Publications

Showing 37 items
TitleLocationYearType
Sort 
 
Sort 
 
Sort 
 
Sort 
 
TitleLocationYearType
Russia and the 2016 U.S. Presidential Election International Security Studies Forum, Policy Roundtable 1-7 2017.03.26 5. Policy Analysis 
The U.S. wants to stop North Korean missiles before they launch. That may not be a great idea. Washington Post, Monkey Cage Blog 2017.03.15 5. Policy Analysis 
Thermonuclear Cyberwar with Erik Gartzke, Journal of Cybersecurity 2:2 2017.02 2. Journal 
Cyber Espionage In P. Cornish, The Oxford Handbook of Cyber Security (Oxford, forthcoming) 2017 3. Chapter 
Coercion through Cyberspace: The Stability-Instability Paradox Revisited with Erik Gartzke, in K. Greenhill and P.J.P. Krause, Coercion: The Power to Hurt in International Politics (Oxford, Forthcoming) [pre-pub draft] 2017 3. Chapter 
Cyber War and Cyber Realities, by B. Valeriano and R. Maness International Security Studies Forum, Roundtable 9-7 2016.12.05 5. Policy Analysis 
Book Review: Free Expression, Globalism and the New Strategic Communication. By Monroe E. Price  Perspectives on Politics 14.4 2016.12 2. Journal 
Eye in the Sky: New War, Old Problems Political Violence @ a Glance 2016.04.06 5. Policy Analysis 
Why Isn’t There More Scholarly Evaluation of U.S. Wars? H-Diplo Forum, No. 13 2016.03 5. Policy Analysis 
The real cyberespionage rule: don’t get caught Policy Forum (Asia & the Pacific Policy Society) 2016.01 5. Policy Analysis 
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack Journal of Cybersecurity 1:1 2015.12 2. Journal 
Correspondence: Debating the Chinese Cyber Threat With Joel Brenner in International Security Vol. 40, No. 1 2015.08 2. Journal 
Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace with Erik Gartzke, Security Studies 24 no. 2, 316-348 2015.06 2. Journal 
Exaggerating the Chinese Cyber Threat Harvard University, JFK School, Belfer Center Policy Brief 2015.05 5. Policy Analysis 
North Korea And The Sony Hack:Exporting Instability Through Cyberspace with Stephan Haggard, East-West Center AsiaPacific Issues, No. 117 2015.05 2. Journal 
Will China and America Clash in Cyberspace? with Tai Ming Cheung and Derek Reveron, National Interest 2015.04 5. Policy Analysis 
The Impact of China on Cybersecurity: Fiction and Friction International Security, Vol. 39, No. 3, 7-47 2015.02 2. Journal 
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain Edited, with Tai Ming Cheung and Derek Reveron, Oxford University Press 2015 1. Book 
From Exploitation to Innovation: Acquisition, Absorption, and Application with Tai Ming Cheung, in Lindsay et al., China and Cybersecurity (Oxford University Press, 2015) 2015 3. Book Chapter 
Correspondence: A Cyber Disagreement International Security Vol. 39, No. 2, pp. 181-192 2014.11 2. Journal Article 
Cross-Domain Deterrence: Strategy in an Era of Complexity with Erik Gartzke, International Studies Association Annual Meeting, Toronto 2014.03.25 4. Conference Paper 
Stuxnet and the Limited Future of Cyber Warfare Security Studies 22 no 3, 365-404 2013.8 2. Journal Article 
Proxy Wars: Control Problems in Irregular Warfare and Cyber Operations International Studies Association annual meeting, San Francisco 2013.4 4. Conference Paper 
Correspondence: Assessing the Synergy Thesis in Iraq With Austin Long in International Security vol. 37 no. 4 2013.3 2. Journal Article 
Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations Journal of Strategic Studies 36 no. 3 2013.2 2. Journal Article 
China: Cyber Threat and Cyber Threatened with Derek Reveron, New Atlanticist Policy and Analysis Blog 2012.8.7 5. Policy Paper 
China and Cybersecurity: Political, Economic, and Strategic Dimensions Report from IGCC Workshops held at UCSD in April 2012 2012.6 5. Policy Paper 
Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009 with Roger Petersen, CIWAG Case Study Series 2011-2012, ed. Andrea Dew and Marc Genest (Newport, RI: US Naval War College, Center for Irregular Warfare and Armed Groups) 2012 3. Book Chapter 
The Pacemaker of Bureaucracy: Information Technology Usage in Military Organizations International Studies Association Annual Convention, Montreal 2011.3.16 4. Conference Paper 
Participant or Observer? Opportunities and Challenges in Wartime Ethnography International Studies Association Annual Convention, Montreal 2011.3.16 4. Conference Paper 
Defense Transparency: Seeking a Definition for a Paradoxical Concept UC Institute on Global Conflict and Cooperation Defense Transparency Project Policy Brief 2011.10 5. Policy Paper 
The Political Economy of Intelligence International Studies Association Annual Convention, New Orleans 2010.2.17 4. Conference Paper 
War upon the Map: User Innovation in American Military Software Technology and Culture vol. 51, no. 3 2010 2. Journal Article 
Commandos, Advisors, and Diplomats: Special Operations Forces and Counterinsurgency International Studies Association Annual Convention, New York City 2009.2.15 4. Conference Paper 
Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s with Staci Strobl, in A New Understanding of Terrorism: Case Studies and Analysis, Ed. Maria Haberfeld and Agostino von Hassell (Springer) 2009 3. Book Chapter 
Does the “Surge” Explain Iraq’s Improved Security? MIT Center for International Studies, Audits of the Conventional Wisdom 2008.9 5. Policy Paper 
Guns or Butter: Aggregation, Functional Differentiation, and Conflict in Biological and Social Systems with Evan Economo, Zhang Qiaoting, Liu Ying, and Liu Honghai, Santa Fe Institute Complex Systems Summer School Proceedings, Qingdao, China 2004.9 4. Conference Paper 
Showing 37 items
Ċ
Jon Lindsay,
Jul 29, 2014, 12:22 PM
Ċ
Jon Lindsay,
Jul 29, 2014, 2:45 PM
Ċ
Jon Lindsay,
Mar 22, 2017, 10:14 AM
Ċ
Jon Lindsay,
Jan 12, 2014, 9:05 PM
Ċ
Jon Lindsay,
Apr 13, 2015, 5:26 PM
Ċ
Jon Lindsay,
May 28, 2014, 12:19 PM
Ċ
Jon Lindsay,
Nov 22, 2014, 12:29 PM
Ċ
Jon Lindsay,
Apr 20, 2013, 12:20 PM
Ċ
Jon Lindsay,
Aug 20, 2013, 4:11 PM
Ċ
Jon Lindsay,
Jan 12, 2014, 9:01 PM
Comments