Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-wq2xx Total loading time: 0 Render date: 2024-04-23T10:11:21.241Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 October 2015

Tim Stevens
Affiliation:
King's College London
Get access
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aaron, Chris (2012), ‘The growing cyber-security market’, RUSI Defence Systems 15, no. 1: 86–7.Google Scholar
Abbott, Andrew (2004), Methods of Discovery: Heuristics for the Social Sciences (New York: W.W. Norton & Company).Google Scholar
Abrahamsen, Rita and Williams, Michael C. (2011), Security Beyond the State: Private Security in International Politics (Cambridge University Press).Google Scholar
Adam, Barbara (1989), ‘Feminist social theory needs time: Reflections on the relation between feminist thought, social theory and time as an important parameter in social analysis’, The Sociological Review 37, no. 3: 458–73.CrossRefGoogle Scholar
Adam, Barbara (1995), Timewatch: The Social Analysis of Time (Cambridge: Polity Press).Google Scholar
Adam, Barbara (2008), ‘Of timescapes, futurescapes and timeprints’, paper presented at Lüneberg University, 17 June.Google Scholar
Adams, James (2001), ‘Virtual defense’, Foreign Affairs 80, no. 3: 98112.CrossRefGoogle Scholar
Ademollo, Francesco (2011), The Cratylus of Plato: A Commentary (Cambridge University Press).CrossRefGoogle Scholar
Adey, Peter and Anderson, Ben (2012), ‘Anticipating emergencies: Technologies of preparedness and the matter of security’, Security Dialogue 43, no. 2: 99117.CrossRefGoogle Scholar
Adler, Emanuel (1997), ‘Seizing the middle ground: Constructivism in world politics’, European Journal of International Relations 3, no. 3: 319–63.CrossRefGoogle Scholar
Adler, Emanuel (2008), ‘The spread of security communities: Communities of practice, self-restraint, and NATO’s post-Cold War transformation’, European Journal of International Relations 14, no. 2: 195230.CrossRefGoogle Scholar
Adler, Emanuel (2012), ‘Constructivism in International Relations: Sources, contributions, and debates’, in Handbook of International Relations, ed. Carlsnaes, Walter, Risse, Thomas and Simmons, Beth A., 2nd. edn (Thousand Oaks, CA: Sage), 112–44.Google Scholar
Adler, Emanuel and Haas, Peter M. (1992), ‘Conclusion: Epistemic communities, world order, and the creation of a reflective research program’, International Organization 46, no. 1: 367–90.CrossRefGoogle Scholar
Adler, Emanuel and Pouliot, Vincent (2011), ‘International practices’, International Theory 3, no. 1: 136.CrossRefGoogle Scholar
Agamben, Giorgio (2004) [2002], The Open: Man and Animal, tr. Attell, Kevin (Stanford University Press).Google Scholar
Agamben, Giorgio (2005) [2000], The Time That Remains: A Commentary on the Letter to the Romans, tr. Dailey, Patricia (Stanford University Press).CrossRefGoogle Scholar
Agnew, John (1994), ‘The territorial trap: The geographical assumptions of International Relations theory’, Review of International Political Economy 1, no. 1: 5380.CrossRefGoogle Scholar
Agnew, John (1996), ‘Time into space: The myth of “backward” Italy in modern Europe’, Time and Society 5, no. 1: 2745.CrossRefGoogle Scholar
Agnew, John (2011), ‘Space and place’, in Handbook of Geographical Knowledge, ed. Agnew, John and Livingstone, David N. (London: Sage), 316–30.CrossRefGoogle Scholar
Ahlers, Mike M. (2011), ‘Inside a government computer attack exercise’, CNN.com, 17 October, http://edition.cnn.com/2011/10/17/tech/innovation/cyberattack-exercise-idaho.Google Scholar
Aho, James A. (1997), ‘The apocalypse of modernity’, in Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements, ed. Robbins, Thomas and Palmer, Susan J. (New York: Routledge), 6172.Google Scholar
Aldrich, Richard J. (2010), GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency (London: HarperCollins).Google Scholar
Allan, Stuart (1994), ‘“When discourse is torn from reality”: Bakhtin and the principle of chronotopicity’, Time and Society 3, no. 2: 193218.CrossRefGoogle Scholar
Aloisio, Mario (2004), ‘The calculation of Easter Day, and the origin and use of the word Computer’, IEEE Annals of the History of Computing 26, no. 3: 42–9.CrossRefGoogle Scholar
Alterman, Hyman (1969), Counting People: The Census in History (New York: Harcourt, Brace & World).Google Scholar
Amoore, Louise (2013), The Possibilities of Possibility: Risk and Security Beyond Probability (Durham, NC: Duke University Press).Google Scholar
Andersen, Holly K. and Grush, Rick (2009), ‘A brief history of time-consciousness: Historical precursors to James and Husserl’, Journal of the History of Philosophy 47, no. 2: 277307.CrossRefGoogle Scholar
Anderson, Ben (2009), ‘Affective atmospheres’, Emotion, Space and Society 2, no. 2: 7781.CrossRefGoogle Scholar
Anderson, Ben (2010a), ‘Security and the future: Anticipating the event of terror’, Geoforum 41, no. 2: 227–35.CrossRefGoogle Scholar
Anderson, Ben (2010b), ‘Preemption, precaution, preparedness: Anticipatory action and future geographies’, Progress in Human Geography 34, no. 6: 777–98.CrossRefGoogle Scholar
Anderson, Benedict (2006) [1983], Imagined Communities: Reflections on the Origin and Spread of Nationalism, rev. edn (London: Verso).Google Scholar
Andrejevic, Mark (2007), iSpy: Surveillance and Power in the Interactive Era (St Lawrence, KS: University Press of Kansas).Google Scholar
Andrew, Christopher (2009), The Defence of the Realm: The Authorized History of MI5 (London: Allen Lane).Google Scholar
Antoniades, Andreas (2003), ‘Epistemic communities, epistemes and the construction of (world) politics’, Global Society 17, no. 1: 2138.CrossRefGoogle Scholar
Appadurai, Arjun (1996), Modernity at Large: Cultural Dimensions of Globalization (Minneapolis, MN: University of Minnesota Press).Google Scholar
Aradau, Claudia (2010), ‘Security that matters: Critical infrastructure and objects of protection’, Security Dialogue 41, no. 5: 491514.CrossRefGoogle Scholar
Aradau, Claudia and van Munster, Rens (2007), ‘Governing terrorism through risk: Taking precautions, (un)knowing the future’, European Journal of International Relations 13, no. 1: 89116.CrossRefGoogle Scholar
Aradau, Claudia and van Munster, Rens (2008), ‘Taming the future: The dispositif of risk in the “War on Terror”’, in Risk and the War on Terror, ed. Amoore, Louise and de Goede, Marieke (London: Routledge), 2340.Google Scholar
Aradau, Claudia and van Munster, Rens (2011), Politics of Catastrophe: Genealogies of the Unknown (London: Routledge).CrossRefGoogle Scholar
Armitage, John (1997), ‘Accelerated aesthetics: Paul Virilio’s The Vision Machine’, Angelaki: Journal of the Theoretical Humanities 2, no. 3: 199209.CrossRefGoogle Scholar
Armitage, John (1999), ‘From modernism to hypermodernism and beyond: An interview with Paul Virilio’, Theory, Culture and Society 16, nos. 5–6: 2555.CrossRefGoogle Scholar
Arnold, Bettina (2014), ‘Life after life: Bioarchaeology and post-mortem agency’, Cambridge Archaeological Journal 24, no. 3: 523–9.CrossRefGoogle Scholar
Aron, Raymond (1954), The Century of Total War, trs. Dickes, E.W. and Griffiths, O.S. (London: Derek Verschoyle).Google Scholar
Aron, Raymond (1984) [1978], ‘The dawn of universal history’, Politics and History, ed. and tr. Conant, Miriam Bernheim (New Brunswick, NJ: Transaction Publishers), 212–33.Google Scholar
Arquilla, John (2009), ‘Information wars’, in Globalization and Security: An Encyclopedia, vol. I, Social and Cultural Aspects, ed. Fagan, G. Honor and Munck, Ronaldo (Westport, CT: Praeger Security International), 206–20.Google Scholar
Arquilla, John (2012), ‘Panetta’s wrong about a cyber “Pearl Harbor”’, Foreign Policy, 19 November, www.foreignpolicy.com/articles/2012/11/19/panettas_wrong_about_a_cyber_pearl_harbor.Google Scholar
Arquilla, John and Ronfeldt, David (1997), ‘Information, power, and grand strategy: In Athena’s Camp—Section 1’, in In Athena’s Camp: Preparing for Conflict in the Information Age, ed. Arquilla, John and Ronfeldt, David (Santa Monica, CA: RAND Corporation), 141–71.Google Scholar
Arquilla, John and Ronfeldt, David (1999), The Emergence of Noopolitik: Toward an American Information Strategy (Santa Monica, CA: RAND Corporation).CrossRefGoogle Scholar
Ashford, Warwick (2014), ‘London cyber war game in final of Cyber Security Challenge’, Computer Weekly, 14 March, www.computerweekly.com/news/2240216180/London-cyber-war-game-in-final-of-Cyber-Security-Challenge.Google Scholar
Attali, Jacques (1982), Histoires du Temps (Paris: Fayard).Google Scholar
Augé, Marc (1995) [1992], Non-Places: Introduction to the Anthropology of Supermodernity, tr. Howe, John (London: Verso).Google Scholar
Augustine (1992), Confessions, tr. Chadwick, Henry (Oxford University Press).Google Scholar
Aurelius, Marcus (2006), Meditations, tr. Hammond, Martin (London: Penguin Books).Google Scholar
Aymé, Marcel (2012) [1943], ‘The problem of summertime’, The Man Who Walked Through Walls, tr. Lewis, Sophie (London: Pushkin Press), 107–37.Google Scholar
Badger, Emily (2012), ‘A tiny city built to be destroyed by cyber terrorists, so real cities know what’s coming’, Fast Company, www.fastcoexist.com/1681033/a-tiny-city-built-to-be-destroyed-by-cyber-terrorists-so-real-cities-know-whats-coming#1.Google Scholar
Baker, Thomas (1857), The Steam Engine; or, The Powers of Steam. An Original Poem in Ten Cantos (London: J.S. Hodson).Google Scholar
Bakhtin, Mikhail (1981) [1937–1938], ‘Forms of time and of the chronotope in the novel: Notes towards an historical poetics’, The Dialogic Imagination: Four Essays by M.M. Bakhtin, ed. Holquist, Michael, trs. Emerson, Caryl and Holquist, Michael (Austin, TX: University of Texas Press), 84258.Google Scholar
Bambauer, Derek E. (2012), ‘Conundrum’, Minnesota Law Review 96, no. 2: 584674.Google Scholar
Barad, Karen (2007), Meeting the Universe Halfway: Quantum Physics and the Entanglement of Matter and Meaning (Durham, NC: Duke University Press).CrossRefGoogle Scholar
Barbour, Julian (1999), The End of Time: The Next Revolution in Our Understanding of the Universe (London: Phoenix).Google Scholar
Barkun, Michael (1997), ‘Millenarians and violence: The case of the Christian identity movement’, in Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements, ed. Robbins, Thomas and Palmer, Susan J. (New York: Routledge), 247–60.Google Scholar
Barnard-Wills, David and Ashenden, Debi (2012), ‘Securing virtual space: Cyber war, cyber terror, and risk’, Space and Culture 15, no. 2: 110–23.CrossRefGoogle Scholar
Barzashka, Ivanka (2013), ‘Are cyber-weapons effective?’, The RUSI Journal 158, no. 2: 4856.CrossRefGoogle Scholar
Baudelaire, Charles (1981), ‘The painter of modern life’, Selected Writings on Art and Artists, tr. Charvet, P.E. (Cambridge University Press), 390435.Google Scholar
Baudrillard, Jean (1997), ‘The end of the millennium or the countdown’, Economy and Society 26, no. 4: 447–55.Google Scholar
Bauer, Johannes M. and van Eeten, Michel J.G. (2009), ‘Cybersecurity: Stakeholder incentives, externalities, and policy options’, Telecommunications Policy 33, nos. 10–11: 706–19.CrossRefGoogle Scholar
Bazalgette, Joseph W. (1865), On the Main Drainage of London and the Interception of the Sewage from the River Thames (London: William Clowes and Sons).Google Scholar
BBC (2012), ‘The One Show’, 13 December, www.youtube.com/watch?v=XvlL2eGohq0.Google Scholar
BBC News (2012a), ‘David Cameron: We must push in “global trade race”’, 12 November, www.bbc.co.uk/news/uk-politics-20304800.Google Scholar
BBC News (2012b), ‘US military train in cyber-city to prepare hack defence’, 28 November, www.bbc.co.uk/news/technology-20525545.Google Scholar
BBC News (2013a), ‘Asteroid 2012 DA14 in record-breaking earth pass’, 15 February, www.bbc.co.uk/news/science-environment-21442863.Google Scholar
Beck, Ulrich (1992), Risk Society: Towards a New Modernity (London: Sage).Google Scholar
Beck, Ulrich, Giddens, Anthony and Lash, Scott (1994), Reflexive Modernization: Politics, Tradition and Aesthetics in the Modern Social Order (Cambridge: Polity Press).Google Scholar
Beck, Ulrich and Levy, Daniel (2013) ‘Cosmopolitanized nations: Re-imagining collectivity in world risk society’, Theory, Culture and Society 30, no. 2: 331.CrossRefGoogle Scholar
Beidel, Eric and Magnuson, Stew (2011), ‘Government, military face severe shortage of cybersecurity experts’, National Defense, www.nationaldefensemagazine.org/archive/2011/August/Pages/Government,MilitaryFaceSevereShortageOfCybersecurityExperts.aspx.Google Scholar
Beissinger, Mark R. (2002), Nationalist Mobilization and the Collapse of the Soviet State (Cambridge University Press).CrossRefGoogle Scholar
Bell, David E. (2005), ‘Looking back at the Bell-LaPadula model’, Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, AZ, 5–9 December 2005, 337–51.CrossRefGoogle Scholar
Belloc, Hillaire (1898), The Modern Traveller (London: Edward Arnold).Google Scholar
Bender, John and Wellbery, David E. (1991), ‘Introduction’, in Chronotypes: The Construction of Time, ed. Bender, John and Wellbery, David E. (Stanford University Press), 115.Google Scholar
Bendrath, Ralf (2001), ‘The cyberwar debate: Perception and politics in US critical infrastructure protection’, Information and Security 7: 80103.Google Scholar
Bendrath, Ralf (2003), ‘The American cyber-angst and the real world—Any link?’, in Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security, ed. Latham, Robert (New York: The New Press), 4973.Google Scholar
Bendrath, Ralf, Eriksson, Johan and Giacomello, Giampiero (2007), ‘From “cyberterrorism” to “cyberwar”, back and forth: How the United States securitized cyberspace’, in International Relations and Security in the Digital Age, ed. Eriksson, Johan and Giacomello, Giampiero (London: Routledge), 5782.Google Scholar
Beniger, James R. (1986), The Control Revolution: Technological and Economic Origins of the Information Society (Cambridge, MA: Harvard University Press).Google Scholar
Benjamin, Medea (2013), Drone Warfare: Killing by Remote Control (London: Verso).Google Scholar
Benjamin, Walter (1979), ‘One-way street’, One-Way Street and Other Writings, trs. Jephcott, Edmund and Shorter, Kingsley (London: NLB), 45104.Google Scholar
Bennett, Jane (2010a), ‘A vitalist stopover on the way to a new materialism’, in New Materialisms: Ontology, Agency, and Politics, ed. Coole, Diana and Frost, Samantha (Durham, NC: Duke University Press), 4769.CrossRefGoogle Scholar
Bennett, Jane (2010b), Vibrant Matter: A Political Ecology of Things (Durham, NC: Duke University Press).Google Scholar
Bennett, Sue, Maton, Karl and Kervin, Lisa (2008), ‘The “digital natives” debate: A critical review of the evidence’, British Journal of Educational Technology 39, no. 5: 775–86.CrossRefGoogle Scholar
Berenskoetter, Felix (2011), ‘Reclaiming the vision thing: Constructivists as students of the future’, International Studies Quarterly 55, no. 3: 647–68.CrossRefGoogle Scholar
Berger, James (1999), After the End: Representations of Post-Apocalypse (Minneapolis, MN: University of Minnesota Press).Google Scholar
Bergson, Henri (1971) [1910], Time and Free Will: An Essay on the Immediate Data of Consciousness, tr. Pogson, J.L. (London: George Allen and Unwin).Google Scholar
Berinato, Scott (2003), ‘The future of security’, CIO 17, no. 6: 71–6, www.cio.com/article/32033/2010_The_Future_of_Security.Google Scholar
Berlant, Lauren (1991), The Anatomy of National Fantasy: Hawthorne, Utopia, and Everyday Life (University of Chicago Press).Google Scholar
Betz, David J. and Stevens, Tim (2011), Cyberspace and the State (London: Routledge).Google Scholar
Betz, David J. and Stevens, Tim (2013), ‘Analogical reasoning and cyber security’, Security Dialogue 44, no. 2: 147–64.CrossRefGoogle Scholar
Bevan, Robert (2006), The Destruction of Memory: Architecture at War (London: Reaktion Books).Google Scholar
Bharara, Preet (2012), ‘Asleep at the laptop’, The New York Times, 4 June.Google Scholar
Bhaskar, Rahul (2006), ‘State and local law enforcement is not ready for a Cyber Katrina’, Communications of the ACM 49, no. 2: 81–3.CrossRefGoogle Scholar
Bigo, Didier (2001), ‘The Möbius ribbon of internal and external security(ies)’, in Identities, Borders, Orders: Rethinking International Relations Theory, ed. Albert, Mathias, Jacobson, David and Lapid, Yosef (Minneapolis, MN: University of Minnesota Press), 91136.Google Scholar
Bigo, Didier (2006), ‘Security, exception, ban and surveillance’, in Theorizing Surveillance: The Panopticon and Beyond, ed. Lyon, David (Cullompton: Willan), 4668.Google Scholar
Binnick, Robert I. (1991), Time and the Verb: A Guide to Tense and Aspect (New York: Oxford University Press).CrossRefGoogle Scholar
Bipartisan Policy Center (2010), ‘Cyber ShockWave shows US unprepared for cyber threats’, press release, 17 February, http://bipartisanpolicy.org/news/press-releases/2010/02/cyber-shockwave-shows-us-unprepared-cyber-threats.Google Scholar
Birkland, Thomas A. (2006), Lessons of Disaster: Policy Change After Catastrophic Events (Washington, DC: Georgetown University Press).Google Scholar
Blank, Stephen (2008), ‘Web War I: Is Europe’s first information war a new kind of war?’, Comparative Strategy 27, no. 3: 227–47.CrossRefGoogle Scholar
Bliss, Jeff (2010), ‘US unprepared for “cyber war”, former top spy official says’, Bloomberg Businessweek, 23 February.Google Scholar
Blum, Justin (2005), ‘Hackers target US power grid’, Washington Post, 11 March.Google Scholar
Blumenson, Martin (1999), ‘The emergence of infrastructure as a decisive strategic concept’, Parameters 29, no. 3: 3945.Google Scholar
Bobbitt, Philip (2008), Terror and Consent: The Wars for the Twenty-First Century (London: Penguin).Google Scholar
Bobrow, Davis B. (1986), ‘Complex insecurity: Implications of a sobering metaphor’, International Studies Quarterly 40, no. 4: 435–50.Google Scholar
Bochel, Hugh, Defty, Andrew and Kirkpatrick, Jane (2015), ‘“New mechanisms of independent accountability”: Select Committees and parliamentary scrutiny of the intelligence services’, Parliamentary Affairs 68, no. 2: 314–31.CrossRefGoogle Scholar
Boellstorff, Tom (2008), Coming of Age in Second Life: An Anthropologist Explores the Virtually Human (Princeton University Press).Google Scholar
Boin, Arjen (2004), ‘Lessons from crisis research’, International Studies Review 6, no. 1: 165–74.CrossRefGoogle Scholar
Boin, Arjen and McConnell, Allan (2007), ‘Preparing for critical infrastructure breakdowns: The limits of crisis management and the need for resilience’, Journal of Contingencies and Crisis Management 15, no. 1: 50–9.CrossRefGoogle Scholar
