El sistema internacional cibernético: elementos de análisis
The international cybersystem: elements of analysis
Contenido principal del artículo
Resumen
Este artículo aporta algunas consideraciones sobre el debate de cuestiones cibernéticas y sus efectos sobre el entendimiento de nuevas temáticas de seguridad internacional. Además, propone la adopción de metodologías de la disciplina de relaciones internacionales para estudiar asuntos cibernéticos de carácter global. El artículo concluye con algunos lineamientos para profundizar acerca del análisis de temas cibernéticos con una perspectiva internacional.
Palabras clave:
Descargas
Detalles del artículo
Referencias (VER)
Allison, G. T. & Zelikow, P. (1999). Essence of Decision: Explaining the Cuban Missile Crisis, 2a. ed., Nueva York: Longman.
Adler, E. (1992). The Emergence of Cooperation: Natio¬nal Epistemic Communities and the International Evolution of the idea of Nuclear Arms Control. International Organization, 46(1), 101-145. DOI: https://doi.org/10.1017/S0020818300001466
Adler, E. (1997). Seizing the Middle Ground: Cons¬tructivism in World Politics. European Journal of International Relations, 3(3), 319-363. DOI: https://doi.org/10.1177/1354066197003003003
Arquilla, J. & Ronfeldt, D. (1993). Cyberwar is Coming! Comparative Strategy, 12(2), 141-165. DOI: https://doi.org/10.1080/01495939308402915
Beckley, M. (2011). China’s Century? Why America’s Edge Will Endure. International Security, 36(3), 41-78. DOI: https://doi.org/10.1162/ISEC_a_00066
Benedikt, M. (1994). Cyberspace: first steps. Cambridge, MA: mit Press.
Betz, D. (2012). Cyberpower in Strategic Affairs: Neither Unthinkable Nor Blessed. Journal of Strategic Stu¬dies, 35(5), 689-711. DOI: https://doi.org/10.1080/01402390.2012.706970
Borg, S. (2005). Economically Complex Cyberattacks. IEEE Security and Privacy Magazine, 3(6), 64-67. DOI: https://doi.org/10.1109/MSP.2005.146
Brenner, J. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. Nueva York: Penguin.
Brito, J. & Watkins, T. (2011). Loving the cyber bomb? The dangers of threat inflation. Arlington, VA: George Mason University.
Buzan, B. & Hansen, L. (2009). The Evolution of Inter¬national Security Studies. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511817762
Camilleri, J. A. & Falk, J. (1992). The End of Sovereignty? The Politics of a Shrinking and Fragmenting World. Aldershot: Edward Elgar.
Castells, M. (2009). Comunicación y poder. Madrid: Alianza Editorial.
Choucri, N. (2012). Cyber Politics in International Rela¬tions. Cambridge: mit Press. DOI: https://doi.org/10.7551/mitpress/7736.001.0001
Clark, D. D. (2010). Characterizing Cyberspace: past, presente and future. Cambridge: mit Press.
Clarke, R. A. & Knake, R. K. (2010). Cyber War: The Next Threat . Nueva York: Ecco.
Craig, A. J. & Valeriano, B. (2018). Realism and Cyber Conflict: Security in the Digital Age. In D. Orsi, J. R. Avgustin, & M. Nurnus, Realism in Practice: An Appraisal (pp. 85-101). Bristol, Reino Unido: E-International Relations Publishing.
Crosset, V. & Dupont, B. (2018). Internet et propagande jihadiste: la régulation polycentrique du cyberes¬pace. Critique Internationale, 78(1), 107-125. DOI: https://doi.org/10.3917/crii.078.0107
Deibert, R. J. (2003). Black code: censorship, surveillan¬ce, and militarization of cyberspace. Millennium, 32(2), 501-530. DOI: https://doi.org/10.1177/03058298030320030801
Deibert, R. J. (2013). Black code: surveillance, privacy, and the dark side of the internet. Toronto: McCle¬lland & Stewart.
