{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:35:27Z","timestamp":1743082527776,"version":"3.40.3"},"publisher-location":"Cham","reference-count":117,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031507571"},{"type":"electronic","value":"9783031507588"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50758-8_9","type":"book-chapter","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T17:02:20Z","timestamp":1706288540000},"page":"134-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber, Disinformation and AI: Evolving Uses of ICT in Peace and Conflict"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1050-4256","authenticated-orcid":false,"given":"Brett","family":"van Niekerk","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,27]]},"reference":[{"key":"9_CR1","unstructured":"Working Group 9.10 \u2013 ICT Uses in Peace and War, IFIP TC 9. http:\/\/ifiptc9.org\/9-10\/"},{"key":"9_CR2","unstructured":"Ongeri, L.: Cyber in Africa has announced top 50 women in cybersecurity Africa finalists. https:\/\/www.ifree.co.ke\/2020\/07\/cyber-in-africa-has-announced-top-50-women-in-cybersecurity-africa-finalists\/. Accessed 21 Apr 2021"},{"key":"9_CR3","unstructured":"IFIP News.: IFIP WG 9.10 members win international cyber security competition. https:\/\/www.ifipnews.org\/ifip-wg-9-10-members-win-international-cyber-security-competition\/. Accessed 21 Apr 2021"},{"key":"9_CR4","unstructured":"Doman, C.: The first cyber espionage attacks: how operation Moonlight Maze made history. https:\/\/medium.com\/@chris_doman\/the-first-sophistiated-cyber-attacks-how-operation-moonlight-maze-made-history-2adb12cc43f7. Accessed 21 Apr 2021"},{"key":"9_CR5","unstructured":"Espiner, T.: Security experts lift lid on Chinese hack attacks, ZDNet. Archived from the original. https:\/\/web.archive.org\/web\/20061211145201\/http:\/\/news.zdnet.com\/2100-1009_22-5969516.html. Accessed 21 Apr 2021"},{"key":"9_CR6","unstructured":"McGuinness, D.: How a cyber attack transformed Estonia, BBC News. https:\/\/www.bbc.com\/news\/39655415. Accessed 21 Apr 2021"},{"key":"9_CR7","unstructured":"Markoff, J.: Before the gunfire, cyberattacks, The New York Times. https:\/\/www.nytimes.com\/2008\/08\/13\/technology\/13cyber.html. Accessed 21 Apr 2021"},{"key":"9_CR8","unstructured":"Zetter, K.: An unprecedented look at Stuxnet, the world\u2019s first digital weapon, Wired. https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet\/. Accessed 23 Apr 2021"},{"key":"9_CR9","volume-title":"Countdown to Zero Day","author":"K Zetter","year":"2014","unstructured":"Zetter, K.: Countdown to Zero Day. Crown Publishers, New York (2014)"},{"key":"9_CR10","unstructured":"Hultquist, J.: Sandworm Team and the Ukrainian Power Authority attacks, FireEye. https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/01\/ukraine-and-sandworm-team.html. Accessed 23 Apr 2021"},{"key":"9_CR11","unstructured":"Assante, M.: Confirmation of a coordinated attack on the Ukrainian power grid, SANS Institute. https:\/\/www.sans.org\/blog\/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid\/. Accessed 23 Apr 2021"},{"key":"9_CR12","unstructured":"Fruhlinger, J.: The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet, CSO Online. https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html. Accessed 23 Apr 2021"},{"key":"9_CR13","unstructured":"Kirk, J.: UK sentences man for Mirai DDoS attacks against Liberia, BankInfoSecurity. https:\/\/www.bankinfosecurity.com\/uk-sentenced-man-for-mirai-ddos-attacks-against-liberia-a-11933. Accessed 23 Apr 2021"},{"key":"9_CR14","unstructured":"Goodin, D.: Confirmed: hacking tool