Chen, P. "Cyber public diplomacy as china's smart power strategy in an information age: Case study of anti-carrefour incident in 2008." International Journal of China Studies 34.9 (2012): 189-217.
Kanuck, S. "Sovereign discourse on cyber conflict under international law." Texas Law Review 38.8 (2010): 1571-1597.
Korns, S.W., & Kastenberg, J.E. "Georgia's cyber left hook." Parameters 23.9 (2009): 60-76.
Narangoa, L. "Mongolia and preventive diplomacy: Haunted by history and becoming cosmopolitan." Asian Survey, 49.2 (2009): 358-379.
Rotfeld, A.D. "NATO 2020: In search of a security community." The Polish Quarterly of International Affairs 21.1 (2012): 29-1.
Anandarajan, M. (2002). Profiling Web Usage in the Workplace: A Behavior-Based Artificial Intelligence Approach. Journal of Management Information Systems, 19(1), 243-266.
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. International Journal of Electronic Commerce, 9(1), 69-104.
Doerr, H.M., & Hecht, C.G. (1995). Navigating the Web. The Mathematics Teacher, 88(8), 716-719.
Hansen, L., & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.
Berkowitz, B. & Hahn, R.W. (2003).Cyber-security: Who's Watching Store? Issue of Science and Technology.
Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM. 54 (8): 132-140.
Rosenzweig, P. (2012). The International Governance Framework for Cybersecurity. Canada-United States Law Journal.37 (1).
Larry K. Gaines Homeland Security 12th edition 2012 Pearson Education
Michael C. Williams "No Greater Threat: After September 11th and the rise of National Security State: 2005.
Homeland Security. (2012). Retrieved from http://www.dhs.gov/index.shtm ill Atoro (2009) The Comprehensive National Cybersecurity Inititave, Retrieved by http://www.nextgov.com/the_basics/tb_20090601_8569.php
Government Accountability Office (GAO), Department of Homeland Security's (DHS's) Role in Critical Infrastructure Protection (CIP) Cybersecurity (2009) Control System Control Program. Retrieved from http://www.us-cert.gov/control_systems/csthreats.html