<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>mjss</journal-id>
            <journal-title-group>
                                                                                    <journal-title>MANAS Sosyal Araştırmalar Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1694-7215</issn>
                                                                                                        <publisher>
                    <publisher-name>Kyrgyz-Turkish Manas University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.33206/mjss.1549263</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>International Security</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Uluslararası Güvenlik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Terör Örgütlerinin Çevrimiçi Eylemleriyle Mücadelede Bir Önleme Stratejisi: Siber Caydırıcılık</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>A Prevention Strategy in Combatting the Online Actions of Terrorist Organizations: Cyber Deterrence</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-8704-6495</contrib-id>
                                                                <name>
                                    <surname>Çıtak</surname>
                                    <given-names>Emre</given-names>
                                </name>
                                                                    <aff>HİTİT ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250415">
                    <day>04</day>
                    <month>15</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>14</volume>
                                        <issue>2</issue>
                                        <fpage>838</fpage>
                                        <lpage>850</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20240912">
                        <day>09</day>
                        <month>12</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20241111">
                        <day>11</day>
                        <month>11</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2001, MANAS Journal of Social Studies</copyright-statement>
                    <copyright-year>2001</copyright-year>
                    <copyright-holder>MANAS Journal of Social Studies</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Bu çalışmada çevrimiçi ortamı siber saldırlar dâhil pek çok amaçla kullanan terör örgütleri üzerinde caydırıcılığın etkililiği farklı yönlerden tartışılmaktadır. Terör örgütlerinin silahlı kanadıyla, finans kaynaklarıyla, dış yardım ve destekleriyle, eleman temin etme yollarıyla ve algı yönetim faaliyetleriyle mücadele edilmesi bütüncül bir yaklaşımı gerektirmektedir. Günümüzde bunların yanı sıra siber alandaki hareketliliklerinin takip edilmesi ve engellenmesi mücadelenin tamamlayıcı etkisini oluşturmaktadır. Bu nedenle terör örgütlerini siber alandan uzak tutmak, buradaki faaliyetlerini durdurmak ve saldırılarını engellemek oldukça hassas bir yaklaşım gerektirmektedir. Çalışmada devletlerin sahip oldukları siber güç ve savunma kabiliyetinin terör örgütleri üzerindeki etkisi ele alınacaktır. Siber caydırıcılığın geleneksel caydırıcılıktan farklılaşan yönleri hâlihazırda devletler için bir meydan okuma oluştururken, bir devlet dışı aktör olarak terör gruplarının nasıl caydırılabileceği incelenmesi fayda sağlayacak konulardandır. Çalışmada caydırıcılık teorisi, bir devlet-dışı aktör üzerinde ve geleneksel mücadele sahasının dışında yeniden değerlendirmeye açılacaktır. Çalışmanın birinci bölümünde siber caydırıcılığın kavramsal çerçevesi çizilecektir. İkinci bölümde ise terör örgütlerinin siber tehdit potansiyeline yer verildikten sonra siber caydırıcılık üzerinden bir analiz yapılacaktır. Burada denial ve punishment kapsamında bir değerlendirme yapılacaktır. Sonuç bölümünde ise kapsamlı ulusal siber caydırıcılık stratejisi hakkında bir tartışma yer alacaktır. Çalışmanın terör örgütlerinin çevrimiçi faaliyetleriyle mücadele stratejilerine mütevazı bir katkı sunması planlanmaktadır.</p></trans-abstract>
                                                                                                                                    <abstract><p>This study explores the effectiveness of deterrence against terrorist organizations that use online environments, including cyberattacks, from various perspectives. Addressing the armed wings, financial resources, external aid and support, recruitment methods, and perception management activities of terrorist organizations requires a comprehensive approach. In addition to these aspects, monitoring and countering their activities in cyberspace constitute a complementary side of the struggle. Therefore, keeping terrorist organizations away from the cyber domain, halting their activities, and preventing attacks require a highly nuanced approach. This study will examine the impact of states&#039; cyber power and defense capabilities on terrorist organizations. As the distinctive aspects of cyber deterrence pose a challenge for states, understanding how to deter non-state actors like terrorist groups is a valuable area of investigation. The study will reevaluate deterrence theory in the context of non-state actors and beyond traditional battlefields. The first section of the study will outline the conceptual framework of cyber deterrence. The second section will analyze the cyber threat potential of terrorist organizations and evaluate cyber deterrence through the lenses of denial and punishment. The conclusion will discuss a comprehensive national cyber deterrence strategy. The study aims to make a modest contribution to strategies for combating the online activities of terrorist organizations.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Cyber Security</kwd>
                                                    <kwd>  Cyber Deterrence</kwd>
                                                    <kwd>  Counterterrorism</kwd>