leak came from \u201comnipotent\u201d NSA-tied group, ARS Technica. https:\/\/arstechnica.com\/information-technology\/2016\/08\/code-dumped-online-came-from-omnipotent-nsa-tied-hacking-group\/. Accessed 23 Apr 2021"},{"key":"9_CR15","unstructured":"BBC News: Cyber-attack: US and UK blame North Korea for WannaCry. https:\/\/www.bbc.com\/news\/world-us-canada-42407488. Accessed 23 Apr 2021"},{"key":"9_CR16","unstructured":"Radio Free Europe: Ukraine Security Service blames Russia for recent cyberattack. https:\/\/www.rferl.org\/a\/cyberattack-ukraine-blames-russia\/28589606.html. Accessed 23 Apr 2021"},{"key":"9_CR17","unstructured":"Cimpanu, C.: Czech hospital hit by cyberattack while in the midst of a COVID-19 outbreak, Zero Day. https:\/\/www.zdnet.com\/article\/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak\/. Accessed 23 Apr 2021"},{"key":"9_CR18","unstructured":"Osborne, C.: Major European private hospital operator struck by ransomware, Zero Day. https:\/\/www.zdnet.com\/article\/europes-largest-private-hospital-chain-struck-by-ransomware-attack\/. Accessed 23 Apr 2021"},{"key":"9_CR19","unstructured":"Cimpanu, C.: US formally accuses China of hacking US entities working on COVID-19 research, Zero Day. https:\/\/www.zdnet.com\/article\/us-formally-accuses-china-of-hacking-us-entities-working-on-covid-19-research\/. Accessed 23 Apr 2021"},{"key":"9_CR20","unstructured":"Scroxton, A.: SolarWinds cyber attack is \u2018grave risk\u2019 to global security, Computer Weekly. https:\/\/www.computerweekly.com\/news\/252493862\/SolarWinds-cyber-attack-is-grave-risk-to-global-security. Accessed 18 Dec 2020"},{"key":"9_CR21","unstructured":"Baksh, M.: CISA, FBI link Exploitation of Microsoft Exchange to nation-state actors, NextGov. https:\/\/www.nextgov.com\/cybersecurity\/2021\/03\/cisa-fbi-link-exploitation-microsoft-exchange-nation-state-actors\/172614\/. Accessed 12 Mar 2021"},{"key":"9_CR22","unstructured":"Council of Europe: Budapest Convention and related standards. https:\/\/www.coe.int\/en\/web\/cybercrime\/the-budapest-convention. Accessed 27 Apr 2021"},{"key":"9_CR23","unstructured":"African Union: Convention on Cyber Security and Personal Data Protection, 2014. https:\/\/au.int\/sites\/default\/files\/treaties\/29560-treaty-0048_-_african_union_convention_on_cyber_security_and_personal_data_protection_e.pdf. Accessed 11 Jul 2019"},{"key":"9_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139169288","volume-title":"Tallinn Manual on the International Law Applicable to Cyber Warfare","author":"MN Schmitt","year":"2013","unstructured":"Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Schmitt, M.N.: Tallinn Manual 2.0: On The International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)","DOI":"10.1017\/9781316822524"},{"key":"9_CR26","unstructured":"Geneva Internet Platform: UN GGE and OEWG, Digital Watch. https:\/\/dig.watch\/processes\/un-gge. Accessed 27 Jan 2023"},{"key":"9_CR27","unstructured":"United Nations General Assembly: Resolution adopted by the General Assembly on 27 December 2013, 68\/243. Developments in the field of information and telecommunications in the context of international security. https:\/\/www.un.org\/en\/ga\/search\/view_doc.asp?symbol=A\/RES\/68\/243. Accessed 27 Apr 2021"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"United Nations General Assembly: Resolution adopted by the General Assembly on 23 December 2015, 70\/237. Developments in the field of information and telecommunications in the context of international security. https:\/\/unoda-web.s3-accelerate.amazonaws.com\/wp-content\/uploads\/2016\/01\/A-RES-70-237-Information-Security.pdf. Accessed 