Passeri, Paolo Cyber Attacks Statistic, Hackmageddon, 4 September,

DAFTAR PUSTAKA Buku Boothby, William H. “Where Do Cyber Hostilities Fit in The International Law Maze.” dalam New Technologies and The Law of Armed C...
17 downloads 3 Views 67KB Size
DAFTAR PUSTAKA

Buku Boothby, William H. “Where Do Cyber Hostilities Fit in The International Law Maze.” dalam New Technologies and The Law of Armed Conflict, diedit oleh Hitoshi Nasu dan Robert McLauglin, 59-74. Hague: T.M.C. Asser Press, 2014. Bull, Hedley. The Anarchical Society: A Study of Order in World Politics. 3rd edn. New York: Palgrave MacMillan, 2002. Cavelty, Myriam Dunn. Cyber-Security and Threat Politics: US efforts to secure the information age. London & New York: Routledge, 2007. Chayes, Antonia. Borderless Wars. New York: Cambridge University Press, 2015. Clark, Robert M. Intelligence Collection. Los Angeles: CQ Press, 2015. Davis, Lyyn E. “Defining The Army’s Homeland Security Needs,” dalam The U.S. Army and the New National Security Strategy, diedit oleh Lynn E. Davis, et. al., 61-84. Santa Monica: RAND, 2003. Fielder, James D. “The Internet and Dissent in Authoritarian States,” dalam Conflict and Cooperation in Cyberspace: The Challenge to National Security, diedit oleh Panayotis A. Yannakogeorgos dan Adam B. Lowther, 161-191. London & New York: Taylor & Francis, 2014. Ghernaouti, Solange. Cyber Power: Crime, Conflict and Security in Cuberspace. Lausanne: EPFL Press, 2013. Giles, K., “Russia’s Public Stance on Cyberspace Issues,” dalam 2012 4th International Conference Cyber Conflict, diedit oleh Czosseck C., Ottis, R., Zlokowski K. 63-75.Tallinn: NATO CCD COE Publications, 2012. Gitlin, Martin. dan Goldstein, Margaret J. Cyber Attack. Minneapolis: Twenty-First Century Books, 2015. Janczewski, L.J. dan Colarik, A.M. Cyber Warfare and Cyber Terrorism. Harshey: IGI Global, 2008. Kennedy, Daniel. Dechipering Russia: Russia’s Perpective on Internet Policy and Governance. London: Global Partners Digital, 2013. Lee, Newton. “Counterterrorism and Cybersecurity”, Springer Science & Business Media, New York: Springer, 2013. Lehto, Martti. “Phenomena in the Cyber World”, dalam Cyber Security: Analytics, Technology and Automation”, diedit oleh Martti Lehto dan Neitta Anmaki, 3-29. New York: Springer, 2015. Loukas, George. Cyber Physical Attacks: A Growing Invisible Threat. Oxford: Butterworth-Heinemann, 2015. Mazanec, Brian M. dan Hayer, Bradley A. Deterring Cyber Warfare: Bolstering Strategic Stability in CyberSpace. New York: Palgrave Macmillan, 2015. Protocol Additional to the Geneva Convention of 12 August 1949, ang relating to Protection of the Victim of International Armed Conflicts (protocol I) 8 June 1977, 1125 UNTS 3 (Additional Protocol I).

1   

Shakarian P., Shakarian J., dan Ruef A. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Waltham: Elsevier, 2013. Sharp, Jane. Striving Military Stability in Europe: Negotiation, implementation, and adaptation of the CFE Treaty. Oxon: Routledge, 2010. Stent, Angela E. The Limits of Partnership: U.S.-Russian Relations in the Twenty-First Century. New Jersey: Princeton University Press, 2014. Springer, Paul J. Cyber Warfare: A Reference Handbook. Santa Barbara: ABC-CLIO, 2015. Roscini, Marco. Cyber Operation and the Use of Force in International Law. Oxford: Oxford University Press, 2014. Wilson,Clay. “Cyber Security and Cyber Weapons: Is Nonproliferation Possible?” dalam Cyber Security: Detterence and IT Protection for Critical Infrastructures, diedit oleh Maurizio Martelini. New York: Springer, 2013.