                                                    <kwd>  Deterrence Theory</kwd>
                                                    <kwd>  National Security</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Siber Güvenlik</kwd>
                                                    <kwd>  Siber Caydırıcılık</kwd>
                                                    <kwd>  Terörizmle Mücadele</kwd>
                                                    <kwd>  Caydırıcılık Teorisi</kwd>
                                                    <kwd>  Ulusal Güvenlik</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Arquilla, J. &amp; Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12(2), 141-165.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Arquilla, J. &amp; Ronfeldt, D. (1999). The advent of netwar: Analytic background. Studies in Conflict&amp;Terrorism, 
22(3), 193-206.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Azani, E. &amp; Liv, N. (2018). A comprehensive doctrine for an evolving threat: Countering terrorist use of social 
networks. Studies in Conflict&amp;Terrorism, 43(8), 1-25.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Beeson, A. (1996). Top ten threats to civil liberties in cyberspace. Human Rights, 23(2), 10-13.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Betts, R. (2013). The lost logic of deterrence: What the strategy that won the Cold War can-and can’t-do 
now. Foreign Affairs, 92(2), 87-99.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Betz, D. (2012). Cyberpower in strategic affairs: Neither unthinkable nor blessed. Journal of Strategic Studies, 
35(5), 689-711.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Bieda, D. &amp; Halawi, L. (2015). Cyberspace: A venue for terrorism. Issues in International Systems, 16(3), 33-42.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Borghard, E. D. &amp; Lonergan, S. W. (2017). The logic of coercion in cyberspace. Security Studies, 26(3), 452-481.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Bowen, W. Q. (2004). Deterrence and asymmetry: Non-state actors and mass casualty terrorism. 
Contemporary Security Policy, 25(1), 54-70.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Cerf, V. G. (2011). Safety in cyberspace. Daedalus, 140(4), 59-69.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Chen, J. (2017). Cyber deterrence by engagement and surprise. Prism, 7(2), 100-107.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Clarke, R. A. &amp; Knake, R. K. (2011). Cyber war: The next threat to national security and what to do about it. New 
York: Ecco.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Conway, M. (2006). Terrorists use of the internet and fighting back. Information and Security, 19, 9-30.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Danky, Y., Maliarchuk, T. &amp; Briggs, C. (2017). Hybrid war: High-tech, information and cyber conflicts. 
Connections, 16(2), 5-24.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Denning, D. E. (2015). Rethinking the cyber domain and deterrence. Joint Forces Quarterly, 77, 8-15.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Der Derian, J. (1994). Cyber-deterrence. Wired, 2.09, https://www.wired.com/1994/09/cyber-deter/</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Elliott, David. (2011). Deterring strategic cyberattack. IEEE Security&amp;Pivacy, 9(5), 36-40.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Fischerkeller, M. P. &amp; Harknett, R. J. (2017). Deterrence is not a credible strategy for cyberspace. Orbis, 61(3), 
381-393.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Fisher, M. (2019). The concept of deterrence and its applicability in the cyber domain. Connections, 18(1-2), 
69-92.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Furnell, S. M. &amp; Warren, M. J. (1999). Computer hacking and cyber terrorism: The real threats in the new 
milenium? Computer&amp;Security, 18(1), 28-34.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Gartzke, E.  &amp; Lindsay, J.R. (2015). Weaving tangled webs: Offense, defense, and deception in cyberspace. 
Security Studies, 24(2), 316-348.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to Earth. International 
Security, 38(2), 41-73.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Gaycken, S. &amp; Martellini, M. (2013). Cyber as deterrent. M. Martellini (Ed.), Cyber security: Deterrence and IT 
protection for critical infrastructures (pp.1-10). Springer.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Geist, E. (2015). Deterrence stability in the cyber age. Strategic Studies Quarterly, 9(4), 44-61.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Gill, P. et al. (2017). Terrorists use of the internet by numbers: Quantifying behaviors, patterns, and process. 
Criminology&amp;Public Policy, 16(1), 99-117.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Goodman, W. (2010). Cyber deterrence: Tougher in theory than in practice. Strategic Studies Quarterly, 4(3), 
102-135.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Harknett, R. J. (1996). Information warfare and deterrence. Parameters, 26(3), 93-107.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Heckmen, K. et al. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. 
Computers&amp;Security, 35, 72-77.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Hua, J., Chen, Y. &amp; Luo, X. (2018). Are we ready for cyberterrorist attacks? Examining the role of individual 
resilience. Information&amp;Management, 55(7), 928-938.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Huey, L. (2015). This is not your mother’s terrorism: Social media, online radicalization and practice of 
political jamming. Journal of Terrorism Research, 6(2), 1-16.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Jabbour, K. &amp; Ratazzi, P. (2012). Does the United States need a new model for cyber deterrence? A. B. Lowther 
(Ed.), Deterrence: Rising powers, roque regimes, and terrorism in the twenty-first century (pp. 33-48). 