27 Apr 2021","DOI":"10.18356\/ac7ce0e9-en"},{"key":"9_CR29","unstructured":"Global Commission on the Stability of Cyberspace. Advancing Cyberstability Final Report. https:\/\/cyberstability.org\/report\/. Accessed 27 Apr 2021"},{"key":"9_CR30","unstructured":"The Paris Call for Trust and Security in Cyberspace. https:\/\/pariscall.international\/en\/. Accessed 27 Apr 2021"},{"key":"9_CR31","unstructured":"The Geneva Dialogue on Responsible Behavior in Cyberspace. https:\/\/genevadialogue.ch\/. Accessed 27 Apr 2021"},{"key":"9_CR32","unstructured":"The Cybersecurity Tech Accord. https:\/\/cybertechaccord.org\/about\/. Accessed 27 Apr 2021"},{"key":"9_CR33","unstructured":"Global Partners Digital. https:\/\/www.gp-digital.org\/. Accessed 27 Apr 2021"},{"key":"9_CR34","unstructured":"Global Forum on Cyber Expertise. https:\/\/thegfce.org\/. Accessed 27 Apr 2021"},{"key":"9_CR35","unstructured":"Council of the European Union.: EU imposes the first ever sanctions against cyber-attacks. https:\/\/www.consilium.europa.eu\/en\/press\/press-releases\/2020\/07\/30\/eu-imposes-the-first-ever-sanctions-against-cyber-attacks\/. Accessed 27 April 2021"},{"key":"9_CR36","unstructured":"Scroxton, A.: Biden sanctions Russia over SolarWinds cyber attacks, Computer Weekly. https:\/\/www.computerweekly.com\/news\/252499384\/Biden-sanctions-Russia-over-SolarWinds-cyber-attacks. Accessed 27 Apr 2021"},{"key":"9_CR37","unstructured":"TOI Staff: Israel behind cyberattack that caused \u2018total disarray\u2019 at Iran port \u2013 report, Times of Israel. https:\/\/www.timesofisrael.com\/israel-said-behind-cyberattack-that-caused-total-disarray-at-iran-port-report\/. Accessed 27 Apr 2021"},{"key":"9_CR38","volume-title":"@War: The Rise of the Military-Internet Complex","author":"S Harris","year":"2014","unstructured":"Harris, S.: @War: The Rise of the Military-Internet Complex. Eamon Dolan, Boston (2014)"},{"key":"9_CR39","volume-title":"The Cybersecurity Dilemma","author":"B Buchanan","year":"2016","unstructured":"Buchanan, B.: The Cybersecurity Dilemma. Oxford University Press, Oxford (2016)"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Ventre, D.: (ed.): Cyberwar and Information Warfare. ISTE and Wiley, London and Hoboken, NJ. (2011)","DOI":"10.1002\/9781118603482"},{"key":"9_CR41","unstructured":"Ventre, D.: (ed.): Cyber Conflict: Competing National Perspectives. ISTE and Wiley, London and Hoboken, NJ. (2012)"},{"key":"9_CR42","volume-title":"Cyber Espionage and International Law","author":"R Buchan","year":"2019","unstructured":"Buchan, R.: Cyber Espionage and International Law. Bloomsbury, Oxford (2019)"},{"key":"9_CR43","doi-asserted-by":"publisher","DOI":"10.1017\/9781316422724","volume-title":"Cyber Mercenaries","author":"T Maurer","year":"2018","unstructured":"Maurer, T.: Cyber Mercenaries. Cambridge University Press, Cambridge (2018)"},{"key":"9_CR44","doi-asserted-by":"publisher","DOI":"10.1017\/9781108780605","volume-title":"Cyber Operations and International Law","author":"F Delerue","year":"2020","unstructured":"Delerue, F.: Cyber Operations and International Law. Cambridge University Press, Cambridge (2020)"},{"key":"9_CR45","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190618094.003.0003","volume-title":"Cyber Strategy: The Evolving Character of Power and Coercion","author":"B Valeriano","year":"2018","unstructured":"Valeriano, B., Jensen, B., Maness, R.C.: Cyber Strategy: The Evolving Character of Power and Coercion. Oxford University Press, Oxford (2018)"},{"key":"9_CR46","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001","volume-title":"Cyber