Bolt, Neville (2009), ‘Unsettling networks’, The RUSI Journal 154, no. 5: 34–9.CrossRefGoogle Scholar
Booth, Ken (1997), ‘Security and self: Reflections of a fallen realist’, in Critical Security Studies: Concepts and Cases, ed. Krause, Keith and Williams, Michael C. (Abingdon: Routledge), 83119.Google Scholar
Booth, Ken (2007), Theory of World Security (Cambridge University Press).CrossRefGoogle Scholar
Borgmann, Albert (1999), Holding On to Reality: The Nature of Information at the Turn of the Millennium (University of Chicago Press).CrossRefGoogle Scholar
Bostrom, Nick and Ćirković, Milan M., ed. (2008), Global Catastrophic Risks (Oxford University Press).CrossRefGoogle Scholar
Bourbeau, Philippe (2013), ‘Resiliencism: Premises and promises in securitisation research’, Resilience: International Policies, Practices and Discourses 1, no. 1: 317.CrossRefGoogle Scholar
Bousquet, Antoine (2006), ‘Time Zero: Hiroshima, September 11 and apocalyptic revelations in historical consciousness’, Millennium: Journal of International Studies 41, no. 2: 739–64.Google Scholar
Bowker, Geoffrey (1993), ‘How to be universal: Some cybernetic strategies, 1943–70’, Social Studies of Science 23, no. 1: 107–27.CrossRefGoogle Scholar
Boyer, Paul S. (1992), When Time Shall Be No More: Prophecy Belief in Modern American Culture (Cambridge, MA: Harvard University Press).Google Scholar
Boyle, Philip and Haggerty, Kevin D. (2009), ‘Spectacular security: Mega-events and the security complex’, International Political Sociology 3, no. 3: 257–74.CrossRefGoogle Scholar
Boyle, Philip and Haggerty, Kevin D. (2012), ‘Planning for the worst: Risk, uncertainty and the Olympic Games’, The British Journal of Sociology 63, no. 2: 241–59.CrossRefGoogle ScholarPubMed
Bozeman, John M. (1997), ‘Technological millennialism in the United States’, in Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements, ed. Robbins, Thomas and Palmer, Susan J. (New York: Routledge), 139–58.Google Scholar
Brandão, Luis Alberto (2006), ‘Chronotope’, Theory, Culture and Society 23, nos. 2–3: 133–4.CrossRefGoogle Scholar
Brants, Kees (1989), ‘The social construction of the information revolution’, European Journal of Communication 4, no. 1: 7997.CrossRefGoogle Scholar
Braund, Simon (2010), ‘How Ronald Reagan learned to start worrying and stop loving the bomb’, Empire 257: 134–40.Google Scholar
Brenner, Susan W. (2009), Cyberthreats: The Emerging Fault Lines of the Nation State (New York: Oxford University Press).CrossRefGoogle Scholar
Brewster, Thomas (2012), ‘David Cameron welcomes Microsoft UK IT skills initiative’, Tech Week Europe, 7 November, www.techweekeurope.co.uk/workspace/david-cameron-microsoft-skills-98570.Google Scholar
Brodie, Bernard (1978), ‘The development of nuclear strategy’, International Security 2, no. 4: 6583.CrossRefGoogle Scholar
Bromley, David G. (1997), ‘Constructing apocalypticism: Social and cultural elements of radical organization’, in Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements, ed. Robbins, Thomas and Palmer, Susan J. (New York: Routledge), 3245.Google Scholar
Brosnan, Mark (1998), Technophobia: The Psychological Impact of Information Technology (London: Routledge).Google Scholar
Brown, Chris (1994), ‘“Turtles all the way Down”: Anti-foundationalism, critical theory and International Relations’, Millennium: Journal of International Studies 23, no. 2: 213–36.Google Scholar
Brown, Ian, Edwards, Lilian and Marsden, Christopher (2009), ‘Information security and cybercrime’, in Law and the Internet, 3rd edn, ed. Edwards, Lilian and Weldes, Charlotte (Oxford: Hart Publishing), 671–92.Google Scholar
Browning, Christopher S. and McDonald, Matt (2013), ‘The future of critical security studies: Ethics and the politics of security’, European Journal of International Relations 19, no. 2: 235–55.CrossRefGoogle Scholar
Bruno, Greg (2008), ‘Backgrounder: The evolution of cyber warfare’, The New York Times, 27 February, www.nytimes.com/cfr/world/slot1_20080227.html.Google Scholar
Bubandt, Nils (2005), ‘Vernacular security: The politics of feeling safe in global, national and local worlds’, Security Dialogue 36, no. 3: 275–96.CrossRefGoogle Scholar
Buchanan, Ben (2014), ‘Speed and asymmetry in cyber operations’, unpublished manuscript.Google Scholar
Buchanan, Brett (2008), Onto-Ethologies: The Animal Environments of Uexküll. Heidegger, Merleau-Ponty, and Deleuze (Albany, NY: State University of New York Press).Google Scholar
Budiansky, Stephen (2010), ‘What’s the use of cryptologic history?’, Intelligence and National Security 25, no. 6: 767–77.CrossRefGoogle Scholar
Buelens, Geert, Hendrix, Harald and Jansen, Monica, ed. (2012), The History of Futurism: The Precursors, Protagonists, and Legacies (Plymouth: Lexington Books).Google Scholar
Bulmer, Martin (1979), ‘Preface’, in Censuses, Surveys and Privacy, ed. Bulmer, Martin (London: Macmillan), viiix.CrossRefGoogle Scholar
Bumiller, Elisabeth (2013), ‘Pentagon expanding cybersecurity force to protect networks against attacks’, The New York Times, 28 January.Google Scholar
Bumiller, Elisabeth and Shanker, Thom (2012), ‘Panetta warns of dire threat of cyberattack’, The New York Times, 12 October.Google Scholar
Burgess, J. Peter (2007), ‘Social values and material threat: The European Programme for Critical Infrastructure Protection’, International Journal of Critical Infrastructures 3, nos. 3–4: 471–87.CrossRefGoogle Scholar
Burke, Edmund (1770), Thoughts on the Cause of the Present Discontents, 3rd edn (London: J. Dodsley).Google Scholar
Burnet, John (1930) [1892], Early Greek Philosophy, 4th edn (London: Adam and Charles Black).Google Scholar
Burnham, David (1983), The Rise of the Computer State (London: Weidenfeld and Nicolson).Google Scholar
Buzan, Barry (1983), People, States and Fear: The National Security Problem in International Relations (Brighton: Wheatsheaf Books).Google Scholar
Buzan, Barry and Hansen, Lene (2009), The Evolution of International Security Studies (Cambridge University Press).CrossRefGoogle Scholar
Buzan, Barry and Wæver, Ole (2009), ‘Macrosecuritisation and security constellations: Reconsidering scale in securitisation theory’, Review of International Studies 35, no. 2: 253–76.CrossRefGoogle Scholar
Buzan, Barry, Wæver, Ole and de Wilde, Jaap (1998), Security: A New Framework for Analysis (Boulder, CO: Lynne Rienner Publishers).Google Scholar
Byrd, Hugh and Matthewman, Steve (2014), ‘Exergy and the city: The technology and sociology of power (failure)Journal of Urban Technology 21, no. 3: 85102.CrossRefGoogle Scholar
Cabinet Office (2011), The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World (London: Cabinet Office).Google Scholar
Callon, Michel (1986), ‘Some elements of a sociology of translation: Domestication of the scallops and the fishermen of St. Brieuc Bay’, in Power, Action and Belief: A New Sociology of Knowledge?, ed. Law, John (London: Routledge), 196233.Google Scholar
Cameron, Craig M. (1994), American Samurai: Myth, Imagination, and the Conduct of Battle in the First Marine Division, 1941–1951 (Cambridge University Press).Google Scholar
Cameron, David (2012a), speech, Conservative Party Conference, Birmingham, 10 October, www.bbc.co.uk/news/uk-politics-19897855.Google Scholar
Cameron, David (2012b), speech, Confederation of British Industry, London, 19 November, www.number10.gov.uk/news/speech-to-cbi/.Google Scholar
Campbell, David (1998), Writing Security: United States Foreign Policy and the Politics of Identity, rev. edn (Minneapolis, MN: University of Minnesota Press).Google Scholar
Campbell, David (2002), ‘Time is broken: The return of the past in the response to September 11’, Theory and Event 5, no. 4: n.p., http://muse.jhu.edu/journals/theory_and_event/summary/v005/5.4campbell.html.Google Scholar
Campbell, David (2010), ‘Poststructuralism’, in International Relations Theories: Discipline and Diversity, 2nd edn, ed. Dunne, Tim, Kurki, Milja and Smith, Steve (Oxford University Press), 213–37.Google Scholar
Camus, Albert (1991) [1955], The Myth of Sisyphus and Other Essays, tr. O’Brien, Justin (New York: Vintage International).Google Scholar
Canadian Broadcasting Corporation (1967), ‘Marshall McLuhan in conversation with Norman Mailer’, The Way It Is, 26 November.Google Scholar
Canales, Jimena (2009), A Tenth of a Second: A History (University of Chicago Press).CrossRefGoogle Scholar
Canetti, Elias (1973) [1960], Crowds and Power (New York: Farrar, Straus and Giroux).Google Scholar
Cannavò, Peter F. (2012), ‘Ecological citizenship, time, and corruption: Aldo Leopold’s Green Republicanism’, Environmental Politics 21, no. 6: 864–81.CrossRefGoogle Scholar
Cant, Sue (2003), ‘“Cyber 9/11” risk warning’, Sydney Morning Herald, 22 April.Google Scholar
Cantril, Hadley (2005) [1940], The Invasion from Mars: A Study in the Psychology of Panic (Princeton University Press).Google Scholar
Carr, Matt (2010), ‘Slouching towards dystopia: The new military futurism’, Race and Class 51, no. 3: 1332.CrossRefGoogle Scholar
Casasanto, Daniel and Boroditsky, Lera (2008), ‘Time in mind: Using space to think about time’, Cognition 106, no. 2: 579–93.CrossRefGoogle Scholar
Castells, Manuel (2000), ‘Urban sustainability in the information age’, City: Analysis of Urban Trends, Culture, Theory, Policy, Action 4, no. 1: 118–22.CrossRefGoogle Scholar
Castells, Manuel (2010) [1996], The Information Age: Economy, Society, and Culture, vol. I: The Rise of the Network Society, 2nd edn (Chichester: Wiley-Blackwell).Google Scholar
Castoriadis, Cornelius (1991), ‘Time and creation’, in Chronotypes: The Construction of Time, ed. Bender, John and Wellbery, David E. (Stanford University Press), 3864.Google Scholar
Cebrowski, Arthur K. (1998), ‘Forum’, Issues in Science and Technology 15, no. 2: n.p., www.issues.org/15.2/forum.htm.Google Scholar
Center for Strategic and International Studies (CSIS) (1998), Cybercrime, Cyberterrorism, Cyberwarfare: Averting an Electronic Waterloo (Washington, DC: CSIS).Google Scholar
Center for Strategic and International Studies (CSIS) (2008), Securing Cyberspace for the 44th Presidency: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency (Washington, DC: CSIS).Google Scholar
Central Office of Information (1998), Our Information Age: The Government’s Vision (London: Central Office of Information).Google Scholar
Ceruzzi, Paul E. (1991), ‘When computers were human’, Annals of the History of Computing 13, no. 3: 237–44.Google Scholar
Ceruzzi, Paul E. (2003), A History of Modern Computing, 2nd edn (Cambridge, MA: MIT Press).Google Scholar
CESG (2012), ‘New certification scheme announced for IA professionals’, press release, 24 October, www.cesg.gov.uk/News/Pages/New-IA-Certification-pages.aspx.Google Scholar
Chakrabarty, Dipesh (2000), Provincializing Europe: Postcolonial Thought and Historical Difference (Princeton University Press).Google Scholar
Chandler, David (2012), ‘Resilience and human security: The post-interventionist paradigm’, Security Dialogue 43, no. 3: 213–29.CrossRefGoogle Scholar
Chandler, David (2013), ‘Resilience and the autotelic subject: Toward a critique of the societalization of security’, International Political Sociology 7, no. 2: 210–26.CrossRefGoogle Scholar
Chandler, Ralph Clark (1985), ‘Little Boy, Fat Man, and the Rapture: The effects of late twentieth century apostasy on public policy’, Dialogue 8, no. 1: 139.Google Scholar
Chang, Kenneth (2014), ‘Automating cybersecurity’, The New York Times, 3 June.Google Scholar
Chapman, Siobhan (2009), ‘Government criticised for plan to hire “naughty boys”’, ComputerWorld UK, 30 June, www.computerworlduk.com/news/security/15467/government-criticised-for-plan-to-hire-naughty-boys/.Google Scholar
Chertoff, Michael (2008a), ‘The cybersecurity challenge’, Regulation and Governance 2, no. 4: 480–4.CrossRefGoogle Scholar
Chertoff, Michael (2008b), ‘Remarks by Homeland Security Secretary Michael Chertoff to the 2008 RSA Conference’, San Francisco, CA, 8 April.CrossRefGoogle Scholar
Chesneaux, Jean (2000), ‘Speed and democracy: An uneasy dialogue’, Social Science Information 39, no. 3: 407420.CrossRefGoogle Scholar
Childers, Erskine (1995) [1903], The Riddle of the Sands: A Record of Secret Service (London: Penguin).Google Scholar
Clark, Katerina and Holquist, Michael (1984), Mikhail Bakhtin (Cambridge, MA: Harvard University Press).Google Scholar
Clarke, Lee (2006), Worst Cases: Terror and Catastrophe in the Popular Imagination (University of Chicago Press).Google Scholar
Clarke, Richard A. (1999), ‘Threats to US national security: Proposed partnership initiatives towards preventing cyber terrorist attacks’, DePaul Business Law Journal 12, nos. 1–2: 3343.Google Scholar
Clarke, Richard A. and Knake, Robert K. (2010), Cyber War: The Next Threat to National Security and What to Do About It (New York: Ecco).Google Scholar
Clarke, Roger (2011), ‘Cyborg rights’, IEEE Technology and Society Magazine 30, no. 3: 4957.CrossRefGoogle Scholar
Clayton, Mark (2012a), ‘Senate cybersecurity bill fails, so Obama could take charge’, The Christian Science Monitor, 16 November.Google Scholar
Clayton, Mark (2012b), ‘“Cyber Pearl Harbor”: Could future cyberattack really be that devastating?’, The Christian Science Monitor, 7 December.Google Scholar
CNN (2010), ‘We were warned: Cyber Shockwave’, first broadcast, 20 February.Google Scholar
Coaffee, Jon (2010) ‘Protecting vulnerable cities: The UK’s resilience response to defending everyday urban infrastructure’, International Affairs 86, no. 4: 939–54.CrossRefGoogle Scholar
Coaffee, Jon, O’Hare, Paul and Hawkesworth, Marian (2009), ‘The visibility of (in)security: The aesthetics of planning urban defences against terrorism’, Security Dialogue 40, nos. 4–5: 489511.CrossRefGoogle Scholar
Cobb, Adam (1999), ‘Electronic Gallipoli?’, Australian Journal of International Affairs 53, no. 2: 133–49.CrossRefGoogle Scholar
Coetzee, J.M. (1999), The Lives of Animals (Princeton University Press).Google Scholar
Cohen, Julie E. (2007), ‘Cyberspace as/and space’, Columbia Law Review 107, no. 1: 210–56.Google Scholar
Cohen, Tova and Lubell, Maayan (2012), ‘Nations must talk to halt “cyber terrorism”—Kaspersky’, Reuters, 6 June.Google Scholar
Cohn, Norman (2004) [1957], The Pursuit of the Millennium: Revolutionary Millenarians and Mystical Anarchists of the Middle Ages (London: Pimlico).Google Scholar
Coker, Christopher (2004), The Future of War: The Re-Enchantment of War in the Twenty-First Century (Malden, MA: Blackwell Publishing).CrossRefGoogle Scholar
Coker, Christopher (2013), Warrior Geeks: How 21st Century Technology is Changing the Way We Fight and Think About War (London: Hurst & Company).CrossRefGoogle Scholar
Colbaugh, Richard and Glass, Kristin, ed. (2012), Proactive Defense for Evolving Cyber Threats (Albuquerque, NM: Sandia National Laboratories).CrossRefGoogle Scholar
Collier, Stephen J. and Lakoff, Andrew (2008), ‘The vulnerability of vital systems: How “critical infrastructure” became a security problem’, in Securing ‘the Homeland’: Critical Infrastructure, Risk and (In)security, ed. Cavelty, Myriam Dunn and Kristensen, Kristian Søby (London: Routledge), 1739.Google Scholar
Collier, Stephen J. and Ong, Aihwa (2005), ‘Global assemblages, anthropological problems’, in Global Assemblages: Technology, Politics, and Ethics as Anthropological Problems, ed. Ong, Aihwa and Collier, Stephen J. (Malden, MA: Blackwell), 321.Google Scholar
Collin, Andrew (1993), ‘Andrew Booth’s computers at Birkbeck College’, Resurrection: The Bulletin of the Computer Conservation Society 5: 1116.Google Scholar
Collins, Craig (2013), ‘Cybersecurity and sequestration’, Defense Media Network, 5 May, www.defensemedianetwork.com/stories/cybersecurity-and-sequestration/.Google Scholar
Colon, Marcus (2012), ‘Spies recruiting hackers: Gen. Keith Alexander at DefCon’, SC Magazine, September, www.scmagazine.com/spies-recruiting-hackers-gen-keith-alexander-at-defcon/article/254692/.Google Scholar
Committee on Manpower Resources for Science and Technology (1968), The Flow Into Employment of Scientists, Engineers and Technologists. Report of the Working Group on Manpower for Scientific Growth (London: HMSO).Google Scholar
Connah, Graham (2010), Writing About Archaeology (Cambridge University Press).CrossRefGoogle Scholar
Connolly, Patrick J. (2014), ‘Newton and God’s sensorium’, Intellectual History Review 24, no. 2: 185201.CrossRefGoogle Scholar
Connolly, William E. (2000), ‘Speed, concentric cultures, and cosmopolitanism’, Political Theory 28, no. 5: 596618.CrossRefGoogle Scholar
Conway, Maura (2008), ‘Media, fear and the hyperreal: The construction of cyberterrorism as the ultimate threat to critical infrastructures’, in Securing ‘the Homeland’: Critical Infrastructure, Risk and (In)security, ed. Cavelty, Myriam Dunn and Kristensen, Kristian Søby (London: Routledge), 109–29.Google Scholar
Conway, Maura (2011), ‘Against cyberterrorism’, Communications of the ACM 54, no. 2: 26–8.CrossRefGoogle Scholar
Cook, Martin L. (2004), ‘Christian apocalypticism and weapons of mass destruction’, in Ethics and Weapons of Mass Destruction: Religious and Secular Perspectives, ed. Hashmi, Sohail H. and Lee, Steven P. (Cambridge University Press), 200–10.Google Scholar
Cooper, John (2011), The Queen’s Agent: Frances Walsingham at the Court of Elizabeth I (London: Faber and Faber).Google Scholar
Copeland, B. Jack, ed. (2006), Colossus: The Secrets of Bletchley Park’s Codebreaking Computers (Oxford University Press).CrossRefGoogle Scholar
Copeland, Dale C. (2000), ‘The constructivist challenge to structural realism: A review essay’, International Security 25, no. 2: 187212.CrossRefGoogle Scholar
Cordle, Daniel (2013), ‘“That’s going to happen to us. It is”: Threads and the imagination of nuclear disaster on 1980s television’, Journal of British Cinema and Television 10, no. 1: 7192.CrossRefGoogle Scholar
Cornish, Paul, Livingstone, David, Clemente, Dave and Yorke, Claire (2010), On Cyber Warfare (London: Chatham House).Google Scholar
Coward, Martin (2009), Urbicide: The Politics of Urban Destruction (Abingdon: Routledge).Google Scholar
Cox, Robert W. (1981), ‘Social forces, states and world orders: Beyond International Relations theory’, Millennium: Journal of International Studies 10, no. 2: 126–55.Google Scholar
Croft, Stuart (2008), ‘What future for security studies?’, in Security Studies: An Introduction, ed. Williams, Paul D. (London: Routledge), 499511.Google Scholar
Crosthwaite, Paul (2011), ‘The accident of finance’, in Virilio Now: Current Perspectives in Virilio Studies, ed. Armitage, John (Cambridge: Polity), 177–99.Google Scholar
