|
2009. Globalization of Media – Understanding Media and Culture. https://open.lib.umn.edu/mediaandculture/chapter/13-6-globalization-of-media/. “Advanced Persistent Threats (APTs) | Threat Actors & Groups.” n.d. Mandiant. Accessed February 18, 2023. https://www.mandiant.com/resources/insights/apt-groups. Akaha, Tsuneo, Jingdong Yuan, and Wei Liang, eds. 2021. Trump’s America and International Relations in the Indo-Pacific: Theoretical Analysis of Changes & Continuities. N.p.: Springer International Publishing. Allison, William T. 2008. “The Tet Offensive | A Brief History with Documents | William Thomas Al.” Taylor & Francis eBooks. https://www.taylorfrancis.com/books/mono/10.4324/9780203931776/tet-offensive-william-thomas-allison. “Anglo-American Strategic Air Power Co-operation in the Cold War and Beyond.” 2022. ProQuest. https://www.proquest.com/openview/4652e9e1c9e3c9ceb97083335b78344d/1?pq-origsite=gscholar&cbl=26498. Ansari, Saghir A. 2022. “India's Trade Relations with China in the Era of Globalization.” Sage Journals. https://journals.sagepub.com/doi/10.1177/0015732515110303. Bhardwaj, Rashmi. n.d. “What Is Stuxnet? What It Is and How It Works.” IP With Ease. Accessed March 2, 2023. https://ipwithease.com/what-is-stuxnet-what-it-is-and-how-it-works/. Blanton, Stephen D. 1993. “A Study of the United States Navy's Minesweeping efforts in the Korean War.” Texas Tech. https://ttu-ir.tdl.org/bitstream/handle/2346/60894/31295007673907.pdf;sequence. Blight, James G. 1987. “The Cuban Missile Crisis Revisited.” jstor. https://doi.org/10.2307/20043297. Borer, Douglas A. 2007. “Rethinking the Cuban Embargo: An Inductive Analysis.” Oxford Academic. https://academic.oup.com/fpa/article-abstract/3/2/127/1792875. “Brookings experts on Trump's National Security Strategy.” 2017. Brookings. https://www.brookings.edu/research/brookings-experts-on-trumps-national-security-strategy/. Bushberg, Jerrold T., Andres Gannon, and Alyssa Ayres. 2017. “More Prominence for India and the Indo-Pacific in the U.S. National Security Strategy.” Council on Foreign Relations. https://www.cfr.org/blog/more-prominence-india-and-indo-pacific-us-national-security-strategy. Carmichael, Joe. 2016. “Hacking Experts Say John McAfee's Cyberattack Warnings Will Make America Safer.” Inverse. https://www.inverse.com/article/16022-hacking-experts-say-john-mcafee-s-cyberattack-warnings-will-make-america-safer. Carter, Joe. 2016. “5 facts about Captive Nations Week.” ERLC. https://erlc.com/resource-library/articles/5-facts-about-captive-nations-week/. CHAU, THOMPSON, and CHENG TING. 2022. “Cyber warfare: China attacks force Taiwan to bolster defenses.” Nikkei Asia. https://asia.nikkei.com/Spotlight/Asia-Insight/Cyber-warfare-China-attacks-force-Taiwan-to-bolster-defenses. Cheung, Louis. 2021. 彩云香江on Twitter: "J-20 cockpit vs F-35 cockpit https://t.co/tLNFdHJ80J". https://twitter.com/louischeung_hk/status/1468419197214490625. “China says US ‘arrogant and selfish’ after indictmentss.com/News/front/archives/2018/12/22/2003706572.” 2018. Taipei Times. https://www.taipeitimes.com/News/front/archives/2018/12/22/2003706572. “Chinese Threats in the Quantum Era.” 2023. Booz Allen Hamilton. https://www.boozallen.com/expertise/analytics/quantum-computing/chinese-cyber-threats-in-the-quantum-era.html. “cold War - Proxy War.” 2022. Gerald Ford Museum. https://www.fordlibrarymuseum.gov/museum/exhibits/coldwar/proxywar.html. “Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1. “Congressional Record | Congress.gov | Library of Congress.” 2022. Congressional Record | Congress.gov | Library of Congress. https://www.congress.gov/congressional-record/volume-168/issue-157/senate-section/article/S5239-1. Daniel, Ellen. 2018. “Thirty years on, what has changed since the Morris Worm?” Verdict. https://www.verdict.co.uk/morris-worm-cyber-security/. “Defense Primer: U.S. Precision-Guided Munitions.” 