{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T04:11:00Z","timestamp":1776312660455,"version":"3.50.1"},"reference-count":75,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2016,8,7]]},"DOI":"10.1080\/01972243.2016.1177762","type":"journal-article","created":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T23:49:02Z","timestamp":1464738542000},"page":"256-268","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":25,"title":["Intellectual property theft and national security: Agendas and assumptions"],"prefix":"10.1080","volume":"32","author":[{"given":"Debora","family":"Halbert","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,31]]},"reference":[{"key":"cit0001","author":"Baumann N.","year":"2013","journal-title":"Mother Jones"},{"key":"cit0003","volume-title":"Copyrighting culture: The political economy of intellectual property","author":"Bettig R. V.","year":"1996"},{"key":"cit0004","volume-title":"The report of the commission on the theft of American intellectual property","author":"Blair D. C.","year":"2013"},{"key":"cit0005","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511510854","volume-title":"Against intellectual monopoly","author":"Boldrin M.","year":"2008"},{"key":"cit0006","doi-asserted-by":"crossref","DOI":"10.4324\/9780203821855","volume-title":"Silent theft: The private plunder of our common wealth","author":"Bollier D.","year":"2002"},{"key":"cit0007","doi-asserted-by":"crossref","DOI":"10.4159\/9780674028630","volume-title":"Shamans, software, and spleens: Law and the construction of the information society","author":"Boyle J.","year":"1996"},{"issue":"1","key":"cit0008","first-page":"33","volume":"66","author":"Boyle J.","year":"2003","journal-title":"Law and Contemporary Problems"},{"issue":"4","key":"cit0009","first-page":"28","volume":"43","author":"Brito J.","year":"2011","journal-title":"Reason"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1177\/1354066111419538"},{"key":"cit0011","doi-asserted-by":"crossref","DOI":"10.1515\/9781685853808","volume-title":"Security: A new framework for analysis","author":"Buzan B.","year":"1997"},{"key":"cit0012","volume-title":"Writing security: United States Foreign policy and the politics of identity","author":"Campbell D.","year":"1998"},{"key":"cit0014","volume-title":"The DOD cyber strategy","author":"Carter A.","year":"2015"},{"key":"cit0015","doi-asserted-by":"crossref","DOI":"10.4324\/9780203937419","volume-title":"Cyber-security and threat politics: US efforts to secure the information age","author":"Cavelty M. D.","year":"2007"},{"key":"cit0016","volume-title":"Cyber war: The next threat to national security and what to do about it","author":"Clarke R. A.","year":"2010"},{"key":"cit0017","volume-title":"Liberty and security in a changing world: Report and recommendations of The President's Review Group on Intelligence and Communications Technologies","author":"Clarke R. A.","year":"2013"},{"key":"cit0018","volume-title":"Intellectual property rights, the WTO, and developing countries: The TRIPS agreement and policy options","author":"Correa C.","year":"2000"},{"key":"cit0021","volume-title":"Black code: Inside the battle for cyberspace","author":"Deibert R. J.","year":"2013"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1353\/jod.2010.0010"},{"key":"cit0023","volume-title":"Information warfare and security","author":"Denning D. E.","year":"1998"},{"key":"cit0024","volume-title":"Content: Selected essays on technology, creativity, copyright, and the future of the future","author":"Doctorow C.","year":"2008"},{"key":"cit0026","volume-title":"Information feudalism: Who owns the knowledge economy?","author":"Drahos P.","year":"2003"},{"key":"cit0027","first-page":"1","author":"Eun Y.-S.","year":"2014","journal-title":"International Studies Perspectives"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2012.709391"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00136"},{"key":"cit0031","author":"Gjelten T.","year":"2013","journal-title":"NPR.org."},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1007\/BF01099260"},{"key":"cit0033","volume-title":"Resisting intellectual property","author":"Halbert D.","year":"2005"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2478.2009.00572.x"},{"key":"cit0035","doi-asserted-by":"crossref","DOI":"10.3138\/9781442620896","volume-title":"No trespassing: Authorship, intellectual property rights, and the boundaries of globalization","author":"Hemmungs Wirt\u00e9n E.","year":"2004"},{"issue":"2","key":"cit0036","first-page":"373","volume":"52","author":"Hollis D. B.","year":"2011","journal-title":"Harvard International Law Journal"},{"key":"cit0038","volume-title":"Active cyber defense: A framework for policymakers","author":"Lachow I.","year":"2013"},{"key":"cit0039","doi-asserted-by":"crossref","DOI":"10.21236\/ADA489361","volume-title":"Securing cyberspace for the 44th presidency: A report of the CSIS commission on cybersecurity for the 44th presidency","author":"Langevin J.","year":"2008"},{"issue":"1","key":"cit0040","first-page":"281","volume":"15","author":"Larsson S.","year":"2013","journal-title":"Societas\/Communitas"},{"key":"cit0041","volume-title":"The future of ideas: The