فهرست منابع و مآخذ فارسی
- خلیلی، احمد. زبردست، اسفندیار و عزیزی، محمد مهدی، (زمستان 1396)، «گونهشناسی سیاستهای مدیریت شهری در مناطق شهربنیان»، فصلنامه معماری و شهرسازی آرمانشهر، شماره 21، 291-308.
- دهقان اشکذری، محمدجواد. میرعمادی، طاهره و قاضی نوری، سید سپهر، (زمستان 1397)، «گونهشناسی نظریههای بینالمللیسازی نظامهای نوآوری»، پژوهشهای مدیریت عمومی، سال یازدهم، شماره 42، 33-60.
- کریمی قهرودی، محمدرضا و زارعی، وحید، (1399)، «حاکمیت فضای سایبری اندیشههایی پیرامون جامعهای با آینده مشترک در فضای سایبر»، انتشارات مؤسسه آموزشی و تحقیقاتی صنایع دفاعی، 75-125 .
- کریمی قهرودی، محمدرضا و کیانخواه، احسان، (تابستان 1394)، «چالش آفرینی اینترنت اشیا بر ارکان امنیت ملی کشور»، فصلنامه علمی امنیت ملی، سال چهارم، شماره شانزدهم، 81-106.
- کیانخواه، احسان، (زمستان 1398)، «چالشهای راهبردی حکمرانی با گسترش فضای سایبر»، فصلنامه علمی امنیت ملی، سال نهم، شماره سیوچهارم، 153-174.
- لطیفی، میثم (زمستان 1397)، «روششناسی گونهشناسی: رهنمونی بر نظریهپردازی در دانش مدیریت»، فصلنامه مطالعات مدیریت دولتی ایران، دوره اول، شماره 2، 25-52.
فهرست منابع و مآخذ انگلیسی
- 26 Years After Gibson, Pentagon Defines ‘Cyberspace’. https://www. wired.com/2008/05/pentagon-define/ [2016-9-7].
- afieldfile/2013/12/17/NSS.pdf [20 16-9-24].
- pdf [2016-9-24].
- Annex 1 to Government Decision No. 1139/2013 National Cyber Security Strategy of Hungary, 2013: 3. https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss map/HU_NCSS.pdf [2016-9-4].
- Austrian Cyber Security Strategy, 2013: 21. https://www.enisa.euro eu/topics/national-cybersecurity-strategies/ncss-map/AT_NCSS.pdf [2016-9-24].
- Belgium, Cyber Security Strategy, 2012: 12. https://www.enisa.europa. eu/topics/national-cybersecurity-strategies/ncss-map/belgian-cyber-sec urity-strategy/at_download/file [2016-9-24].
- Braun, viriginia and Clarke(2006)”using thematic analysis in psychology” Qualititative research , Vol.3 No.2:76-101 Retrived from: http:eprints.uwe.ac.//11735.
- Canada’s Cyber Security Strategy, For a Stronger and More Prosperous Canada, 2010: 2. http://www.publicsafety.gc.ca/cnt/rsrcs/p blctns/cbr-scrt-strtgy/index-eng.aspx [2016-9-24].
- Conceptual Views Regarding the Activities of the Armed Forces of the Russian Federation in the Information Space, p. 5. https://ccdcoe.org/ strategies/Russian_Federation_unofficial_translation.pdf ,2016.
- Cyber Security Strategy for Germany, 2011: 9. http://www.cio.bund. de/SharedDocs/Publikationen/DE.
- Cyber Security Strategy of Latvia 2014-2018, 2014.https://www.enisa. eu/topics/national-cyber-security-strategies/n css-map/lv-ncss [2016-9-24]. r%20Montenegro.pdf [2016-9-24].
- Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space, 2009:7. https://www.gov.uk/government/ uploads/system/uploads/attachment_data/file/228841/7642.pdf [2016-24].
- Cybersecurity Strategy: Towards a world-leading, resilient and vigorous cyberspace, 2013: 5. http://www.nisc.go.jp/active/kihon/pdf/ cybersecuritystrategy-en.pdf [2016-9-24].
- Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, 2009: III. https://ww smartgrid.gov/files/Cyberspace_Policy_Review _Assuring_ Trusted_ Resilient_Informat_200908.pdf [2016-9-24].
- Cyberspace Protection Policy of the Republic of Poland, 2013: 5. https: //www.enisa.europa.eu/topics.