Cunningham, Kevin and Tomes, Robert R. (2004), ‘Space-time orientations and contemporary political-military thought’, Armed Forces and Society 31, no. 1: 119–40.CrossRefGoogle Scholar
Curtis, Sophie (2014), ‘School children to be trained in cyber warfare’, The Telegraph, 11 August, www.telegraph.co.uk/technology/internet-security/11025457/School-children-to-be-trained-in-cyber-warfare.html.Google Scholar
Daily Telegraph (2013), ‘Russian meteor exploded with force of 30 Hiroshima bombs’, 16 February.Google Scholar
Dainton, Barry (2010) [2001], Time and Space, 2nd edn (Durham: Acumen).Google Scholar
D’Amico, Robert (1989), Historicism and Knowledge (New York: Routledge).Google Scholar
Daniel, Lisa (2011), ‘Panetta: Intelligence community needs to predict uprisings’, American Forces Press Service, 11 February, www.defense.gov/news/newsarticle.aspx?id=62790.Google Scholar
Davis, Joshua (2007), ‘Hackers take down the most wired country in Europe’, Wired 15, no. 9, www.wired.com/politics/security/magazine/15–09/ff_estonia.Google Scholar
Davis, Mike (1999), Ecology of Fear: Los Angeles and the Imagination of Disaster (New York: Vintage Books).Google Scholar
Davis, Jon and Magrath, Shane (2013), A Survey of Cyber Ranges and Testbeds (Edinburgh, Australia: Defence Science and Technology Organisation).Google Scholar
Davis Cross, Mai’a K. (2013), ‘Rethinking epistemic communities twenty years later’, Review of International Studies 39, no. 1: 137–60.Google Scholar
Debrix, François (2008), Tabloid Terror: War, Culture and Geopolitics (London: Routledge).Google Scholar
Deering, Christopher J. and Maltzman, Forrest (1999), ‘The politics of executive orders: Legislative constraints on Presidential power’, Political Research Quarterly 52, no. 4: 767–83.CrossRefGoogle Scholar
Defense Advanced Research Projects Agency (2008a), ‘National Cyber Range proposers’ day workshop’, Special Notice DARPA-SN08-33, 29 April, www.fbo.gov/index?s=opportunity&mode=form&id=250832bfd8f71f0340ce65767397fb25&tab=core&_cview=0.Google Scholar
Defense Advanced Research Projects Agency (2008b), ‘National Cyber Range’, Broad Agency Announcement DARPA-BAA-08–43, 5 May, www.fbo.gov/download/c33/c330660f00c9820d05c9f4c54422024b/080505_BAA_National_Cyber_Range_Final.doc.Google Scholar
Defense Advanced Research Projects Agency (2012), ‘National Cyber Range rapidly emulates complex networks’, press release, 13 November, www.darpa.mil/NewsEvents/Releases/2012/11/13.aspx.Google Scholar
Defense Science Board (2013), Task Force Report: Resilient Military Systems and the Advanced Cyber Threat (Washington, DC: Department of Defense).Google Scholar
De Goede, Marieke (2008a), ‘The politics of preemption and the war on terror in Europe’, European Journal of International Relations 14, no. 1: 161–85.CrossRefGoogle Scholar
De Goede, Marieke (2008b), ‘Beyond risk: Premediation and the post-9/11 security imagination’, Security Dialogue 39, nos. 2–3: 155–76.CrossRefGoogle Scholar
De Goede, Marieke and de Graaf, Beatrice (2013), ‘Sentencing risk: Temporality and precaution in terrorism trials’, International Political Sociology 7, no. 3: 313–31.CrossRefGoogle Scholar
De Goede, Marieke and Randalls, Samuel (2009), ‘Precaution, preemption: Arts and technologies of the actionable future’, Environment and Planning D: Society and Space 27, no. 5: 859–78.CrossRefGoogle Scholar
Deibert, Ronald J. (1997), Parchment, Printing, and Hypermedia: Communication in World Order Transformation (New York: Columbia University Press).Google Scholar
Deibert, Ronald J. (1999), ‘Harold Innis and the Empire of Speed’, Review of International Studies 25, no. 2: 273–89.CrossRefGoogle Scholar
Deibert, Ronald J. (2003), ‘Black code: Censorship, surveillance, and the militarisation of cyberspace’, Millennium: Journal of International Studies 32, no. 3: 501–30.Google Scholar
Deibert, Ronald J. (2008), ‘Black code redux: Censorship, surveillance, and the militarization of cyberspace’, in Digital Media and Democracy: Tactics in Hard Times, ed. Boler, Megan (Cambridge, MA: MIT Press), 137–62.Google Scholar
Deibert, Ronald J. (2012), ‘The growing dark side of cyberspace (… and what to do about it)’, Penn State Journal of Law and International Affairs 1, no. 2: 260–74.Google Scholar
Deibert, Ronald J. and Crete-Nishihata, Masashi (2012), ‘Global governance and the spread of cyberspace controls’, Global Governance 18, no. 3: 339–61.CrossRefGoogle Scholar
Deibert, Ronald J. and Rohozinski, Rafal (2011), ‘The new cyber military industrial complex’, The Globe and Mail, 28 March, www.theglobeandmail.com/commentary/the-new-cyber-military-industrial-complex/article573990/.Google Scholar
DeLanda, Manuel (2006), A New Philosophy of Society: Assemblage Theory and Social Complexity (London: Continuum).Google Scholar
DeLashmutt, Michael W. (2006), ‘A better life through information technology? The techno-theological eschatology of posthuman speculative science’, Zygon 41, no. 2: 267–88.CrossRefGoogle Scholar
De Leeuw, Karl and Bergstra, Jan, ed. (2007), The History of Information Security: A Comprehensive Handbook (Amsterdam: Elsevier).Google Scholar
Deleuze, Gilles and Guattari, Félix (2004) [1980], Capitalism and Schizophrenia, vol. II, A Thousand Plateaus, tr. Massumi, Brian (London: Continuum).Google Scholar
De Mul, Jos (1999), ‘The informatization of the worldview’, Information, Communication and Society 2, no. 1: 6994.CrossRefGoogle Scholar
Dennett, Daniel C. (2000), ‘Making tools for thinking’, in Metarepresentations: A Multidisciplinary Perspective, ed. Sperber, Dan (New York: Oxford University Press), 1729.CrossRefGoogle Scholar
Denning, Dorothy (2003), ‘Cyber-security as an emergent infrastructure’, in Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security, ed. Latham, Robert (New York: The New Press), 2548.Google Scholar
Denning, Peter J. and Frailey, Dennis J. (2011), ‘Who are we—Now?’, Communications of the ACM 54, no. 6: 25–7.CrossRefGoogle Scholar
Department for Culture, Media and Sport (2013), ‘Stimulating private sector investment to achieve a transformation in broadband in the UK by 2015’, 27 February, www.gov.uk/government/policies/transforming-uk-broadband.Google Scholar
Department for Education (2012), ‘“Harmful” ICT curriculum set to be dropped to make way for rigorous computer science’, press release, 11 January, www.gov.uk/government/news/harmful-ict-curriculum-set-to-be-dropped-to-make-way-for-rigorous-computer-science.Google Scholar
Department for Education (2013) ‘Consultation on computing and disapplication of the current national curriculum’, 3 May, http://webarchive.nationalarchives.gov.uk/20130904084020/https://www.education.gov.uk/schools/teachingandlearning/curriculum/nationalcurriculum2014/a00224578/consultation.Google Scholar
Der Derian, James (1990), ‘The (s)pace of international relations: Simulation, surveillance, and speed’, International Studies Quarterly 34, no. 3: 295310.CrossRefGoogle Scholar
Der Derian, James (1992), Antidiplomacy: Spies, Terror, Speed and War (Oxford: Blackwell).Google Scholar
Der Derian, James (1999), ‘The conceptual cosmology of Paul Virilio’, Theory, Culture and Society 16, nos. 5–6: 215–27.CrossRefGoogle Scholar
Der Derian, James (2001), ‘Global events, national security, and virtual theory’, Millennium: Journal of International Studies 30, no. 3: 669–90.Google Scholar
Der Derian, James (2002), ‘Virtuous war/virtual theory’, International Affairs 76, no. 4: 771–88.Google Scholar
Der Derian, James (2003), ‘The question of information technology in International Relations’, Millennium: Journal of International Studies 32, no. 3: 441–56.Google Scholar
Der Derian, James (2009a) [2001], Virtuous War: Mapping the Military-Industrial-Media-Entertainment Network, 2nd edn (New York: Routledge).CrossRefGoogle Scholar
Der Derian, James (2009b), ‘Paul Virilio’, in Critical Theorists and International Relations, ed. Edkins, Jenny and Vaughan-Williams, Nick (Abingdon: Routledge), 330–40.Google Scholar
Der Derian, James and Finkelstein, Jesse (2008), ‘Critical infrastructures and network pathologies: The Semiotics and Biopolitics of Heteropolarity’, in Securing ‘the Homeland’: Critical Infrastructure, Risk and (In)security, ed. Cavelty, Myriam Dunn and Kristensen, Kristian Søby (London: Routledge), 84105.Google Scholar
Derrida, Jacques (1984), ‘No apocalypse, not now (full speed ahead, seven missiles, seven missives)’, Diacritics 14, no. 2: 2031.CrossRefGoogle Scholar
Devji, Faisal (2005), Landscapes of the Jihad: Militancy, Morality, Modernity (London: Hurst & Company).Google Scholar
Díaz-Andreu, Margarita (1996), ‘Constructing identities through culture: The past in the forging of Europe’, in Cultural Identity and Archaeology: The Construction of European Communities, ed. Graves-Brown, Paul, Jones, Siân and Gamble, Clive (London: Routledge), 4861.Google Scholar
Dietrich, Rainer, Klein, Wolfgang and Noyau, Colette (1995), The Acquisition of Temporality in a Second Language (Amsterdam: John Benjamins Publishing Company).CrossRefGoogle Scholar
Dillon, Michael (1996), Politics of Security: Towards a Political Philosophy of Continental Thought (London: Routledge).CrossRefGoogle Scholar
Dillon, Michael (2002), ‘Network society, network-centric warfare and the state of emergency’, Theory, Culture and Society 19, no. 4: 71–9.CrossRefGoogle Scholar
Dillon, Michael (2003a), ‘Virtual security: A life science of (dis)order’, Millennium: Journal of International Studies 32, no. 3: 531–58.Google Scholar
Dillon, Michael (2003b), ‘Intelligence incarnate: Martial corporeality in the digital age’, Body and Society 9, no. 4: 123–47.CrossRefGoogle Scholar
Dillon, Michael (2004), ‘The security of governance’, in Global Governmentality: Governing International Spaces, ed. Larner, Wendy and Walters, William (Abingdon: Routledge, 2004), 7694.Google Scholar
Dillon, Michael (2011), ‘Specters of biopolitics: Finitude, eschaton, and katechon’, South Atlantic Quarterly 110, no. 3: 780–92.CrossRefGoogle Scholar
Dillon, Michael and Lobo-Guerrero, Luis (2009), ‘The biopolitical imaginary of species-being’, Theory, Culture and Society 26, no. 1: 123.CrossRefGoogle Scholar
Dillon, Michael and Reid, Julian (2001), ‘Global liberal governance: Biopolitics, security and war’, Millennium: Journal of International Studies 30, no. 1: 4166.CrossRefGoogle Scholar
Dillon, Michael and Reid, Julian (2009), The Liberal Way of War: Killing to Make Life Live (London: Routledge).CrossRefGoogle Scholar
Dimitrov, Radoslav S. (2010), ‘Inside Copenhagen: The state of climate governance’, Global Environmental Politics 10, no. 2: 1824.CrossRefGoogle Scholar
Doctorow, Cory and Stross, Charles (2012), The Rapture of the Nerds (New York: Tor Books).Google Scholar
Dodge, Martin and Kitchin, Rob (2004), ‘Charting movement: Mapping internet infrastructures’, in Moving People, Goods, and Information in the 21st Century: The Cutting-Edge Infrastructures of Networked Cities, ed. Hanley, Richard E. (New York: Routledge), 159–85.Google Scholar
D’Ottavi, Alberto (2003), ‘Firewall pioneer: Security needs integration’, Zone-H, 4 February, www.zone-h.org/news/id/2058.Google Scholar
Dover, Robert and Goodman, Michael S., ed. (2011), Learning from the Secret Past: Cases in British Intelligence History (Washington, DC: Georgetown University Press).Google Scholar
Duncan, James (1993), ‘Sites of representation: Place, time and the discourse of the other’, in Place/Culture/Representation, ed. Duncan, James and Ley, David (London: Routledge), 3956.Google Scholar
Dunn, Myriam (2007), ‘Securing the digital age: The challenges of complexity for critical infrastructure protection and IR theory’, in International Relations and Security in the Digital Age, ed. Eriksson, Johan and Giacomello, Giampiero (London: Routledge), 85105.Google Scholar
Dunn, Myriam and Mauer, Victor (2006), ‘Towards a global culture of cyber-security’, in The International CIIP Handbook 2006, vol. II: Analyzing Issues, Challenges, and Prospects, ed. Dunn, Myriam and Mauer, Victor (Zurich: Swiss Federal Institute of Technology), 189206.Google Scholar
Dunn, Myriam and Mauer, Victor (2007), ‘The role of the state in securing the information age—Challenges and prospects’, in Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, ed. Cavelty, Myriam Dunn, Mauer, Victor and Krishna-Hensel, Sai Felicia (Aldershot: Ashgate), 151–62.Google Scholar
Dunn Cavelty, Myriam (2007), ‘Cyber-terror—Looming threat or phantom menace? The framing of the US cyber-threat debate’, Journal of Information Technology and Politics 4, no. 1: 1936.CrossRefGoogle Scholar
Dunn Cavelty, Myriam (2008), Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (London: Routledge).Google Scholar
Dunn Cavelty, Myriam (2013), ‘From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse’, International Studies Review 15, no. 1: 105–22.CrossRefGoogle Scholar
Dunn Cavelty, Myriam (2014), ‘Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities’, Science and Engineering Ethics 20, no. 3: 701–15.CrossRefGoogle ScholarPubMed
Dunn Cavelty, Myriam and Giroux, Jennifer (2015), ‘The good, the bad, and the sometimes ugly: Complexity as both threat and opportunity in the vital systems security discourse’, in World Politics at the Edge of Chaos: Reflections on Complexity and Global Life, ed. Kavalski, Emilian (Albany, NY: SUNY Press), 209–27.Google Scholar
Dunn Cavelty, Myriam and Kristensen, Kristian Søby (2008), ‘Introduction: Securing the homeland: Critical infrastructure, risk and (in)security’, in Securing ‘the Homeland’: Critical Infrastructure, Risk and (In)security, ed. Cavelty, Myriam Dunn and Kristensen, Kristian Søby (London: Routledge), 114.Google Scholar
Dunn Cavelty, Myriam and Suter, Manuel (2012), ‘The art of CIIP strategy: Taking stock of content and processes’, in Critical Information Infrastructure Protection, ed. Lopez, Javier, Setola, Robert and Wolthusen, Stephen D. (Berlin: Springer-Verlag), 1538.CrossRefGoogle Scholar
Dutil, Patrice (2014), ‘Paths, precedents, parallels and pendulums: The uses of the past in public policy and administration’, Canadian Public Administration 57, no. 3: 419–35.CrossRefGoogle Scholar
Dyer, Geoff (2012), ‘Panetta warns US of “cyber Pearl Harbor”’, FT.com, 12 October, www.ft.com/cms/s/0/6c06b03a-1423-11e2-9ac6-00144feabdc0.html#axzz2PsqYDZXx.Google Scholar
Eckler, A. Ross (1972), The Bureau of the Census (New York: Praeger Publishers).Google Scholar
Eddington, Arthur S. (1928), The Nature of the Physical World (New York: Macmillan).Google Scholar
Edelman, Murray (1964), The Symbolic Uses of Politics (Urbana, IL: University of Illinois Press).Google Scholar
Edwards, Paul N. (1996), The Closed World: Computers and the Politics of Discourse in Cold War America (Cambridge, MA: MIT Press).Google Scholar
Eliot, T.S. (1971) [1943], ‘Burnt Norton’, Four Quartets (San Diego, CA: Harvest).Google Scholar
Ellis, Stephen (2011), Season of Rains: Africa in the World (London; Hurst & Company).Google Scholar
Elzen, Boelie and MacKenzie, Donald (1994), ‘The social limits of speed: The development and use of supercomputers’, IEEE Annals of the History of Computing 16, no. 1: 4661.CrossRefGoogle Scholar
English, Richard (2009), Terrorism: How to Respond (Oxford University Press).Google Scholar
ENISA (2012), On National and International Cyber Security Exercises: Survey, Analysis and Recommendations (Heraklion: ENISA).Google Scholar
Enloe, Cynthia (2011), ‘The mundane matters’, International Political Sociology 5, no. 4: 447–50.CrossRefGoogle Scholar
Epstein, Keith (2009), ‘Fearing “Cyber Katrina”, Obama candidate for cyber czar urges a “FEMA for the internet”’, Bloomberg Businessweek, 18 February, www.businessweek.com/the_thread/techbeat/archives/2009/02/fearing_cyber_k.html.Google Scholar
Erikson, Kai (1994), A New Species of Trouble: The Human Experience of Modern Disasters (New York: W.W. Norton & Company).Google Scholar
Eriksson, Johan (2001), ‘Cyberplagues, IT, and security: Threat politics in the information age’, Journal of Contingencies and Crisis Management 9, no. 4: 211–22.CrossRefGoogle Scholar
Eriksson, Johan and Giacomello, Giampiero (2007), ‘Introduction: Closing the gap between International Relations theory and studies of digital-age security’, in International Relations and Security in the Digital Age, ed. Eriksson, Johan and Giacomello, Giampiero (London: Routledge), 128.CrossRefGoogle Scholar
e-skills UK (n.d.), ‘Cyber security in schools: Cyber ninjas keep Cyber City secure’, www.infosecurityeurope.com/__novadocuments/28345?v=635018761162070000.Google Scholar
e-skills UK (2013), Career Analysis into Cyber Security: New and Evolving Occupations (London: e-skills UK).Google Scholar
Euben, Roxanne L. (1999), Enemy in the Mirror: Islamic Fundamentalism and the Limits of Modern Rationalism (Princeton University Press).Google Scholar
Fabian, Johannes (2002) [1983], Time and the Other: How Anthropology Makes Its Object (New York: Columbia University Press).Google Scholar
Farrell, Theo (1996), ‘Figuring out fighting organisations: The new organisational analysis in strategic studies’, Journal of Strategic Studies 19, no. 1: 122–35.CrossRefGoogle Scholar
Farrell, Theo (2002), ‘Constructivist security studies: Portrait of a research program’, International Studies Review 4, no. 1: 4972.CrossRefGoogle Scholar
Farwell, James P. and Rohozinski, Rafal (2011), ‘Stuxnet and the future of cyber war’, Survival 53, no. 1: 2340.CrossRefGoogle Scholar
Fawaz, Mona and Akar, Hiba Bou (2012), ‘Practicing (in)security in the city’, City and Society 24, no. 2: 105–9.CrossRefGoogle Scholar
Featherstone, Mark (2010), ‘Virilio’s apocalypticism’, CTheory, 16 September, www.ctheory.net/articles.aspx?id=662.Google Scholar
Federal Civil Defense Administration (1955a), Cue For Survival: Operation Cue (Washington, DC: US Government Printing Office).Google Scholar
Federal Civil Defense Administration (1955b), ‘Operation Cue’, film, 15 minutes, http://archive.org/details/Operatio1955.Google Scholar
Feldman, Stanley and Sigelman, Lee (1985), ‘The political impact of prime-time television: “The Day After”’, The Journal of Politics 47, no. 2: 556–78.CrossRefGoogle Scholar
Fink, Glenn A., Haack, Jereme N., McKinnon, A. David and Fulp, Errin W. (2014), ‘Defense on the move: Ant-based cyber defense’, IEEE Security and Privacy 12, no. 2: 3643.CrossRefGoogle Scholar
Fisher, Kathryn Marie (2013), ‘Exploring the temporality in/of British counterterrorism law and lawmaking’, Critical Studies on Terrorism 6, no. 1: 5072.CrossRefGoogle Scholar
Fletcher, Paul (2004), ‘The political theology of the empire to come’, Cambridge Review of International Affairs 17, no. 1: 4961.CrossRefGoogle Scholar