Deibert, R. J. & Rohozinsky, R. (2010). Liberation vs Control in Cyberspace. Journal of Democracy, 21(4), 43-57. DOI: https://doi.org/10.1353/jod.2010.0010
Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2010). Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/8551.001.0001
Deibert, R.; Palfrey, J.; Rohozinski, R. & Zittrain, J. (2012). Access Contested: Security, Identity, and Resistance in Asian Cyberspace. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/9780262016780.001.0001
Deibert, R.; Palfrrey, J.; Rohozinski, R. & Zittrain. (2008). Access Denied: the Practice and Policy of Global Inter¬net Filtering. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/7617.001.0001
Demchak, C. C. (2011). Wars of Disruption and Resilien¬ce: Cybered Conflict, Power, and National Security. Athens: University of Georgia Press.
DeNardis, L. (2009). Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: mit Press. DOI: https://doi.org/10.7551/mitpress/9780262042574.001.0001
DeNardis, L. (2014). The Global War for Internet Gover¬nance. New Haven: Yale University Press. DOI: https://doi.org/10.12987/yale/9780300181357.001.0001
Deutsch, K. (1963). The Nerves of the Government: Models of Political Communications and Control. Nueva York: Glencoe.
Dobbins, J. (2012). War with China. Survival, 54(4), 7-24. DOI: https://doi.org/10.1080/00396338.2012.709384
Drezner, D. W. (2009). Bad Debts Assesing China’s Influence in Great Power Politics. International Security, 34(2), 7-45. DOI: https://doi.org/10.1162/isec.2009.34.2.7
Dunn Cavelty, M. (2008a). Cyber-Security and Threats Politics: U.S. Efforts to Secure the Information Age. Nueva York: Routledge. DOI: https://doi.org/10.4324/9780203937419
Dunn Cavelty, M. (2008b). Cyber-terror, looming threat or phantom menace: the framing of the US cyber-threat debate. Journal of Information & Technology Politics, 4(1), 19-36. DOI: https://doi.org/10.1300/J516v04n01_03
Ebert, H. & Maurer, T. (2014). Revendications sur le cyberespace et puissances émergentes. Hérodote, 152-153(1), 276-295. DOI: https://doi.org/10.3917/her.152.0276
Edde, R. (2018). Le droit? Un outil de régulation du cyberespace? Le cas du droit à l’oubil numérique. Homme et la Societe, 206(1), 69-94. DOI: https://doi.org/10.3917/lhs.206.0069
Eriksson, J. & Giacomello, G. (. (2007). International Relations and Security in the Digital Age. Londres, Nueva York: Routledge. DOI: https://doi.org/10.4324/9780203964736
Eriksson, J. & Giacomello, G. (2006). The information revolution, security and international relations: the (IR) relevant theory? International Political Science Review, 27(3), 221-244. DOI: https://doi.org/10.1177/0192512106064462
Escobar, A. (06/1994). Welcome to cyberia: notes on the anthology of cyberculture. Current Anthropology, 35(3), 211-231. DOI: https://doi.org/10.1086/204266
Fearon, J. D. & Wendt, A. (2002). Realism v. Construc¬tivism: A Skeptical View. In Handbook of Inter¬national Relations. Londres: Sage Publications.
Finnemore, M. & Sikkink, K. (1998). International Norm Dynamics and Political Change. Interna¬tional Organization, 52(4), 887-917. DOI: https://doi.org/10.1162/002081898550789
Foot, R. & Walter, A. (2010). China, the United States, and the Global Order. Nueva York: Oxford Uni¬versity Press. DOI: https://doi.org/10.1017/CBO9780511782015
Franda, M. F. (2001). Governing the Internet: The Emer¬gence of an International Regime. Boulder, CO: Lynne Rienner.
Friedberg, A. L. (2011). A Contest for Supremacy: China, America and the Struggle for Mastery in Asia. Nueva York: W.W. Norton.