Palgrave Macmillian.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Jasper, S. (2015). Deterring malicious behavior in cyberspace. Strategic Studies Quarterly, 9(1), 60-85.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Jervis, R. (2016). Some thoughts on deterrence in the cyber era. Journal of Information Warfare, 15(2), 66-73.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Kolton, M. (2017). Interpreting China’s pursuit of cyber sovereignty and its views on cyber deterrence. The 
Cyber Defense Review, 2(1), 119-157.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Klein, J.J. (2015). Deterring and dissuading cyberterrorism. Journal of Strategic Security, 8(4), 23-38.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Kuehl, D. T. (2009). From cyberspace to cyberpower: Defining the problem. F. D. Kramer, S. H. Starr &amp; L. K. 
Wentz (Eds.), Cyberpower and national security (pp.24-42). Potomac Books.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Kugler, R. L. (2009).  Deterrence of cyber attacks. F. D. Kramer, S. H. Starr &amp; L. K. Wentz (Eds.), Cyberpower and 
national security (pp.309-342). Potomac Books.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Lachow, I. (2009). Cyber terrorism: Menace or myth? F. D. Kramer, S. H. Starr &amp; L. K. Wentz (Eds.), Cyberpower 
and national security (pp.437-464). Potomac Books.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Langner, R. (2016). Cyber power: An emerging factor in national and international security. Horizons:  Journal 
of International Relations and Sustainable Development, 8, 206-2018.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. Cambridge 
University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">Libicki, M. C. (2018). Expectation of cyber deterrence. Strategic Studies Quarterly, 12(4), 44-57.</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">Lindsay, J. R. (2015). Tipping the scale: The attribution problem and the feasibility of deterrence against 
cyberattack. Journal of Cybersecurity, 1(1), 53-67.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">Lowther, A. B. (2012). Introduction: How has deterrence evolved? A. B. Lowther (Ed.), Deterrence: Rising 
powers, roque regimes, and terrorism in the twenty-first century (pp.1-16). Palgrave Macmillian.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">Macdonald, S., Jarvis, L. &amp; Lavis, S. M. (2019). Cyberterrorism today? Findings from a follow-on survey of 
researchers. Studies in Conflict&amp;Terrorism, 45(8), 1-26.</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">Marsili, M. (2018). The war on cyberterrorism. Democracy and Security, 15(2), 172-199.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">Mazaar, M. J. (2018). Understanding deterrence. Perspective, RAND Corporation.</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">McKenzie, T. M. (2017). Is cyber deterrence possible? Perspectives on Cyber Power. Air University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">Nye Jr., J. S. (2017). Deterrence and dissuasion cyberspace. International Security, 41(3), 44-71.</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">Quackenbush, S. L. (2011). Understanding general deterrence: Theory and application. Palgrave Macmillian.</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">Quinlan, M. (2004). Deterrence and deterrability. Contemporary Security Policy, 25(1), 11-17.</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">Soesanto, S. &amp; Smeets, M. (2021). Cyber deterrence: The past, present, and the future. F. Osinga &amp; T. Sweijs 
(Eds.), NL Arms Netherlands annual review of military studies 2020: Deterrence in the 21st century- Insights 
from theory and practice. Asser Press&amp;Springer.</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">Stein, J. G. (2009). Rational deterrence against ‘irrational’ adverseries? No common knowledge. T. V. Paul, P. 
M. Morgan &amp; J. J. Wirtz (Eds.), Complex deterrence: Strategy in the global age (pp. 58-84). The University of 
Chicago Press.</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">Sterner, E. (2011). Retaliatory deterrence in cyberspace. Strategic Studies Quarterly, 5(1), 62-80.</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">Stevens, T. (2012). A cyber war of ideas? Deterrence and norms in cyberspace. Contemporary Security 
Policy, 33(1), 148-170.</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">Valari, L. &amp; Knights, M. (2000). Affecting trust: Terrorism, internet and offensive information warfare. Terrorism 
and Political Violence, 12(1), 15-36.</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">Valeriano, B. &amp; Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international 
system. Oxford University Press.</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">van Creveld, M. (1991). Technology and war: From 2000 B.C. to the present. The Free Press.</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in Conflict&amp;Terrorism, 28(2), 129-149.</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">Wheatley, G. F. &amp; Hayes, E. E. (1996). Information warfare and deterrence. NDU Press Book.</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">Wilner, A. (2015). Contemporary deterrence theory and counterterrorism: A bridge too far? International Law 
and Politics, 47, 439-462.</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">Wilner, A. (2017). Cyber deterrence and critical-infrastructure protection: Expectation, application, and 
limitation. Comparative Strategy, 36(4), 309-318.</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">Wilner, A. S. (2011). Deterring the undeterrable: Coercion, denial and delegitimization in counterterrorism. 
The Journal of Strategic Studies, 34(1), 3-37.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
