Resource Log
Resource Log
Resource Log
RESOURCE LOG
A RECORD OF ALL THE SOURCES I HAVE USED IN MY PROJECT AND AN EVALUATION OF EACH OF THEM .
Type
Bibliography reference
Web article
Reliability
Web article
Web article
ASSOCIATION OF OLD
CROWS, n.d.
Online video
Online news
article
AUSTRALIAN
BROADCASTING
CORPORATION. 2011
BALL, J., 2013
Usefulness
Cyber-security.
Cybercrime.
Cyber-espionage.
Cyber-terrorism.
Issues for governments.
Another front on the battlefield?
Very useful.
Insightful view on censorship in China.
Useful because this is one viewpoint which can be discussed.
Report
Book
Web article
Web article,
online video
BRITISH BROADCASTING
CORPORATION (BBC), 2010a
BRITISH BROADCASTING
CORPORATION (BBC), 2010b
Online news
article
BRITISH BROADCASTING
CORPORATION (BBC), 2010c
Online news
article
BRITISH BROADCASTING
CORPORATION (BBC), 2012
Online news
article
BRITISH BROADCASTING
CORPORATION (BBC), 2013a
Online news
article
BRITISH BROADCASTING
CORPORATION (BBC), 2013b
Web article
BRITISH BROADCASTING
CORPORATION (BBC), 2014
accurate.
The BBC supports the British governments stance
against QSIS
Web article
BUZZLE, 2012
Web article
Web article
Online article
Online news
article
Encyclopaedia
entry
Online news
article
Web article
Online news
Definition of cyber-intelligence.
About ten years old, but not this is not relevant as definition
hasnt changed.
An image from this source was used in the report and the
presentation.
Compilation of the slides of the defacement on President
Saakashvilis website, comparing him to Hitler.
Georgia-Russia conflict of 2008, technical details.
Information about hackers, actions and effects.
An image from this source was used in the presentation.
Air traffic control tower used as visual aid.
Attack on Docomo users in Japan that jammed their
Online news
article
Magazine article
Online news
article
Online news
article
Web article
Web article
GTECH, 2014
Web article
Encyclopaedia
entry
Online news
article
Web article
IMPERVA, 2012
Report
INFORMATION WARFARE
Online news
article
Online video
An image from this source was used in the report and the
presentation.
Screenshot of the illegitimate tweet sent out by Associated
Press Twitter account as mentioned in report and
presentation.
Impact of this tweet on US stock markets.
MI6 attacks on al-Qaeda-supporting website (Operation
Cupcake).
Video demonstration of Chinas national internet filters.
Web page
Online news
article
Web site
Academic blog
post
Report
Web page
KEPHIR. 2012
Web article
Web article
Web page
LOGOPEDIA, 2013
Report
Web article
Encyclopaedia
entry
Web site
Web article
Online magazine
article
MONITOR &
SHADOWSERVER
FOUNDATION, 2010
INFORMATION WARFARE
MONITOR, 2011
INTERNATIONAL BUSINESS
TIMES, 2014
ITN PRODUCTIONS, 2014
JOHNSTON, P., 2013
Reliable.
Cyber-espionage.
Irrelevant
IT in North Korea.
North Korean intranet.
Stuxnet.
Origins of Stuxnet (US and Israel).
NATO reaction to Stuxnet.
Definition and brief explanation of electronic warfare.
Filtering.
Types of censorship.
Censorship methods and control points.
Opinions of censorship.
Web article
Web article
Web article
Web article
OPENMEDIA, 2013
Web article
Online news
article
Web page
Online news
article
Online news
article
Online news
article
REUTERS, 2014a
Likely to be reliable.
Reliability of information wasn't considered as the source was
only used for an image.
REUTERS, 2014b
Reliable.
Reference annual
encyclopaedia
entry
Web article
Book
Online news
article
Web article
Online news
article
Online news
article
Online news
article
Online news
article
Web article
STREAMUK, 2011
Online news
article
Controversial book.
Researched by author.
Web article
Online video
US cyber command
Pentagon using private companies for cyber-protection.
Using censorship for protection of children.
Magazine article
Online journal
article
Magazine article
Online journal
article
Web article
Online journal
article
Online journal
article
Magazine article
Web article
Online magazine
article
Web article
Web article
TRIPWIRE, 2014
Online video
Online video
TRUTHLOADER. 2013a
TRUTHLOADER. 2013b
Online video
TRUTHLOADER. 2013c
Online video
TRUTHLOADER. 2014a
Online video
TRUTHLOADER. 2014b
TRUTHLOADER. 2014c
Online video
TRUTHLOADER. 2014d
Online video
TRUTHLOADER. 2014e
Online image
ULLI1105. 2007
Web article
UWANG, 2011
Report
Online news
article
Web article
VOXEUROP, 2012
Encyclopaedia
entry
Web article
Diplomatic cable
WIKILEAKS, 2010
Web article
Web article
US Congresscommissioned
WIKIPEDIA
CONTRIBUTORS, n.d.a.
WIKIPEDIA
CONTRIBUTORS, n.d.b.
WILSON, C., 2008
factually reliable.
Online news
article
Encyclopaedia
entry
Online news
article
Personal
experience
Screenshots of
three tweets by
Twitter users
10
NATOs CCDCoE.
Terrorism.
Cybercrime.
Social infrastructure and SCADA.
Relationship between cyberwarfare and national security.
An image from this source was used in the presentation.
An unrolled cannabis joint used as a visual aid.
Cyberwarfare definitions
A video still of the Aurora test from this source was used in
the report and the presentation.
The effect of Koobface on my Facebook friends at the time
of the incident many were affected.
The failure of family internet filters in particular, blocking
of sects.
Seen a lot of propaganda used on Facebook and Twitter,
particularly by QSIS and anti-government activists during the
Arab Spring.
The use of hashtags in Israel-Gaza conflict of 2014.
Empathy by internet users on all sides of the conflict.
Visible use of Twitter for public awareness raising and
expression of perceived truths by each user.