Friis, K. & Ringsmose, J. (n.d.). Conflict in Cyber Space: Theoretical, Strategic, and Legal Perspectives. Lon¬dres: Routledge.
Glaser, C. L. (2004). When Are Arms Races Dangerous? Rational versus Suboptimal Arming. International Security, 28(4), 44-84. DOI: https://doi.org/10.1162/0162288041588313
Gartzke, E. (2013). The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth. Inter¬national Security, 38(2), 41-73. DOI: https://doi.org/10.1162/ISEC_a_00136
Gilpin, R. (1981). War and Change in World Politics. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511664267
Gilpin, R. (1986). The Richness of the Tradition of Po¬litical Realism. In R. Keohane, Neorealism and Its Critics. New York: Columbia University Press.
Giacomello, G. (2005). National Governments and Con¬trol of the Internet: A Digital Challenge. Londres: Routledge.
Gibson, W. (1984). Neuromancer. Nueva York: Ace.
Goldsmith, J. L. & Wu, T. (2006). Who Controls the Internet: Illusions of a Borderless World. Oxford: Oxford University Press. DOI: https://doi.org/10.1093/oso/9780195152661.001.0001
Goldstein, L. (2015). Meeting China Halfway. Washing¬ton, DC: Georgetown University Press.
Gourevitch, P. (1978). The Second Image Reversed: The International Sources of Domestic Politics. Inter¬national Organization, 32(4), 881-912. DOI: https://doi.org/10.1017/S002081830003201X
Hansen, L. & Nissenbaum, H. (2009). Digital disas¬ter: cyber security, and the Copenhagen School. International Studies Quarterly (4), 1155-1175. DOI: https://doi.org/10.1111/j.1468-2478.2009.00572.x
Herz, M. (2013). Seguridad. In T. Legler, A. Santa Cruz, L. Zamudio (eds.), Introducción a las relaciones internacionales: América Latina y la política global (pp. 123-133). México: Oxford University Press.
Ikenberry, J. (2009). Liberal Internationalism 3.0: Ame¬rica and the Dilemmas of World Order. Perspecti¬ves on Politics, 7(1), 71-87. DOI: https://doi.org/10.1017/S1537592709090112
Jacques, M. (2009). When China Rules the World: The End of the Western World and the Birth of a New Global Order. Nueva York: Penguin.
Jervis, R. (1979). Deterrence Theory Revisited. World Politics, 31(2), 289-324. DOI: https://doi.org/10.2307/2009945
Johnston, A. I. (2013). How New and Assertive is China’s New Assertiveness? International Security, 37(4), 7-48. DOI: https://doi.org/10.1162/ISEC_a_00115
Junio, T. J. (2013). How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate. Journal of Strategic Studies, 36(1), 125-133. DOI: https://doi.org/10.1080/01402390.2012.739561
Klimburg, A. (2017). The Darkening Web: The War for Cyberspace. New York: Penguin Press.
Kello, L. (2013). The meaning of cyber revolution: perils to theory and statecraft. International Security, 38(2), 7-40. DOI: https://doi.org/10.1162/ISEC_a_00138
Kennedy, P. (1987). The Rise and Fall of Great Powers. Nueva York: Random House.
Keohane, R. (1984). After Hegemony: Cooperation and Discord in the World Political Economy. Princeton: Princeton University Press.
Keohane, R. O. & Nye, J. S. (1977). Power and Inter¬dependence: World Politics. Boston: Little Brown.
Keohane, R. & Nye, J. S. (1998). Power and Interde¬pendence in the Information Age. Foreign Affairs, 77(5), 81-94. DOI: https://doi.org/10.2307/20049052
Khanna, P. (2016). Connectography: mapping the future of global civilization. Nueva York: Random House.
Kirshner, J. (2010). The Tragedy of Offensive Realism: Classical Realism and the Rise of China. European Journal of International Relations, 18(1), 53-75. DOI: https://doi.org/10.1177/1354066110373949
Kramer, F. D.; Starr, S. H.; Wentz, L. K. & (eds.). (2009). Cyberpower and National Security. Washington, DC: Potomac.
