{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:19:24Z","timestamp":1743095964484,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":17,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_10","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"134-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Restricting Excessive State-on-State Cyber Espionage under International Law: A Quest of Futility?"],"prefix":"10.1007","author":[{"given":"Murdoch","family":"Watney","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"10_CR68","unstructured":"[Alex14] Alexander, David: \u201cHagel, ahead of China trip, urges military restraint in cyberspace.\u201d In: http:\/\/www.reuters.com\/assets\/print?aid=USBREA2R1ZH20140328"},{"key":"10_CR69","unstructured":"[Beau14] Beauchamp, Zack: \u201cHow the US indictment of Chinese military hackers will change cyberespionage.\u201d In: http:\/\/www.vox.com\/2014\/5\/19\/57311696\/chinese-hackers-cyberespionage-theft-cyber..."},{"key":"10_CR70","unstructured":"[ClKn12] Clarke, Richard; Knake, Robert: Cyber War. Publisher: HarperCollins Publishers, New York, 2012, page 58 \u2013 60; 213 \u2013 214, 222, 225, 236 \u2013 237, 285, 291 \u2013 296."},{"key":"10_CR71","unstructured":"[Doyl14a] Doyle, Jack: \u201cSpires cleared of Snowden\u2019s claims of mass intrusion: communications watchdog says they did not break any laws.\u201d In: http:\/\/www.dailymail.co.uk\/news\/article-2600239\/Spiescleared-Snowdens-claims-ma..."},{"key":"10_CR72","unstructured":"[Doyl14b] Doyle, Jack: \u201cTheresa May calls for return of snooper\u2019s charter: She warns internet is a paradise for terrorists.\u201d In: http:\/\/www.dailymail.co.uk\/news\/article-2668433\/Theresa-May-calls-return-snoopers..."},{"key":"10_CR73","unstructured":"[Fidl13] Fidler, David: \u201cEconomic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies.\u201d In: http:\/\/www.asil.org\/print\/25"},{"key":"10_CR74","unstructured":"[Kush13] Kushner, David: \u201cThe Real Story of Stuxnet.\u201d In: http:\/\/spectrum.ieee.org\/telecom\/security\/thereal-story-of-stuxnet\/"},{"key":"10_CR75","unstructured":"[Lach09] Lachow, Irving: \u201cCyber Terrorism: Menace or Myth?\u201d In: Kramer, Franklin, Starr, Stuart and Wentz, Larry Cyberpower and National Security. Publisher: Potomac Books Inc, US, 2009, pages 440 \u2013 441."},{"key":"10_CR76","unstructured":"[Land10] Lander, Mark: \u201cClinton urges global response to Internet attacks.\u201d In: http:\/\/www.nytimes.com\/2010\/01\/22\/world\/asia\/22diplo.html?_r=0"},{"key":"10_CR77","unstructured":"[LeHa13] Leigh, David and Harding, Luke: Wikileaks. Publisher: Guardian Books, UK, 2013, pages 2, 52, 87, 212, 214, 266, 280."},{"key":"10_CR78","unstructured":"[Leyd13] Leyden, John: \u201cCyberwar playbook, says Stuxnet may have armed attack.\u201d In: http:\/\/www.theregister.co.uk\/2013\/03\/27\/stuxnet_cyberwar_r"},{"key":"10_CR79","unstructured":"[Masn13] Masnick, Mike: \u201cUS working overtime behind the scenes to kill UN plan to protect online privacy from snooping.\u201d In: http:\/\/www.techdirt.com\/aricles\/20131120\/17013625313\/us-working-overtime-behi..."},{"key":"10_CR80","doi-asserted-by":"crossref","unstructured":"[Schm13] Schmitt, Michael: Tallinn Manual on the International Law Applicable to Cyber Warfare. Publisher: Cambridge University Press, 2013, pages 30, 44 \u2013 45, 50.","DOI":"10.1017\/CBO9781139169288"},{"key":"10_CR81","unstructured":"[ScCo13] Schmidt, Eric and Cohen, Jared: \u201cThe New Digital Age. Publisher: John Muray Publishers, UK, 2013, pages 7, 254 \u2013 256."},{"key":"10_CR82","unstructured":"[Szpo14] \u201cSnowden: Here\u2019s Everything We\u2019ve Learned in One Year of Unprecedented Top-Secret Leaks.\u201d In: http:\/\/www.businessinsider.com\/snowden-leaks-timeline-2014-6"},{"key":"10_CR83","doi-asserted-by":"crossref","unstructured":"[Watn10] Watney, Murdoch: \u201cThe use of surveillance in conducting criminal investigations on the internet.\u201d In: Jahankhani, Hamid; Watson, David; Ganluigi ME, and Leonhart, Frank Handbook of Electronic Security and Digital Forensics. Publisher: World Scientific Publishing co. Pte. Ltd, Singapore, 2010, pages 525 \u2013 551.","DOI":"10.1142\/9789812837042_0027"},{"key":"10_CR84","doi-asserted-by":"crossref","unstructured":"[Watn14]: Watney: Murdoch: \u201cChallenges Pertaining to Cyber War under International Law.\u201d In: The Third International Conference on Cyber Security, Cyber Warfare and Digital Forensics (Cybersec2014), 2014, pages 1 \u2013 5.","DOI":"10.1109\/CyberSec.2014.6913962"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:41:18Z","timestamp":1674175278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_10","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}