- Cyberspace: Definition and Implications. https://ccdcoe.org/multime dia/cyberspace-definitionand-implications.html [2016-9-6].
- Czech Republic, Draft Act on Cyber Security and Change of Related Acts (Act on Cyber Security), 2014: 2. https://www.govcert.cz/downlo ad/legislativa/container-nodeid-1168/draftactcybersecurity-130415.pdf [2016-12-31].
- Denmark A, Mulvenon J (2010) Contested commons. Contested commons: the future of American power in a multi-polar world, pp 3-48. https://s3.amazonaws.com/files.cnas.org/documents/CNAS-Contest ed-Commons_1.pdf [2016-12-31].
- Department of Communications, Notice of Intention to Make South African National Policy, 2010: 12. http://www.gov.za/sites/www.gov. za/files/32963_118_0.pdf [2016-9-24].
- Developing National Information Security Strategy for the Kingdom of Saudi Arabia, NISS, DRAFT 7: A-http://www.itu.int/en/ITUD/Cybersecurity/Documents/National_Strategies_Repositoy/SaudiArabia_NISS_Draft_7_EN.pdf 2016-12-31].
- Discussion on origin and translation of cyberspace. http://www.360doc. com/content/16/0115/19/21966267 _ 528220372.shtml [2016-12-31].
- Finland´s Cyber Security Strategy. http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategy [2016-9-25].
- Finland’s Cyber Security Strategy Government Resolution 24 Jan 2013. https://ccdcoe.org/cyberdefinitions .html [2016-9-10.
- Government of Kenya Cybersecurity Strategy, 2014: 2. http://www.ict a.go.ke/wp-content/uploads/2014 /03/ GOK-national-cybersecurity-strat egy.pdf [2016-9-25].
- Government of the Republic of Lithuania Resolution No. 796 of 29 June 2011 on the approval of the programme for the development of electronic information security (cyber-security) for 2011-2019, 2011: 3. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National Strategies _Repository/ Lithuania_ 2011_ EIS(KS)PP_796_2011-06-29_E pdf [2016-9-24].
- Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate Cibernetică a României şi a Planului de Acţiune la Nivel Naţional Privind Implementarea Sistemului Naţional de Securitate. Cibernetică,2013:7.https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncssmap/.
- Information Systems Defence and Security: France’s Strategy, 2011: http://www.ssi.gouv.fr /uploads / IMG /pdf/2011-02-15_Information_ system_defence_and_security_-_France_s_strategy. pdf [2016-9-24].
- International Organization for Standardization, ISO/IEC27032:2012, Information technology Security techniques - Guidelines for cyber security. https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-1:v1:en [2016-9-19].
- Israel, Resolution No. 3611: Advancing National Cyberspace Capabilities, 2011: http://www.itu.int /en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Israel_2011_Advancing%20National %20 Cyberspace%20Capabilities.pdf [2016-9-24].
- Japan, National Security Strategy, 2013: 9.http://japan.kantei.go.jp/96_abe/documents/2013/__icsFiles.
- Joint Publication 3-12(R): Cyberspace Operation. http://www.dtic.mil/ doctrine/new_pubs/jp3_12R.pdf [2016-9-5].
- Ministry of Communication and Information Technolory, India, National Cyber Security Policy-2013 (NCSP-2013), 2013: 1. http:// gov.in/sites/upload_files/dit/files/National%20 Cyber%20Security %20Policy%20(1).pdf [2016-9-24].
- National Cyber Security Strategy for Montenegro 2013-2017, 2013: 5. http://www.mid.gov.me/ ResourceManager/FileDownload.aspx?rid=165416&rType=2&file=Cyber%20Security%20Strategy%20fo.
- National Cyber Security Strategy of Afghanistan, 2014.http://nic.af/Content/files/National %20Cybersecurity%20 Strategy%20of%20Afghanistan%20(November2014).pdf [2016-9-25].
- National Cyberspace Security Strategy. http://www.cac.gov.cn/2016-12/27/c_1120195926.htm [2016].
- National Initiative for Cybersecurity Careers and Studies, Explore Terms: A Glossary of Common Cybersecurity Terminology. https://def com/a/download/document/11128 [2016-9-24].
- National strategy for the protection of Switzerland against cyber risks, 2012: 5. https://www.enisa.europa .eu / topics/national-cybersecuritystrategies/ncssmap/National_strategy_for_the protection_of_Switzerland.
- national-cyber-security-strategies/ncss-map/copy_of_PO_NCSS.pdf [2016-9-24].