Krauthamer, C. (31/07/1995). Why We Must Contain China. Time.
Krishna-Hensel, S. F. (2007). Preface. Cybersecurity: Perspectives on the Challenges of the Information Revolution. In M. Dunn Cavelty, V. Mauer, S. F.
Krishna-Hensel (eds.), Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. Londres: mpg Books.
Kupchan, C. (2012). No One’s World: the West, the Rising Rest, and the Coming Global Turn. New York: Oxford University Press. DOI: https://doi.org/10.1093/acprof:osobl/9780199739394.001.0001
Lawson, S. (2013). Beyond Cyber-Doom: Assesing the Limits of Hypothetical Scenarios in the Framing of Cyber Threats. Journal of Information Tehcno¬logy & Politics, 10(1), 86-103. DOI: https://doi.org/10.1080/19331681.2012.759059
Layne, C. (2006). The Unipolar Illusion Revisited: the Coming End of the United States ‘Unipolar Mo¬ment’. International Security, 31(2), 7-41. DOI: https://doi.org/10.1162/isec.2006.31.2.7
Layne, C. (2009). The Unipolar Illusion Revisited: The Coming End of the United States’ Unipolar Moment. International Security, 34(1), 147-172.
Layne, C. (2009). The Waning of U.S. Hegemony: Myth or Reality? A Review Essay. International Security, 34(1), 147-172. DOI: https://doi.org/10.1162/isec.2009.34.1.147
Li, R. (2009). A Rising China and Security in East Asia: Identity Construction and Security Discourse. Lon¬dres: Routledge. DOI: https://doi.org/10.4324/9780203886946
Libicki, M. C. (2007). Conquest in cyberspace: national security and information warfare. Nueva York: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511804250
Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica, CA: rand.
Liff, A. P. (2012). Cyberwar: a new absolute weapon? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401-428. DOI: https://doi.org/10.1080/01402390.2012.663252
Lindsay. (2013). Stuxnet and the Limits of Cyber War¬fare. Security Studies, 22(3), 365-404. DOI: https://doi.org/10.1080/09636412.2013.816122
Lindsay, J. R. (2015a). The impact of China cybersecu¬rity: fiction and friction. International Security, 39(3), 7-47. DOI: https://doi.org/10.1162/ISEC_a_00189
Lindsay, J. R. (2015b). Introduction. In J. R. Lindsay, T. Cheung, D. Reveron & (eds.), China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Area (pp. 1-26). Nueva York: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780190201265.001.0001
Mattelart, A. (2007). Historia de la sociedad de la infor¬mación. Barcelona: Paidós.
McEvoy, M. M. (2010). From global village to virtual battlespace: the colonizing of the internet and the extension of realpolitik. International Studies Quarterly, 54(2), 381-401. DOI: https://doi.org/10.1111/j.1468-2478.2010.00592.x
Mesa, L. (2009). El debate sobre la seguridad nacional en la República Islámica de Irán. Estudio del primer mandato del presidente hojatoleslam Seyed Moham¬med Khatami (1997-2001). México: El Colegio de México.
Mitrany, D. (1948). The Functional Approach to World Organization. International Affairs, 24(3), 350- 363. DOI: https://doi.org/10.2307/3018652
Moravcsik, A. (1998). Centralization or Fragmentation? Europe Facing Challenges of Deepening, Diversity, and Democracy. New York: Council on Foreign Relations.
Moravcsik, A. (1999). The Choice for Europe: Social Pur¬pose and State Power from Messina to Maastricht. Londres: UCL Press.
Morgenthau, H. J. (1948). Politics Among Nations: The Stru¬ggle for Power and Peace. New York: McGraw Hill.
Morozov, E. (2009). Cyber-scare: the exaggerated fear over digital warfare. Boston Review, 34(4).
Morozov, E. (2011). The Net Delusion: The Dark Side of Internet Freedom. Nueva York: Public Affairs.