Jurnal dan Majalah Asmolov, Gregory. “Welcoming the Dragon: The Role of Public Opinion in Russian Internet Regulation”, Center for Global Communication Studies (2015). Beech, Hannah. “The Other Side of the Great Firewall,” Time, 22 Juni. 2015, 26-29. Bugajski, Janusz. Expanding Eurasia: Russia’s European Ambition, Significant Issue Series 30, No.6 (2008). Collins, Sean dan Mc.Combie, Stephen. “Stuxnet: The Emergence of a New Cyber weapon and Its Implication.” Journal of Policing, Intelligence and Counter Terrorism 7, no. 1 (Maret 2012): 80-91. Denning, Dorothy. “Reflections on Cyberweapons Controls.” Computer Security Journal XVI, No. 4 (2000): 43-53. Finnemore, Martha dan Sikkink, Kathryn. “International Norm Dynamics and Political Change.” International Organization 52, No. 4 (1998): 887-917. Ghelbach, Scott. “Reflections on Putin and the Media.” Post-Soviet Affairs 26, No. 1 (2010):77-87 Grossman, Lev. “The Code War.” Time, 21 Juli. 2014. John Herhalt, “Cyber Crime: A Growing Challenge for Governments”, KPMG International Issue Monitor 8, No. 2 (2011). Juwana, Hikmahanto. “Hukum Internasional Sebagai Instrumen Politik: Beberapa Pengalaman Indonesia Sebagai Studi Kasus”, Arena Hukum 6, no. 2 (2012): 79-154. Koesel, Karrie J. Dan Bunce, Valerie J. “Putin, Popular Protest, and Political Trajectories in Russia: A Comparative Perspective.” Post-Soviet Affairs 28, no. 4 (2012): 403-423. Kumagai, Jean. “The Web as Weapon.” IEEE Spectrum 38, no. 1 (2001): 118-121. Nisbet, Erik. “Benchmarking Public Demand: Russia’s Appetite for Internet Control”, Center for Global Communication Studies (2015). 2   

Orbach, Barak. “What is Regulation?.” Yale Journal on Regulation 30, No.1 (2012). Perserikatan Bangsa-Bangsa, Majelis Umum sesi 66, International Code of Conduct for Information Security, agenda item 93, doc. No. A/66/359, 14 September 2011. Perserikatan Bangsa-Bangsa, Majelis Umum sesi 68, Group of Governmental Experts, Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, agenda item 94, doc. No. A/68/98, 24 Juni 2013 Perserikatan Bangsa-Bangsa, Majelis Umum sesi 69, International Code of Conduct for Information Security, agenda item 91, doc. No. A/69/723, 13 Januari 2015. Shackelford, Scott J. “From Nuclear War to Net War: Analyzing Cyber Attacks in International Law.” Barkeley Journal of International Law 27, No.1 (2009): 192-251. Tselikov, Andrey. “The Tightening Web of Russian Internet Regulation,” Berkman Research Publication No. 2014-15 (2014).

Internet Duffy, Natalie. “Internet freedom in Vladimir Putin’s Russia: The noose tightens.” AEI Research, Januari 2015. https://www.aei.org/wpcontent/uploads/2015/01/Internet-freedom-in-Putins-Russia.pdf (diakses 3 Agustus 2015). Farnsworth, Timothy. “China and Russia Submit Cyber Proposal.” Arms Control Association. https://www.armscontrol.org/act/2011_11/China_and_Russia_Submit_C yber_Proposal (diakses 2 Maret, 2015). Fenenko, Alexey. “How the US military plans to neutralize Russia,” Russia Direct, 9 Juni, 2015. http://www.russia-direct.org/opinion/how-usmilitary-plans-neutralize-russia (diakses 3 agustus 2015). Etzioni, Amitai. “China Might Negotiate Cybersecurity,” The National Interest, 14 Maret, 2013. http://nationalinterest.org/commentary/chinamight-negotiate-cybersecurity-8222 (diakses 3 Agustus, 2015) Grigsby, Alex. “Will China and Russia’s Updated Code of Conduct Get More Traction in a Post-Snowden Era?,” Net Politics, 28 Januari, 2015. http://blogs.cfr.org/cyber/2015/01/28/will-china-and-russias-updatedcode-of-conduct-get-more-traction-in-a-post-snowden-era/ (diakses 4 Mei, 2015). Gross, G. “Stuxnet changed cyber security.” Networkworld, 17 November, 2010. http://www.networkworld.com/news/2010/111710-expertsStuxnet-changed-the-cybersecurity.html (diakses 22 Desember, 2014). Hathaway, Oona A. et.al., “The Law of Cyber-Attack”, California Law Review, 16 November 2012.

