literature. 2012. / R. Reardon, N. Choucri // Paper Prepared for the 2012 ISAAnnualConvention.-SanDiego,2012.URL:http://ecir.mit.edu/sites/default/files/documents/%5BReardon%2C%20Choucri%5D%20The%20Role%20of%20Cyberspace%20in%20International%20Relations.pdf447.Ristow B. The New Gatekeepers: Controlling Information in the InternetAge.
A report to the Center for International Media Assistance // Center forInternationalMediaAssistance.-2013.URL:http://apo.org.au/files/Resource/CIMA_TheNewGatekeepers_May2013.pdf448.Rogerson K. Information Interdependence: Keohane and Nye’s ComplexInterdependence in the Information Age // Communication & Society.
- 2000. - №3 (3). - P. 415-436.449.Rosato S. The Inscrutable Intentions of Great Powers //InternationalSecurity. - 2015. - №. 3. - P. 48-88.361450.Rosenau J. Governance in the 21st Century // Global Governance: a Reviewof Multilateralism and International Organization. - 1995. - № 1 (1). - P. 13-43.451.Rosenau J. States, Sovereignty, and Diplomacy in the Information Age. //Paper prepared for presentation at the Panel on «Virtual Diplomacy: A Revolutionin Diplomatic Affairs Theory, Annual Meeting of the International StudiesAssociation.-Washington,D.C.,1998.URLhttp://www.usip.org/virtualdiplomacy/publications/reports/jrosenauisa99.html452.Rothkopf D.
Cyberpolitik: The Changing Nature of Power in theInformation Age — Journal of International Affairs. - 1998. - № 2(51). - P. 325359.453.Segal A. When China Rules the Web: Technology in Service of the State//Foreign Aff. – 2018. – Т. 97. – С. 10.454.Stayner J. Web 2.0 and the transformation of news and journalism //Handbook of Internet Politics. / Ed. by A. Chadwick. - London: Routledge, 2008.
P. 201-213.455.Stein A. Coordination and Collaboration: regimes in an Anarchic World //International Organization. - 1982. - № 2 (36). - P. 299-324.456.Stevens T. A cyberwar of ideas? Deterrence and norms in cyberspace//Contemporary Security Policy. - 2012. - №. 1. - Р. 148-170.457.Stokke O. Regimes as governance systems // Global governance: drawingInsights from the environmental experience / Ed.
by O. Young. - Cambridge:Cambridge University Press, 1997. —P. 27-63.458.Szafranski R. A Theory of Information Warfare: Preparing for 2020 //AirpowerJournal.–1995.-№1.URL:http://www.dtic.mil/get-tr-doc/pdf?AD=ADA328193459.Sunstein C. The daily we: Is the internet really a blessing for democracy //Boston Review. - 2001. - №.
3. URL: http://bostonreview.net/cass-sunsteininternet-democracy-daily-we362460.Tannenwald N. Law versus power on the high frontier: The case for a rule-based regime for outer space // Yale Journal on International Law. - 2004. URL:http://drum.lib.umd.edu/bitstream/1903/7902/1/tannenwald.pdf461.Walker C. The meaning of sharp power.
How authoritarian states projectinfluence / C. Walker, J. Ludwig // Foreign Affairs. – 2017. - Snapshot. November16.URL:https://www.foreignaffairs.com/articles/china/2017-11-16/meaning-sharp-power462.Wendt A. Anarchy is what states make of it: the social construction of powerpolitics // International Organization. – 1992. - No.
2. - Р. 391-425.463.Wendt A. Constructing International Politics // International Security. -1995. - № 1(20). - Р. 71-81.464. Wenger A. The Internet and the Changing Face of International Relations andSecurity// Information & Security. - 2001. - № 7. - P. 5-11.465.Wolbring G. Why NBIC? Why human performance enhancement? //Innovation: The European journal of social science research. - 2008. - №.
1. - P.25-40..