Newitz, A. (16/09/2013). The Bizarre Evolution of the Word ‘Cyber’. Retrieved noviembre 12, 2018 from Gizmodo: https://io9.gizmodo.com/to¬day-cyber-means-war-but-back-in-the-1990s-it-mean-1325671487
Nye, J. (2010). Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. Cambridge: Harvard University.
Nye, J. S. (2004a). Soft Power: The Means to Success in World Politics. New York: Public Affairs.
Nye, J. S. (2004b). Power in the Global Information Age: From Realism to Globalization. Londres: Routledge.
Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18-38. DOI: https://doi.org/10.21236/ADA553620
Ohm, P. (2008). The Myth of the Superuser: Fear, Risk, and Harm Online. Univeristy of California Davis Law Review, 41(4), 1327-1402.
Owens, W. A.; Dam, K. W.; Lin, H. S. (eds.). (2009). Technology, Policy, Law, and Ethics Regarding U.S. Adquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press.
Palfrey, J. (2010). Four phases of internet regulation. Social Research, 77(3), 981-996.
Perrit, H. H. (1998). The Internet as a Threat to So¬vereignty? Thoughts on the Internet’s Role in Strenghtening National and Global Governance. Indiana Journal of Global Studies, 5(2), 423-442.
Petterson, D. (2013). Offensive Cyber Weapons: Cons¬truction, Development, Employment. Journal of Strategic Studies, 36(1), 120-124. DOI: https://doi.org/10.1080/01402390.2012.742014
Pillsbury, M. (2015). The Hundred Year Marathon: China’s Secret Strategy to Replace America’s as the Global Superpower. Nueva York: Henry Holt.
Rachman, G. (1996). Containing China. Washington Quarterly, 19(1), 129-140. DOI: https://doi.org/10.1080/01636609609550186
Rattray, G. J. (2001). Strategic Warfare in Cyberspace. Cambridge: MIT Press. DOI: https://doi.org/10.7551/mitpress/6483.001.0001
Reardon, R. & Nazli, C. (2012). The Role of Cyberspace in International Relations. San Diego, CA: ISA Annual Convention.
Reveron, D. S. (eds.). (2012). Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington, DC: Georgetown University Press.
Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 523-544. DOI: https://doi.org/10.1080/01402390.2011.608939
Risse-Kappen, T. (1995). Bringing Transnational Relations Back In: Non-State Actors, Domestic Structures, and International Institutions. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511598760
Rosenau, J. N. (1990). Turbulence in World Politics: A Theory of Change and Continuity. Princeton, NJ: Princeton University Press. DOI: https://doi.org/10.1515/9780691188522
Rosenau, J. N.; Singh, J. P. (2002). Information Tech¬nology and Global Politics: The Changing Scope of Power and Governance. Alabany: State University of New York Press.
Ross, R. (1997). Beijing as a Conservative Power. Foreign Affairs, 76(2), 33-44. DOI: https://doi.org/10.2307/20047935
Ruggie, J. G. (1983). Continuity and Transformation in the World Polity: Toward a Neorealist Theory Synthesis. World Politics, 35(2), 261-285. DOI: https://doi.org/10.2307/2010273
Ruggie, J. G. (1998). Constructing the World Polity: Es¬says on International Institutionalism. Londres: Routledge.
Russett, B. & Antholis, W. (1993). Grasping the World Polity: Essays on International Institutionalism. Londres: Routledge.
Schmidt, M. (13/03/2012). New interest in hacking as threat to security. The New York Times.
Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Indianapolis: Wiley.
Schweller, R. & Pu, X. (2011). After Unipolarity: China’s Vision of International Order in an Era of U.S. Decline. 36(1), 47-72. DOI: https://doi.org/10.1162/ISEC_a_00044
Sanger, D. (2012). Confront and conceal: Obama’s secret wars and surprising use of American power. Nueva York: Crown.
