فهرست منابع و مآخذ
- Cyber resilience , The cyber risk challenge and the role of insurance. (2014). CRC FORUM.
- Richard L. Armitage, J. S. (2007). CSIS COMMISSION ON SMART POWER. CSIS.
- Abbott, M. (2014). Log Analysis of Cyber Security Training Exercises. Elsevier, 5-7.
- Alleyne, M. D. (2012). International Communication And World Affairs. Journalism And Mass Communication, 2.
- (2016). Degrees of Freedom, Dimensions of Power. MIT Press Journals, 19-20.
- Clarke, R. A.Securing Cyberspace Through International Norms. (2011).
- Cliff Joslyn, S. C. (2013). Massive Scale Cyber Traffic Analysis: A Driver for Graph Database.ACM. 1.
- Henshela, M. G. (2015). Trust as a human factor in holistic cyber security risk. 1118.
- Henshela, M. G. (2015). Trust as a human factor in holistic cyber security risk assessment. ScienceDirect, 1118.
- Danielson, M. E. ((2009)). Economic Espionage: A Framework for a Workable Solution. Minnesota Journal of Law, Science & Technology, 504-507.
- David A. Lane a, S. v. (2011). (2011). Innovation, sustainability and ICT. ELSEVIER, 83-86.
- Dealing With Today’s Asymmetric Threat to U.S, Global Security. Employing Smart Power. ((2009)).
- Dutton, J. M. (2016). The New Cybersecurity Agenda:Economic and Social Challenges to a Secure Internet. Michigan State University.
- Eadie, P. (2016). Counter-terrorism, Smart Power and the United States. GlobalPolicy, 328.
- Eadie, P. (2016). Counter-terrorism, Smart Power and the United States. 323-324.
- Eadie, P. (2016). Counter-terrorism, Smart Power and the United States. Global Policy, 324.
- Elena Ramona STROIE, A. C. (2011). Security Risk Management - Approaches and Methodology.. Informatica Economică,, 229-230.
- Ernest J. Wilson, I. (2008). Hard Power, Soft Power, Smart Power. The ANNALS of the American Academy of Political and Social Science. 111-122.
- european commission. Cybersecurity. (2016).
- (2016). China’s Security Strategy towards East Asia.. The Chinese Journal of International Politics(OXFORD), 7.
- Fischer, E. A. (2014). Cybersecurity Issues and Challenges: In Brief. 1.
- Fischer, E. A. (2016). Cybersecurity Issues and Challenges. 12.
- Fry, R. (2014).. (2014). Smart Power and the Strategic Deficit. The RUSI Journal, 31.
- Gallarotti, G. M. (2011). Soft power: what it is, why it’s important, and the conditions for its effective use. Journal of Political Power, 25-30.
- Gallarotti, G. M. (2011). Soft power: what it is, why it’s important, and the conditions for its effective use. Journal of Political Power, 25-28.
- Gallarotti,G. M. (2014).Smart Power:Definitions,Importance,and Effectiveness. Social Sciences, 4-8.
- (2016). Soft power: Media influence and its limits. 1.
- HARE, F. (2015). Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?.. George Mason University, 2.
- Haugaard, M. (2012). reflections upon power over, power to,power with, and the four dimensions of power. Journal of Political Power. 353.
- Henga, Y.-K. (2015). Smart Power and Japan’s Self-Defense Forces. 284.
- (2010). Understanding cybercrime: Phenomena, challenges and legal response.
- Wilson, E. (. (2008). Hard Power, Soft Power, Smart Power. The ANNAL Of American Academy of Politicalad Social Sciece, 114.
- James A. Lewis, K. T. (2011). (2011). Cybersecurity and Cyberwarfare.. CSIS, 3.
- Jason Creasey, I. G. (2013). Cyber Security Incident Response Guide. 4.
- Joseph S. Nye, J. (2008). Public Diplomacy and Soft Power. SAGE, 94-102.
- Kabay, M. E. (2008). Industrial Espionage. Network World Fusion Security. 3.
- KAGAN, R. (n.d.). OF PARADISE, AND P OWER. Vintage. 2003,2004.
- Kashiam, M. A. (2012). The Italian role in the Libyan spring revolution: is it a shift from soft to hard power? Routledge Taylor AndFrancis Group.
- Keir Giles, K. H. (2015). Cyber Defense:An International View. The United States.
- Kuromiya, H. (2009). STALIN’S GREAT TERROR AND ESPIONAGE. The National Council for Eurasian and East European Research. 3.
- Lampros Litosb, c (2017). Management tool design for eco-efficiency improvements in manufacturing.ScienceDirect, 505.
- Lee Gillam, A. V. (2012). Investigating Cyber Law and Cyber Ethics: Issues, Impacts, and Practices.. Information Science Reference, 79.
- Lee, G. (2009). A theory of soft power and Korea's soft power Strategy. Korean Journal of Defense Analysis, 211.
- Lee,G.A theory of soft power and Korea's soft power Strategy.Korean Journal of Defense Analysis. (2009) 211.
- LIBICKI, M. C. (2009). Cyber Deterence And Cyberwar. 12-13.
- Lindsley Boiney, J. C. (2015). Cyber Operations Rapid Assessment (CORA). 4-8.
