диссертация (1169143), страница 67
Текст из файла (страница 67)
by V.Rittberger. Oxford: Oxford University Press, 1995. P. 168-202.320363.Haas, P. Epistemic Communities and International-Policy Coordination.Introduction // International Organization. 1992. No. 46 (1) P. 1-35.364.Hansen L., Nissenbaum H. Digital disaster, cyber security, and the CopenhagenSchool //International Studies Quarterly.
2009. №. 4. P. 1155-1175.365.Hasenclever A., Mayer P., Rittberger V. Integrating Theories of InternationalRegimes // Review of International Studies. 2000. No. 26. P. 3–33366.Haufler V. Crossing the Boundaries Between Public and Private: InternationalRegimes and Non-State Actors // Regime Theory and International Relations / ed. by V.Rittberge. Oxford: Oxford University Press, 1995. P. 94-111.367.Henderson J. Global production networks and the analysis of economicdevelopment / Henderson J.
, Dicken P., Hess M., Coe N., Yeung H. //Review ofinternational political economy. 2002. №. 3. P. 436-464.368.Hofmann J. Internet Governance: A Regulative Idea in Flux // Social ScienceResearch Centre. Berlin, 2005.URL:http://duplox.wzb.eu/people/jeanette/texte/Internet%20Governance%20english%20version.pdf369.ICANN and Internet Governance: Getting Back to Basics // Center forDemocracy and Technology. URL: http://www.cdt.org/dns/icann/20040713_cdt.pdf370.Judge A. International Organization Networks // International Organization: AConceptual Approach / Ed. by A.Groom, P.Taylor.
London: Pinter Publishers, 1978.371.Kein H. ICANN and internet governance: leveraging technical coordination torealize global public policy // Information Society. 2002. № 18 (193–207).URL:http://programs.ssrc.org/itic/publications/civsocandgov/Klein.pdf372.Kennard W. Vision to Mission.
A Blueprint for Architects of the GlobalInformation Infrastructure: Speech Before the World Economic Development Congress.23 September 1999. URL:http://www.fcc.gov/Speeches/Kennard/spwek932.html373.Keohane R. International Institutions: Can Interdependence Work? (The Frontiersof Knowledge) // Foreign Policy. 1998. Vol. 110. P. 82-96.374.Khatib L.
and al. Public Diplomacy 2.0: An Exploratory Case Study of the USDigital Outreach Team // Oxford Internet Institute. CDDRL working papers. 2011. №321120.URL:http://uscpublicdiplomacy.org/media/Exploratory_Case_Study_US_Digital_Outreach_Team.pdf375.Klein H. Understanding WSIS: An Institutional Analysis of the UN World Summiton the Information Society // The Massachusetts Institute of Technology InformationTechnologies and International Development.
2004. № 3–4 (1). P. 3-13.Kleinwächter W. Global Governance in the Information Age // Center for Internet376.Research,UniversityofAarhus.2001.P.1–46.URL:http://www.palgrave-journals.com/development/journal/v46/n1/abs/1110416a.htmlKleinwächter W. De-Mystification of the Internet Root: Do we need377.Governmental Oversight? // Reforming Internet Governance. Perspectives from theWorking Group on Internet Governance / ed. by W.
Drake. – N.Y.: UN, ICT Task ForceSeries,2005.URL:http://www.wgig.org/docs/book/Wolfgang_Kleinwa%CC%88chter.htmlKleinwächter W. Internet Co-Governance. Towards a Multilayer Multiplayer378.Mechanism of Consultation, Coordination and Cooperation (M3C3) // E–Learning.2006.No.3(3).URL:http://www.wwwords.co.uk/pdf/viewpdf.asp?j=elea&vol=3&issue=3&year=2006&article=18_Kleinwachter_ELEA_3_3_web&id=212.16.10.52379.Klimburg A. The Internet Yalta: Commentary // Center for New AmericanSecurity. 5.02.2013.
URL:http://www.cnas.org/theinternetyalta380.Kobrin S. Back to the Future: Neomedievalism and the Post Modern DigitalWorld Economy // Columbia Journal of International Affairs. 1998. № 2 (51) . P. 361386.381.Kratochwil F., Ruggie J. International Organization: A State of the Art and an Artof the State // International Organization. 1986.
No. 40 (4). P. 753–775.382.Kummer M. Internet Governance and the Need for an Inclusive MultiStakeholder Dialogue: Position Paper // Social & economic factors shaping the future ofthe internet NSF/OECD Workshop. Washington, 2007322383.Levy M, Young O, Zuern M. The Study of International Regimes // EuropeanJournal of International Relations. 1995. № 3(1). P. 267-330.384.
Lewis J. Confidence-building and international agreement in cybersecurity //DisarmamentForum.2011.№4.P.51-60.URL:https://citizenlab.ca/cybernorms2012/Lewis2011.pdf385.Lewis J., Timlin K. Cybersecurity and Cyberwarfare: Preliminary Assessment ofNationalDoctrineandOrganization,UNIDIR,2011.URL:http://unidir.org/files/publications/pdfs/cybersecurity-and-cyberwarfare-preliminaryassessment-of-national-doctrine-and-organization-380.pdf386.
