{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T19:06:05Z","timestamp":1771009565464,"version":"3.50.1"},"reference-count":55,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2004,7]]},"DOI":"10.1080\/01972240490456854","type":"journal-article","created":{"date-parts":[[2004,5,27]],"date-time":"2004-05-27T21:36:15Z","timestamp":1085693775000},"page":"187-199","source":"Crossref","is-referenced-by-count":29,"title":["The Sources of Laws: Policy Dynamics in a Digital and Terrorized World"],"prefix":"10.1080","volume":"20","author":[{"given":"Ian","family":"Hosein","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","volume-title":"Risks of key recovery, key escrow and trusted third party encryption.","author":"Abelson H.","year":"1998"},{"key":"CIT0002","first-page":"213","volume":"25","author":"Alvarez JoseE.","year":"2002","journal-title":"Boston College International and Comparative Law Review"},{"key":"CIT0003","first-page":"371","volume":"2","author":"Anderson Kenneth","year":"2001","journal-title":"Chicago Journal of International Law"},{"key":"CIT0004","volume-title":"Cybercrime Bill 2001 second reading speech by the Attorney General","year":"2001"},{"key":"CIT0005","volume-title":"Understanding regulation: Theory, strategy, and practice","author":"Baldwin Robert","year":"1999"},{"key":"CIT0006","volume-title":"Keynote address to the Organization for Security and Cooperation in Europe Annual Security Review Conference","author":"Black Cofer","year":"2003"},{"key":"CIT0007","volume-title":"U.S. Counterterrorism policy in Asia and the Pacific","author":"Black Cofer","year":"2003"},{"key":"CIT0008","doi-asserted-by":"crossref","DOI":"10.1017\/9780521780339","volume-title":"Global business regulation","author":"Braithwaite John","year":"2000"},{"key":"CIT0009","volume-title":"Letter from President George W. Bush to Mr Romano Prodi, President","author":"Bush GeorgeW.","year":"2001"},{"key":"CIT0010","volume-title":"Council of Europe convention on cybercrime explanatory report","year":"2001"},{"key":"CIT0011","volume-title":"Note from the German delegation to the Article 36 committee on computer-aided preventative searches carried out by individual member states on the basis of coordinated offender profiles (Europe-wide electronic profile searches)","year":"2002"},{"key":"CIT0012","volume-title":"Outcome of proceedings of meeting of Working Party on Terrorism","year":"2002"},{"key":"CIT0013","volume-title":"Answers to questionnaire on traffic data retention","year":"2002"},{"key":"CIT0014","volume-title":"US-VISIT Program, increment 1, Privacy impact assessment","year":"2003"},{"key":"CIT0015","first-page":"321","volume":"2","author":"Drezner DanielW.","year":"2001","journal-title":"Chicago Journal of International Law"},{"key":"CIT0016","volume-title":"Draft framework decision on the retention of traffic data and on access to this data in connection with criminal investigations and prosecutions","year":"2002"},{"key":"CIT0017","first-page":"276","volume-title":"Combating transnational crime","author":"Fijnaut Cyrille","year":"2001"},{"key":"CIT0018","volume-title":"Chairman's Statement","year":"1995"},{"key":"CIT0019","volume-title":"Chair's summary","year":"2003"},{"key":"CIT0020","volume-title":"Principles on the availability of data essential to protecting public safety","year":"2002"},{"key":"CIT0021","volume-title":"Recommendations for tracing networked communications across national borders in terrorist and criminal investigations","year":"2002"},{"key":"CIT0022","volume-title":"Un dialogue entre les pouvoirs publics et le secteur priv\u00e9 sur la s\u00e9curit\u00e9 et la confiance dans le cyberespace, communiqu\u00e9 du G8 (groupe de Lyon)","year":"2000"},{"key":"CIT0023","volume-title":"Recommendations for tracing networked communications across national borders in terrorist and criminal investigations (Draft)","year":"2001"},{"key":"CIT0024","volume-title":"Looking to the future: Clarity on communications data retention law","author":"Gaspar Roger","year":"2000"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818300033506"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818300001442"},{"key":"CIT0027","volume-title":"International