3   

http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttack.pdf, (diakses 3 Agustus, 2015). Hughes, Rex. Toward a Global Regime for Cyber Warfare. https://ccdcoe.org/publications/virtualbattlefield/07_HUGHES%20Cyber %20Regime.pdf (diakses 2 Maret, 2015). IHS Jane’s. West accuses Russia of cyber-warfare, 28 Desember, 2014. http://www.janes.com/article/47299/west-accuses-russia-of-cyberwarfare (diakses 2 Maret, 2015). INCYDER, European Union, http://ccdcoe.org/eu-0.html (diakses 17 Juni 2015). Institute of Information Security. Russia’s “Draft Convention on International Information Security”, April 2012. http://www.conflictstudies.org.uk/files/20120426_scrc_iisi_commentary. pdf (diakses 7 September 2015). Kedutaan Besar Republik Rakyat China untuk Selandia Baru, “China, Rusia and Other Countries Submit the Document of International Code of Conduct for Information Security to the United Nations”, 13 September, 2011. http://nz.chineseembassy.org/eng/zgyw/t858978.htm (diakses 3 Agustus, 2015). Komisi Eropa, Policy on Critical Information Infrastructure Protection (CIIP), 2013. http://ec.europea.eu/digital-agenda/en/news/policy-criticalinformation-i (diakses 17 Juni, 2015). Kramer, Mark. “Political Protest and Regime-Opposition Dynamics in Russia,” PONARS Eurasia Policy Memo No. 280, September 2013. https://www.gwu.edu/~ieresgwu/assets/docs/PONARS_Eurasia_Confere nce_Book_2013.pdf. (diakses 2 September 2015). League for Safe Internet. About the League. www.ligainternet.ru/liga/about.php (diakses 5 Agustus 2015). Levada Center. “Cencorship on the Internet.” Yuri Levada Analytical Center, 17 Oktober 2014. www.levada.ru/eng/cencorship-internet (diakses 5 Agustus 2015). Lieutenant General Keith Alexander, “Advance Question for Lieutenant General Keith Alexander, USA,” wawancara didokumentasikan oleh National Security Archives, http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-035.pdf (diakses 5 Agustus 2015) NATO Review magazines. http://www.nato.int/docu/review/2013/cyber/timeline/ EN/index.htm (diakses 22 Maret, 2013). NATO. The North Atlantic Treaty (1949) in Washington. http://www.nato.int/nato_static/assets/pdf/stock_publications/20120822_ nato_treaty_en_light_2009.pdf. (diakses 5 September 2015). Nerk, Dot. “The Importance of Data (part I),” Hackmageddon, 18 Juni, 2015. http://www.hackmageddon.com/2015/06/18/the-importance-of-data-partI/ (diakses 3 Agustus, 2015).

