Lecture 1: Computing and Networks: The Basics | Speaker: Andrew Martin
- Ken Thompson, “Reflections on Trusting Trust,” Communication of the ACM,27.8 (August 1984), pp. 761-763
- David D. Clark and Marjory S. Blumenthal, “Rethinking the Design of the Internet: The End to End Arguments vs. the Brave New World” (2000)
Lecture 2: Code as a Weapon: Worms and Viruses | Speaker: Andrew Martin
- Committee on Offensive Information Warfare, National Research Council, Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities (Washington, D.C.: National Academies Press, 2009), “Preface” and “Synopsis,”
- Nicolas Falliere, Liam O. Murchu, and Eric Chien, W32.Stuxnet Dossier, Version 1.4 (February 2011)
Lecture 3: International Security and Conflict in the Cyber Domain | Speaker: Lucas Kello
- Joseph S. Nye, Jr., “Nuclear Lessons for Cyber Security,” Strategic Studies Quarterly (Winter 2011)
- Thomas Rid, “Cyber War Will Not Take Place,” Journal of Strategic Studies, 35.1 (2012), pp. 5-32
- Lucas Kello, “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft,” International Security 38.2 (Fall 2013), pp. 7-40
Lecture 4: Rules of War in Cyberspace | Speaker: Lucas Kello
- Harold Koh, “International Law in Cyberspace,” USCYBERCOM Inter-Agency Legal Conference (September 2012)
- Michael N. Schmitt, ed., Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge 2013)
Lecture 5: Cybersecurity and the Age of Privateering: A Historical Analogy (Student perspective) | Speaker: Florian Egloff
- Christian Czosseck, “State Actors and Their Proxies in Cyberspace,” in Katharina Ziolkowski, ed., Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (Tallinn: NATO CCD COE, 2013)
- Florian Egloff, “Cybersecurity and the Age of Privateering: A Historical Analogy,” Cyber Studies Working Paper Series, University of Oxford (March 2015)
- Joseph S. Nye, Jr., The Future of Power (New York: PublicAffairs, 2011), Chapter 5, pp. 113-151
Lecture 6: Origins, Principles and Functions of the Estonian State Information System | Speaker prof. Kuldar Taveter
- Kitsing, M. (2010) An Evaluation of E-Government in Estonia (Paper prepared for delivery at the Internet, Politics and Policy 2010: An Impact Assessment conference at Oxford University, UK, on September 16-17, 2010.) Last accessed 26.07.2012
- Kitsing, M. (2011) Success Without Strategy: E-Government Development in Estonia. Policy & Internet 3 (1), Article 5
- E-Estonia (2015) X-Road. Last accessed March 11, 2015.
Lecture 7: Designing User Friendly and Secure Services of e-State | Speaker prof. Kuldar Taveter
- Layne, K. & Lee, J. (2001) Developing fully functional e-government: A four stage model. Government Information Quarterly 18, pp 122-136.
- Andersen, K. & Henriksen, H. (2006) E-government maturity models: Extension of the Layne and Lee model. Government Information Quarterly, Vol (23), p 236-248.
- Sterling, L. & Taveter, K. (2009). The art of agent-oriented modeling. MIT Press. Additionally: http://aom.ttu.ee
- Venkatesh, V., Chan, F. K. Y. & Thong, J. Y. L. (2012) Designing e-government services: Key service attributes and citizens’ preference structures. Journal of Operations Management, Vol 30, p 116-133. Additional http://aom.ttu.ee/
- Lee, J. (2010). 10 year retrospect on stage models of e-Government: A qualitative meta-synthesis. Government Information Quarterly 27, 220–230.