Floridi, Luciano (1995), ‘Internet: Which future for organized knowledge, Frankenstein or Pygmalion?’, International Journal of Human-Computer Studies 43, no. 2: 261–74.CrossRefGoogle Scholar
Floridi, Luciano (2011), The Philosophy of Information (Oxford University Press).CrossRefGoogle Scholar
Floridi, Luciano (2012), ‘Hyperhistory and the philosophy of information policies’, Philosophy and Technology 25, no. 2: 129–31.CrossRefGoogle Scholar
Floridi, Luciano (2014), ‘The latent nature of global information warfare’, Philosophy and Technology 27, no. 3: 317–19.CrossRefGoogle Scholar
Folger, Tim (2007), ‘Newsflash: Time may not exist’, Discover Magazine, June, http://discovermagazine.com/2007/jun/in-no-time.Google Scholar
Forsee, Aylesa (1963), Albert Einstein: Theoretical Physicist (New York: Macmillan).Google Scholar
Forsyth, James Wood Jr (2013), ‘What great powers make it: International order and the logic of cooperation in cyberspace’, Strategic Studies Quarterly 7, no. 1: 93113.Google Scholar
Foucault, Michel (1984), ‘What is Enlightenment?’, in The Foucault Reader, ed. Rabinow, Paul (New York: Pantheon Books), 3250.Google Scholar
Foucault, Michel (1986), ‘Of other spaces’, Diacritics 16, no. 1: 22–7.CrossRefGoogle Scholar
Foucault, Michel (2002) [1966], The Order of Things: An Archaeology of the Human Sciences (London: Routledge).Google Scholar
Fox, Robin (2001), ‘Time out of mind: Anthropological reflections on temporality’, KronoScope 1, nos. 1–2: 129–37.CrossRefGoogle Scholar
Frank, Adam (2011), About Time (Oxford: Oneworld).Google ScholarPubMed
Fraser, J.T. (1992), ‘Human temporality in a nowless universe’, Time and Society 1, no. 2: 159–73.CrossRefGoogle Scholar
Fraser, J.T. (1999), Time, Conflict, and Human Values (Urbana, IL: University of Illinois Press).Google Scholar
Fraser, J.T. (2001), ‘The extended umwelt principle: Uexküll and the nature of time’, Semiotica 134, nos. 1–4: 263–73.Google Scholar
Fraser, J.T. (2003), ‘Time felt, time understood’, KronoScope 3, no. 1: 1526.CrossRefGoogle Scholar
Fraser, J.T. (2005), ‘Space-time in the study of time: An exercise in critical interdisciplinarity’, KronoScope 5, no. 2: 151–75.CrossRefGoogle Scholar
Freedman, Lawrence (1981), The Evolution of Nuclear Strategy (Basingstoke: Macmillan Press).Google Scholar
Friedman, Milton (1961), ‘The lag in effect of monetary policy’, Journal of Political Economy 69, no. 5: 447–66.CrossRefGoogle Scholar
Frost and Sullivan (2013), The 2013 (ISC)2 Global Information Security Workforce Study (Mountain View, CA: Frost and Sullivan).Google Scholar
Fulghum, David A. (2010), ‘No fingerprints: Culprits in the cyberattack on Iran are still unknown’, Aviation Week and Space Technology 172, no. 36: 2930.Google Scholar
Fuller, Steve (2002) [1988], Social Epistemology, 2nd edn (Bloomington, IN: Indiana University Press).Google Scholar
Furber, Stephen B. (1989), VLSI RISC Architecture and Organization (New York: Marcel Dekker).Google Scholar
Furedi, Frank (2006) [1997], Culture of Fear Revisited: Risk-Taking and the Morality of Low Expectation, 4th edn (London: Continuum).Google Scholar
Gable, Kelly A. (2010), ‘Cyber-apocalypse now: Securing the internet against cyberterrorism and using universal jurisdiction as a deterrent’, Vanderbilt Journal of Transnational Law 43: 57118.Google Scholar
Galison, Peter (2003), Einstein’s Clocks, Poincaré’s Maps: Empires of Time (New York: W.W. Norton & Company).Google Scholar
Galison, Peter and Hevly, Bruce, ed. (1992), Big Science: The Growth of Large-Scale Research (Stanford University Press).Google Scholar
Gane, Nicholas (2006), ‘Speed up or slow down? Social theory in the information age’, Information, Communication and Society 9, no. 1: 2038.CrossRefGoogle Scholar
Gannon, Charles E. (2009), ‘Imag(in)ing tomorrow’s wars and weapons’, Peace Review: A Journal of Social Justice 21, no. 2: 198208.CrossRefGoogle Scholar
Garamone, Jim (2009), ‘Lynn calls for collaboration in establishing cyber security’, American Forces Press Service, 1 October.Google Scholar
Garber, Megan (2013), ‘The future of cybersecurity could be sitting in an office in New Jersey’, The Atlantic, 4 January, www.theatlantic.com/technology/archive/2013/01/the-future-of-cybersecurity-could-be-sitting-in-an-office-in-new-jersey/266849/.Google Scholar
Gardham, Duncan (2009), ‘Hackers hired to halt attacks on Britain by cyber terrorists’, The Daily Telegraph, 26 June.Google Scholar
Garrison, Dee (2006), Bracing for Armageddon: Why Civil Defense Never Worked (New York: Oxford University Press).CrossRefGoogle Scholar
Gartner (2014), ‘Gartner says worldwide information security spending will grow almost 8 percent in 2014 as organizations become more threat-aware’, 22 August, www.gartner.com/newsroom/id/2828722.Google Scholar
Geers, Kenneth (2009), ‘The cyber threat to national critical infrastructures: Beyond theory’, Information Security Journal: A Global Perspective 18, no. 1: 17.Google Scholar
Geers, Kenneth (2010), ‘Live fire exercise: Preparing for cyber war’, Journal of Homeland Security and Emergency Management 7, no. 1, article 74.CrossRefGoogle Scholar
Gell, Alfred (1992), The Anthropology of Time: Cultural Constructions of Temporal Maps and Images (Oxford: Berg).Google Scholar
Gellner, Ernest (1988), Plough, Sword and Book: The Structure of Human History (London: Collins Harvill).Google Scholar
Gerovitch, Slava (2008), ‘InterNyet: Why the Soviet Union did not build a nationwide computer network’, History and Technology 24, no. 4: 335–50.CrossRefGoogle Scholar
Gertz, Bill (1998), ‘Computer hackers could disable military’, The Washington Times, 16 April.Google Scholar
Gibbs, Samuel (2014), ‘Eugene Kaspersky: Major cyberterrorist attack is only a matter of time’, The Guardian, 1 May, www.theguardian.com/technology/2014/may/01/eugene-kaspersky-major-cyberterrorist-attack-uk.Google Scholar
Gibson, William (1984), Neuromancer (London: HarperCollins).Google Scholar
Giddens, Anthony (1984), The Constitution of Society: Outline of a Theory of Structuration (Berkeley, CA: University of California Press).Google Scholar
Gill, Stanley (1951), ‘The diagnosis of mistakes in programmes on the EDSAC’, Proceedings of the Royal Society A 206, no. 1087: 538–54.Google Scholar
Gjelten, Tom (2011), ‘Stuxnet raises “blowback” risk in cyberwar’, NPR.org, 2 November, www.npr.org/2011/11/02/141908180/stuxnet-raises-blowback-risk-in-cyberwar.Google Scholar
Gjertsen, Derek (1989), Science and Philosophy: Past and Present (London: Penguin Books).Google Scholar
Glennie, Paul and Thrift, Nigel (2009), Shaping the Day: A History of Timekeeping in England and Wales 1300–1800 (Oxford University Press).CrossRefGoogle Scholar
Glenny, Misha (2011), ‘Virtual warfare in race to avoid “doomsday”’, The Guardian, 17 May.Google Scholar
Glenny, Misha and Kavanagh, Camino (2012), ‘800 titles but no policy—Thoughts on cyber warfare’, American Foreign Policy Interests 34, no. 6: 287–94.CrossRefGoogle Scholar
Glezos, Simon (2012), The Politics of Speed: Capitalism, the State and War in an Accelerating World (London: Routledge).Google Scholar
Golding, Peter (2000), ‘Forthcoming features: Information and communications technologies and the sociology of the future’, Sociology 34, no. 1: 165–84.CrossRefGoogle Scholar
Goldman, Alvin I. (1999), Knowledge in a Social World (Oxford University Press).CrossRefGoogle Scholar
Goldsmith, Jack and Hathaway, Melissa (2010), ‘The cybersecurity changes we need’, Washington Post, 29 May.Google Scholar
Goodman, Michael S. (2014), The Official History of the Joint Intelligence Committee, vol. I: From the Approach of the Second World War to the Suez Crisis (Abingdon: Routledge).CrossRefGoogle Scholar
Goodman, Seymour E., Kirk, Jessica C. and Kirk, Megan H. (2007), ‘Cyberspace as a medium for terrorists’, Technological Forecasting and Social Change 74, no. 2: 193210.CrossRefGoogle Scholar
Gordon, Uri (2009), ‘Anarchism and the politics of technology’, WorkingUSA: The Journal of Labor and Society 12, no. 3: 489503.CrossRefGoogle Scholar
Gould, Stephen Jay (1987), Time’s Arrow, Time’s Cycle: Myth and Metaphor in the Discovery of Geological Time (Cambridge, MA: Harvard University Press).Google Scholar
Government Office for Science (2011), Blackett Review of High Impact Low Probability Risks (London: Department of Business, Innovation and Skills).Google Scholar
Graham, Bradley (1998), ‘US studies new threat: Cyber attack’, The Washington Post, 24 May.Google Scholar
Graham, Philip (2001), ‘Space: Irrealis objects in technology policy and their role in a new political economy’, Discourse and Society 12, no. 6: 761–88.CrossRefGoogle Scholar
Graham, Stephen and Marvin, Simon (2001), Splintering Urbanism: Networked Infrastructures, Technological Mobilities and the Urban Condition (London: Routledge).Google Scholar
Graham, Stephen and Thrift, Nigel (2007), ‘Out of order: Understanding repair and maintenance’, Theory, Culture and Society 24, no. 3: 125.CrossRefGoogle Scholar
Gramsci, Antonio (1973) [1929], Letters from Prison (New York: Harper Row).Google Scholar
Gray, John (2007), Black Mass: Apocalyptic Religion and the Death of Utopia (London: Allen Lane).Google Scholar
Gray, John (2012), ‘The violent visions of Slavoj Žižek’, New York Review of Books, 12 July, www.nybooks.com/articles/archives/2012/jul/12/violent-visions-slavoj-zizek/.Google Scholar
Gray, John (2013), ‘Ignore at our peril’, The Guardian, 2 February.Google Scholar
Greenberg, Stanley (1998), Invisible New York: The Hidden Infrastructure of the City (Baltimore, MD: Johns Hopkins University Press).CrossRefGoogle Scholar
Greene, Brian (1999), The Elegant Universe: Superstrings, Hidden Dimensions, and the Quest for the Ultimate Theory (London: Jonathan Cape).Google Scholar
Greenwald, Glenn (2013), ‘Pentagon’s new massive expansion of “cyber-security” unit is about everything except defense’, The Guardian, 28 January, www.guardian.co.uk/commentisfree/2013/jan/28/pentagon-cyber-security-expansion-stuxnet.Google Scholar
Gregory, Donna U. (1989), ‘The dictator’s furnace’, Peace Review: A Journal of Social Justice 1, no. 1: 12–6.CrossRefGoogle Scholar
Grier, David Alan (2005), When Computers Were Human (Princeton University Press).Google Scholar
Gross, Michael Joseph (2011), ‘A declaration of cyber-war’, Vanity Fair, April, www.vanityfair.com/culture/features/2011/04/stuxnet-201104.Google Scholar
Grubesic, Tony H. and Murray, Alan T. (2006), ‘Vital nodes, interconnected infrastructures, and the geographies of network survivability’, Annals of the Association of American Geographers 96, no. 1: 6484.CrossRefGoogle Scholar
Grusin, Richard (2010a), Premediation: Affect and Mediality After 9/11 (Basingstoke: Palgrave Macmillan).CrossRefGoogle Scholar
Grusin, Richard (2010b), ‘Cyber Shock Wave—Fearmongering on CNN’, Premediation, 25 February, http://premediation.blogspot.co.uk/2010/02/cyber-shock-wave-fearmongering-on-cnn.html.Google Scholar
Grzymala-Busse, Anna (2011), ‘Time will tell? Temporality and the analysis of causal mechanisms and processes’, Comparative Political Studies 44, no. 9: 1267–97.CrossRefGoogle Scholar
Guernsey, Daniel, Rice, Mason and Shenoi, Sujeet (2012), ‘Implementing novel reactive defense functionality in MPLS networks using hyperspeed signalling’, International Journal of Critical Infrastructure Protection 5, no. 1: 4052.CrossRefGoogle Scholar
Guitton, Clement (2013), ‘Cyber insecurity as a national threat: Overreaction from Germany, France and the UK?’, European Security 22, no. 1: 2135.CrossRefGoogle Scholar
Gusterson, Hugh (1999), ‘Missing the end of the Cold War in international security’, in Cultures of Insecurity: States, Communities, and the Production of Danger, ed. Weldes, Jutta, Laffey, Mark, Gusterson, Hugh and Duvall, Raymond (Minneapolis, MN: University of Minnesota Press), 319–45.Google Scholar
Guthrie, W.K.C. (1978), A History of Greek Philosophy, vol. V: The Later Plato and the Academy (Cambridge University Press).Google Scholar
Guzzini, Stefano (2000), ‘A reconstruction of constructivism in International Relations’, European Journal of International Relations 6, no. 2: 147–82.CrossRefGoogle Scholar
Haas, Peter M. (1989), ‘Do regimes matter? Epistemic communities and Mediterranean pollution control’, International Organization 43, no. 3: 377403.CrossRefGoogle Scholar
Haas, Peter M. (1992), ‘Introduction: Epistemic communities and international policy coordination’, International Organization 46, no. 1: 135.CrossRefGoogle Scholar
Hacking, Ian (1999), The Social Construction of What? (Cambridge, MA: Harvard University Press).Google Scholar
Haimes, Yacov Y., Crowther, Kenneth and Horowitz, Barry M. (2008), ‘Homeland security preparedness: Balancing protection with resilience in emergent systems’, Systems Engineering 11, no. 4: 287308.CrossRefGoogle Scholar
Halbert, Debora (1997), ‘Discourses of danger and the computer hacker’, The Information Society 13, no. 4: 361–74.CrossRefGoogle Scholar
Hall, Wayne M. (2003), Stray Voltage: War in the Information Age (Annapolis, MD: Naval Institute Press).Google Scholar
Hansen, Lene and Nissenbaum, Helen (2009), ‘Digital disaster, cyber security, and the Copenhagen School’, International Studies Quarterly 53, no. 4: 1155–75.CrossRefGoogle Scholar
Haraway, Donna (1991), ‘A cyborg manifesto: Science, technology, and socialist-feminism in the late twentieth century’, Simians, Cyborgs and Women: The Reinvention of Nature (New York: Routledge), 149–81.Google Scholar
Haraway, Donna (1997), Modest Witness@Second_Millennium: Female_Man©_Meets OncomouseTM: Feminism and Technoscience (New York: Routledge).Google Scholar
Harknett, Richard J. (2011), ‘Thinking about how to think about cybersecurity’, 15th Karlsruhe Dialogues: Caught In the Net? Global Google-Cultures, Karlsruhe Institute of Technology, Karlsruhe, Germany, 11–13 February.Google Scholar
Harknett, Richard A. and Stever, James A. (2009), ‘The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen’, Journal of Homeland Security and Emergency Management 6, no. 1, DOI:10.2202/1547-7355.1649.CrossRefGoogle Scholar
Harknett, Richard A. and Stever, James A. (2011), ‘The new policy world of cybersecurity’, Public Administration Review 71, no. 3: 455–60.CrossRefGoogle Scholar
Harman, Graham (2010a), ‘I am also of the opinion that materialism must be destroyed’, Environment and Planning D: Society and Space 28, no. 5: 772–90.CrossRefGoogle Scholar
Harman, Graham (2010b), ‘Technology, objects and things in Heidegger’, Cambridge Journal of Economics 34, no. 1: 1725.CrossRefGoogle Scholar
Harris, Jose (1993), Private Lives, Public Spirit: Britain 1870–1914 (London: Penguin Books).Google Scholar
Harris, Paul (2011), ‘Living with 9/11: The anti-terror chief’, The Guardian, 6 September.Google Scholar
Hartnett, Stephen John (2011), ‘Google and the “twisted cyber spy” affair: US-Chinese communication in an age of globalization’, Quarterly Journal of Speech 97, no. 4: 411–34.CrossRefGoogle Scholar
Harvey, David (1990), The Condition of Postmodernity: An Enquiry Into the Origins of Cultural Change (Cambridge, MA: Blackwell).Google Scholar
Hassan, Robert (2007), ‘Network time’, in Hassan, and Purser, (ed.), 3761.CrossRefGoogle Scholar
Hassan, Robert (2009), Empires of Speed: Time and the Acceleration of Politics and Society (Leiden: Brill).CrossRefGoogle Scholar
Hassan, Robert (2010), ‘Globalization and the “temporal turn”: Recent trends and issues in time studies’, The Korean Journal of Policy Studies 25, no. 2: 83102.Google Scholar
Hassan, Robert and Purser, Ronald E., ed. (2007), 24/7: Time and Temporality in the Network Society (Stanford, CA: Stanford Business Books).CrossRefGoogle Scholar
Hayden, Michael V. (2011), speech, Aspen Security Forum, Aspen, CO, 29 July, www.youtube.com/watch?v=yoWkAVXmSs0.Google Scholar
Healey, Jason (2011), The Five Futures of Cyber Conflict and Cooperation (Washington, DC: Atlantic Council).Google Scholar
Healey, Jason (2012), ‘Hazard, outrage and Panetta’s cyber speech’, New Atlanticist, 23 October, www.atlanticcouncil.org/blogs/new-atlanticist/hazard-outrage-and-panettas-cyber-speech.Google Scholar
Healey, Jason, ed. (2013), A Fierce Domain: Conflict in Cyberspace, 1986–2012 (Washington, DC: Atlantic Council).Google Scholar
Heidegger, Martin (1995) [1929–1930], The Fundamental Concepts of Metaphysics: World, Finitude, Solitude, trs. McNeill, William and Walker, Nicholas (Bloomington, IN: Indiana University Press).Google Scholar
Heidegger, Martin (2010) [1927], Being and Time, rev. edn, tr. Stambaugh, Joan (Albany, NY: State University of New York Press).Google Scholar
Heim, Michael (1993), The Metaphysics of Virtual Reality (New York: Oxford University Press).Google Scholar
Hellström, Tomas (2003), ‘Systemic innovation and risk: Technology assessment and the challenge of responsible innovation’, Technology in Society 25, no. 3: 369–84.CrossRefGoogle Scholar
Hellström, Tomas (2007), ‘Critical infrastructure and systemic vulnerability: Towards a planning framework’, Safety Science 45, no. 3: 415–30.CrossRefGoogle Scholar
Helm, Bertrand P. (2001), ‘Review: J.T. Fraser, Time, Conflict, and Human Values’, The Journal of Speculative Philosophy 15, no. 1: 50–6.CrossRefGoogle Scholar
Heywood, Andrew (2000), Key Concepts in Politics (Basingstoke: Palgrave Macmillan).Google Scholar
Highland, Harold Joseph (1983), ‘Impact of microcomputers on total computer security’, Computers and Security 2, no. 2: 171–83.CrossRefGoogle Scholar
Hildreth, Steven A. (2001), Cyberwarfare (Washington, DC: Congressional Research Service).Google Scholar
Hindess, Barry (2007), ‘The past is another culture’, International Political Sociology 1, no. 4: 325–38.CrossRefGoogle Scholar
HM Government (1955), Annual Report of the Chief of Inspector of Factories for the Year 1954 (London: HMSO).Google Scholar
HM Government (2000), A New Future for Communications (London: HMSO).Google Scholar
HM Government (2009a), Digital Britain: Final Report (Norwich: The Stationery Office).Google Scholar
HM Government (2009b), Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space (Norwich: The Stationery Office).Google Scholar
HM Government (2010a), Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review (Norwich: The Stationery Office).Google Scholar
HM Government (2010b), Britain’s Superfast Broadband Future (London: Department for Business, Innovation and Skills).Google Scholar
HM Government (2013), The Coalition: Together in the National Interest (London: Cabinet Office).Google Scholar
HM Government (2014a), Cyber Security Skills: Business Perspectives and Government’s Next Steps (London: Department for Business, Innovation and Skills).Google Scholar
