{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:39:19Z","timestamp":1725536359025},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040610"},{"type":"electronic","value":"9783642040627"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04062-7_15","type":"book-chapter","created":{"date-parts":[[2009,8,20]],"date-time":"2009-08-20T03:32:15Z","timestamp":1250739135000},"page":"138-144","source":"Crossref","is-referenced-by-count":2,"title":["The People\u2019s Republic of China \u2013 The Emerging Cyberpower"],"prefix":"10.1007","author":[{"given":"S\u00e9rgio Tenreiro","family":"de Magalh\u00e3es","sequence":"first","affiliation":[]},{"given":"Maria J.","family":"Rios","sequence":"additional","affiliation":[]},{"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Jahankhani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2008. DoD, Washington (2008)"},{"key":"15_CR2","unstructured":"Central Intelligence Agency. The World Fact Book. Retrieved 10th Junho (2008), \n                  \n                    https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ch.html"},{"key":"15_CR3","volume-title":"China Military Science","author":"W. Pufeng","year":"1995","unstructured":"Pufeng, W.: China Military Science. Academy of Military Science, Pequim (1995), \n                  \n                    http:\/\/ftp.fas.org\/irp\/world\/china\/docs\/iw_mg_wang.htm"},{"key":"15_CR4","volume-title":"Unrestricted Warfare","author":"Q. Liang","year":"1999","unstructured":"Liang, Q., Xiangsui, X.: Unrestricted Warfare. PLA Literature and Arts Publishing House, Pequim (1999)"},{"key":"15_CR5","unstructured":"Wei, J.: Information War: A New Form of People\u2019s War. Liberation Army Daily, Pequim (1996), \n                  \n                    http:\/\/ftp.fas.org\/irp\/world\/china\/docs\/iw_wei.htm\n                  \n                  \n                 (retrieved, Junho 2008)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"631","DOI":"10.2307\/2137606","volume":"20","author":"D.L. Poston","year":"1994","unstructured":"Poston, D.L., Mao, M.X., Yu, M.Y.: The global distribution of the overseas Chinese around 1990. Population and Development Review\u00a020, 631\u2013645 (1994)","journal-title":"Population and Development Review"},{"key":"15_CR7","unstructured":"Terrazas, A.M., Devani, B.: Chinese Immigrants in the United States. Migration Policy Institute (2008), \n                  \n                    http:\/\/www.migrationinformation.org\/USfocus\/print.cfm?ID=685\n                  \n                  \n                 (retrieved)"},{"key":"15_CR8","unstructured":"Laczko, F.: Europe Attracts More Migrants from China. Migration Policy Institute (2003), \n                  \n                    http:\/\/www.migrationinformation.org\/Feature\/print.cfm?ID=144\n                  \n                  \n                 (retrieved, January 2008)"},{"key":"15_CR9","unstructured":"Wolf, F.R.: Wolf Reveals House Computers Compromised by Outside Source. P.R. Press Release (2008), \n                  \n                    http:\/\/wolf.house.gov\/index.cfm?sectionid=34&parentid=6&sectiontree=6,34&itemid=1174\n                  \n                  \n                 (retrieved 11 de Junho de 2008)"},{"key":"15_CR10","unstructured":"Thornburgh, N.: The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them). Time Magazine (2005, 29 de Agosto)"},{"key":"15_CR11","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2002. DoD, Washington (2002)"},{"key":"15_CR12","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2003. DoD, Washington (2003)"},{"key":"15_CR13","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2004. DoD, Washington (2004)"},{"key":"15_CR14","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2005. DoD, Washington (2005)"},{"key":"15_CR15","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2006. DoD, Washington (2006)"},{"key":"15_CR16","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2007. DoD, Washington (2007)"},{"key":"15_CR17","unstructured":"Department of Defense. Annual Report to Congress \u2013 Military Power of the People\u2019s Republic of China 2008. DoD, Washington (2008)"},{"key":"15_CR18","unstructured":"Sevastopulo, D.: Chinese hacked into Pentagon. Financial Times (2007, 3 de Setembro)"},{"key":"15_CR19","unstructured":"Haris, S.: China\u2019s Cyber-Militia. National Journal Magazine (2008, 31 de Maio)"},{"key":"15_CR20","unstructured":"McAfee. Virtual Criminology Report 2007: Cybercrime The Next Wave (2007), \n                  \n                    http:\/\/www.mcafee.com\/us\/local_content\/misc\/mcafee_na_virtual_criminology_report.pdf\n                  \n                  \n                 (retrieved, Julho 2008)"},{"key":"15_CR21","unstructured":"Mandraud, I.: La France, cible de hackers chinois Apr\u00e8s les Etats-Unis, l\u2019Allemagne et le Royaume-Uni, la France victime d\u2019intrusions. Le Monde (2007, 9 de Setembro)"},{"key":"15_CR22","unstructured":"Blakely, R.R., Rossiter, J., Beeston, R.: MI5 alert on China\u2019s cyberspace spy threat. The Times (2007)"},{"key":"15_CR23","unstructured":"Merkel\u2019s China Visit Marred by Hacking Allegations (2007, 27 de Agosto). Spiegel (2007)"},{"key":"15_CR24","unstructured":"Is China attacking Belgian computers? (2008, 3 de Maio). United Press International (2008)"},{"key":"15_CR25","unstructured":"Buckley, C.: China says suffers \u2019massive\u2019 Internet spy damage. Reuters (2007, 12 de Setembro)"}],"container-title":["Communications in Computer and Information Science","Global Security, Safety, and Sustainability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04062-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T08:35:40Z","timestamp":1552120540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04062-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040610","9783642040627"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04062-7_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}