{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T05:25:48Z","timestamp":1737696348921,"version":"3.33.0"},"publisher-location":"Wiesbaden","reference-count":9,"publisher":"Vieweg","isbn-type":[{"type":"print","value":"9783834803467"},{"type":"electronic","value":"9783834894182"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9418-2_7","type":"book-chapter","created":{"date-parts":[[2007,12,17]],"date-time":"2007-12-17T10:52:55Z","timestamp":1197888775000},"page":"65-72","source":"Crossref","is-referenced-by-count":1,"title":["Is Cyber Tribalism Winning Online Information Warfare?"],"prefix":"10.1007","author":[{"given":"Godfried","family":"Williams","sequence":"first","affiliation":[]},{"given":"Johnnes","family":"Arreymbi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Arquilla, J. and Ronfeldt, D.(2001) Networks and Netwars: The future of Terror, Crime and Militancy, RAND (2001) (ISBN: 0833030302)."},{"key":"7_CR2","unstructured":"Arreymbi, J.(2005) Phishing Attack \u2014 A Socially Engineered Threat to e-Business. Proceedings of the International Conference on Internet Computing, Las Vegas, USA, CSREA Press."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Arreymbi, J. and Williams, G.(2005) Assessing the Economics of Electronic Security. ISSE 2005, Paulus, S., Pohlmann, N. and Reimer, H. (Eds). Vieweg. (ISBN 3834800112)","DOI":"10.1007\/978-3-322-85237-3_38"},{"key":"7_CR4","unstructured":"Borden, A. Col.(Ret). (1999) What is Information Warfare? Aerospace Power Chronicles, USAF."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Cordesman, A. H.(2002) Cyberthreats Information Warfare, and Critical infrastructure Protection: Defending the US Homeland (2002) (ISBN: 0275974235) Denning, D. (1998) Information warfare and Security, Addison-Wesley (ISBN: 0201433036)","DOI":"10.5040\/9798400636509"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Rattray, G. J.(2001) Strategic Warfare in Cyberspace, MIT Press (2001) (ISBN: 0262182092).","DOI":"10.7551\/mitpress\/6483.001.0001"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Williams G. B (2004), Synchronizing E-Security, Kluwer Academic Publishers","DOI":"10.1007\/978-1-4615-0493-1"},{"key":"7_CR8","unstructured":"Williams G. B (2007), Artificial Intelligence, Existing and Emerging Techniques. Google Partner Programme, Kobsa and Powl (1995, 2000), (1997) Peppers and Rogers (1993, 1997), Zukerman and Albrecht (2000)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Williams G. B (2007), Online Business Security Systems, Springer-Verlag","DOI":"10.1007\/978-0-387-68850-3"}],"container-title":["ISSE\/SECURE 2007 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9418-2_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T21:23:10Z","timestamp":1737667390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9418-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834803467","9783834894182"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9418-2_7","relation":{},"subject":[]}}