War versus Cyber Realities","author":"B Valeriano","year":"2015","unstructured":"Valeriano, B., Maness, R.C.: Cyber War versus Cyber Realities. Oxford University Press, Oxford (2015)"},{"key":"9_CR47","volume-title":"Cyber War: The Next Threat to National Security and What to Do About It","author":"RA Clarke","year":"2010","unstructured":"Clarke, R.A., Knake, R.A.: Cyber War: The Next Threat to National Security and What to Do About It. Harper Collins, New York (2010)"},{"key":"9_CR48","volume-title":"Dark Territory: The Secret History of Cyber War","author":"F Kaplan","year":"2016","unstructured":"Kaplan, F.: Dark Territory: The Secret History of Cyber War. Simon & Schuster, New York (2016)"},{"key":"9_CR49","volume-title":"Global Information Warfare: The New Digital Battlefield","author":"A Jones","year":"2016","unstructured":"Jones, A., Kovacich, G.L.: Global Information Warfare: The New Digital Battlefield, 2nd edn. CRC Press, Boca Raton, FL (2016)","edition":"2"},{"key":"9_CR50","volume-title":"The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age","author":"A Segal","year":"2016","unstructured":"Segal, A.: The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. Hachette, New York (2016)"},{"key":"9_CR51","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv3405w2m","volume-title":"The Hacker and the State","author":"B Buchanan","year":"2020","unstructured":"Buchanan, B.: The Hacker and the State. Harvard University Press, Cambridge, Ma (2020)"},{"key":"9_CR52","volume-title":"Information Operations Matters: Best Practices","author":"EL Armistead","year":"2010","unstructured":"Armistead, E.L.: Information Operations Matters: Best Practices. Potomac Books, Washington, D.C. (2010)"},{"volume-title":"Information Operations: Warfare and the Hard Realities of Soft Power","year":"2004","key":"9_CR53","unstructured":"Armistead, E.L. (ed.): Information Operations: Warfare and the Hard Realities of Soft Power. Potomac Books, Washington, D.C. (2004)"},{"key":"9_CR54","doi-asserted-by":"crossref","unstructured":"Ventre, D.: Information Warfare, 2nd ed. ISTE and Wiley, London and Hoboken, NJ. (2016)","DOI":"10.1002\/9781119004721"},{"volume-title":"Information Warfare: Separating Hype from Reality","year":"2007","key":"9_CR55","unstructured":"Armistead, E.L. (ed.): Information Warfare: Separating Hype from Reality. Potomac Books, Washington, D.C. (2007)"},{"key":"9_CR56","unstructured":"Carr, J.: Inside Cyber Warfare: Mapping the Cyber Underworld. O\u2019Reilly Media, Sebastopol, CA (2010)"},{"key":"9_CR57","volume-title":"The Virtual Battlefield: Perspectives on Cyber Warfare","author":"C Czosseck","year":"2009","unstructured":"Czosseck, C., Geers, K.: The Virtual Battlefield: Perspectives on Cyber Warfare. IOS Press, Amsterdam (2009)"},{"issue":"2","key":"9_CR58","first-page":"54","volume":"4","author":"HJ Morello","year":"2007","unstructured":"Morello, H.J.: E-(re)volution: Zapatistas and the emancipatory Internet. Contra Corriente: J. Soc. Lit. Lat. Am. 4(2), 54\u201376 (2007)","journal-title":"Contra Corriente: J. Soc. Lit. Lat. Am."},{"key":"9_CR59","unstructured":"World Movement for Democracy: Case Study on Twitter. http:\/\/www.wmd.org\/resources\/whats-being-done\/information-and-communication-technologies\/casestudy-twitter. Accessed 17 Jun 2010"},{"key":"9_CR60","unstructured":"News24.: Mozambique unrest shows power of SMSes. https:\/\/www.news24.com\/news24\/moz-unrest-shows-power-of-smses-20100907. Accessed 27 Apr 2021"},{"key":"9_CR61","first-page":"233","volume-title":"14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020","author":"B van Niekerk","year":"2020","unstructured":"van Niekerk, B., De Barros, M.J.Z., Ramluckan, T.: An analysis of Twitter during the 2017 Zimbabwean military intervention. In: Kreps, D., Komukai, T., Gopal, T.V., Ishii, K. (eds.) 