HM Government (2014b), Developing Our Capability in Cyber Security: Academic Centres of Excellence in Cyber Security Research (London: Department for Business, Innovation and Skills).Google Scholar
Hobbes, Thomas (1996) [1651], Leviathan, ed. Tuck, Richard, rev. edn (Cambridge University Press).Google Scholar
Hobbes, Thomas (1998) [1642], On the Citizen, ed. Tuck, Richard and Silverthorne, Michael (Cambridge University Press).Google Scholar
Hobsbawm, Eric (2013), ‘The American cowboy: An international myth?’, Fractured Times: Culture and Society in the 20th Century (London: Little, Brown), 272–89.Google Scholar
Hobson, John and Lawson, George (2008), ‘What is history in International Relations?’, Millennium: Journal of International Studies 37, no. 2: 415–35.Google Scholar
Hodder, Ian (2012), Entangled: An Archaeology of the Relationships between Humans and Things (Chichester: Wiley-Blackwell).CrossRefGoogle Scholar
Hoekstra, Peter and Finch, Brian (2013), ‘The looming certainty of a cyber Pearl Harbor’, Politico, 19 February, www.politico.com/story/2013/02/the-looming-certainty-of-a-cyber-pearl-harbor-87806.html.Google Scholar
Holquist, Michael (2010), ‘The fugue of chronotope’, in Bakhtin’s Theory of the Literary Chronotope: Reflections, Applications, Perspectives, ed. Bemong, Nele, Borghart, Pieter, de Dobbeleer, Michel, Demoen, Kristoffel, de Temmerman, Koen and Keunen, Bart (Ghent: Ginkgo Academia Press), 1933.Google Scholar
Holt, Thomas J. (2007), ‘Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures’, Deviant Behavior 28, no. 2: 171–98.CrossRefGoogle Scholar
Hom, Andrew R. (2010), ‘Hegemonic metronome: The ascendancy of Western standard time’, Review of International Studies 36, no. 4: 1145–70.CrossRefGoogle Scholar
Hom, Andrew R. and Steele, Brent J. (2010), ‘Open horizons: The temporal visions of reflexive realism’, International Studies Review 12, no. 2: 271300.CrossRefGoogle Scholar
Home Office (2010), Cyber Crime Strategy (Norwich: The Stationery Office).Google Scholar
Hoofd, Ingrid M. (2012), Ambiguities of Activism: Alter-Globalism and the Imperatives of Speed (New York: Routledge).CrossRefGoogle Scholar
Hook, Glenn D (1984), ‘The nuclearization of language: Nuclear allergy as political metaphor’, Journal of Peace Research 21, no. 3: 259–75.CrossRefGoogle Scholar
Hopf, Ted (1998), ‘The promise of constructivism in International Relations theory’, International Security 23, no. 1: 171200.CrossRefGoogle Scholar
Hopkins, Nick (2012), ‘Militarisation of cyberspace: Why the West fears the threat from China’s “cyber jedis”’, The Guardian, 17 April.Google Scholar
Hopkins, Nick (2013), ‘“Cyber jedi” schools contest a new hope for Britain’s IT empire to strike back’, The Guardian, 28 April, www.guardian.co.uk/technology/2013/apr/28/cyber-jedi-contest-britain-empire.Google Scholar
Hosein, Ian (2004), ‘The sources of laws: Policy dynamics in a digital and terrorized world’, The Information Society: An International Journal 20, no. 3: 187–99.CrossRefGoogle Scholar
Hoskins, Andrew (2006), ‘Temporality, proximity and security: Terror in a media-drenched age’, International Relations 20, no. 4: 453–66.CrossRefGoogle Scholar
Hoskins, Andrew (2011), ‘Media, memory, metaphor: Remembering and the connective turn’, Parallax 17, no. 4: 1931.CrossRefGoogle Scholar
Hoskins, Andrew and O’Loughlin, Ben (2010), War and Media: The Emergence of Diffused War (Cambridge: Polity).Google Scholar
House of Commons Committee of Public Accounts (2011), Information and Communications Technology in Government: Report, Together with Formal Minutes, Oral and Written Evidence (London: The Stationery Office).Google Scholar
House of Commons (1984), Minutes of Evidence, Select Committee on House of Commons (Services), Computer Sub-Committee, 24 January 1984.Google Scholar
House of Commons Defence Committee (2013), Defence and Cyber-Security, vol. I (London: The Stationery Office).Google Scholar
House of Lords (2010) [1862], Companion to the Standing Orders of and Guide to the Proceedings of the House of Lords, 22nd edn (Norwich: The Stationery Office).Google Scholar
House of Lords Select Committee on Science and Technology (2012), Higher Education in Science, Technology, Engineering and Mathematics (STEM) Subjects: Report (London: The Stationery Office).Google Scholar
Hughes, James J. (2012), ‘The politics of transhumanism and the techno-millennial imagination, 1626-2030’, Zygon: Journal of Religion and Science 47, no. 4: 757–76.CrossRefGoogle Scholar
Hughes, Michael and Wood, Harry (2014), ‘Crimson nightmares: Tales of invasion and fears of revolution in early twentieth-century Britain’, Contemporary British History 28, no. 3: 294317.CrossRefGoogle Scholar
Hughes, Rex (2010), ‘A treaty for cyberspace’, International Affairs 86, no. 2: 523–41.CrossRefGoogle Scholar
Hundley, Richard O. and Anderson, Robert H. (1995), ‘Emerging challenge: Security and safety in cyberspace’, IEEE Technology and Society 14, no. 4: 1928.CrossRefGoogle Scholar
Hunt, Edward (2012), ‘US government penetration programs and the implications for cyberwar’, IEEE Annals of the History of Computing 34, no. 3: 421.CrossRefGoogle Scholar
Huntington, Samuel P. (1968), Political Order in Changing Societies (New Haven, CT: Yale University Press).Google Scholar
Husserl, Edmund (1964) [1928], The Phenomenology of Internal Time-Consciousness, ed. Heidegger, Martin, tr. Churchill, James S. (The Hague: Martinus Nijhoff).Google Scholar
Hutchings, Kimberly (2007), ‘Happy anniversary! Time and critique in International Relations theory’, Review of International Studies 33, supplement S1: 7189.CrossRefGoogle Scholar
Hutchings, Kimberly (2008), Time and World Politics: Thinking the Present (Manchester University Press).CrossRefGoogle Scholar
Huysmans, Jef (1996), ‘Security! What do you mean? From concept to thick signifier’, European Journal of International Relations 4, no. 2: 226–55.Google Scholar
Huysmans, Jef (1997), ‘James Der Derian: The unbearable lightness of theory’, in The Future of International Relations: Masters in the Making?, ed. Neumann, Iver B. and Wæver, Ole (London: Routledge), 361–83.Google Scholar
Huyssen, Andreas (2003), Present Pasts: Urban Palimpsests and the Politics of Memory (Stanford University Press).CrossRefGoogle Scholar
Hynek, Nik and Chandler, David (2013), ‘No emancipatory alternative, no critical security studies’, Critical Studies on Security 1, no. 1: 4663.CrossRefGoogle Scholar
Information Assurance Advisory Council (2012), Record of a Joint IAAC/Cabinet Office Seminar―UK Cyber Security Strategy (Swindon: IAAC).Google Scholar
InfoSecurity (2013), ‘RSA 2013: As cybersecurity receives more attention, DHS becomes a critical player’, 26 February, www.infosecurity-magazine.com/view/30907/rsa-2013-as-cybersecurity-receives-more-attention-dhs-becomes-a-critical-player/.Google Scholar
Innes, Michael, ed. (2007), Denial of Sanctuary: Understanding Terrorist Safe Havens (Westport, CT: Praeger Security International).Google Scholar
Institute of Engineering and Technology (2011), Delivering London 2012: ICT Enabling the Games (Stevenage: The IET).Google Scholar
Institute of Engineering and Technology (2013), Delivering London 2012: ICT Implementation and Operations (Stevenage: The IET).Google Scholar
Intelligence and Security Committee (2012), Annual Report 2011–2012 (Norwich: The Stationery Office).Google Scholar
Jabri, Vivienne (2006), ‘War, security and the liberal state’, Security Dialogue 37, no. 1: 4764.CrossRefGoogle Scholar
Jackson, Patrick Thaddeus (2011), The Conduct of Inquiry in International Relations: Philosophy of Science and Its Implications for the Study of World Politics (London: Routledge).Google Scholar
Jackson, Richard (2005), Writing the War on Terrorism: Language, Politics and Counter-Terrorism (Manchester University Press).Google Scholar
Jagoda, Patrick (2012), ‘Speculative security’, in Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, ed. Reveron, Derek S. (Washington, DC: Georgetown University Press), 2135.Google Scholar
Jarvis, Lee (2009), Times of Terror: Discourse, Temporality and the War on Terror (Basingstoke: Palgrave Macmillan).CrossRefGoogle Scholar
Jeffery, Keith (2010), MI6: The History of the Secret Intelligence Service (London: Bloomsbury Publishing).Google Scholar
Jessop, Bob (2009), ‘The spatiotemporal dynamics of globalizing capital and their impact on state power and democracy’, in Rosa, and Scheuerman, (ed.), 135–58.Google Scholar
Johnson, Boris (2011), ‘It will take a super-sewer to get London out of this mess’, Daily Telegraph, 12 September.Google Scholar
Johnson, Ed (2002), ‘“Cowboy” Blair raises eyebrows’, Associated Press, 4 September.Google Scholar
Jordan, Glenn (1995), ‘Flight from modernity: Time, the Other and the discourse of primitivism’, Time and Society 4, no. 3: 281303.CrossRefGoogle Scholar
Jungk, Robert (1958), Brighter Than a Thousand Suns: The Moral and Political History of the Atomic Scientists, tr. Cleugh, James (London: Victor Gollancz).Google Scholar
Kaczynski, Theodore (1995), Industrial Society and Its Future.Google Scholar
Kaika, Maria and Swyngedouw, Erik (2000), ‘Fetishizing the modern city: The phantasmagoria of urban technological networks’, International Journal of Urban and Regional Research 24, no. 1: 120–38.CrossRefGoogle Scholar
Kaiser, Robert (2015), ‘The birth of cyberwar’, Political Geography 46: 1120.CrossRefGoogle Scholar
Kaldor, Mary (2006) [1999], New and Old Wars: Organized Violence in a Global Era, 2nd edn (Cambridge: Polity Press).Google Scholar
Kaminski, Ryan T. (2010), ‘Escaping the cyber state of nature: Cyber deterrence and international institutions’, in Conference on Cyber Conflict Proceedings 2010, ed. Czosseck, Christian and Podins, Karlis (Tallinn: CCD COE Publications), 7994.Google Scholar
Kamp, Poul-Henning (2011), ‘The one-second war’, Communications of the ACM 54, no. 5: 4488.Google Scholar
Kane, Margaret (2002), ‘US vulnerable to data sneak attack’, CNet News, 13 August, http://news.cnet.com/2100-1017-949605.html.Google Scholar
Kant, Immanuel (1998) [1781/1787], Critique of Pure Reason (Cambridge University Press).CrossRefGoogle Scholar
Karatzogianni, Athina (2006), The Politics of Cyberconflict (Abingdon: Routledge).CrossRefGoogle Scholar
Kaspersky, Eugene (2012), ‘Cassandra complex … not for much longer’, Nota Bene, 17 March, http://eugene.kaspersky.com/2012/03/17/cassandra-complex-not-for-much-longer-2/.Google Scholar
Kaveney, Roz (2013), ‘The meaning of meteors’, The Guardian, 15 February, www.guardian.co.uk/commentisfree/2013/feb/15/meaning-of-meteors.Google Scholar
Keane, John (2012), ‘Silence and catastrophe: New reasons why politics matters in the early years of the twenty-first century’, The Political Quarterly 83, no. 4: 660–8.CrossRefGoogle Scholar
Keep, Christopher (1995), ‘An absolute acceleration: Apocalypticism and the war machines of Waco’, in Postmodern Apocalypse: Theory and Cultural Practice at the End, ed. Dellamora, Richard (Philadelphia, PA: University of Pennsylvania Press), 262–74.Google Scholar
Kelly, Kevin (2010), What Technology Wants (New York: Viking).Google Scholar
Kern, Stephen (1983), The Culture of Time and Space 1880–1918 (Cambridge, MA: Harvard University Press).Google Scholar
Kesan, Jay P. and Hayes, Carol M. (2010), ‘Thinking through active defense in cyberspace’, Proceedings of the Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options, 10–11 June 2010 (Washington, DC: National Academies Press), 327–42.Google Scholar
Khong, Yuen Foong (1992), Analogies at War: Korea, Munich, Dien Bien Phu, and the Vietnam Decisions of 1965 (Princeton University Press).CrossRefGoogle Scholar
Kiggins, Ryan David (2015), ‘Open for expansion: US policy and the purpose for the internet in the post-Cold War era’, International Studies Perspectives 16, no. 1: 86105.CrossRefGoogle Scholar
Kilcullen, David (2005), ‘Countering global insurgency’, Journal of Strategic Studies 28, no. 4: 597617.CrossRefGoogle Scholar
Kincanon, Eric (2004), ‘Misuses of physical models in understanding time’, KronoScope 4, no. 1: 70–3.CrossRefGoogle Scholar
King, Martin Luther Jr (1993), ‘Letter from Birmingham Jail’, University of California Davis Law Review 26, no. 4: 835–51.Google Scholar
King, Vera (2010), ‘The generational rivalry for time’, Time and Society 19, no. 1: 5471.CrossRefGoogle Scholar
Kitzinger, Jenny (2000), ‘Media templates: Patterns of association and the (re)construction of meaning over time’, Media, Culture and Society 22, no. 1: 6184.CrossRefGoogle Scholar
Klaver, J.M.I. (1997), Geology and Religious Sentiment: The Effect of Geological Discoveries on English Society and Literature Between 1829 and 1859 (Leiden: Brill).CrossRefGoogle Scholar
Kleinrock, Leonard (2003), ‘An internet vision: The invisible global infrastructure’, Ad Hoc Networks 1, no. 1: 311.CrossRefGoogle Scholar
Klimburg, Alexander (2010), ‘The whole of nation in cyberpower’, Georgetown Journal of International Affairs 11: 171–9.Google Scholar
Klimburg, Alexander (2011), ‘Mobilising cyber power’, Survival 53, no. 1: 4160.CrossRefGoogle Scholar
Klimburg, Alexander (2013), ‘The Internet Yalta’, 5 February, Center for a New American Security, http://www.cnas.org/files/documents/publications/CNAS_WCIT_commentary.pdf.Google Scholar
Kline, Ronald R. (2006), ‘Cybernetics, management science, and technology policy: The emergence of “information technology” as a keyword, 1948–1985’, Technology and Culture 47, no. 3: 513–35.CrossRefGoogle Scholar
Klinke, Ian (2013), ‘Chronopolitics: A conceptual matrix’, Progress in Human Geography 37, no. 5: 673–90.CrossRefGoogle Scholar
Knabb, Richard D., Rhome, Jamie R. and Brown, Daniel P. (2011), ‘Tropical Cyclone Report: Hurricane Katrina’, National Hurricane Center, 20 December 2005, updated 14 September 2011, www.nhc.noaa.gov/pdf/TCR-AL122005_Katrina.pdf.Google Scholar
Kohl, Philip L. and Fawcett, Clare (1995), ‘Archaeology in the service of the state: Theoretical considerations’, in Nationalism, Politics, and the Practice of Archaeology, ed. Kohl, Philip L. and Fawcett, Clare (Cambridge University Press), 318.Google Scholar
Koselleck, Reinhart (2004) [1979], Futures Past: On the Semantics of Historical Time, tr. Tribe, Keith (New York: Columbia University Press).Google Scholar
Kragh, Helge S. (2007), Conceptions of the Cosmos—From Myths to the Accelerating Universe: A History of Cosmology (Oxford University Press).Google Scholar
Krahmann, Elke (2008), ‘Security: Collective good or commodity?’, European Journal of International Relations 14, no. 3: 379404.CrossRefGoogle Scholar
Kundera, Milan (1997), Slowness: A Novel, tr. Asher, Linda (New York: HarperCollins).Google Scholar
Kütting, Gabriela (2001), ‘Back to the future: Time, the environment and IR theory’, Global Society 15, no. 4: 345–60.CrossRefGoogle Scholar
Lakoff, George and Johnson, Mark (1980), Metaphors We Live By (University of Chicago Press).Google Scholar
Landes, Richard (1998), Whilst God Tarried: Disappointed Millennialism and the Genealogy of the Modern West (New York: Basic Books).Google Scholar
Landy, Marcia (2004), ‘“America under attack”: Pearl Harbor, 9/11, and history in the media’, in Film and Television After 9/11, ed. Dixon, Wheeler W. (Carbondale, IL: Southern Illinois University Press), 79100.Google Scholar
Latham, Robert (2003), ‘Introduction’, in Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security, ed. Latham, Robert (New York: The New Press), 121.Google Scholar
Latour, Bruno (1988), The Pasteurization of France, trs. Sheridan, Alan and Law, John (Cambridge, MA: Harvard University Press).Google Scholar
Latour, Bruno (1990), ‘Drawing things together’, in Representation in Scientific Practice, ed. Lynch, Michael and Woolgar, Steve (Cambridge, MA: MIT Press), 1968.Google Scholar
Latour, Bruno (1992), ‘Where are the missing masses? The sociology of a few mundane artifacts’, in Shaping Technology / Building Society: Studies in Sociotechnical Change, ed. Bijker, Wiebe E. and Law, John (Cambridge, MA: MIT Press), 225–58.Google Scholar
Latour, Bruno (1993) [1991], We Have Never Been Modern, tr. Porter, Catherine (Cambridge, MA: Harvard University Press).Google Scholar
Latour, Bruno (2002), ‘Morality and technology: The end of the means’, Theory, Culture and Society 19, nos. 5–6: 247–60.CrossRefGoogle Scholar
Latour, Bruno (2005), Reassembling the Social: An Introduction to Actor-Network Theory (Oxford University Press).CrossRefGoogle Scholar
Law, John (2004), After Method: Mess in Social Science Research (London: Routledge).CrossRefGoogle Scholar
Lawson, George (2012), ‘The eternal divide? History and International Relations’, European Journal of International Relations 18, no. 2: 203–26.CrossRefGoogle Scholar
Lawson, Sean (2011), ‘Articulation, antagonism, and intercalation in Western military imaginaries’, Security Dialogue 42, no. 1: 3956.CrossRefGoogle Scholar
Lawson, Sean (2012a), ‘Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States’, First Monday 17, no. 7, http://firstmonday.org/ojs/index.php/fm/article/view/3848/3270.Google Scholar
Lawson, Sean (2012b), ‘DHS Secretary Napolitano uses Hurricane Sandy to hype cyber threat’, Forbes, 1 November, www.forbes.com/sites/seanlawson/2012/11/01/dhs-secretary-napolitano-uses-hurricane-sandy-to-hype-cyber-threat/.Google Scholar
Lawson, Sean (2013a), ‘Motivating cybersecurity: Assessing the status of critical infrastructure as an object of cyber threats’, in Securing Critical Infrastructures and Industrial Control Systems: Approaches for Threat Protection, ed. Laing, Christopher, Badii, Atta and Vickers, Paul (Hershey, PA: IGI Global), 168–88.Google Scholar
Lawson, Sean (2013b), ‘Beyond cyber-doom: Assessing the limits of hypothetical scenarios in the framing of cyber-threats’, Journal of Information Technology and Politics 10, no. 1: 86103.CrossRefGoogle Scholar
Lawson, Sean and Gehl, Robert W. (2011), ‘Convergence security: Cyber-surveillance and the biopolitical production of security’, paper presented at Cyber-Surveillance in Everyday Life: An International Workshop, Toronto, 13–15 May.Google Scholar
Leccardi, Carmen (2007), ‘New temporal perspectives in the “high-speed society”’, in Hassan, , Robert, and Purser, Ronald E., ed. (2007), 24/7: Time and Temporality in the Network Society (Stanford, CA: Stanford Business Books), 2536.CrossRefGoogle Scholar
Lee, Heejin and Liebenau, Jonathan (2000), ‘Time and the internet at the turn of millennium’, Time and Society 9, no. 1: 4356.CrossRefGoogle Scholar
Lee, Raymond L.M. (2012), ‘Global modernity and temporal multiplicity’, KronoScope 12, no. 1: 3151.CrossRefGoogle Scholar