- LuisOrtega, J. (2016). Reference Management Tools. Elsevier Ltd, 65.
- (2018). Efficiency and effectiveness of factors affecting renewable energy projects; an empirical perspective. 6-13.
- Marco Angelini. Maria Cristina Arcuri, R. B. (2013). Italian Cyber Security Report.
- Margarita Kefalaki, Y. P. (2012). Challenges in International Communication. Athens Institute for Education and Research, 1.
- Martin, A. (2012). Political participation among the young in Australia. Routledge.
- Martin, A. (2012). Political participation among the young in Australia Routledge.
- Mason Ricea, J. B. (2011). A signaling framework to deter aggression in cyberspace. ELSEVIER, 58.
- Mason Ricea, J. B. (2011). A signaling framework to deter aggression in cyberspace.. ELSEVIER, 58.
- MATTHEW S. COHEN, C. D. (2015). Israel and Cyberspace: Unique Threat and Response.. International Studies Perspectives Advance Access.
- Mayfield, M. (2011). Innovation. Elsevier, 1.
- (2016). Soft power, Russia and the former Soviet states: a case study of Russian language and education in Armenia. International Journal of Cultural Policy, 1.
- Moore, T. (2010). Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy.
- Navráti, D. (2014). National Cyber Security Strategy OF THE CZECH REPUBLIC. 20.
- Noluxolo Gcaza, R. v. (2017). Information & Computer Security.. EMERALD INSIGHT, 4.
- Nor’azuwa Muhamad Pahri, N. A. (2010). 3rd Party Information Security Assessment Guideline.CyberSecurity Malaysia, 12
- Nye, J. S. (2006). Soft Power, Hard Power and Leadership. 3-4.
- Nye, J. S. (2011). Power and foreign policy. Journal of Political Power, 20.
- Nye, J. S. (2012). China and soft power. Journal of International, 151-152.
- Nye, J. S. (2015). China and soft power. Routledge, 151.
- Patterson, W. R. (2008). Smart power in reunified Germany. pp.340-49. Journal of Power, 340-49.
- (2008). Smart power in reunified Germany. Journal of Power, 350.
- Petress, K. (2016). Power: Definition, Typology, Description, Examples, and Implications. 1-3.
- Purdy, A. (2016). The Global Cyber Security Challenge. Huawei Technologies, 7.
- (2013). Negotiating meanings for security in the cyberspace. 32-34.
- (2013). Negotiating meanings for security in the cyberspace. Emerald Insight, 32-34.
- (2013). Negotiating meanings for security in the cyberspace. Emerald Insight, 32-34.
- (2013). Negotiating meanings for security in the cyberspace. Emerald Insight, 32-34.
- Ramsaroop, P. (2003). Cybercrime, Cyberterrorism, and Cyberwarfare. Technology and Health Services Delivery Health Services Organization Unit (THS/OS). 14.
- Randall J. Murphy, M. S. (2015). Guidebook on Best Practices for Airport Cybersecurity. 7.
- (391). I Will Follow: Smart Power and the Management of Wartime Alliances.. Journal of Strategic Studies, 215.
- Richard L. Armitage, D. J. (2008). IMPLEMENTING SMART POWER: SETTING AN Agenda For National Security Reform. CSIS, 3.
- Robert G. Abbott, J. M. (2015).. (). Log Analysis of Cyber Security Training Exercises.ScienceDirect, 5089.
- Robert V. Kozinets, A. H. (2008). The Wisdom of Consumer Crowds: Collective Innovation in the Age of Networked Marketing. Journal of Macromarketing, 340.
- Rubenstein, D. (2014). Nation State Cyber Espionage and its Impacts. CSE, 2.
- Saroyan, D. (2015). SMART POWER. PUBLIC DIPLOMACY MAGAZINE,, 14-19.
- Sherr, J. (2011). Hard power in the Black Sea region: a dreaded but crippled instrument.. 11.
- SKINNER, C. P. An International Law Response to Economic Cyber Espionage.. (2014).
- Stall, S. T. (2011). The Future Of Cyber Security. 7.
- Stephen J. Mariano, C. B. (2009). US Army Africa: Smart Power in Action. Small Wars Journal, 2.
- (2015). Cyber security, community, time. cyber security and the politic. 20-41.
- (2015). Cyber security, community, time. Cyber Security and the Politics of Time. 21-40.
- Strategy, A. t. (2009). Lee, G.. Korean Journal of Defense Analysis, 1.
- Stratton, J. (2009). International law. 2-7.
- Susana Borrás, C. E. (2013). The choice of innovation policy instruments. 1.
- Tana, S. S. (2015). Mailed Fists and Velvet Gloves: The Relevance of Smart Power to Singapore’s Evolving Defence and Foreign Policy. Journal Strategic Studies, 332-333.
- Understanding cybercrime: Phenomena, challenges and legal response.. (2010). ITU.
- Wamala, F. (2011). The ITU National Cybersecurity Strategy.
- Wamala, F. (2011). (2011). The ITU National Cybersecurity Strategy Guide. ITU.
- Wamala, F. (2011). The ITU National Cybersecurity Strtategy Guide. ITU.
- YONG-SOO EUN, J. S. (2014). Cyberwar: Taking Stock of Security and Warfare in the Digital Age. International Studies Perspectives, 4.
|