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, pp. 233\u2013247. Springer, Heidelberg (2020)"},{"key":"9_CR62","doi-asserted-by":"crossref","unstructured":"van Niekerk, B.: Information warfare in the 2013\u20132014 Ukraine crisis. In: Richet, J.L. (ed.), Cybersecurity Policies and Strategies for Cyberwarfare Prevention, pp. 311\u2013342. IGI Global, Hershey, PA (2015)","DOI":"10.4018\/978-1-4666-8456-0.ch012"},{"key":"9_CR63","unstructured":"Bright, M.: Katharine Gun: Ten years on what happened to the woman who revealed dirty tricks on the UN Iraq war vote? The Guardian. https:\/\/www.theguardian.com\/world\/2013\/mar\/03\/katharine-gun-iraq-war-whistleblower. Accessed 27 Apr 2021"},{"key":"9_CR64","unstructured":"MacAskill, E.: Interview with Snowden, The Guardian. https:\/\/www.theguardian.com\/us-news\/ng-interactive\/2019\/sep\/13\/edward-snowden-interview-whistleblowing-russia-ai-permanent-record. Accessed 27 Apr 2021"},{"key":"9_CR65","unstructured":"BBC News: Wikileaks: document dumps that shook the world. https:\/\/www.bbc.com\/news\/technology-47907890. Accessed 27 Apr 2021"},{"key":"9_CR66","unstructured":"Hosenball, M.: Russia used social media for widespread meddling in U.S. politics: reports, Reuters. https:\/\/www.reuters.com\/article\/us-usa-trump-russia-socialmedia-idUSKBN1OG257. Accessed 27 Apr 2021"},{"key":"9_CR67","unstructured":"Confessore, N.: Cambridge Analytica and Facebook: the scandal and the fallout so far, The New York Times. https:\/\/www.nytimes.com\/2018\/04\/04\/us\/politics\/cambridge-analytica-scandal-fallout.html. Accessed 27 Apr 2021"},{"key":"9_CR68","unstructured":"Cave, A.: Deal that undid Bell Pottinger: inside story of the South Africa scandal, The Guardian. https:\/\/www.theguardian.com\/media\/2017\/sep\/05\/bell-pottingersouth-africa-pr-firm. Accessed 27 Apr 2021"},{"key":"9_CR69","unstructured":"Swan, B.W.: State report: Russian, Chinese and Iranian disinformation narratives echo one another, Politico. https:\/\/www.politico.com\/news\/2020\/04\/21\/russia-china-iran-disinformation-coronavirus-state-department-193107. Accessed 27 Apr 2021"},{"key":"9_CR70","unstructured":"Kao, J., and Li, M.S.: How China built a Twitter propaganda machine then let it loose on Coronavirus, ProPublica. https:\/\/www.propublica.org\/article\/how-china-built-a-twitter-propaganda-machine-then-let-it-loose-on-coronavirus. Accessed 27 Apr 2021"},{"key":"9_CR71","unstructured":"Friedman, U.: The Coronavirus-denial movement now has a leader, The Atlantic. https:\/\/www.theatlantic.com\/politics\/archive\/2020\/03\/bolsonaro-coronavirus-denial-brazil-trump\/608926\/. Accessed 27 Apr 2021"},{"key":"9_CR72","unstructured":"McCarthy, T.: \u2018It will disappear\u2019: the disinformation Trump spread about the coronavirus \u2013 timeline, The Guardian. https:\/\/www.theguardian.com\/us-news\/2020\/apr\/14\/trump-coronavirus-alerts-disinformation-timeline. Accessed 27 Apr 2021"},{"key":"9_CR73","unstructured":"Carnegie Endowment for International Peace.: Partnership for Countering Influence Operations. https:\/\/carnegieendowment.org\/specialprojects\/counteringinfluenceoperations. Accessed 27 Apr 2021"},{"key":"9_CR74","unstructured":"Disinfodex: https:\/\/disinfodex.org\/. Accessed 27 Apr 2021"},{"key":"9_CR75","unstructured":"Twitter Transparency.: Information operations. https:\/\/transparency.twitter.com\/en\/reports\/information-operations.html. Accessed 