Leong, Susan, Mitew, Teodor, Celletti, Marta and Pearson, Erika (2009), ‘The question concerning (internet) time’, New Media and Society 11, no. 8: 1267–85.CrossRefGoogle Scholar
Levin, Adam (2012), ‘How the SEC almost shut down Wall Street’ Huffington Post, 15 November, www.huffingtonpost.com/adam-levin/did-you-know-the-sec-almo_b_2133962.html.Google Scholar
Lewis, James A. (2003), ‘Cyber terror: Missing in action’, Knowledge, Technology and Policy 16, no. 2: 3441.CrossRefGoogle Scholar
Lewis, James A. (2005), ‘Aux armes, citoyens: Cyber security and regulation in the United States’, Telecommunications Policy 29, no. 11: 821–30.CrossRefGoogle Scholar
Lewis, James A. (2010), ‘Sovereignty and the role of government in cyberspace’, Brown Journal of World Affairs 16, no. 2: 5565.Google Scholar
Lewis, Jeff (2012), Global Media Apocalypse: Pleasure, Violence and the Cultural Imaginings of Doom (Basingstoke: Palgrave Macmillan).Google Scholar
Libicki, Martin C. (1997), Defending Cyberspace and Other Metaphors (Honolulu, HI: University Press of the Pacific).Google Scholar
Libicki, Martin C. (2007), Conquest in Cyberspace: National Security and Information Warfare (New York: Cambridge University Press).CrossRefGoogle Scholar
Libicki, Martin C. (2009), Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Corporation).Google Scholar
Libicki, Martin C. (2011), ‘The strategic uses of ambiguity in cyberspace’, Military and Strategic Affairs 3, no. 3: 310.Google Scholar
Libicki, Martin C., Senty, David and Pollak, Julia (2014), Hackers Wanted: An Examination of the Cybersecurity Labor Market (Santa Monica, CA: RAND Corporation).CrossRefGoogle Scholar
Lieberman, Joseph I. and Collins, Susan (2012), ‘At dawn we sleep’, The New York Times, 7 December.Google Scholar
Liff, Adam P. (2012), ‘Cyberwar: A new “absolute weapon”? The proliferation of cyberwarfare capabilities and interstate war’, Journal of Strategic Studies 35, no. 3: 401–28.CrossRefGoogle Scholar
Lindsay, Jon R. (2013), ‘Stuxnet and the limits of cyber warfare’, Security Studies 22, no. 3: 365404.CrossRefGoogle Scholar
Little, Morgan (2012), ‘Executive Order on cyber security builds steam amid criticisms’, Los Angeles Times, 2 October, http://articles.latimes.com/2012/oct/02/news/la-pn-obama-executive-order-cyber-security-20121002.Google Scholar
Little, Richard G. (2002), ‘Controlling cascading failure: Understanding the vulnerabilities of interconnected infrastructures’, Journal of Urban Technology 9, no. 1: 109–23.CrossRefGoogle Scholar
Lockheed Martin (2012), ‘National cyber range’, presentation, www.ndia.org/Resources/OnlineProceedings/Documents/21M0/MODSIM/03-Defense-Pridmore.pdf.Google Scholar
Lucas, Gavin (2005), The Archaeology of Time (London: Routledge).Google Scholar
Lule, Jack (1991), ‘Roots of the space race: Sputnik and the language of US news in 1957’, Journalism and Mass Communication Quarterly 68, nos. 1–2: 7686.Google Scholar
Lundborg, Tom (2012), Politics of the Event: Time, Movement, Becoming (London: Routledge).CrossRefGoogle Scholar
Lunenfeld, Peter (1996), ‘Theorizing in real time: Hyperaesthetics for the technoculture’, Afterimage 23, no. 4: 1618.CrossRefGoogle Scholar
Lynn, William J., III (2010), ‘Defending a new domain: The Pentagon’s cyberstrategy’, Foreign Affairs 89, no. 5: 97108.Google Scholar
Lyotard, Jean-François (1987), ‘The sign of history’, in Post-Structuralism and the Question of History, ed. Attridge, Derek, Bennington, Geoff and Young, Robert (Cambridge University Press), 162–80.Google Scholar
McCaney, Kevin (2014), ‘Intelligence agency has a cold plan for faster, cheaper supercomputing’, Defense Systems, 4 December, http://defensesystems.com/articles/2014/12/04/iarpa-cryogenic-exascale-supercomputing.aspx.Google Scholar
McCarthy, Daniel (2013), ‘Technology and “the international” or: How I learned to stop worrying and love determinism’, Millennium: Journal of International Studies 41, no. 3: 470–90.Google Scholar
McConnell, Mike (2010), ‘To win the cyber-war, look to the Cold War’, The Washington Post, 28 February.Google Scholar
McFarlane, Colin and Anderson, Ben (2011), ‘Thinking with assemblage’, Area 43, no. 2: 162–4.CrossRefGoogle Scholar
McGinn, Bernard (1998) [1979], Visions of the End: Apocalyptic Traditions in the Middle Ages (New York: Columbia University Press).Google Scholar
McIvor, David (2011), ‘The politics of speed: Connolly, Wolin, and the prospects for democratic citizenship in an accelerated polity’, Polity 43, no. 1: 5883.CrossRefGoogle Scholar
Mackenzie, Adrian (2002), Transductions: Bodies and Machines at Speed (London: Continuum).Google Scholar
MacKenzie, Donald (1996), ‘Nuclear weapons laboratories and the development of supercomputing’, Knowing Machines: Essays on Technical Change (Cambridge, MA: MIT Press), 99129.Google Scholar
MacKenzie, Donald and Pottinger, Garrel (1997), ‘Mathematics, technology, and trust: Formal verification, computer security, and the US military’, IEEE Annals of the History of Computing 19, no. 3: 4159.CrossRefGoogle Scholar
Mackinlay, John (2009), The Insurgent Archipelago: From Mao to Bin Laden (London: Hurst and Company).Google Scholar
McLaren, Peter (2002), ‘George Bush, apocalypse sometime soon, and the American imperium’, Cultural Studies—Critical Methodologies 2, no. 3: 327–33.CrossRefGoogle Scholar
McLuhan, Marshall (2002) [1951], The Mechanical Bride: Folklore of Industrial Man (Corte Madera, CA: Ginkgo Press).Google Scholar
McLuhan, Marshall (2006) [2001], ‘The medium is the message’, in Media and Cultural Studies: KeyWorks, rev. edn, ed. Durham, Meenakshi Gigi and Kellner, Douglas M. (Malden, MA: Blackwell Publishing), 107–16.Google Scholar
McLure, Helen (2000), ‘The wild, wild web: The mythic American West and the electronic frontier’, The Western Historical Quarterly 31, no. 4: 457–76.CrossRefGoogle Scholar
McManners, John (1981), Death and the Enlightenment: Changing Attitudes to Death Among Christians and Unbelievers in Eighteenth-Century France (Oxford University Press).Google Scholar
McPherson, James L. and Alexander, S.N. (1951), ‘Performance of the census UNIVAC system’, Proceedings of the AIEE-ERE Conference, 10–12 December 1951, 1622.CrossRefGoogle Scholar
McSorley, Kevin (2012), ‘Helmetcams, militarized sensation and “somatic war”’, Journal of War and Culture Studies 5, no. 1: 4758.CrossRefGoogle Scholar
McTaggart, J.M.E. (1908), ‘The unreality of time’, Mind: A Quarterly Review of Psychology and Philosophy 17, no. 4: 457–74.Google Scholar
Magaziner, Ira (1998), ‘Democracy and cyberspace: First principles’, Democracy and Digital Media Conference, Cambridge, MA, 8 May.Google Scholar
Magee, Clifford S. (2013), ‘Awaiting cyber 9/11’, Joint Force Quarterly 70: 7682.Google Scholar
Maier, Charles S. (1987), ‘The politics of time: Changing paradigms of collective time and private time in the modern era’, in Changing Boundaries of the Political: Essays on the Evolving Balance Between the State and Society, Public and Private in Europe, ed. Meier, Charles S. (Cambridge University Press), 151–75.CrossRefGoogle Scholar
Malphurs, Ryan (2008), ‘The media’s frontier construction of President George W. Bush’, The Journal of American Culture 31, no. 2: 185201.CrossRefGoogle Scholar
Mandiant (2014), Trends 2014: Beyond the Breach (Alexandria, VA: Mandiant).Google Scholar
Marcus, Jonathan (2013), ‘Are we really facing cyberwar?’, BBC News, 5 March, www.bbc.co.uk/news/technology-21653361.Google Scholar
Marinetti, Filippo Tommaso (1973), ‘The founding and manifesto of Futurism’, in Futurist Manifestos, ed. Apollonio, Umbro (New York: Viking Press), 1924, originally published in Gazzetta dell’Emilia, 5 February 1909.Google Scholar
Markoff, John (2005), ‘A new arms race to build the world’s mightiest computer’, The New York Times, 19 August.Google Scholar
Marshall, Rosalie (2013), ‘Ofsted, Microsoft and teachers voice concerns with draft DfE computing curriculum’, V3.co.uk, 1 March, www.v3.co.uk/v3-uk/news/2251555/ofsted-microsoft-and-teachers-worried-dfe-computing-curriculum-not-up-to-scratch.Google Scholar
Martin, Lauren and Simon, Stephanie (2008), ‘A formula for disaster: The Department of Homeland Security’s virtual ontology’, Space and Polity 12, no. 3: 281–96.CrossRefGoogle Scholar
Martin, Thomas (2014), ‘Governing an unknowable future: The politics of Britain’s Prevent policy’, Critical Studies on Terrorism 7, no. 1: 6278.CrossRefGoogle Scholar
Marwick, Alice (2008), ‘To catch a predator? The MySpace moral panic’, First Monday 13, no. 6, n.p., http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2152/1966.Google Scholar
Masco, Joseph (2004), ‘Nuclear technoaesthetics: Sensory politics from Trinity to the virtual bomb in Los Alamos’, American Ethnologist 31, no. 3: 349–73.CrossRefGoogle Scholar
Masco, Joseph (2008), ‘“Survival is your business”: Engineering ruins and affect in nuclear America’, Cultural Anthropology 23, no. 2: 361–98.CrossRefGoogle Scholar
Massey, Doreen (1992), ‘Politics and space/time’, New Left Review 196: 6584.Google Scholar
May, Jon and Thrift, Nigel (2001), ‘Introduction’, in Timespace: Geographies of Temporality, ed. May, Jon and Thrift, Nigel (London: Routledge), 146.Google Scholar
May, Peter J., Koski, Chris and Stramp, Nicholas (2014), ‘Issue expertise in policymaking’, Journal of Public Policy, DOI:10.1017/S0143814X14000233.CrossRefGoogle Scholar
Mayer, Kenneth R. (2001), With the Stroke of a Pen: Executive Orders and Presidential Power (Princeton University Press).CrossRefGoogle Scholar
Mellor, D.H. (1993), ‘The unreality of tense’, in The Philosophy of Time, ed. Le Poidevin, Robin and MacBeath, Murray (Oxford University Press), 4759.Google Scholar
Merk, Frederick (1995) [1963], Manifest Destiny and Mission in American History (Cambridge, MA: Harvard University Press).Google Scholar
Meserve, Jeanne (2007), ‘Sources: Staged cyber attack reveals vulnerability in power grid’, CNN.com, 26 September, http://edition.cnn.com/2007/US/09/26/power.at.risk/.Google Scholar
Miller, Donald F. (1993), ‘Political time: The problem of timing and chance’, Time and Society 2, no. 2: 179–87.CrossRefGoogle Scholar
Mills, David L. (2006), Computer Network Time Synchronization: The Network Time Protocol (Boca Raton, FL: CRC Press).CrossRefGoogle Scholar
Ministry of Defence (2010), Global Strategic Trends: Out to 2040, 4th edn, Development, Concepts and Doctrine Centre Strategic Trends Programme.Google Scholar
Minkowski, Hermann (2010), ‘Space and time’, in Minkowski Spacetime: A Hundred Years Later, ed. Petkov, Vesselin (New York: Springer), xivxli.Google Scholar
Mitchell, William J. (1995), City of Bits: Space, Place and the Infobahn (Cambridge, MA: MIT Press).CrossRefGoogle Scholar
Mitnick, Kevin D. and Simon, William L. (2011), Ghost in the Wire: My Adventures as the World’s Most Wanted Hacker (New York: Little, Brown and Company).Google Scholar
Mitzen, Jennifer (2006), ‘Ontological security in world politics’, European Journal of International Relations 12, no. 3: 341–70.CrossRefGoogle Scholar
Molfino, Emily (2012), ‘Viewpoint: Cyberterrorism: Cyber “Pearl Harbor” is imminent’, in Cyberspaces and Global Affairs, ed. Costigan, Sean S. and Perry, Jake (Farnham: Ashgate Publishing), 7582.Google Scholar
Moltmann, Jürgen (1993) [1965], Theology of Hope: On the Ground and the Implications of a Christian Eschatology, tr. Leitch, James W. (Minneapolis, MN: Fortress Press).Google Scholar
Morson, Gary Saul and Emerson, Caryl (1990), Mikhail Bakhtin: Creation of a Prosaics (Stanford University Press).CrossRefGoogle Scholar
Mueller, John (1995), Quiet Cataclysm: Reflections on the Recent Transformation of World Politics (New York: HarperCollins).Google Scholar
Mueller, John (2010), Atomic Obsession: Nuclear Alarmism from Hiroshima to al-Qaeda (New York: Oxford University Press).Google Scholar
Mueller, Milton L. (2010) Networks and States: The Global Politics of Internet Governance (Cambridge, MA: MIT Press).CrossRefGoogle Scholar
Mulrine, Anna (2011), ‘CIA chief Leon Panetta: The next Pearl Harbor could be a cyberattack’, The Christian Science Monitor, 9 June.Google Scholar
Mumford, Lewis (1934), Technics and Civilization (New York: Harcourt, Brace and Company).Google Scholar
Münkler, Herfried (2005), The New Wars (Cambridge: Polity Press).Google Scholar
Munn, Nancy D. (1992), ‘The cultural anthropology of time: A critical essay’, Annual Review of Anthropology 21: 93123.CrossRefGoogle Scholar
Murphy, Raymond (2001), ‘Nature’s temporalities and the manufacture of vulnerability: A study of a sudden disaster with implications for creeping ones’, Time and Society 10, nos. 2–3: 329–48.Google Scholar
Murray, W.H. (1984), ‘Security considerations for personal computers’, IBM Systems Journal 23, no. 3: 297304.CrossRefGoogle Scholar
Mythen, Gabe and Walklate, Sandra (2008), ‘Terrorism, risk and international security: The perils of asking “what if?”’, Security Dialogue 39, nos. 2–3: 221–42.CrossRefGoogle Scholar
Nakashima, Ellen (2010), ‘War game reveals US lacks cyber-crisis skills’, The Washington Post, 17 February.Google Scholar
Nakashima, Ellen (2012), ‘US builds a cyber “Plan X”’, The Washington Post, 31 May.Google Scholar
Nakashima, Ellen (2013), ‘Pentagon plans to add 13 offensive teams to combat online threat’, The Washington Post, 13 March.Google Scholar
Napolitano, Janet (2013), ‘From cyber to immigration, terrorism to disasters: Securing America in the next administration’, Wilson Center, Washington, DC, 24 January, www.wilsoncenter.org/event/cyber-to-immigration-terrorism-to-disasters-securing-america-the-next-administration.Google Scholar
National Audit Office (2013), The UK Cyber Security Strategy: Landscape Review (Norwich, The Stationery Office).Google Scholar
National Cyber Security Division (2006), Cyber Storm: Exercise Report (Washington, DC: Department of Homeland Security).Google Scholar
National Infrastructure Protection Center (and National Counterintelligence Center and Federal Bureau of Investigation) (1999), Solar Sunrise: Dawn of a New Threat, video, 18 minutes, www.wired.com/threatlevel/2008/09/video-solar-sun/.Google Scholar
National Public Radio (2010), ‘Assessing the threat of cyberterrorism: Interview with James Lewis’, Fresh Air, 10 February, www.npr.org/templates/story/story.php?storyId=123531188.Google Scholar
Naughtie, James (2005), The Accidental American: Tony Blair and the Presidency, rev. edn (London: Macmillan).Google Scholar
Neocleous, Mark (2008), Critique of Security (Edinburgh University Press).Google Scholar
Neustadt, Richard E. and May, Ernest R. (1986), Thinking in Time: The Uses of History for Decision Makers (New York: The Free Press).Google Scholar
Newitz, Annalee and Glezos, Simon (2010), ‘Digital inflections: Annalee Newitz in conversation with Simon Glezos’, CTheory, 30 November, www.ctheory.net/articles.aspx?id=673.Google Scholar
Newton, Isaac (1729), The Mathematic Principles of Natural Philosophy, vol. I, tr. Motte, Andrew (London: Benjamin Motte).Google Scholar
Nguyen, Anh (2012), ‘UK cybersecurity professionals are “too old”, says Baroness Neville-Jones’, ComputerWorld UK, 24 May, www.computerworlduk.com/news/careers/3359837/uk-cybersecurity-professionals-are-too-old-says-baroness-neville-jones/.Google Scholar
Nishimura, Kuniyuki (2011), ‘Worlds of our remembering: The agent-structure problem as the search for identity’, Cooperation and Conflict 46, no. 1: 96112.CrossRefGoogle Scholar
Nissenbaum, Helen (2004), ‘Hackers and the contested ontology of cyberspace’, New Media and Society 6, no. 2: 195217.CrossRefGoogle Scholar
Nissenbaum, Helen (2005), ‘Where computer security meets national security’, Ethics and Information Technology 7, no. 2: 6173.CrossRefGoogle Scholar
Nowotny, Helga (1992), ‘Time and social theory: Towards a social theory of time’, Time and Society 1, no. 3: 421–54.CrossRefGoogle Scholar
Nowotny, Helga (1994), Time: The Modern and Postmodern Experience (Cambridge: Polity Press).Google Scholar
Nye, Joseph S. Jr (2011), ‘Nuclear lessons for cyber security’, Strategic Studies Quarterly 5, no. 4: 1838.Google Scholar
Obama, Barack (2010), ‘Remarks by the President on the economy’, Winston-Salem, NC, 6 December, www.whitehouse.gov/the-press-office/2010/12/06/remarks-president-economy-winston-salem-north-carolina.Google Scholar
Office of Cyber Security and Information Assurance (2011), presentation, London Conference on Cyberspace, 2 November.Google Scholar
Office of Cyber Security and Information Assurance (2012), ‘Cyber security skill shortages’, ITNOW 54, no. 2: 32–4.Google Scholar
Olivier, Laurent (2011), The Dark Abyss of Time: Archaeology and Memory, tr. Greenspan, Arthur (Lanham, MD: AltaMira Press).Google Scholar
Omand, David (2010), Securing the State (London: Hurst & Company).Google Scholar
Ong, Aihwa (2005), ‘Ecologies of expertise: Assembling flows, managing citizenship’, in Global Assemblages: Technology, Politics, and Ethics as Anthropological Problems, ed. Ong, Aihwa and Collier, Stephen J. (Malden, MA: Blackwell Publishers), 337–53.Google Scholar
Onuf, Nicholas (1994), ‘The constitution of international society’, European Journal of International Law 5, no. 1: 119.CrossRefGoogle Scholar
Orwell, George (1965) [1949], Nineteen Eighty-Four (London: Heinemann).Google Scholar
Osborne, Peter (1995), The Politics of Time: Modernity and Avant-Garde (London: Verso).Google Scholar
Ostovich, Steven (2007), ‘Carl Schmitt, political theology, and eschatology’, KronoScope 7, no. 1: 4966.CrossRefGoogle Scholar
Ostroff, Natalie and Taylor, Jim (2012), ‘First boot camp gets young people into cybersecurity’, BBC Newsbeat, 7 September, www.bbc.co.uk/newsbeat/19515213.Google Scholar
Overy, Richard (2009), The Morbid Age: Britain Between the Wars (London: Allen Lane).Google Scholar
Ovid, (1916), Metamorphoses, vol. II, tr. Miller, Frank Justus (London: William Heinemann, Ltd.).Google Scholar
Page, Lewis (2008), ‘DARPA wants Matrix style virtual world for cybergeddon’, The Register, 7 May, www.theregister.co.uk/2008/05/07/darpa_cyber_range_rfp/.Google Scholar
Palmer, Allen W. (2002), ‘Negotiation and resistance in global networks: The 1884 International Meridian Conference’, Mass Communication and Society 5, no. 1: 724.CrossRefGoogle Scholar
Panetta, Leon (2012), ‘Remarks by Secretary Panetta on cybersecurity’, speech to Business Executives for National Security, New York, 11 October, www.defense.gov/transcripts/transcript.aspx?transcriptid=5136.Google Scholar
Panetta, Leon (2013), ‘Remarks by Secretary Panetta’, speech at Georgetown University, Washington, DC, 6 February, www.defense.gov/transcripts/transcript.aspx?transcriptid=5189.Google Scholar