Santa Cruz, A. (2000). Un debate teórico empíricamente ilustrado: la construcción de la soberanía japonesa, 1853-1902. Guadalajara: Universidad de Gua¬dalajara.
Santa Cruz, A. (2013). Constructivismo. In T. Legler, A. Santa Cruz & L. Zamudio, Introducción a las relaciones internacionales: América Latina y la política global (pp. 36-50). México: Oxford University Press.
Sassen, S. (1998). On the Internet and Sovereignty. Indiana Journal of Global Legal Studies, 5(2), 545-559.
Shambaugh, D. (1996). Containment or Engagement of China: Calculating Beijing’s Responses. Inter¬national Security, 21(2), 180-209. DOI: https://doi.org/10.1162/isec.21.2.180
Shambaugh, D. (2013). China Goes Global: the Partial Power. Nueva York: Oxford University Press.
Shapiro, I. & Wendt, A. (1992). The Difference that Realism Makes. Politics & Society (2). DOI: https://doi.org/10.1177/0032329292020002004
Shirky, C. (2011). The Political Power of Social Media: Technology, the Public Sphere, and Political Change. Foreign Affairs, 90(1), 28-41.
Singer, P. W. & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Nueva York: Oxford University Press. DOI: https://doi.org/10.1093/wentk/9780199918096.001.0001
Snyder, J. (1991). Myths of Empire. Ithaca, NY: Cornell University Press.
Starrs, S. (2013). American Economic Power Hasn’t Declined- It Globalized! Summoning the Data and Taking Globalization Seriously. International Studies Quarterly, 57(4), 817-830. DOI: https://doi.org/10.1111/isqu.12053
Steinfeld, E. S. (2010). Playing our Game: Why China’s Economic Rise Doesn’t Threaten the West. Oxford: Oxford University Press.
Sterling-Folker, Jennifer. (2013). Making Sense of Interna¬tionl Relations Theory: Londres: Lyenne Rienner.
Stone, J. (2012). Cyber War Will Take Place! Journal of Strategic Studies, 36(1), 101-108. DOI: https://doi.org/10.1080/01402390.2012.730485
Tammen, R. L. (ed.). (2000). Power Transitions Strategies for the 21st Century. Nueva York: Chatham House.
Valeri, L. (2000). Securing Internet Society: Toward an International Regime for Information Assurance. Studies in Conflict and Terrorism, 23(2), 129-146. DOI: https://doi.org/10.1080/105761000265566
Valeriano, B. & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. Nueva York: Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780190204792.001.0001
Vaidhyanathan, S. (2018). Antisocial Media. Nueva York: Oxford University Press.
Van Evera, S. (1997). Guide to Methods for Students of Political Science. Ithaca, Londres: Cornell Uni¬versity Press.
Walker, R. B. (1993). Inside/Outside: International Rela¬tions ads Political Theory. Cambridge: Cambridge University Press.
Walt, S. (1994). The Reinaissance of Security Studies. International Studies Quarterly, 35(2), 211-239. DOI: https://doi.org/10.2307/2600471
Walt, S. M. (2010). Is the Cyber Threat Overblown? Retrieved enero 2, 2018 from Foreign Policy: http://walt.foreignpolicy.com/posts/2010/03/30/is_the_cyber_threat_overblown
Waltz, K. N. (1979). Theory of International Politics. Readings: Addison Wesley.
Weldes, J. (1996). Constructing National Interest. Eu¬ropean Journal of International Relations, 2(3), 335-370. DOI: https://doi.org/10.1177/1354066196002003001
Wendt, A. (1999). Social Theory of International Politics. Cambridge: Cambridge University Press. DOI: https://doi.org/10.1017/CBO9780511612183
Wiener, N. (1948). Cybernetics or Control and Commu¬nication in the Animal and the Machine. París: Hermann.
Wu, I. S. (2008). Information, identity and institutions. Institute for the Study of Diplomacy. Washing¬ton, DC: Georgetown University.
Zittrain, J. (2008). The future of the internet and how to stop it. New Haven: Yale University Press.