27 Apr 2021"},{"key":"9_CR76","unstructured":"Skelton, S.K.: Government tells social media companies they must go further to address disinformation, Computer Weekly. https:\/\/www.computerweekly.com\/news\/252483063\/Government-tells-social-media-companies-they-must-do-more-to-address-disinformation. Accessed 27 Apr 2021"},{"key":"9_CR77","unstructured":"Hodgson, T.F., Farise, K., and Mavedzenge, J.: Southern Africa has cracked down on fake news, but may have gone too far, Mail and Guardian. https:\/\/mg.co.za\/analysis\/2020-04-05-southern-africa-has-cracked-down-on-fake-news-but-may-have-gone-too-far\/. Accessed 27 Apr 2021"},{"key":"9_CR78","volume-title":"Active Measures: The Secret History of Disinformation and Political Warfare","author":"T Rid","year":"2020","unstructured":"Rid, T.: Active Measures: The Secret History of Disinformation and Political Warfare. Profile Books, London (2020)"},{"key":"9_CR79","volume-title":"Information Wars: How We Lost the Global Battle against Disinformation and What We Can Do About It","author":"R Stengel","year":"2019","unstructured":"Stengel, R.: Information Wars: How We Lost the Global Battle against Disinformation and What We Can Do About It. Atlantic Books, London (2019)"},{"key":"9_CR80","unstructured":"Wanless, A., Pamment, J., eds.: Special issue on countering influence operations. J. Inf. Warfare 18(3) (2019)"},{"key":"9_CR81","volume-title":"This is not Propaganda: Adventures in the War Against Reality","author":"P Pomerantsev","year":"2019","unstructured":"Pomerantsev, P.: This is not Propaganda: Adventures in the War Against Reality. Faber & Faber, London (2019)"},{"key":"9_CR82","doi-asserted-by":"publisher","DOI":"10.4324\/9781003046905","volume-title":"The World Information War: Western Resilience, Campaigning, and Cognitive Effects","author":"T Clack","year":"2021","unstructured":"Clack, T., Johnson, R.: The World Information War: Western Resilience, Campaigning, and Cognitive Effects. Routledge, New York (2021)"},{"key":"9_CR83","unstructured":"PYMNTS.: EU probe into IoT targets Siri, Alexa over data collection. https:\/\/www.pymnts.com\/news\/regulation\/2020\/eu-probe-into-iot-targets-siri-alexa-over-data-collection\/. Accessed 28 Apr 2021"},{"key":"9_CR84","unstructured":"Allen, K.: Future of facial recognition technology in Africa, Institute for Security Studies. https:\/\/issafrica.org\/iss-today\/future-of-facial-recognition-technology-in-africa. Accessed 28 Apr 2021"},{"key":"9_CR85","unstructured":"Hill, K.: Wrongfully accused by an algorithm, The New York Times. https:\/\/www.nytimes.com\/2020\/06\/24\/technology\/facial-recognition-arrest.html. Accessed 28 Apr 2021"},{"key":"9_CR86","unstructured":"Future of Life Institute: Lethal autonomous weapons systems. https:\/\/futureoflife.org\/lethal-autonomous-weapons-systems\/. Accessed 28 Apr 2021"},{"key":"9_CR87","volume-title":"Army of None: Autonomous Weapons and the Future of War","author":"P Scharre","year":"2019","unstructured":"Scharre, P.: Army of None: Autonomous Weapons and the Future of War. W.W. Norton & Company, New York (2019)"},{"volume-title":"Autonomous Weapons Systems: Law, Ethics","year":"2016","key":"9_CR88","unstructured":"Bhuta, N., Beck, S., Gei\u03b2, R., Liu, H., Kre\u03b2, C. (eds.): Autonomous Weapons Systems: Law, Ethics. Policy. Cambridge University Press, Cambridge (2016)"},{"key":"9_CR89","doi-asserted-by":"publisher","DOI":"10.1017\/9781108584654","volume-title":"Autonomous Weapon Systems and the Law of Armed Conflict","author":"T McFarland","year":"2020","unstructured":"McFarland, T.: Autonomous Weapon Systems and the Law of Armed