Parkins, Wendy (2004), ‘Out of time: Fast subjects and slow living’, Time and Society 13, nos. 2–3: 363–82.CrossRefGoogle Scholar
Pärna, Karen (2010), ‘Digital apocalypse: The implicit religiosity of the Millennium Bug scare’, in Religions of Modernity: Relocating the Sacred to the Self and the Digital, ed. Aupers, Stef and Houtman, Dick (Leiden: Brill), 239–59.Google Scholar
Parsons, Talcott (1949) [1937], The Structure of Social Action, 2nd edn (Glencoe, IL: The Free Press).Google Scholar
Partridge, Chris (1997), ‘How to conquer the world … and never leave the barracks’, The Times, 27 August.Google Scholar
Patterson, David (2011), A Genealogy of Evil: Anti-Semitism from Nazism to Islamic Jihad (Cambridge University Press).Google Scholar
Paz, Octavio (1974) [1969], ‘Order and accident’, Conjunctions and Disjunctions, tr. Lane, Helen R. (New York: Viking Press,), 91139.Google Scholar
Penrose, Roger (1989), The Emperor’s New Mind: Concerning Computers, Minds and the Laws of Physics (Oxford University Press).CrossRefGoogle Scholar
Pepper, David (2010), ‘The business of SIGINT: The role of modern management in the transformation of GCHQ’, Public Policy and Administration 25, no. 1: 8597.CrossRefGoogle Scholar
Perrow, Charles (1981), ‘Normal accident at Three Mile Island’, Society 18, no. 5: 1726.CrossRefGoogle Scholar
Perrow, Charles (1999) [1984], Normal Accidents: Living with High-Risk Technologies, 2nd edn (Princeton University Press).Google Scholar
Peters, Bernard (1967), ‘Security considerations in a multi-programmed computer system’, Proceedings of the 1967 Spring Joint Computer Conference 30, 283–86.Google Scholar
Peters, F.E. (1967), Greek Philosophical Terms: A Historical Lexicon (New York University Press).Google Scholar
Phillips, John (2006), ‘Agencement/Assemblage’, Theory, Culture and Society 23, nos. 2–3: 108–9.CrossRefGoogle Scholar
Pick, Daniel (1993), War Machine: The Rationalisation of Slaughter in the Modern Age (New Haven, CT: Yale University Press).CrossRefGoogle Scholar
Pietz, William (1997), ‘Death of the deodand: Accursed objects and the money value of human life’, RES: Anthropology and Aesthetics 31: 97108.Google Scholar
Pilkington, Ed (2011), ‘Fear: The old technology that turned hackers into informers’, The Guardian, 7 June.Google Scholar
Plotinus, (1992), The Enneads, tr. MacKenna, Stephen (Burdett, NY: Larson Publications).Google Scholar
Pobojewska, Aldona (2001), ‘New biology—Jakob von Uexküll’s Umweltlehre’, Semiotica 134, nos. 1–4: 323–39.Google Scholar
Poole, Steven (2012), ‘Invasion of the cyber hustlers’, New Statesman, 6 December, www.newstatesman.com/sci-tech/internet/2012/12/jeff-jarvis-clay-shirky-jay-rosen-invasion-cyber-hustlers.Google Scholar
Porter, Patrick (2015), The Global Village Myth: Distance, War, and the Limits of Power (Washington, DC: Georgetown University Press).CrossRefGoogle Scholar
Portnoy, Michael and Goodman, Seymour (2009), ‘A brief history of global responses to cyber threats’, in Global Initiatives to Secure Cyberspace: An Emerging Landscape, ed. Portnoy, Michael and Goodman, Seymour (New York: Springer), 510.CrossRefGoogle Scholar
Power, Richard (2000), ‘Joy riders: Mischief that leads to mayhem’, InformIT, 30 October, www.informit.com/articles/article.aspx?p=19603.Google Scholar
Prensky, Marc (2001), ‘Digital natives, digital immigrants part 1’, On the Horizon 9, no. 5: 1, 36.Google Scholar
President’s Council of Advisors on Science and Technology (2010), Report to the President and Congress: Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology (Washington, DC: White House).Google Scholar
Pretorius, Joelien (2008), ‘The security imaginary: Explaining military isomorphism’, Security Dialogue 39, no. 1 (2008): 99120.CrossRefGoogle Scholar
Prewitt, Kenneth (2004), ‘What if we give a census and no one comes?’, Science 304, no. 5676: 1452–3.CrossRefGoogle ScholarPubMed
Prior, Arthur N. (1993), ‘Changes in events and changes in things’, in The Philosophy of Time, ed. Le Poidevin, Robin and MacBeath, Murray (Oxford University Press), 3546.Google Scholar
Prozorov, Sergei (2011), ‘The other as past and present: Beyond the logic of “temporal othering” in IR theory’, Review of International Studies 37, no. 3: 1273–93.CrossRefGoogle Scholar
Radcliff, Deborah (2002), ‘More than a game’, ComputerWorld, 9 September.Google Scholar
Rämö, Hans (1999), ‘An Aristotelian human time-space manifold: From chronochora to kairotopos’, Time and Society 8, no. 2: 309–28.CrossRefGoogle Scholar
Rapoport, David C. (1988), ‘Messianic sanctions for terror’, Comparative Politics 20, no. 2: 195213.CrossRefGoogle Scholar
Rashid, Fahmida Y. (2014), ‘Global cybersecurity market to hit $120.1 billion by 2017’, SecurityCurrent, 6 March, www.securitycurrent.com/en/news/ac_news/global-cybersecurity-marke.Google Scholar
Rattray, Greg, Evans, Chris and Healey, Jason (2010), ‘American security in the cyber commons’, in Contested Commons: The Future of American Power in a Multipolar World, ed. Denmark, Abraham M. and Mulvenon, James (Washington, DC: Center for a New American Security), 139–72.Google Scholar
Rawnsley, Gary D. (2009), ‘The laws of the playground: Information warfare and propaganda across the Taiwan Strait’, in Cyber Conflict and Global Politics, ed. Karatzogianni, Athina (London: Routledge), 7994.Google Scholar
Reichenbach, Hans and Reichenbach, Maria (1956), The Direction of Time (Berkeley, CA: University of California Press).CrossRefGoogle Scholar
Reid, Julian (2009), ‘Politicizing connectivity: Beyond the biopolitics of information technology in international relations’, Cambridge Review of International Affairs, 22, no. 4: 607–23.CrossRefGoogle Scholar
Rescher, Nicholas (1996), Process Metaphysics: An Introduction to Process Philosophy (Albany, NY: State University of New York Press).Google Scholar
Reuters (2014), ‘China’s Tianhe-2 retains top supercomputer rank’, 17 November.Google Scholar
Rid, Thomas (2012), ‘Cyber war will not take place’, Journal of Strategic Studies 35, no. 1: 532.CrossRefGoogle Scholar
Rid, Thomas (2013a), Cyber War Will Not Take Place (London: Hurst & Company).Google Scholar
Rid, Thomas (2013b), ‘Cyber fail’, New Republic, 4 February, www.newrepublic.com/article/112314/obama-administrations-lousy-record-cyber-security.Google Scholar
Rid, Thomas and Buchanan, Ben (2015), ‘Attributing cyber attacks’, Journal of Strategic Studies 39, no. 1: 437.CrossRefGoogle Scholar
Rid, Thomas and McBurney, Peter (2012), ‘Cyber-weapons’, The RUSI Journal 157, no. 1: 613.CrossRefGoogle Scholar
Rieff, David (2013), ‘The singularity of fools’, Foreign Policy 200: 96.Google Scholar
Rifkin, Jeremy (1987), Time Wars: The Primary Conflict in Human History (New York: Henry Holt and Company).Google Scholar
Rinaldi, Steven M., Peerenboom, James P. and Kelly, Terrence K. (2001), ‘Identifying, understanding, and analyzing critical infrastructure interdependencies’, IEEE Control Systems 21, no. 6: 1125.Google Scholar
Robbins, Thomas and Palmer, Susan J. (1997), ‘Patterns of contemporary apocalypticism in North America’, in Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements, ed. Robbins, Thomas and Palmer, Susan J. (New York: Routledge, 1997), 127.Google Scholar
Roberts, Geoffrey (2006), ‘History, theory and the narrative turn in IR’, Review of International Studies 32, no. 4: 703–14.CrossRefGoogle Scholar
Robin, Corey (2012), ‘The language of fear: National security in modern politics’, in Fear: Across the Disciplines, ed. Plamper, Jan and Lazier, Benjamin (University of Pittsburgh Press), 118–31.Google Scholar
Rogers, Richard (2010), ‘Internet research: The question of method—A keynote address from the YouTube and the 2008 Election Cycle in the United States Conference’, Journal of Information Technology and Politics 7, nos. 2–3: 241–60.CrossRefGoogle Scholar
Romm, Joseph J. (1993), Defining National Security: The Nonmilitary Aspects (New York: Council on Foreign Relations Press).Google Scholar
Rosa, Hartmut (2005), ‘The speed of global flows and the pace of democratic politics’, New Political Science 27, no. 4: 445–59.CrossRefGoogle Scholar
Rosa, Hartmut (2009), ‘Social acceleration: Ethical and political consequences of a desynchronized high-speed society’, in Rosa, and Scheuerman, (ed.), 77111.Google Scholar
Rosa, Hartmut and Scheuerman, William E., ed. (2009), High-Speed Society: Social Acceleration, Power, and Modernity (University Park, PA: Pennsylvania State University Press).Google Scholar
Rosenberg, Emily S. (2003), A Date Which Will Live: Pearl Harbor in American Memory (Durham, NC: Duke University Press).CrossRefGoogle Scholar
Rosenberg, Justin (1994), ‘The international imagination: IR theory and “classic social analysis”’, Millennium: Journal of International Studies 23, no. 1: 85108.CrossRefGoogle Scholar
Rosenzweig, Paul (2013), Cyber Warfare: How Conflicts in Cyberspace are Challenging America and Changing the World (Santa Barbara, CA: ABC-CLIO).Google Scholar
Ruggie, John Gerard (1975), ‘International responses to technology: Concepts and trends’, International Organization 29, no. 3: 557–83.CrossRefGoogle Scholar
Ruggie, John (1993), ‘Territoriality and beyond: Problematizing modernity in International Relations’, International Organization 47, no. 1: 139–74.CrossRefGoogle Scholar
Russia Today (2013), ‘Panetta back at it with “cyber Pearl Harbor” fear mongering’, 7 February, http://rt.com/usa/panetta-cyber-pearl-harbor-611/.Google Scholar
Rutz, Henry J. (1992), ‘Introduction: The idea of a politics of time’, in The Politics of Time, ed. Rutz, Henry J. (Arlington, VA: American Anthropological Association), 117.Google Scholar
Sabin, Philip (2012), Simulating War: Studying Conflict Through Simulation Games (London: Continuum).Google Scholar
Saco, Diana (1999), ‘Colonizing cyberspace: “National security” and the internet’, in Cultures of Insecurity: States, Communities, and the Production of Danger, ed. Weldes, Jutta, Laffey, Mark, Gusterson, Hugh and Duvall, Raymond (Minneapolis, MN: University of Minnesota Press), 261–91.Google Scholar
Sandywell, Barry (2006), ‘Monsters in cyberspace: Cyberphobia and cultural panic in the information age’, Information, Communication and Society 9, no. 1: 3961.CrossRefGoogle Scholar
Sanger, David E. (2012), Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Crown Publishers).Google Scholar
Sanger, David E., Markoff, John and Shanker, Thom (2009), ‘US plans attack and defense in web warfare’, The New York Times, 28 April.Google Scholar
SANS Institute (2012), ‘SANS launches NetWars CyberCity to train cyber warriors for defense’, press release, 27 November, www.sans.org/press/announcement/2012/11/27/1.Google Scholar
Sarkar, Dibya (2002), ‘Cybersecurity guide delayed’, Federal Computer Week, 11 June, http://fcw.com/articles/2002/06/11/cybersecurity-guide-delayed.aspx.Google Scholar
Satter, Raphael (2012), ‘Amateurs battle malware, hackers in UK cybergames’, Associated Press, 11 March.Google Scholar
Savvas, Antony (2012), ‘IT students aim for the security services’, ComputerWorld UK, 17 May, www.computerworlduk.com/news/careers/3358292/it-students-aim-for-security-services/.Google Scholar
Saward, Michael (2011), ‘Slow theory: Taking time over transnational democratic representation’, Ethics and Global Politics 4, no. 1: 118.CrossRefGoogle Scholar
Sawyer, Rex (2001), Little Imber on the Down: Salisbury Plain’s Ghost Village (East Knoyle: The Hobnob Press).Google Scholar
Schaefer, Nancy A. (2004), ‘Y2K as an endtime sign: Apocalypticism in America at the fin-de-millennium’, The Journal of Popular Culture 38, no. 1: 82105.CrossRefGoogle Scholar
Schafer, Mark and Crichlow, Scott (1996), ‘Antecedents of groupthink: A quantitative study’, Journal of Conflict Resolution 40, no. 3: 415–35.CrossRefGoogle Scholar
Schaffer, Jonathan (2003), ‘Is there a fundamental level?’, Noûs 37, no. 3: 498517.CrossRefGoogle Scholar
Schell, Bernadette and Martin, Clemens (2006), Webster’s New World Hacker Dictionary (Indianapolis, IN: Wiley Publishing, Inc.).Google Scholar
Scherpe, Klaus R. (1986), ‘Dramatization and de-dramatization of “the end”: The apocalyptic consciousness of modernity and post-modernity’, Cultural Critique 5: 95129.CrossRefGoogle Scholar
Scheuerman, William E. (2004), Liberal Democracy and the Social Acceleration of Time (Baltimore, MD: Johns Hopkins University Press).CrossRefGoogle Scholar
Schieber, Philip (1987), ‘The wit and wisdom of Grace Hopper’, The OCLC Newsletter 167, n.p., www.cs.yale.edu/homes/tap/Files/hopper-wit.html.Google Scholar
Schivelbusch, Wolfgang (1986) [1977], The Railway Journey: The Industrialization of Time and Space in the 19th Century (Berkeley, CA: University of California Press).Google Scholar
Schlienger, Thomas and Teufel, Stephanie (2002), ‘Information security culture: The socio-cultural dimension in information security management’, in Security in the Information Society: Visions and Perspectives, ed. Ghonaimy, M. Adeeb, El-Hadidi, Mahmoud T. and Aslan, Heba K. (Norwell, MA: Kluwer Academic Publishers), 191201.CrossRefGoogle Scholar
Schmidt, Howard A. (2006), Patrolling Cyberspace: Lessons Learned from a Lifetime in Data Security (North Potomac, MD: Larstan Publishing, Inc.).Google Scholar
Schmitt, Carl (1996) [1932], The Concept of the Political, tr. Schwab, George (Chicago University Press).Google Scholar
Schmitt, Frederick F. (1994), ‘Socializing epistemology: An introduction through two sample issues’, in Socializing Epistemology: The Social Dimensions of Knowledge, ed. Schmitt, Frederick F. (Lanham, MD: Rowman and Littlefield Publishers, Inc.), 127.Google Scholar
Schmitt, Michael N., ed. (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press).CrossRefGoogle Scholar
Schneier, Bruce (2000), ‘The process of security’, Information Security Magazine, April, www.schneier.com/essay-062.html.Google Scholar
Schneier, Bruce (2004), Secrets and Lies: Digital Security in a Networked World, rev. edn (Indianapolis, IN: John Wiley & Sons).Google Scholar
Schneier, Bruce (2013a), ‘Our new regimes of trust’, The SciTech Lawyer 9, nos. 3–4, www.schneier.com/blog/archives/2013/02/our_new_regimes.html.Google Scholar
Schneier, Bruce (2013b), ‘Our security models will never work—No matter what we do’, Wired, 14 March, www.wired.com/opinion/2013/03/security-when-the-bad-guys-have-technology-too-how-do-we-survive/.Google Scholar
Schofield, Janet W. and Pavelchak, Mark A. (1989), ‘Fallout from The Day After: The impact of a TV film on attitudes relating to nuclear war’, Journal of Applied Social Psychology 19, no. 5: 433–48.CrossRefGoogle Scholar
Schroeder, Paul W. (1997), ‘History and International Relations theory’, International Security 22, no. 1: 6474.CrossRefGoogle Scholar
Schurz, Carl (1913), ‘Manifest destiny’, Speeches, Correspondence and Political Papers, vol. V, ed. Bancroft, Frederic (New York: The Knickerbocker Press), 191214.Google Scholar
Schwaller, Caroline M. (1997), ‘Year 2000. A date with destiny. Apocalypse as “the end” or as “revelation”?’, Space and Culture 1, no. 2: 3749.CrossRefGoogle Scholar
Schwartau, Winn (1991a), Terminal Compromise—Computer Terrorism: When Privacy and Freedom are the Victims (Seminole, FL: Interpact Press).Google Scholar
Schwartau, Winn (1991b), ‘Fighting terminal terrorism’, Computerworld, 28 January, 23.Google Scholar
Schwartau, Winn (1994), Information Warfare. Cyberterrorism: Protecting Your Personal Security in the Electronic Age (New York: Thunder’s Mouth Press).Google Scholar
Schwartau, Winn (2002), Pearl Harbor Dot Com (Seminole, FL: Interpact Press).Google Scholar
Sewell, William H. Jr (1990), ‘Collective violence and collective loyalties in France: Why the French Revolution made a difference’, Politics and Society 18, no. 4: 527–52.CrossRefGoogle Scholar
Shah, Sooraj (2013), ‘Cyber Security Challenge “is not only about recruiting talent”, claims CEO’, Computing, 13 March, www.computing.co.uk/ctg/news/2254243/cyber-security-challenge-is-not-only-about-recruiting-talent-claims-ceo.Google Scholar
Shameli-Sendi, Alireza, Ezzati-Jivan, Naser, Jabbarifar, Masoume and Dagenais, Michael (2012), ‘Intrusion response systems: Survey and taxonomy’, International Journal of Computer Science and Network Security 12, no. 1: 114.Google Scholar
Shannon, Claude E. (1949), ‘Communication theory of secrecy systems’, The Bell System Technical Journal 28, no. 4: 656715.CrossRefGoogle Scholar
Shim, Doobo (1998), ‘From yellow peril through model minority to renewed yellow peril’, Journal of Communication Inquiry 22, no. 4: 385409.CrossRefGoogle Scholar
Shostack, Adam (2012), ‘The evolution of information security’, The Next Wave: The National Security Agency’s Review of Emerging Technologies 19, no. 2: 611.Google Scholar
Siaterlis, Christos and Genge, Béla (2014), ‘Cyber-physical testbeds’, Communications of the ACM 57, no. 6: 6473.CrossRefGoogle Scholar
Singer, P.W. and Friedman, Allan (2014), Cybersecurity and Cyberwar: What Everyone Needs to Know (New York: Oxford University Press).CrossRefGoogle Scholar
Sky News (2013), bulletin, 8 January.Google Scholar
Slack, Jennifer Daryl (1984), ‘The information revolution as ideology’, Media, Culture and Society 6, no. 3: 247–56.CrossRefGoogle Scholar
Smith, Chloe (2012), speech to London Conference on Cyberspace, 6 November, www.gov.uk/government/speeches/chloe-smith-speaks-at-cyber-security-summit.Google Scholar
Smith, George (1998), ‘An electronic Pearl Harbor? Not likely’, Issues in Science and Technology 15, no. 1: 6873.Google Scholar
Smith, John E. (1969), ‘Time, times, and the “right time”; Chronos and kairos’, The Monist 53, no. 1: 113.CrossRefGoogle Scholar
Smith, John E. (1986), ‘Time and qualitative time’, The Review of Metaphysics 40, no. 1: 316.Google Scholar
Smith, Roger (2010), ‘The long history of gaming in military training’, Simulation and Gaming 41, no. 1: 619.CrossRefGoogle Scholar
Smith, Steve (1999), ‘The increasing insecurity of security studies: Conceptualizing security in the last twenty years’, Contemporary Security Policy 20, no. 3: 72101.CrossRefGoogle Scholar
Smoke, Richard (1993), National Security and the Nuclear Dilemma: An Introduction to the American Experience in the Cold War, 3rd edn (New York: McGraw-Hill).Google Scholar
Solomon, Ty (2014), ‘Time and subjectivity in world politics’, International Studies Quarterly 58, no. 4: 671–81.CrossRefGoogle Scholar
Spellman, Frank R. and Stoudt, Melissa L. (2011), Nuclear Infrastructure Protection and Homeland Security (Lanham, MD: Government Institutes).Google Scholar
