Number of purchasers: 2, views: 2488
Readers community rating: votes 0
1. Walker Ch., Ludwig J. The Meaning of Sharp Power. How Authoritarian States Project Influence. Foreign Affairs, 2017, November 16. Available at: https://www.foreignaffairs.com/articles/china/2017-11-16/meaning-sharp-power?cid=nlc-fa_fatoday-20171221 (accessed 02.12.2017).
2. Nye J.S., Jr. Soft Power. The Means to Success in World Politics. New York, Public Affairs, 2004. 192 p.
3. Nye J.S., Jr. The Future of Power. New-York, Public Affairs, 2011. 320 p.
4. Stoletov O.V. Strategiya “razumnoj sily” v politike global'nogo liderstva. Diss. kand. polit. nauk. Moskva, 2014. 152 s. [Stoletov O. V. Strategiya “razumnoi sily” v politike global'nogo liderstva. Diss. kand. polit. nauk. [The Strategy of "Reasonable Power" in the Policy of Global Leadership. Cand. Diss. (Polit.)]. Moscow, 2014. 152 p.]
5. Kurlantzick J. Charm Offensive: How China's Soft Power Is Transforming the World. Yale University Press, 2007. 306 p.
6. Nye J.S. Jr. How Sharp Power Threatens Soft Power. The Right and Wrong Ways to Respond to Authoritarian Influence. Foreign Affairs, 2018, January 24, Available at: https://www.foreignaffairs.com/articles/china/2018-01-24/how-sharp-power-threatens-soft-power?cid=nlc-fa_fatoday-20180124 (accessed 29.01.2018).
7. Serena C.C., Clarke C.P. America's Cyber Security Dilemma – and a Way Out (2016). Available at: https://www.rand.org/blog/2016/12/americas-cyber-security-dilemma-and-a-way-out.html (accessed 12.01.2018).
8. Libicki M.C. Checklist for a U.S.–Russia Cyberwar (2016). Available at: https://www.rand.org/blog/2016/10/checklist-for-a-us-russia-cyberwar.html (accessed 14.01.2018).
9. McClintock B. Russian Information Warfare: A Reality That Needs a Response (2017). Available at: https://www.rand.org/blog/2017/07/russian-information-warfare-a-reality-that-needs-a.html (accessed 16.01.2018).
10. Wiener M., Wiener C. Cybersecurity Threats: How Vulnerable Is the United States? Annual Lecture on Science and Technology (2017). Available at: https://www.cfr.org/event/cybersecurity-threats-how-vulnerable-united-states (accessed 29.12.2017).
11. Kania E.B. Artificial Intelligence and Chinese Power. Beijing's Push for a Smart Military and How to Respond. Foreign Affairs, 2017, December 5. Available at: https://www.foreignaffairs.com/articles/china/2017-12-05/artificial-intelligence-and-chinese-power (accessed 20.02.2018).
12. Fominykh A. Nastuplenie s ulybkoj: kak “myagkoe vliyanie” Kitaya preobrazhaet mir. Problemy Dal'nego Vostoka, 2009, № 3, ss. 175-178. [Fominykh A. Nastuplenie s ulybkoi: kak “myagkoe vliyanie” Kitaya preobrazhaet mir [Coming with a Smile: How China's “Soft Influence" Transforms the World]. Problemy Dal'nego Vostoka, 2009, no. 3, pp. 175-178.]
13. Report Watch Vol. VI: Tracking Digital and Cyber Scholarship So You Don’t Have To (2018). Available at: https://www.cfr.org/blog/report-watch-vol-vi-tracking-digital-and-cyber-scholarship-so-you-dont-have (accessed 25.05.2018).
14. Deibert R. Social Media, Inc.: The Global Politics of Big Data. World Politics Review, 19.06.2012. Available at: https://www.worldpoliticsreview.com/articles/12065/social-media-inc-the-global-politics-of-big-data (accessed 21.06.2018).
15. Countering Russian Information Operations in the Age of Social Media (2017). Available at: https://www.cfr.org/report/countering-russian-information-operations-age-social-media (accessed 26.12.2017).
16. Parasiliti A. Were Russian Hacks Really a Threat to American Democracy? (2016). Available at: https://www.rand.org/pubs/research_reports/RR2081.html (accessed 20.02.18).
17. Courtney W., Libicki M.C. How to Counter Putin's Subversive War on the West (2016). Available at: https://www.rand.org/blog/2016/08/how-to-counter-putins-subversive-war-on-the-west.html (accessed 12.01.2018).
18. Knake R.K. Iran: Keep Your Finger Off the Cyber Button. Available at: https://www.cfr.org/blog/iran-keep-your-finger-cyber-button (accessed 19.05.2018).
19. Davis II J.S., Boudreaux B.A., Welburn J.W., Aguirre J., Ogletree C., McGovern G., Chase M.S., eds. Stateless Attribution. Toward International Accountability in Cyberspace. Santa Monica, Calif. Published by the RAND Corporation, 2017. 57 p.
20. The Hacked Elections, Online Influence Operations, and the Threat to Democracy symposium. December 6, (2017). (The transcript of the Symposium). Available at: https://www.cfr.org/hacked-elections-online-influence-operations-and-threat-democracy (accessed 25.12.2017).