Ontrol Over IT & Cyberspace in Aviation in the United States

I have an outline, and a number of articles that should or preferred to be referenced.
Also, it needs to included such detentions and methodologies:
Crowd sourcing

The time: developing stages. (difference).
who are the people on the ground.
information operations
information exploiting.
surveillance environment relating to china cyper attack as an example
Cyper Power (Book)