Conflict. Cambridge University Press, Cambridge (2020)"},{"key":"9_CR90","volume-title":"Genius Weapons: Artificial Intelligence, Autonomous Weaponry, and the Future Warfare","author":"LA Del Monte","year":"2018","unstructured":"Del Monte, L.A.: Genius Weapons: Artificial Intelligence, Autonomous Weaponry, and the Future Warfare. Prometheus Books, New York (2018)"},{"key":"9_CR91","volume-title":"Killer Robots: Legality and Ethicality of Autonomous Weapons","author":"A Krishnan","year":"2009","unstructured":"Krishnan, A.: Killer Robots: Legality and Ethicality of Autonomous Weapons. Routledge, New York (2009)"},{"key":"9_CR92","volume-title":"Killer Robots: Lethal Autonomous Weapon Systems Legal","author":"UC Jha","year":"2016","unstructured":"Jha, U.C.: Killer Robots: Lethal Autonomous Weapon Systems Legal. Ethical and Moral Challenges. Vij Books India, Delhi (2016)"},{"volume-title":"Lethal Autonomous Weapons: Re-Examining the Law and Ethics of Robotic Warfare","year":"2021","key":"9_CR93","unstructured":"Galliott, J., MacIntosh, D., Ohlin, J.D. (eds.): Lethal Autonomous Weapons: Re-Examining the Law and Ethics of Robotic Warfare. Oxford University Press, Oxford (2021)"},{"key":"9_CR94","volume-title":"Wired for War: The Robotics Revolution and Conflict in the 21st Century","author":"PW Singer","year":"2009","unstructured":"Singer, P.W.: Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin Press, London (2009)"},{"key":"9_CR95","unstructured":"Greenberg, I.: Fifth-generation cyberattacks are here. How can the IT industry adapt? World Economic Forum. https:\/\/www.weforum.org\/agenda\/2021\/02\/fifth-generation-cyberattacks\/. Accessed 29 Apr 2021"},{"key":"9_CR96","unstructured":"Coulehan, G.: The Fourth Industrial Revolution \u2013 AI, Quantum, and IoT Impacts on Cybersecurity, Security Boulevard. https:\/\/securityboulevard.com\/2021\/02\/the-fourth-industrial-revolution-ai-quantum-and-iot-impacts-on-cybersecurity\/. Accessed 29 Apr 2021"},{"key":"9_CR97","unstructured":"Naidoo, V.: The fifth industrial revolution looms, ITWeb. https:\/\/www.itweb.co.za\/content\/WnxpE74D2jg7V8XL. Accessed 29 Apr 2021"},{"key":"9_CR98","unstructured":"Djekic, M.D.: The perspectives of the 5th Industrial Revolution, Cyber Defense Magazine. https:\/\/www.cyberdefensemagazine.com\/the-perspectives\/. Accessed 29 Apr 2021"},{"key":"9_CR99","unstructured":"UN Human Rights Office of the High Commissioner: Call for inputs: report on the provision of military and security cyber products and services by \u2018cyber mercenaries\u2019 and its human rights impact. https:\/\/www.ohchr.org\/EN\/Issues\/Mercenaries\/WGMercenaries\/Pages\/Report-Cyber-Mercenaries-2021.aspx. Accessed 29 Apr 2021"},{"key":"9_CR100","unstructured":"France Diplomacy: Cybersecurity: Paris Call of 12 November 2018 for Trust and Security in Cyberspace. https:\/\/www.diplomatie.gouv.fr\/en\/french-foreign-policy\/digital-diplomacy\/france-and-cyber-security\/article\/cybersecurity-paris-call-of-12-november-2018-for-trust-and-security-in. Accessed 29 Apr 2021"},{"key":"9_CR101","unstructured":"Council of Europe: Consultations with civil society, data protection authorities and industry on the 2nd Additional Protocol to the Budapest Convention on Cybercrime. https:\/\/www.coe.int\/en\/web\/cybercrime\/protocol-consultations. Accessed 29 Apr 2021"},{"key":"9_CR102","unstructured":"CyberPeace Institute: Cyber Threats. https:\/\/cyberconflicts.cyberpeaceinstitute.org\/threats. Accessed 27 Jan 2023"},{"key":"9_CR103","unstructured":"van Niekerk, B., Ramluckan, T., Kushwaha, N. (eds.): Modelling Nation-state Information Warfare and