Compiled by Walter Dorn (annotations to come)
Cahill, T. P., K. Rozinov, and C. Mule (2003), “Cyber Warfare Peacekeeping,” in Proceedings of the 2003 IEEE Workshop on Information Assurance (New York: IEEE, 2003), 100.
Kleffner, Jann K., and Heather A. Harrison Dinniss (2013), “Keeping the Cyber Peace: International Legal Aspects of Cyber Activities in Peace Operations,” Int. Law Stud. 89, no. 1, (2013): 512-35.
Karlsrud, John (2014), “Peacekeeping 4.0: Harnessing the Potential of Big Data, Social Media and Cyber-technology,” in Cyberspace and International Relations: Theory, Prospects and Challenges, ed. Jan-Frederik Kremer and Benedikt Muller (Cham: Springer, 2014), 141-60.
Akatyev, Nikolay, and Joshua I. James (2015), “Cyber Peacekeeping,” in Digital Forensics and Cyber Crime, ed. Joshua L. James and Frank Breitinger (Cham: Springer, 2015), 126-39.
Akatyev, N., & James, J. I. (2015), “Cyber Peacekeeping.” In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 157, pp. 126–139). https://doi.org/10.1007/978-3-319-25512-5_10
Akatyev, N., & James, J. (2017). “United nations digital blue helmets as a starting point for cyber peacekeeping.” In European Conference on Information Warfare and Security, ECCWS (pp. 8–16). Dublin: Academic Conferences International Limited. https://arxiv.org/abs/1711.04502.
Akatyev, N., & James, J. I. (2017). “Legislative Requirements for Cyber Peacekeeping.” Journal of Digital Forensics, Security and Law, 12(3). Retrieved from https://commons.erau.edu/jdfsl/vol12/iss3/4/
Robinson, M., Jones, K., & Janicke, H. (2017). “An Introduction to Cyber Peacekeeping.” Retrieved from https://arxiv.org/abs/1710.09616.
Dorn, Walter (2018), “Cyberpeacekeeping: the Challenge,” Peace Magazine, vol. 34, no. 1, p.27, 30 (January–March 2018). http://peacemagazine.org/archive/v34n1p27.htm
Cyberpeacekeeping.org, developed by researchers Nikolay Akatyev and Joshua I. James at the suggestion of W. Dorn.