- Netherlands, The Defence Cyber Strategy, 2012: 4. https://ccdcoe.org/ strategies/Defence_Cyber_Strategy_ NDL .pdf [2016-9-24].
- New Zealand’s Cyber Security Strategy, 2011: 12. http://www.dpmc. nz/sites/all/files/publications/nz-cyber-security-strategy-june-2011 _0.pdf [2016-9-24].
- Qatar National Cyber Security Strategy, 2014: 23. https://www.itu.int /en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Qatar_2014_national_cyber_security_strategy.pdf [2016-9-25].
- Rattray G, Evans C, Healey J. Chapter V: American security in the cyber commons. https://s3.amazonaws.com/files.cnas.org/documents/ CNAS-Contested-Commons_1.pdf [2016-12-31].
- Republic of Colombia, National Planning Department, Policy Guidelins for Cybersecurity and Cyberdefense, 2011: 34. https://www.sites.oas.org/cyber/Documents/Colombia%20-%20National%20 Cybersecurity%20and%20Cyberdefense%20Policy.pdf [2016-9-24].
- Series X: Data Networks, Open System Communications and Security. Telecommunication security. Overview of cybersecurity. http://www. itu.int/rec/T-REC-X.1205-200804-I [2016-12-31].
- Some Principles of Cyber Strategy—Analysis—Eurasia Review. ISN Security Watch, 2014. http://maritimesecurity.asia/free-2/sea-lines-of-co mmunication/some-principles-of-cyber-strategyanalysis-eurasia-review/ [2016-9-6].
- Spain, National Cyber Security Strategy, 2013: 9. https://www.enisa. eu/topics/nationalcyber-security-strategies/ncssmap/NCSS_ESe n.pdf [2016-9-24].
- Strate L (1999) The varieties of cyberspace: problems in definition and delimitation. Western J Commun 63(3):382–412].
- StrategiaDeSecuritateCibernetica%20ARomaniei.pdf [2016-12-31].
- Strategische-Themen/css_engl_download.pdf? __blob=publicationFile [2016-9-24].
- The NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013: 211. http://www.jku.at/intlaw/content/e275831/e275836/e276629/Talli pdf [2016-9-.
- Turkey, National Cyber Security Strategy and 2013–2014 Action Plan, 2013: 8. https://www.enisa.europa.eu/topics/national-cyber-security-str ategies/ncss-map/national-cybersecurity-strategyand-2013-2014-action -plan/at_download/file [2016-9-24].
- United Kingdom, The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World, 2011:11. https://www.gov.uk/ government/uploads/system/uploads/attachment_data/file/60961/uk-cy ber-security-strategy-final.pdf [2016-9-24].
- White House, and United States of America. The National Strategy to Secure https://www.us-cert.gov/sites/default/files/publicat ions/cyberspace_strategy.pdf [2016-9-17].
- Wiener N (1948) Cybernetics or control and communication in the animal and the machine, Vol 25. MIT press. http://www.allen-riley.com/ utopia/cybernetics.pdf [2016-9-24].
- William G (1984) Neuromancer, Vol 4. Phantasia Press Edition, Bloomfield, MI. http://www.taodocs .com/p- 4046079.html [2016-12-31].
- William G. BURNING CHROME. http://dinhe.net/*aredridel/.notmine /www.digipromo.com/vruz/ebooks /scifi/William%20Gibson-Burning %20Chrome.rtf [2016-11-30].
- Wolff HVH (2013) Territorial sovereignty and neutrality in cyberspace. Intl L Stud Ser US Naval War 89:i. https://www.usnwc. edu/getattachment/ff9537ce-94d6-49a8- 51e335126c1e/vonHeinegg.aspx [2016-9-24].
- Wolff HVH (2013) Territorial sovereignty and neutrality in cyberspace. Intl L Stud Ser US Naval War 89:i. https://www.usnwc. edu/getattachment/ff9537ce-94d6--a9ef-51e335126c1e/vonHeine aspx[2016-9-24].
- Yannakogeorgos P (2009) Technogeopolitics of militarization and security in cyberspace. https://rucore.libraries.rutgers.edu/rutgers-lib/2 6118/PDF/1/ [2016-9-24].
- Концепция Стратегии Кибербезопасности Российской Федерации, p. 2. http://council.gov.ru/media/ files/41d4b3dfbdb25cea8a73.pdf [2016-9-24].
|