Cyber-operations. Academic Conferences and Publishing International, Reading, UK (2022)"},{"key":"9_CR104","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197661628.001.0001","volume-title":"No Shortcuts: Why States Struggle to Develop a Military Cyber-Force","author":"M Smeets","year":"2022","unstructured":"Smeets, M.: No Shortcuts: Why States Struggle to Develop a Military Cyber-Force. Hurst, London (2022)"},{"key":"9_CR105","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197657553.001.0001","volume-title":"Offensive Cyber Operations","author":"D Moore","year":"2022","unstructured":"Moore, D.: Offensive Cyber Operations. Hurst, London (2022)"},{"key":"9_CR106","volume-title":"Cyber Persistence Theory","author":"MP Fischerkeller","year":"2002","unstructured":"Fischerkeller, M.P., Goldman, E.O., Harknett, R.J.: Cyber Persistence Theory. Oxford University Press, New York (2002)"},{"key":"9_CR107","volume-title":"Russian Information Warfare","author":"B Lilly","year":"2022","unstructured":"Lilly, B.: Russian Information Warfare. Naval Institute Press, Annapolis, MD (2022)"},{"key":"9_CR108","unstructured":"Hersman, R., Brewer, E., Sheppard, L., Simon, M.: Influence and Escalation: Implications of Russian and Chinese Influence Operations for Crisis Management. Center for Strategic and International Studies. https:\/\/www.csis.org\/analysis\/influence-and-escalation-implications-russian-and-chinese-influence-operations-crisis. Accessed 27 Jan 2023"},{"key":"9_CR109","volume-title":"Information Warfare in the Age of Cyber Conflict","author":"C Whyte","year":"2021","unstructured":"Whyte, C., Thrall, A.T., Mazanec, B.M.: Information Warfare in the Age of Cyber Conflict. Routledge, Milton Park, UK (2021)"},{"key":"9_CR110","unstructured":"EU Cyber Direct.: Cyber Diplomacy Atlas. https:\/\/eucyberdirect.eu\/atlas. Accessed 14 Feb 2023"},{"key":"9_CR111","unstructured":"The Hague Centre for Strategic Studies.: Cyber Arms Watch. https:\/\/hcss.nl\/cyber-arms-watch\/. Accessed 14 Feb 2023"},{"key":"9_CR112","unstructured":"United Nations Institute for Disarmament Research.: Cyber Policy Portal. https:\/\/cyberpolicyportal.org\/. Accessed 14 Feb 2023"},{"key":"9_CR113","unstructured":"Atlantic Council.: Digital Sherlocks. https:\/\/www.digitalsherlocks.org\/. Accessed 14 Feb 2023"},{"key":"9_CR114","unstructured":"Atlantic Council.: 360\/OS. https:\/\/www.digitalsherlocks.org\/360-os. Accessed 14 Feb 2023"},{"key":"9_CR115","unstructured":"Organization for Economic Co-operation and Development (OECD).: AI Policy Observatory. Accessed 14 Feb 2023"},{"key":"9_CR116","unstructured":"Anand, A., and Deng, H.: Towards Responsible AI in Defence: A Mapping and Comparative Analysis of AI Principles Adopted by States, United Nations Institute for Disarmament Research: Geneva (2023). https:\/\/unidir.org\/publication\/towards-responsible-ai-defence-mapping-and-comparative-analysis-ai-principles-adopted"},{"key":"9_CR117","unstructured":"Hutchinson, W. (ed.) Special Issue on Ukraine. J. Inf. Warfare 22(1) (2023)"}],"container-title":["IFIP Advances in Information and Communication Technology","Current Directions in ICT and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50758-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T17:04:29Z","timestamp":1706288669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50758-8_9"}},"subtitle":["Working Group 9.10: ICT Uses in Peace and War"],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031507571","9783031507588"],"references-count":117,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50758-8_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}