2022. CRS Reports. https://crsreports.congress.gov/product/pdf/IF/IF11353. Garfield, R. 2011. “The impact of the economic crisis and the US embargo on health in Cuba.” American Journal of Public Health. https://ajph.aphapublications.org/doi/abs/10.2105/AJPH.87.1.15. “GDP growth (annual %) - China | Data.” 2023. World Bank Data. https://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG?locations=CN. Gunawan, Arief S. 2002. “Five Forces Porter Framework (Ward and Peppard,2002) | Download Scientific Diagram.” ResearchGate. https://www.researchgate.net/figure/Five-Forces-Porter-Framework-Ward-and-Peppard-2002_fig1_304013321. Halloran, Richard. 2022. “China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.” Gale Academic Onefile. https://go.gale.com/ps/i.do?id=GALE%7CA126491255&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00311723&p=AONE&sw=w&userGroupName=anon%7Ef61452ab. Hanna, Terrell. 2021. “What are social engineering attacks? - Security.” TechTarget. https://www.techtarget.com/searchsecurity/definition/social-engineering. Harrison, R. 1988. “Economic interdependence, bargaining power, and political influence.” IDEAS/RePEc. https://ideas.repec.org/a/cup/intorg/v42y1988i03p461-483_02.html. Hill, Michael. 2022. “China's attack motivations, tactics, and how CISOs can mitigate threats.” CSO Online. https://www.csoonline.com/article/3676075/china-s-attack-motivations-tactics-and-how-cisos-can-mitigate-threats.html. Hioe, Brian, Mercy A. Kuo, and Dechlan Brennan. 2023. “Taiwan Cabinet Reshuffle Sets the Stage for 2024 Presidential Elections.” The Diplomat. https://thediplomat.com/2023/02/taiwan-cabinet-reshuffle-sets-the-stage-for-2024-presidential-elections/. Hossain, Kamrul. 2022. “The UNCLOS and the US-China Hegemonic Competition over the South China Sea.” Hein Online. https://heinonline.org/HOL/LandingPage?handle=hein.journals/jeasil6&div=10&id=&page=. Hwang, Ji-Jen. 2017. “한국학술지인용색인.” 한국학술지인용색인. https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002199620. Itasari, Endah R. 2022. “LEGAL PROTECTION OF UIGHUR MUSLIM ETHNICS IN CHINA FROM PERSPECTIVE HUMAN RIGHTS.” LamLaj. https://pdfs.semanticscholar.org/bb9c/71812869090f15fa147a95272b256a2b4322.pdf. Kabeer, N. 2001. “Bargaining Power.” ScienceDirect. https://www.sciencedirect.com/topics/computer-science/bargaining-power. Kamrany, Nake M. 2012. “Ending the 30-Year War in Afghanistan.” Middle East Institute. https://www.mei.edu/publications/ending-30-year-war-afghanistan. Katada, Saori N. 2022. “At the crossroads : the TPP, AIIB, and Japan's foreign economic strategy.” Scholar Space. https://scholarspace.manoa.hawaii.edu/items/c181166e-e43d-4bfe-88a1-a609dcd2d496. Killion, Ulric. 2009. “The US-China Trade Conflict: A Game Theoretical Analysis.” IDEAS. https://ideas.repec.org/p/guc/wpaper/15.html. Koivunen, Pia. 2022. “Performing Peace and Friendship.” Degruyter. https://www.degruyter.com/document/doi/10.1515/9783110761160/html?lang=en. Korolov, Maria. 2017. “How hackers crack passwords and why you can't stop them.” CSO Online. https://www.csoonline.com/article/3236716/how-hackers-crack-passwords-and-why-you-cant-stop-them.html. Lebow, Richard N. 1995. “Deterrence and the Cold War.” Political Science Quarterly Vol. 110, no. 2 (Summer): 157-181 (25 pages). https://doi.org/10.2307/2152358. Lee, Yimou. 2020. “Taiwan says China behind cyberattacks on government agencies, emails.” Reuters. https://www.reuters.com/article/us-taiwan-cyber-china-idUSKCN25F0JK. Lindsay, Jon R. 2013. “Stuxnet and the Limits of Cyber Warfare.” Scinapse. https://www.scinapse.io/papers/1972914161. Lyngaas, Sean. 2021. CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/. Lyngaas, Sean. 2022. “At least 24 agencies run Pulse Secure software. How many were hacked is an open question.” CyberScoop. https://www.cyberscoop.com/pulse-secure-24-agencies-espionage-department-of-energy/. Martin, Katherine C. 2015. “George Orwell and the origin of the term 'cold war.'” OUP Blog. https://blog.oup.com/2015/10/george-orwell-cold-war/. Mattis, Peter, and Sebastian Strangio. 