4   

Passeri, Paolo. “2012 Cyber Attacks Statistic,” Hackmageddon, 4 September, 2012. http://www.hackmageddon.com/2012-cyber-attacks-statisticsmaster-index/ (diakses 2 Maret, 2015). Passeri, Polo. “2013 Cyber Attacks Statistic (Summary),” Hackmageddon, 19 Januari, 2014. http://www.hackmageddon.com/2014/01/19/2013cyber-attacks-statistics-summary/ (diakses 22 Maret, 2015). Passeri, Paolo. “2014 Cyber Attacks Statistic (Aggregated),” Hackmageddon, 13 Januari, 2015. http://www.hackmageddon.com/2015/01/13/2014cyber-attacks-statistics-aggregated/ (diakses 22 Maret, 2015). Passeri, Paolo. The China Cyber Attack Syndrome. Hackmageddon, 11 November, 2011. http://hackmageddon.com/2011/11/11/the-china-cyberattacks-syndrome/ (diakses 2 Maret, 2015). Redunovic, Vladimir. “Welcome 2015: A year of cyber (in)security,” DiploFoundation, 31 Desember, 2014. http://www.diplomacy.edu/blog/welcome-2015-%E2%80%92-yearcyberinsecurity (diakses 8 April, 2015). Rothrock, Kevin. “Orphaned in the US SOPA find a Home in Russia.” Global Voices, 14 Juni 2013. http://globalvoicesonline/2013/06/14/orphaned-in-us-sopa-finds-homein-russia/ (diakses 5 Agustus 2015). Rothrock, Kevin. “Russia’s parliament prepares new ‘anti-terrorist’ law of internet.” Global Values, 16 Januari 2014. http://globalvoicesonline.org/2014/01/16/russias-parliament-preparesnew-anti-terrorist-law-for-internet (diakses 5 Agustus 2015). Russian Gazette. Federal Law of the Russian Federation of December 28, 2013 N 398-FZ. 30 Desember 2013. rg.ru/2013/12/30/extrem-sitedok.html (diakses 5 Agustus 2015) Russian Gazette. Federal law of the Russian Federation on July 2, 2013 N 187-FZ Moscow, 10 Juli 2013. rg.ru/2013/07/10/pravo-internet-dok.html (diakses 5 Agustus, 2015). Russian Gazette. Federal Law of 27 July 2006 N 152-FZ, 29 Juli 2006. rg.ru/2006/07/29/personaljnye-dannye-dok.html (diakses 5 Agustus 2015). Sakwa, Richard. Whatever Happened to Russian Opposition?, Mei 2014. http://www.chathamhouse.org/sites/files/chathamhouse/field/field_docu ment/20140523SakwaFinal.pdf, (diakses 2 September 2015). Sharkov, Damien. “Russian Minister to Propose ‘Strict’ Internet Regulation.” Newsweek, 27 Maret 2015, 7:10 pm. http://europe.newsweek.com/russias-communication-minister-presentchina-esque-internet-plan-317420 (diakses 5 Agustus 2015). Snegovaya, Maria. (Over-)Estimating the Role of the Internet in 2011-12 Russia’s Protest, cprg.polisci.ucla.edu/snegovaya.pdf (diakses 2 September 2015). State Duma. asozd2.duma.gov.ru/main.nsf/(Spravka)?OpenAgent&RN=428884-6 (diakses 5 Agustus 2015).

5   

State Duma. asozd2.duma.gov.ru/main.nsf/(Spavka)?OpenAgent&RN=553424-6 (diakses 5 Agustus 2015). State Duma, asozd2.duma.gov.ru/main.nsf/(Spravka)?OpenAgent&RN=89417-6, diakses 5 Agustus 2015. The Federal Service for Supervision of Communication, Information Technology, and Mass Media. Statute on Roskomnadzor. eng.rkn.gov.ru/legal_information/statute_on_roskomnadzor/ (diakses 3 Agustus 2015). Tselikov, Andrey. “Can Pirates save the Russian Internet?” Global Voices, 29 Juli 2013. http://globalvoicesonline.org/2013/07/29/can-pirates-save-therussian-internet (diakses 3 Maret 2015). UNIDIR, The Cyber Index: International Security and Realities, Maret 2013. www.unidir.org/.../cyber-index-2013-en-463.pdf (diakses 3 Agustus 2015). Williams, Jev. “The New Target for State-Sponsored Cyber Attacks: Applications,” InformationWeek, 17 Desember, 2014. http://www.darkreading.com/attacks-breaches/the-new-target-for-statesponsored-cyber-attacks-applications-/a/d-id/1318215 (diakses 22 Maret, 2015).  

6   

Suggest Documents