law: Politics and values. Developments in international law, Vol. 18","author":"Henkin Louis","year":"1995"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(01)00059-2"},{"key":"CIT0029","volume-title":"ICAO facilitation meeting considers aircraft disinsection, public health, asylum seekers and persons with disabilities","year":"1995"},{"key":"CIT0030","volume-title":"Biometrics deployment of machine readable travel documents","year":"2003"},{"key":"CIT0031","volume-title":"Executive summary of the technical report on ICAO Work on Selection and Testing of a Biometric Technology for Identity Confirmation with Machine Readable Travel Documents (MRTDS)"},{"key":"CIT0032","volume-title":"A Guide to Doc 9303"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818300007189"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.2307\/422294"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2307\/2151968"},{"key":"CIT0036","doi-asserted-by":"crossref","DOI":"10.1515\/9781400820269","volume-title":"After hegemony: Cooperation and discord in the world political economy","author":"Keohane RobertO.","year":"1984"},{"key":"CIT0037","volume-title":"Cops across borders: The internationalization of U.S. criminal law enforcement","author":"Nadelman Ethan","year":"1993"},{"key":"CIT0038","first-page":"1235","volume":"23","author":"Nagle LuzEstella","year":"2000","journal-title":"Fordham International Law Journal"},{"key":"CIT0039","unstructured":"NZPA. 2003. PM's war stance criticised as Parliament debates terrorism bill.New Zealand Herald, 2 April"},{"key":"CIT0040","volume-title":"Fact sheet: Action to enhance global capacity to combat terror","year":"2003"},{"key":"CIT0041","volume-title":"OSCE security conference considers fresh options","year":"2003"},{"key":"CIT0042","first-page":"997","volume":"73","author":"Perritt HenryH.","year":"1998","journal-title":"Chicago-Kent Law Review"},{"key":"CIT0043","volume-title":"SUBJECT: Enhanced border security and visa entry reform act of 2002\u2014ALDAC No. 1","author":"Powell Colin","year":"2002"},{"key":"CIT0044","volume-title":"Report of the G8 government\/private sector high level meeting on high-tech crime","author":"Purdy Dan","year":"2001"},{"key":"CIT0045","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1215\/9780822381815-007","volume-title":"The argumentative turn in policy analysis and planning","author":"Rein Martin","year":"1993"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.2307\/20048208"},{"key":"CIT0047","first-page":"233","volume":"1","author":"Slaughter Anne-Marie","year":"2000","journal-title":"Chicago Journal of International Law"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.2307\/2997914"},{"key":"CIT0049","first-page":"443","volume-title":"A reader on regulation","author":"Sun Jeanne-Mey","year":"1998"},{"key":"CIT0050","unstructured":"2003. Suspected terrorist, 24, is arrested.The Nation, 30 June"},{"key":"CIT0051","first-page":"308","volume":"39","author":"Tuerkheimer Frank","year":"2002","journal-title":"Houston Law Review"},{"key":"CIT0052","volume-title":"United States\u2013Japan joint statement on promoting global cyber security","year":"2003"},{"key":"CIT0053","volume-title":"Comments of the United States government on the European Commission Communication on Combating Computer Crime","year":"2001"},{"key":"CIT0054","volume-title":"Prepared statement of the United States of America","year":"2001"},{"key":"CIT0055","first-page":"1023","volume":"32","author":"Zagaris Bruce","year":"1999","journal-title":"Vanderbilt Journal of Transnational Law"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972240490456854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T01:53:17Z","timestamp":1623981197000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01972240490456854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,7]]}},"alternative-id":["10.1080\/01972240490456854"],"URL":"https:\/\/doi.org\/10.1080\/01972240490456854","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,7]]}}}