2011. “China's Misunderstood Spies – The Diplomat.” The Diplomat. https://thediplomat.com/2011/10/chinas-misunderstood-spies/. “The Morris Worm Virus: How it Works and How to Protect Yourself.” 2022. History-Computer. https://history-computer.com/the-morris-worm-virus-how-it-works-and-how-to-protect-yourself/. Nance, Brad. 2019. “Using Pulse Connect Secure© to Implement Multi-Factor Authentication Solutions.” U.S. Department of Energy: Office of Scientific and Technical Informaton. https://www.osti.gov/biblio/1550735. “NATIONAL SECURITY STRATEGY.” 2022. The White House. https://www.whitehouse.gov/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf. “National Security Strategy 2017.” 2017. National Security Strategy Archive. http://nssarchive.us/national-security-strategy-2017/. Nemeth, Stephen C. 2014. “Ruling the Sea: Managing Maritime Conflicts through UNCLOS and Exclusive Economic Zones.” Taylor & Francis Online. https://www.tandfonline.com/doi/abs/10.1080/03050629.2014.897233. Novak, Matt. 2022. “China to Stop Welding Homes Shut Over Covid After Protests.” Gizmodo. https://gizmodo.com/china-relaxes-harshest-covid-19-rules-after-protests-1849862755. “N S S.” 2017. Trump White House Archive. https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf. Nye, Joseph S. 1990. “Soft Power.” no. No. 80 (Autumn), 153-171 (19 pages). https://doi.org/10.2307/1148580. Nye, Joseph S. 2022. “American and Chinese Power after the Financial Crisis.” tandfonline. https://www.tandfonline.com/doi/abs/10.1080/0163660X.2010.516634?journalCode=rwaq20. Patch, Buel W. 2023. “Soviet Peace Offensives: CQR.” CQ Press Library. https://library.cqpress.com/cqresearcher/document.php?id=cqresrre1951080300. Pearce, Justin. 2012. “Control, politics and identity in the Angolan Civil War.” African Affairs. https://doi.org/10.1093/afraf/ads028. Porup, JM, and Josh Fruhlinger. 2021. “11 penetration testing tools the pros use.” CSO Online. https://www.csoonline.com/article/2943524/11-penetration-testing-tools-the-pros-use.html. Rider, Toby C. 2022. “A Campaign of Truth: The State Department, Propaganda, and the Olympic Games, 1950–1952.” MIT. https://direct.mit.edu/jcws/article-abstract/18/2/4/13570/A-Campaign-of-Truth-The-State-Department. Robinson, Christopher. 2020. “Dr. Ji-Jen Hwang discusses Taiwan’s Cybersecurity Environment versus China’s Cyber Strategy.” The Institute of World Politics. https://www.iwp.edu/past-events/2020/07/09/dr-ji-jen-hwang-discusses-taiwans-cybersecurity-environment-versus-chinas-cyber-strategy/. Roos, Meghan, Nick Gillespie, Jason Nichols, and Ben Weingarten. 2020. “Chinese Hackers Targeted U.S. COVID Vaccine Research, Prosecutors Allege.” Newsweek. https://www.newsweek.com/two-chinese-hackers-targeted-us-covid-vaccine-research-military-intelligence-prosecutors-allege-1519503. Satam, Parth. 2022. “'Battle Of 35s': US F-35 Or China's J-35 Stealth Aircraft, A Battle Of Equals Or Comparing Apples With Oranges?” EurAsian Times. https://eurasiantimes.com/american-f-35-vs-chinese-j-35-stealth-aircraft-a-battle-of-equals/. SEITZ, AMANDA, ERIC TUCKER, and MIKE CATALINI. 2022. “How China's TikTok, Facebook influencers push propaganda.” AP News. https://apnews.com/article/china-tiktok-facebook-influencers-propaganda-81388bca676c560e02a1b493ea9d6760. Shaikh, Shaan, and Tom Karako. 2021. “S-300 | Missile Threat.” Missile Threat. https://missilethreat.csis.org/defsys/s-300/. Silk, Jesse A. 2014. “"A Generation That Didn't Agree": The Paramountcy of Multidimensional Moral Hierarchy in the System of a Down Discography.” DigitalCommons@Cedarville. https://digitalcommons.cedarville.edu/english_seminar_capstone/25/. Smalley, Suzanne. 2022. “Investors, analysts question Biden's plan to limit U.S. investments in Chinese tech.” CyberScoop. https://www.cyberscoop.com/biden-admin-limit-investment-china/. Smalley, Suzanne. 