Lichtenstein J. Digital Diplomacy // New York Times Magazine. 16.07.2010.URL:http://www.nytimes.com/2010/07/18/magazine/18web2-0-t.html?pagewanted=all387. Lieberthal K., Singer P. Cybersecurity and U.S. - China Relations. // Jonh L. TortonChina Institute in Brookings, 2012. 52 p. URL: https://www.brookings.edu/wpcontent/uploads/2016/06/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf388.Litan R. Thoughts on Internet Policy and Global Governance: Draft PositionPaper // Tokyo Club Meetings. October 2001. URL:http://www.tcf.or.jp/data/2002012425_Robert_Litan.pdf389.MacLean D. Herding Cats: Some Conceptual Tools for Thinking about InternetGovernance // Internet Governance: a Grand Collaboration: an Edited Collection ofPapers / ed.
by D. MacLean. N.Y.: UN ICT Task Force, 2004. P. 73-100.390.Masanga C. The Internet Governance Forum: Its Development, Function andFuture // Internet Governance and the Information Society: Global Perspectives andEuropean Dimensions / ed. by W.Benedek, V.Bauer, M.Kettemann. Utrecht: ElevenInternational Publishing, 2008. P.
63-79.391.Mathiason J. Internet Governance: The State of Play: Report Commissioned bythe UN ICT Task Force / J.Mathiason, M.Mueller, H.Klein, M.Holitscher, L.McKnight— 2004. URL:http://dcc.syr.edu/miscarticles/MainReport-final.pdf392.McLaughlin L., Pickard V. What is Bottom-up about Global InternetGovernance? — Global Media and Communication. 2005. № 1(3) P. 357–373.323393.Mearsheimer, J. The False Promise of International Institutions // InternationalSecurity. 1994.
No. 15. P. 5–49.394.Menthe D. Jurisdiction in Cyberspace: A Theory of International Spaces //MichmannTelecommunicationTechnicalRevue.№69.URL:http://www.law.umich.edu/mttlr/vol-four/menthe.html395. Morozov E. The Digital Dictatorship // Wall Street Journal. 20.02.2010.URL:http://online.wsj.com/article/SB10001424052748703983004575073911147404540.html396.Mueller M. Dancing the Quango: ICANN as International Regulatory Regime //Johns Hopkins SAIS / George Mason University Conference on Technology and GlobalGovernance. February 11-12, 2002. URL: http://istweb.syr.edu/~mueller/quango.pdf397.Mueller M. Making Sense of Internet Governance: Defining Principles andNorms in a Policy Context / M.Mueller, J.Mathiason, L.McKnight // InternetGovernance Project, 2004.
URL:http://dcc.syr.edu/reports.htm398.Mueller M. Network Neutrality as Global Principle for Internet Governance /M.Mueller, D. Cogburn, J.Mathiason, J.Hoffmann // Internet Governance Project:Official–Site.2007.URL:www.internetgovernance.org/pdf/NetNeutralityGlobalPrinciple.pdf399.Mueller M.
Political Oversight of ICANN: A Briefing for the WSIS Summit:Concept Paper by the Internet Governance Project / M.Mueller, K H.lein, J.Hofmann,L.McKnight, D.Cogburn 2005. URL: www.world-governance.org/spip.php?article135400.Mueller M. The Internet and Global Governance: Principles and Norms for aNew Regime / M.Mueller, J.Mathiason, H.Klein // Global Governance.
– 2007. – № 13.URL:http://www.atypon-link.com/LRP/doi/abs/10.5555/ggov.2007.13.2.237401.Neuneck G. Civilian and military cyberthreats: shifting identities an attribution. //The Cyber Index. International Security Trends and Realities. UNIDIR, 2013.P. 115 //http://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf402.Nojeim G. Statement On Cybersecurity, Civil Liberties and Innovation. // USSenateHouseCommitteeonEnergyandCommerce,Subcommitteeon324Communications, Technology and the Internet.
Washington D.C., 1st may 2009.URL:http://www.cdt.org/security/20090501_cybersecurity.pdf403.Nortoncybercirmereport2013.//Symantecofficialsite.URL:http://www.symantec.com/content/en/us/about/presskits/b-norton-report-2013.pptx404.Nye J. Nuclear lessons for cyber security. Air Univ Press Maxwell Afb Al, 2011.405.Nye J. Cyberpower // Belfer center for science in international affairs.
2010.URL:http://www.dtic.mil/dtic/tr/fulltext/u2/a522626.pdf406.Nye J., Owens W. America's Information Edge // Foreign Affairs. 1996. MarchApril. P. 20-36.407.Panke D. Lock-in Strategies in International Negotiations: The Deconstruction ofBargaining Power //Millennium-Journal of International Studies.
2015. №. 2. P. 375391.408.Peterson M. International organizations and the implementation of theenvironmental regimes // Global Governance: Drawing Insights from the EnvironmentalExperience / ed. by O. Young. London: MIT Press, 1997. P. 115-153.409.Pickard V. Neoliberal Visions and Revisions in Global Communications PolicyFrom NWICO to WSIS // Journal of Communication Inquiry. 2007. № 2(31). P.