Reading Materials
Session 1: Sources of Instability in Cyberspace and the Role of Norms in Responding to Them.
- K. Geers. "Pandemonium: Nation States, National Security, and the Internet." The Tallinn Papers, NATO Cooperative Cyber Defence Centre of Excellence 1(1) 1-17 (2014). https://www.ccdcoe.org/publications/TP_Vol1No1_Geers.pdf
- K. Geers. "Cyberspace and the Changing Nature of Warfare." Hakin9 E-Book, 19/3 No. 6, SC Magazine (2008). http://www.carlisle.army.mil/DIME/documents/Cyberspace%20and%20the%20Changing%20Nature%20of%20Warfare.pdf
Session 2: Norms for International Responses to Globalized Cyber Threats.
- A. Lysyanskaya. "How to Keep Secrets Safe." Scientific American, Sep. 2008. http://www.nature.com/scientificamerican/journal/v299/n3/full/scientificamerican0908-88.html
Session 5: Norms Applying to Cyber Fueled Conflicts Below the Level of Armed Attack.
- "A Measure of Restraint in Cyberspace: Reducing Risk to Civilian Nuclear Assets." East West Institute, 2014. http://issuu.com/ewipublications/docs/a_measure_of_restraint_in_cyberspac/1?e=1954584/6553952
Session 6: Norms for Protection of Critical Infrastructure.
- "A Measure of Restraint in Cyberspace: Reducing Risk to Civilian Nuclear Assets." East West Institute, 2014. http://issuu.com/ewipublications/docs/a_measure_of_restraint_in_cyberspac/1?e=1954584/6553952
- K. Geers. “The Cyber Threat to National Critical Infrastructures: Beyond Theory.” The Information Security Journal: A Global Perspective 18(1) 1-7 (2009). http://www.tandfonline.com/doi/abs/10.1080/19393550802676097#.UzmBfq1dW3s
- "Framework for Improving Critical Infrastructure Cybersecurity." National Institute of Standards and Technology, Feb. 12, 2014. http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf
- J. Kramek. "The Critical Infrastructure Gap: U.S. Port Facilities and Cyber Vulnerabilities." Brookings Institution, Jul. 3, 2013. http://www.brookings.edu/research/papers/2013/07/03-cyber-ports-security-kramek
- F. Osinga. "Science, Strategy, and War: The Strategic Theory of John Boyd."
Session 7: The Forms and Norms of Cyberwar.
- P. Feaver and K. Geers. "When the Urgency of Time and Circumstances Clearly Does not Permit: Predelegation in Nuclear and Cyber Scenarios." NSA Cyber Analogies Project. Ed. John Arquilla and Emily Goldman. (Forthcoming March 2014)
- M. Libicki. "Crisis and Escalation in Cyberspace." RAND, 2012. http://www.rand.org/pubs/monographs/MG1215.html
- C. Droege. "Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians." International Committee of the Red Cross, Jun. 30, 2012. http://www.icrc.org/eng/resources/documents/article/review-2012/irrc-886-droege.htm
- P. Feaver and K. Geers. "When the Urgency of Time and Circumstances Clearly Does not Permit: Predelegation in Nuclear and Cyber Scenarios." NSA Cyber Analogies Project. Ed. John Arquilla and Emily Goldman. (Forthcoming March 2014) http://calhoun.nps.edu/public/bitstream/handle/10945/40037/NPS-DA-14-001.pdf?sequence=1
Session 8. The Possibility of Deterrence Structured by Norms.
- R. Axelrod. "Timing of cyber conflict." Proceedings of the National Academy of Sciences (PNAS), Jan. 8, 2014. http://www.pnas.org/content/early/2014/01/08/1322638111.full.pdf+html
- G. Brown and O. Tullos. "On the spectrum of cyberspace operations." Small Wars Journal, Dec. 11, 2012. http://smallwarsjournal.com/jrnl/art/on-the-spectrum-of-cyberspace-operations
- M. Libicki. "Crisis and Escalation in Cyberspace." Santa Monica, CA: RAND, 2012. http://www.rand.org/pubs/monographs/MG1215.html
- K. Geers. “The Challenge of Cyber Attack Deterrence.” Computer Law and Security Review 26(3) 298-303 (2010). http://www.sciencedirect.com/science/article/pii/S0267364910000506
- R. Hurwitz. "Keeping Cool: Steps in Avoiding Conflict and Escalation in Cyberspace." Georgetown Journal of International Affairs, Special Issue: International Engagement on Cyber III, April 2014, 17-27.
- R. Axelrod. "An Evolutionary Approach to Norms." American Political Science Review. 80:4 (Dec., 1986). http://www-personal.umich.edu/~axe/Axelrod%20Norms%20APSR%201986%20(2).pdf
Session 9: Governance and New Institutions for Cyberspace.
- A. Klimburg. "Watering the Grass Roots." Collaboratory, 2013. http://www.collaboratory.de/w/MIND_6_Internet_and_Security
- M. Price. "Reflections on Multistakeholderism and Internet Governance." Center for Global Communications Studies, Mar. 26, 2014. http://cgcsblog.asc.upenn.edu/2014/03/26/reflections-on/
- A. Sofaer, D. Clark, and W. Diffie. "Cyber Security and International Arrangements." National Academic Press, 2010. http://www.nap.edu/catalog.php?record_id=12997
- K. Geers. "Cyber Weapons Convention." Computer Law and Security Review 26(5) 547-551 (2010). http://www.sciencedirect.com/science/article/pii/S0267364910001081
- M. Maciel. "Internet Governance and Institutional Innovation: Brazil as the Vantage Point of Analysis." Feb. 2014. http://direitorio.fgv.br/sites/direitorio.fgv.br/files/Marilia_Maciel_Internet_Governance_and_institutional_innovation_draft.pdf
- M. Mueller and B. Wagner. "Finding a formula for Brazil: representation and legitimacy in Internet Governance." 2014. http://bit.ly/1j6qjje
- M. Mueller and B. Kuerbis. "Roadmap for globalizing IANA: four principles and a proposal for reform. A submission to the Global Multistakeholder Meeting on the Future of Internet Governance." 2014. http://content.netmundial.br/contribution/roadmap-for-globalizing-iana-four-principles-and-a-proposal-for-reform-a-submission-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/96
- L. DeNardis and M. Raymond. "Thinking Clearly About Multistakeholder Internet Governance." Nov. 2013. http://ssrn.com/abstract=2354377