2022. “Commerce lacks intelligence resources to keep U.S. tech from fueling Chinese cyberthreat, experts warn.” CyberScoop. https://www.cyberscoop.com/senate-intel-to-strengthen-intelligence-exports/. Stone, Jeff. 2020. “US accuses two Chinese hackers of global hacking campaign, targeting coronavirus vaccine research.” CyberScoop. https://www.cyberscoop.com/chinese-hackers-accused-targeting-coronavirus-vaccine-research/. “Taiwan Independence vs. Unification with the Mainland(1994/12~2022/12).” 2023. Election Study Center, NCCU-Taiwan Independence vs. Unification with the Mainl. https://esc.nccu.edu.tw/PageDoc/Detail?fid=7801&id=6963. Tang, Frank. 2020. “China GDP: Xi Jinping says 'completely possible' to double size of economy by 2035, despite foreign hostility.” South China Morning Post. https://www.scmp.com/economy/china-economy/article/3108767/china-gdp-xi-jinping-says-completely-possible-double-size. Taylor, Craig. 2020. “Stuxnet.” CyberHoot. https://cyberhoot.com/cybrary/stuxnet/. “Top 5 Most Notorious Attacks in the History of Cyber Warfare.” 2023. Fortinet. https://www.fortinet.com/resources/cyberglossary/most-notorious-attacks-in-the-history-of-cyber-warfare. “Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.” 2018. Department of Justice. https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion. Ulric, Killion M. 2009. “Relation of game theory to economic history and marginalism.” University Library of Munich. https://ideas.repec.org/p/pra/mprapa/13378.html. Vavra, Shannon. 2020. “Chinese intelligence-linked hackers are exploiting known flaws to target Washington, US says.” CyberScoop. https://www.cyberscoop.com/chinese-intelligence-hackers-us-government-agencies-ministry-state-security/. Vavra, Shannon, and Tonya Riley. 2020. “NSA warns defense contractors of recent Chinese government-backed hacking.” CyberScoop. https://www.cyberscoop.com/defense-contractors-chinese-government-hacking-nsa/. Velde, James V. 2022. “The intellectual mistakes that crippled U.S. cyber policy.” CyberScoop. https://www.cyberscoop.com/intellectual-mistakes-crippled-cyber-policy/?category_news=news. “The Vietnam War and the My Lai Massacre | AP US History Study Guide from The Gilder Lehrman Institute of American History.” 2023. AP Gilder Lehrman. https://ap.gilderlehrman.org/history-by-era/sixties/essays/vietnam-war-and-my-lai-massacre. Wagner, R. H. 1988. “Economic interdependence, bargaining power, and political influence.” EconPapers. https://econpapers.repec.org/article/cupintorg/v_3a42_3ay_3a1988_3ai_3a03_3ap_3a461-483_5f02.htm. Webb, Michael C. 2009. “Hegemonic Stability Theory: An Empirical Assessment.” Cambridge. https://doi.org/10.1017/S0260210500112999. Williamson, John. 2012. “Is the "Beijing Consensus" Now Dominant? - The National Bureau of Asian Research (NBR).” National Bureau of Asian Research. https://www.nbr.org/publication/is-the-beijing-consensus-now-dominant/. Wong, Sharon. 2011. “Voice of America in the post-Cold War era.” Opportunities and challenges to external media services via new information and communication technology 73 (4): 343-358. https://doi.org/10.1177/1748048511398599. Woo, Etienne. 2022. “Narrating the Belt and Road Education Policy: A Critical Policy Discourse Analysis.” NCBI. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9344438/. “Xi sends condolences to Trump on death of former U.S. President George H.W. Bush.” 2018. Ministry of Foreign Affairs of the People's Republic of China. https://www.fmprc.gov.cn/mfa_eng/topics_665678/2018zt/xjpcxytjhzz/201812/t20181203_710030.html. Xu, Chi. 2022. “Digital Gordian Knot, Trade, 11.11: a Special Weekend Edition of Weekly Highlights.” https://www.chinabigidea.info/p/digital-gordian-knot-trade-1111-a. Zimmerman, Nicholas, Lindsay Maizland, and James M. Lindsay. 2022. “Hong Kong's Freedoms: What China Promised and How It's Cracking Down.” Council on Foreign Relations. https://www.cfr.org/backgrounder/hong-kong-freedoms-democracy-protests-china-crackdown. Zingales, Luigi. 2022. “Causes and Effects of the Lehman Brothers Bankruptcy.” PSU. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=617982783e3bda3388ac4f2305a971fb57f3f841.
|