References
- Lee & Jung, "A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference", The Journal of Korea Convergence Security Association, Vol. 18, No.2, pp.19-24, 2018
- 한국인터넷진흥원 "주요 국가별 사이버방어 체제 및 대응동향" 심층보고서, 2014
- Walt, Stephen M, "The Renaissance of Security Studies." International Studies Quarterly 35, 211-239, 1991 https://doi.org/10.2307/2600471
- Haftendorn, Helga, "The Security Puzzle: Theory-Building and Discipline-Building in International Security." International Studies Quarterly 35, 3-17, 1991. https://doi.org/10.2307/2600386
- Baldwin, David A. 1995. "Security Studies and the End of the Cold War." World Politics 48(1), 117-141, 1995. https://doi.org/10.1353/wp.1995.0001
- Baldwin, David A, "The Concept of Security." Review of International Studies 23, 5-26, 1997. https://doi.org/10.1017/S0260210597000053
- Waever, Ole, Barry Buzan, Morten Kelstrup, and Pierre Lemaitre. 1993, Identy, Migration and the New Security Agenda in Europe. London: Printer.
- Waever, Ole. "Securityzation and Desecuritization." in Ronny Lipschuts. ed. On Security. New York: Colombia University Press, 46-86, 1995.
- Buzan, Barry, Ole Waver, and Jaap de Wilde, Security: A New Framework for Analysis. Boulder: Lynne Rienner, 1998.
- Buzan, Barry and Lene Hensen, The Evolution of International Security Studies. Cambridge: Cambridge University Press, 2009.
- Balzaq, Thierry, ed, Securitization Theory: How Security Problems Emerge and Dissolve. London and New York: Routledge, 2011.
- 박인휘, "탈냉전과 미국의 패권적 안보담론", 국제정치논총 40(4), pp.45-64, 2000.
- 김상배, "사이버 안보의 미중관계: 안보화 이론의 시각", 한국정치학회보 49(1), pp.71-97, 2015. https://doi.org/10.18854/KPSR.2015.49.1.004004
- Rid, Thomas, Cyber War will not take place. Oxford and New York: Oxford University Press, 2013.
- Hansen, Lene and Helen Nissenbaum, "Digital Disaster, Cyber Security, and the Copenhagen School." Internation Studies Quarterly 53(4): 1155-1175, 2009. https://doi.org/10.1111/j.1468-2478.2009.00572.x
- Whasun Jho, Minje Kim, "Securitization of Cyberspace and the Limits of Cyber Security Governance", Information Society & Media, vol 17, No. 2, pp.77-98, 2016.
- 김상배, "신흥안보와 메타 거버넌스: 새로운 안보 패러다임의 이론적 이해", 한국정치학회보, 50(1), pp.75-104, 2016.
- 이신화, "21세기 글로벌이슈와 국제정치학", 국제정치논총 46(특별호), pp.197-226, 2007
- 한승주, "인권: 국가주권 대 인간주권", 아산재단 창립 30주년 기념 국제학술대회, 2007년 6월 22일.
- Craig, Susan L. "Chinese Perceptions of Traditional an Nontraditional Security." http://www.StrategicStudiesInstitute.army.mil (검색일: 2019.8.3.).
- 이신화, "비전통안보와 동북다지역협력", 한국정치학회보 42(2), pp.411-434, 2006. https://doi.org/10.18854/KPSR.2008.42.2.019019
- 김상배, "신흥안보의 미래전략: 개념적, 이론적 이해" 서울: 사회평론아카데미, 2016.
- 이신화, "인구, 이주, 난민안보의 복합지정학", 아세아연구 60(1), pp.6-50, 2017.
- 김상배, "세계 주요국의 사이버 안보 전략", 국제지역연구 26(3), pp.67-108, 2017.
- Morgan, Patrick M, "Applicability of Traditional Deterrence Concepts and Theory to the cyber Realm" , Proceedings of a Workshop on Dettering Cyber Attacks: Informing Strategies and Developing Options for U.S.Policy. National Research council, 2010
- Lupovici, Amir, "Cyber Warfare and Detterence: Trends and Challenges in Research" Military and Strategic Affairs 3(3), pp.49-62, 2011.
- Singer & Scachtman, "International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed" Havard International Law Journal 54, pp. 13-37, 2011
- 장노순, 한인택, 2013, "사이버 안보의 쟁점과 연구 경향" 국제정치논총 53(3), pp.195-230, 2013.
- Matusitz, Jonathan A. "Cyberterrorism: A postmodern View of Networks of Terror and How Computer Security Experts and law Enforcement Officials Fight Them. Ph.d. Dissertation. university of Oklahoma, 2006.