Stakhanova, Natalia, Basu, Samik and Wong, Johnny (2007), ‘A taxonomy of intrusion response systems’, International Journal of Information and Computer Security 1, nos. 1–2: 169–84.CrossRefGoogle Scholar
Star, Susan Leigh (1999), ‘The ethnography of infrastructure’, American Behavioral Scientist 43, no. 3: 377–91.CrossRefGoogle Scholar
Starr, Harvey (2013), ‘On geopolitics: Spaces and places’, International Studies Quarterly 57, no. 3: 433–39.CrossRefGoogle Scholar
Staudenmeier, John M. (1985), Technology’s Storytellers: Reweaving the Human Fabric (Cambridge, MA: MIT Press).Google Scholar
Steele, Brent J. (2007), ‘Liberal-idealism: A constructivist critique’, International Studies Review 9, no. 1: 2352.CrossRefGoogle Scholar
Steele, Brent J. (2008), Ontological Security In International Relations: Self-Identity and the IR State (London: Routledge).CrossRefGoogle Scholar
Stephens, Carlene (1989), ‘“The most reliable time”: William Bond, the New England railroads, and time awareness in 19th-century America’, Technology and Culture 30, no. 1: 124.Google Scholar
Sterling, Bruce (2010), ‘Atemporality for the creative artist’, Transmediale 10, Berlin, 6 February, www.wired.com/beyond_the_beyond/2010/02/atemporality-for-the-creative-artist/.Google Scholar
Stevens, Tim (2012), ‘A cyberwar of ideas? Deterrence and norms in cyberspace’, Contemporary Security Policy 33, no. 1: 148–70.CrossRefGoogle Scholar
Stevens, Tim (2013a), ‘Information warfare: A response to Taddeo’, Philosophy and Technology 26, no. 2: 221–25.CrossRefGoogle Scholar
Stevens, Tim (2013b), ‘DEFCON to feds: “We need some time apart”’, Assembling Security, 11 July, http://assemblingsecurity.wordpress.com/2013/07/11/defcon-feds/.Google Scholar
Stevenson, David (2014), ‘Learning from the past: The relevance of international history’, International Affairs 90, no. 1: 522.CrossRefGoogle Scholar
Stewart, William (2014), ‘Pupils to be taught cyber-security from age 11 to help tackle online crime’, Times Educational Supplement, 13 March.Google Scholar
Stibitz, George (1945), ‘Relay computers’, National Defense Research Committee, Applied Mathematics Panel, AMP Report 171.1R.Google Scholar
Stockdale, Liam P.D. (2013), ‘Imagined futures and exceptional presents: A conceptual critique of “pre-emptive security”’, Global Change, Peace and Security 25, no. 2: 141–57.CrossRefGoogle Scholar
Stone, Deborah A. (1989), ‘Causal stories and the formation of policy agendas’, Political Science Quarterly 104, no. 2: 281300.CrossRefGoogle Scholar
Stone, John (2013), ‘Cyber war will take place!’, Journal of Strategic Studies 36, no. 1: 101–8.CrossRefGoogle Scholar
Stronach, Ian, Clarke, John and Frankham, Jo (2014), ‘Economic “revelations” and the metaphors of the meltdown: An educational deconstruction’, British Educational Research Journal 40, no. 2: 319–36.CrossRefGoogle Scholar
Sturken, Marita (1997), Tangled Memories: The Vietnam War, the AIDS Epidemic, and the Politics of Remembering (Berkeley, CA: University of California Press).Google Scholar
Sulek, David and Moran, Ned (2009), ‘What analogies can tell us about the future of cybersecurity’, in The Virtual Battlefield: Perspectives on Cyber Warfare, ed. Czosseck, Christian and Geers, Kenneth (Amsterdam: IOS Press), 118–31.Google Scholar
Summers, Rita C. (1984), ‘An overview of computer security’, IBM Systems Journal 23, no. 4: 309–25.CrossRefGoogle Scholar
Swyngedouw, Erik (2013), ‘Apocalypse now! Fear and doomsday pleasures’, Capitalism Nature Socialism 24, no. 1: 918.CrossRefGoogle Scholar
Tapia, Andrea H. (2003), ‘Technomillennialism: A subcultural response to the technological threat of Y2K’, Science, Technology and Human Values 28, no. 4: 483512.CrossRefGoogle Scholar
Taylor, Anthony (2012), London’s Burning: Pulp Fiction, the Politics of Terrorism and the Destruction of the Capital in British Popular Culture, 1840–2005 (London: Continuum).Google Scholar
Taylor, Charles (2004), Modern Social Imaginaries (Durham, NC: Duke University Press).CrossRefGoogle Scholar
Taylor, Paul (2012), ‘Former US spy chief warns on cybersecurity’, Financial Times, 2 December.Google Scholar
Taylor, Paul A. (1999), Hackers: Crime in the Digital Sublime (London: Routledge).Google Scholar
Tegmark, Max and Bostrom, Nick (2005), ‘Is a doomsday catastrophe likely?’, Nature 438: 754.CrossRefGoogle ScholarPubMed
Teske, Roland J. (2000), ‘William of Auvergne on time and eternity’, Traditio 55: 125–41.CrossRefGoogle Scholar
Tennyson, Alfred (1971), ‘Ode on the death of the Duke of Wellington’, Poems and Plays, ed. Warren, T. Herbert (Oxford University Press).Google Scholar
The Economist (2012), ‘Hype and fear’, 8 December, 62.Google Scholar
Thibodeau, Patrick (2013), ‘Fear of thinking war machines may push US to exascale’, ComputerWorld, 20 June, www.computerworld.com/s/article/9240230/Fear_of_thinking_war_machines_may_push_U.S._to_exascale.Google Scholar
Thierer, Adam (2013), ‘Technopanics, threat inflation, and the danger of an information technology precautionary principle’, Minnesota Journal of Law, Science and Technology 14, no. 1: 309–86.Google Scholar
Thompson, E.P. (1967), ‘Time, work-discipline and industrial capitalism’, Past and Present 38: 5697.CrossRefGoogle Scholar
Thoreau, Henry David (1888) [1854], Walden (London: Walter Scott).Google Scholar
Thrift, Nigel (2008), Non-Representational Theory: Space, Politics, Affect (London: Routledge).CrossRefGoogle Scholar
Tierney, Kathleen, Bevc, Christine and Kuligowski, Erica (2006), ‘Metaphors matter: Disaster myths, media frames, and their consequences in Hurricane Katrina’, The Annals of the American Academy of Political and Social Science 604, no. 1: 5781.CrossRefGoogle Scholar
Todorova, Maria (2005), ‘The trap of backwardness: Modernity, temporality, and the study of Eastern European nationalism’, Slavic Review 64, no. 1: 140–64.CrossRefGoogle Scholar
Toulmin, Stephen and Goodfield, June (1965), The Discovery of Time (London: Hutchinson).Google Scholar
Trigger, Bruce G. (1989), A History of Archaeological Thought (Cambridge University Press).Google Scholar
Tsouras, Peter G., ed. (2000), The Greenhill Dictionary of Military Quotations (London: Greenhill Books).Google Scholar
Tsutsui, William M. (2010), ‘Oh no, there goes Tokyo: Recreational apocalypse and the city in postwar Japanese popular culture’, in Noir Urbanisms: Dystopic Images of the Modern City, ed. Prakash, Gyan (Princeton University Press), 104–26.Google Scholar
Urbelis, Alexander (2005), ‘Toward a more equitable prosecution of cybercrime: Concerning hackers, criminals, and the national security’, Vermont Law Review 29, no. 4: 9751008.Google Scholar
Urry, John (1994), ‘Time, leisure and social identity’, Time and Society 3, no. 2: 131–49.CrossRefGoogle Scholar
US Commodity Futures Trading Commission and US Securities and Exchange Commission (2010), Findings Regarding the Market Events of May 6, 2010: Report of the Staffs of the CFTC and SEC to the Joint Advisory Committee on Emerging Regulatory Issues (Washington, DC: CFTC/SEC).Google Scholar
US Department of Justice (1998), ‘Israeli citizen arrested in Israel for hacking United States and Israeli government computers’, 18 March, www.justice.gov/opa/pr/1998/March/125.htm.html.Google Scholar
US Joint Chiefs of Staff (2013), Cyberspace Operations, Joint Publication 3–12 (R), http://fas.org/irp/doddir/dod/jp3_12r.pdf.Google Scholar
Van Creveld, Martin (1989), Technology and War: From 2000 BC to the Present, rev. and expanded edn (New York: The Free Press).Google Scholar
Van Creveld, Martin (2013), Wargames: From Gladiators to Gigabytes (Cambridge University Press).CrossRefGoogle Scholar
Van Loon, Joost (2000), ‘Imminent immanence: The time-politics of speed and the management of decline’, Time and Society 9, nos. 2–3: 347–53.CrossRefGoogle Scholar
Vatis, Michael (2002), ‘Cyber attacks: Protecting America’s security against digital threats’, ESDP Discussion Paper 2002–04 (Cambridge, MA: John F. Kennedy School of Government, Harvard University).Google Scholar
Vaughan-Williams, Nick (2005), ‘International Relations and the “problem of history”’, Millennium: Journal of International Studies 34, no. 1: 115–36.Google Scholar
Verbeek, Peter-Paul (2004), What Things Do: Philosophical Reflections on Technology, Agency, and Design (University Park, PA: Pennsylvania State University Press).Google Scholar
Vieira, Ryan Anthony (2011), ‘Connecting the new political history with recent theories of temporal acceleration: Speed, politics, and the cultural imagination of fin de siècle Britain’, History and Theory 50, no. 3: 373–89.CrossRefGoogle Scholar
Viereck, Peter (1949), ‘The poet in the machine age’, Journal of the History of Ideas 10, no. 1: 88103.CrossRefGoogle Scholar
Virilio, Paul (1993) [1976], L’Insécurité du Territoire, 2nd edn (Paris: Galilée).Google Scholar
Virilio, Paul (1997) [1995], Open Sky, tr. Rose, Julie (London: Verso).Google Scholar
Virilio, Paul (2000) [1990], Polar Inertia, tr. Camiller, Patrick (London: Sage).CrossRefGoogle Scholar
Virilio, Paul (2004), ‘The last vehicle’, in The Paul Virilio Reader, ed. Redhead, Steve (New York: Columbia University Press), 109–20.Google Scholar
Virilio, Paul (2007) [2005], The Original Accident, tr. Rose, Julie (Cambridge: Polity).Google Scholar
Virilio, Paul (2009) [1980], The Aesthetics of Disappearance, tr. Beitchman, Philip (Los Angeles, CA: Semiotext(e)).Google Scholar
Virilio, Paul (2012) [2010], The Great Accelerator, tr. Rose, Julie (Cambridge: Polity).Google Scholar
Virilio, Paul and Armitage, John (2011), ‘The third war: Cities, conflict and contemporary art: Interview with Paul Virilio’, in Virilio Now: Current Perspectives in Virilio Studies, ed. Armitage, John (Cambridge: Polity), 2945.Google Scholar
Virilio, Paul, Courtois, Gérard and Guerrin, Michel (2008), ‘Le krach actuel représente l’accident intégral par excellence’, Le Monde, 18 October.Google Scholar
Virilio, Paul and Der Derian, James (1998), ‘“Is the author dead?”—An interview with Paul Virilio’, in The Virilio Reader, ed. Derian, James Der (Malden, MA: Blackwell Publishers), 1621.Google Scholar
Virilio, Paul and Petit, Philippe (1999) [1996], Politics of the Very Worst: An Interview by Philippe Petit, tr. Cavaliere, Michael, ed. Lotringer, Sylvère (New York: Semiotext(e)).Google Scholar
Von Uexküll, Jakob (1957) [1934], ‘A stroll through the worlds of animals and men: A picture book of invisible worlds’, in Instinctive Behavior: The Development of a Modern Concept, tr. and ed. Schiller, Claire H. (New York: International Universities Press, Inc.), 580.Google Scholar
Walker, Jeremy and Cooper, Melinda (2011), ‘Genealogies of resilience: From systems ecology to the political economy of crisis adaptation’, Security Dialogue 42, no. 2: 143–60.CrossRefGoogle Scholar
Walker, R.B.J. (1989), ‘History and structure in the theory of International Relations’, Millennium: Journal of International Studies 18, no. 2: 163–83.Google Scholar
Walker, R.B.J. (1993), Inside/Outside: International Relations as Political Theory (Cambridge University Press).Google Scholar
Walker, R.B.J. (1997), ‘The subject of security’, in Critical Security Studies: Concepts and Cases, ed. Krause, Keith and Williams, Michael C. (London: Routledge), 6181.Google Scholar
Walpole, Horace (1973), ‘Letter to Thomas Walpole the Younger, Saturday 19 February 1785’, Horace Walpole’s Correspondence, vol. XXXVI, ed. Lewis, W.S. (New Haven, CT: Yale University), 231–3.Google Scholar
Ward, Koral (2008), Augenblick: The Concept of the ‘Decisive Moment’ in 19th- and 20th-Century Philosophy (Aldershot: Ashgate).Google Scholar
Warrell, Helen (2014), ‘Cyber security industry sends recruiting officers into schools’, FT.com, 22 October 2014, www.ft.com/cms/s/0/ae43a730-5a00-11e4-8771-00144feab7de.html#axzz3MA5xiWh1.Google Scholar
Watson, Julie (2011), ‘Mock city rises at Marine base for urban training’, Associated Press, 25 January.Google Scholar
Watson, Jonathan (2012), ‘Getting serious about security’, Business Technology, April, 9.Google Scholar
Webster, Frank (2006) [1995], Theories of the Information Society, 3rd edn (London: Routledge).Google Scholar
Webster, Frank and Robins, Kevin (1986), Information Technology: A Luddite Analysis (Norwood, NJ: Ablex Publishing Corporation).Google Scholar
Weinberger, Sharon (2008), ‘Cyberwarfare: DARPA’s new “space race”’, Danger Room, 1 May, www.wired.com/dangerroom/2008/05/the-pentagon-wa-2/.Google Scholar
Weithman, Paul (2001), ‘Augustine’s political philosophy’, in The Cambridge Companion to Augustine, ed. Stump, Eleonore and Kretzmann, Norman (Cambridge University Press, 2001), 234–52.Google Scholar
Wells, H.G. (1913), The Discovery of the Future (New York: B.W. Huebsch).Google Scholar
Wells, H.G. (1934) [1931], The Work, Wealth and Happiness of Mankind, new and rev. edn (London: William Heinemann).Google Scholar
Wendt, Alexander (2003), ‘Why a world state is inevitable’, European Journal of International Relations 9, no. 4: 491542.CrossRefGoogle Scholar
Wertheim, Margaret (1999), The Pearly Gates of Cyberspace: A History of Space from Dante to the Internet (London: Virago).Google Scholar
Wessinger, Catherine (1997), ‘Millennialism with and without the mayhem’, in Millennium, Messiahs, and Mayhem: Contemporary Apocalyptic Movements, ed. Robbins, Thomas and Palmer, Susan J. (New York: Routledge), 4759.Google Scholar
Wesson, Paul S. (2010), ‘Time as an illusion’, in Minkowski Spacetime: A Hundred Years Later, ed. Petkov, Vesselin (New York: Springer), 307–18.Google Scholar
West, Mark and Carey, Chris (2006), ‘(Re)enacting frontier justice: The Bush administration’s tactical narration of the Old West fantasy after September 11’, Quarterly Journal of Speech 92, no. 4: 379412.CrossRefGoogle Scholar
Wheeler, John Archibald Wheeler (1982), ‘The computer and the universe’, International Journal of Theoretical Physics 21, nos. 6–7: 557–72.CrossRefGoogle Scholar
White, Jonathan (2013), ‘Thinking generations’, British Journal of Sociology 64, no. 2: 216–47.CrossRefGoogle ScholarPubMed
Whitehead, Alfred North (1920), The Concept of Nature (Cambridge University Press).Google Scholar
White House (2003), The National Strategy to Secure Cyberspace (Washington, DC: White House).Google Scholar
White House (2009), Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure (Washington, DC: White House).Google Scholar
White House (2011), International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Washington, DC: White House).Google Scholar
White House (2013a), Improving Critical Infrastructure Cybersecurity, Executive Order 13636.Google Scholar
White House (2013b), Critical Infrastructure Security and Resilience, Presidential Policy Directive 21.Google Scholar
Williams, Donald C. (1951), ‘The myth of passage’, The Journal of Philosophy 48, no. 15: 457–72.CrossRefGoogle Scholar
Williams, Michael C. (2012), ‘The new economy of security’, Global Crime 13, no. 4: 312–19.CrossRefGoogle Scholar
Williams, Stewart (2012), ‘Rendering the untimely event of disaster ever present’, Landscape Review 14, no. 2: 8696.Google Scholar
Wilson, Clay (2005), Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress (Washington, DC: Congressional Research Service).Google Scholar
Wilson, Eric (2012), ‘Criminogenic cyber-capitalism: Paul Virilio, simulation, and the global financial crisis’, Critical Criminology 20, no. 3: 249–74.CrossRefGoogle Scholar
Winner, Langdon (2004), ‘Trust and terror: The vulnerability of complex socio-technical systems’, Science as Culture 13, no. 2: 155–72.CrossRefGoogle Scholar
Winthrop-Young, Geoffrey (2010), ‘Afterword: Bubbles and webs: A backdoor stroll through the readings of Uexküll’, in von Uexküll, Jakob, A Foray into the Worlds of Animals and Humans: With a Theory of Meaning, tr. O’Neil, Joseph D. (Minneapolis, MN: University of Minnesota Press), 209–43.Google Scholar
Wohlstetter, Roberta (1962), Pearl Harbor: Warning and Decision (Stanford University Press).CrossRefGoogle Scholar
Wojcik, Daniel (1997), The End of the World as We Know It: Faith, Fatalism, and Apocalypse in America (New York University Press).Google Scholar
Wolfers, Arnold (1952), ‘National security as ambiguous symbol’, Political Science Quarterly 67, no. 4: 481502.CrossRefGoogle Scholar
Woodcock, George (1977), ‘The tyranny of the clock’, in The Anarchist Reader, ed. Woodcock, George (Hassocks: Harvester Press), 132–6.Google Scholar
Woodward, Bob (2002), Bush at War (New York: Simon & Schuster).Google Scholar
World Economic Forum (2014), Global Risks 2014, 9th edn (Geneva: World Economic Forum).Google Scholar
Yeats, William Butler (2008), ‘The second coming’, The Collected Poems of W.B. Yeats (Ware: Wordsworth Editions).Google Scholar
Yould, Rachel E.D. (2003), ‘Beyond the American fortress: Understanding homeland security in the information age’, in Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Society, ed. Latham, Robert (New York: The New Press), 7498.Google Scholar
Zenko, Micah (2013), ‘Most. Dangerous. World. Ever’, Foreign Policy, 26 February, www.foreignpolicy.com/articles/2013/02/26/most_dangerous_world_ever.Google Scholar
Zerubavel, Eviatar (1987), ‘The language of time: Toward a semiotics of temporality’, The Sociological Quarterly 28, no. 3: 343–56.CrossRefGoogle Scholar
Zetter, Kim (2014), ‘Meet MonsterMind, the NSA bot that could wage cyberwar autonomously’, Wired, 13 August 2014, www.wired.com/2014/08/nsa-monstermind-cyberwarfare/.Google Scholar
Zimmerman, Rae (2001), ‘Social implications of infrastructure network interactions’, Journal of Urban Technology 8, no. 3: 97119.CrossRefGoogle Scholar
Zittrain, Jonathan (2008), The Future of the Internet—And How to Stop It (London: Penguin).Google Scholar
Zuccato, Albin (2007), ‘Holistic security management framework applied in electronic commerce’, Computers and Security 26, no. 3: 256–65.CrossRefGoogle Scholar
Zurbrugg, Nicholas (1999), ‘Virilio, Stelarc and “terminal” technoculture’, Theory, Culture and Society 16, nos. 5–6: 177–99.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Tim Stevens, King's College London
  • Book: Cyber Security and the Politics of Time
  • Online publication: 05 October 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316271636.010
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Tim Stevens, King's College London
  • Book: Cyber Security and the Politics of Time
  • Online publication: 05 October 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316271636.010
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Tim Stevens, King's College London
  • Book: Cyber Security and the Politics of Time
  • Online publication: 05 October 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316271636.010
Available formats
×