Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 7 results:
  • RTF
  • EndNote XML
Filters: Author is Sean Lawson  [Clear All Filters]
2017
Lawson, Sean. "Font Size Current Issue Atom logo." New York: Free Press (2017): 49-73.
  • Google Scholar
  • RTF
  • EndNote XML
2014
Lawson, Sean. "The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affair 27, no. 2 (2014).
  • Google Scholar
  • RTF
  • EndNote XML
2013
Lawson, Sean. "Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats." Journal of Information Technology & Politics 10, no. 1 (2013).
  • Google Scholar
  • RTF
  • EndNote XML
Lawson, Sean. "Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 168-189. IGI Global, 2013.
  • Google Scholar
  • RTF
  • EndNote XML
2012
Lawson, Sean. "Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States." First Monday 17, no. 7 (2012): 49-73.
  • Google Scholar
  • RTF
  • EndNote XML
2011
Lawson, Sean. "Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History." Working Paper 11, no. 01 (2011).
  • Google Scholar
  • RTF
  • EndNote XML
Lawson, Sean. Beyond cyber-doom: Cyberattack Scenarios and the Evidence of History In Working Paper. Mercatus Center, George Mason University, 2011.
  • Google Scholar
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Crisis Management study tour to France

read more >>

Information Security Workshop, 26-28 Sep 2019

read more >>

Interview on the expectations from the NATO summit in Wales

read more >>

Forum: Future Digital Society Resilience in the New Digital Age

read more >>

IT4Sec researcher defends her dissertation

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT, 2010 -