{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Cavelty, Myriam Dunn. "Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erkl\'e4rungen." \i Journal of self-regulation and regulation\i0  01 (2015).\par \par Cavelty, Myriam Dunn. "Die materiellen Ursachen des Cyberkriegs  Cybersicherheitspolitik jenseits diskursiver Erkl\'e4r ungen ." \i Journal of self-regulation and regulation \i0  01 (2015).\par \par Cavelty, Myriam Dunn. "From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse." \i International Studies Review\i0  15 (2013): 105-122.\par \par Cavelty, Myriam Dunn, and Tim Prior. "Resilience in Security Policy: Present and Future." \i CSS Analysis in Security Policy\i0  142  (2013): 142.\par \par Cavelty, Myriam Dunn. "Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen." \i Polit Bild\i0  (2012).\par \par Hagmann, Jonas, and Myriam Dunn Cavelty. "National risk registers: Security scientism and the propagation of permanent insecurity ." \i Security Dialogue\i0  43, no. 79 (2012).\par \par Br\'f6nnimann, Gabriel, Thomas Gartmann, Jennifer Giroux, Manuel Suter, and Myriam Dunn Cavelty. \i Using scenarios to assess risks examining trends in the public sector\i0 ., 2011.\par \par Eriksson, Johan, Giampiero Giacomello, Hamoud Salhi, Myriam Dunn Cavelty, J. P. Singh, and M. I. Franklin. "Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State." \i International Studies Review\i0  11, no. 1 (2009): 205-230 .\par \par Cavelty, Myriam Dunn. \i Critical Information Infrastructure Protection, Overview\i0 .  ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.\par \par Cavelty, Myriam Dunn. "\i Like a Phoenix from the Ashes: The Reinvention of Critical Infrastructure Protection as Distributed Security\i0 ." In \i Securing the homeland\i0 . London: Routledge, 2008.\par \par Cavelty, Myriam Dunn. \i Critical information infrastructure: vulnerabilities, threats and responses\i0  In \i Disarmament Forum\i0 ., 2007.\par \par Cavelty, Myriam Dunn. \i Cyber-security and threat politics: US efforts to secure the information age\i0 . London: Routledge, 2007.\par \par Cavelty, Myriam Dunn. "Cyber-Terror? Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate." \i Journal of Information Technology & Politics\i0  4, no. 1 (2007).\par \par Cavelty, Myriam Dunn, and Elgin M. Brunner. "\i Introduction: Information, Power, and Security ? An Outline of Debates and Implications\i0 ." In \i Power and Security in the Information Age\i0 . London: Routledge, 2007.\par \par }