References
Albury, D. (2005). Fostering Innovation in Public Services. Public Money And Management, 25(1), 51-56.
Amadeo, K. (2018). 5 U.S. GDP Statistics You Need to Know. The Balance. Retrieved 8 March 2018, from https://www.thebalance.com/u-s-gdp-5-latest-statistics-and-how-to-use-them-3306041
Army Air Forces - United States Army Aviation. (2018). Army.mil. Retrieved 8 March 2018, from https://www.army.mil/aviation/airforces/index.html
Attar, A. (2017). 10 Highly Powerful Air Forces in the World (2018 Ranking). ListoGraphic. Retrieved 8 March 2018, from http://listographic.com/10-powerful-air-force
Barno, D., & Bensahel, N. (2017). Three Things the Army Chief of Staff Wants You to Know. War on the Rocks. Retrieved 8 March 2018, from https://warontherocks.com/2017/05/three-things-the-army-chief-of-staff-wants-you-to-know/
Choucri, N., Madnick, S., & Ferwerda, J. (2013). Institutions for Cyber Security: International Responses and Global Imperatives. Information Technology For Development, 20(2), 96-121. http://dx.doi.org/10.1080/02681102.2013.836699
Commons, A. (2018). Cyber is the New Air Domain Superiority in the Megacity. Military Review. Retrieved from http://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2018/cyber-is-the-New-Air-Domain-Superiority-in-the-Megacity/
Cox, M. (2018). Army to Stress More Emergency-Deployment Training in 2018. Military.com. Retrieved 8 March 2018, from https://www.military.com/daily-news/2018/02/13/army-stress-more-emergency-deployment-training-2018.html
Cyber Incident Response: What Is It, And Why Do You Need It? - Securonix. (2017). Securonix. Retrieved 25 March 2018, from https://www.securonix.com/cyber-incident-response/
Department of Defense. (2018). Summary of the National Defense Strategy of The United States of America (p. 1). United States of America.
Greenberg, A. (2017). How An Entire Nation Became Russia's Test Lab for Cyberwar. WIRED. Retrieved 8 March 2018, from https://www.wired.com/story/russian-hackers-attack-ukraine/
Hammons, M. (2016). The Origin of the U.S. Air Force - VeteranAid. VeteranAid. Retrieved 8 March 2018, from https://www.veteranaid.org/blog/2016/04/12/the-origin-of-the-u-s-air-force/
Hermes, W. (2001). American Military History (pp. 591-619). United States Army. Retrieved from https://history.army.mil/books/AMH/AMH-27.htm
Kilcarr, S. (2016). Survey says corporate cyber response still too slow. Fleet Owner. Retrieved 25 March 2018, from http://www.fleetowner.com/blog/survey-says-corporate-cyber-response-still-too-slow
Koppel, T. (2015). Lights out (pp. 121-126). New York: Broadway Books.
Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy Magazine, 9(3), 49-51. http://dx.doi.org/10.1109/msp.2011.67
Lee, R., Assante, M., & Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing And Analysis Center, v-vi. Retrieved from https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
McCarthy, T. (2018). Does the US really need a huge boost in military spending?. The Guardian. Retrieved 8 March 2018, from https://www.theguardian.com/us-news/2018/feb/09/senate-budget-deal-us-military-spending
Pomerleau, M. (2017a). Army, Navy Cyber teams say they’re ready to go ... a year early. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/2017/11/02/army-navy-cyber-teams-say-theyre-ready-to-go-a-year-early/
Pomerleau, M. (2017b). DoD still working toward CYBERCOM elevation. Fifth Domain. Retrieved 8 March 2018, from https://www.fifthdomain.com/dod/cybercom/2017/10/16/dod-still-working-toward-cybercom-elevation/
Richardson, G. (2012). The United States Army’s Current Capability to Conduct Combined Arms Maneuver (pp. 37-49). Fort Leavonworth, Kansas: United States Army Command and General Staff College.
Stavridis, J., & Weinstein, D. (2014). Time for a U.S. Cyber Force. Proceedings Magazine, (140). Retrieved from https://www.usni.org/magazines/proceedings/2014-01/time-us-cyber-force
Sullivan, J., & Kamensky, D. (2017). How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), 30-35. http://dx.doi.org/10.1016/j.tej.2017.02.006
Timeline of Army Cyber. (2017). goarmy.com. Retrieved 8 March 2018, from https://www.goarmy.com/army-cyber/timeline-of-army-cyber.html
U.S. Army Cyber Command. (2016). Integration of cyberspace capabilities into tactical units. www.army.mil. Retrieved 8 March 2018, from https://www.army.mil/article/163156/integration_of_cyberspace_capabilities_into_tactical_units
U.S. Army Cyber Command | The U.S. Army. (2018). www.army.mil. Retrieved 26 March 2018, from https://www.army.mil/armycyber#org-about
Zetter, K. (2014). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. WIRED. Retrieved 8 March 2018, from https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/