fate of the commons in a connected world","author":"Lessig L.","year":"2002"},{"key":"cit0042","volume-title":"Free culture: The nature and future of creativity","author":"Lessig L.","year":"2005"},{"key":"cit0043","volume-title":"Code: And other laws of cyberspace, version 2.0","author":"Lessig L.","year":"2006"},{"key":"cit0044","author":"Lessig L.","year":"2013","journal-title":"Huffington Post"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804250"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00189"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2478.2010.00592.x"},{"key":"cit0050","volume-title":"A global political economy of intellectual property rights: The new enclosures?","author":"May C.","year":"2000"},{"key":"cit0049","volume-title":"Intellectual property rights: A critical history","author":"May C.","year":"2006"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2012.742013"},{"key":"cit0052","volume-title":"Freedom of expression\u00ae: Resistance and repression in the age of intellectual property","author":"McLeod K.","year":"2007"},{"key":"cit0053","volume-title":"The politics of piracy: Intellectual property in contemporary China","author":"Mertha A.","year":"2005"},{"key":"cit0054","author":"Michaels J.","year":"2013","journal-title":"USA Today"},{"issue":"2","key":"cit0055","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1163\/19426720-01302007","volume":"13","author":"Mueller M.","year":"2007","journal-title":"Global Governance: A Review of Multilateralism and International Organizations"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.2307\/1192397"},{"key":"cit0057","volume-title":"International strategy for cyberspace: Prosperity, security, and openness in a networked world","author":"Obama B.","year":"2011"},{"issue":"3","key":"cit0060","first-page":"i","volume":"2010","author":"Ophardt J. A.","year":"2010","journal-title":"Duke Law & Technology Review"},{"key":"cit0061","volume-title":"Property outlaws: How squatters, pirates, and protesters improve the law of ownership","author":"Pe\u00f1alver E.","year":"2010"},{"key":"cit0062","author":"Pooley J.","year":"2013","journal-title":"WIPO Magazine"},{"key":"cit0064","author":"Reilly R. J.","year":"2013","journal-title":"Huffington Post"},{"key":"cit0065","author":"Reilly R. J.","year":"2013","journal-title":"Huffington Post"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2011.608939"},{"key":"cit0067","volume-title":"Cyber war will not take place","author":"Rid T.","year":"2013"},{"key":"cit0068","author":"Riley M.","year":"2011","journal-title":"Bloomberg"},{"key":"cit0069","author":"Schmidt M. S.","year":"2014","journal-title":"New York Times"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139169288"},{"key":"cit0071","author":"Schulz G. W.","year":"2013","journal-title":"Wired"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1080\/09700160903354450"},{"key":"cit0073","doi-asserted-by":"crossref","DOI":"10.1093\/wentk\/9780199918096.001.0001","volume-title":"Cybersecurity and cyberwar: What everyone needs to know","author":"Singer P. W.","year":"2014"},{"key":"cit0075","volume-title":"Free software, free society: Selected essays of Richard M. Stallman","author":"Stallman R. M.","year":"2002"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1080\/13523260.2012.659597"},{"key":"cit0078","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2012.730485"},{"key":"cit0079","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812439553"},{"key":"cit0080","volume-title":"The national strategy to secure cyberspace","author":"The White House","year":"2003"},{"key":"cit0082","doi-asserted-by":"crossref","DOI":"10.7249\/RB9417","volume-title":"Film piracy, organized crime and terrorism","author":"Treverton G.","year":"2009"},{"key":"cit0083","first-page":"405","volume-title":"Managing trust in cyberspace","author":"Uzal R.","year":"2014"},{"key":"cit0084","volume-title":"Copyrights and copywrongs: The rise of intellectual property and how it threatens creativity","author":"Vaidhyanathan S.","year":"2001"},{"key":"cit0085","volume-title":"Logics of security: The Copenhagen School, risk management and the war on terror","author":"van Munster R.","year":"2005"},{"key":"cit0086","doi-asserted-by":"publisher","DOI":"10.1002\/9781118603482"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.1046\/j.0020-8833.2003.00277.x"},{"issue":"1","key":"cit0088","first-page":"143","volume":"34","author":"Yu P.","year":"2005","journal-title":"Georgia Journal of International and Comparative Law"},{"issue":"4","key":"cit0089","first-page":"901","volume":"55","author":"Yu P.","year":"2006","journal-title":"American University Law Review"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2016.1177762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T22:17:01Z","timestamp":1656627421000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2016.1177762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,31]]},"references-count":75,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,5,31]]},"published-print":{"date-parts":[[2016,8,7]]}},"alternative-id":["10.1080\/01972243.2016.1177762"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2016.1177762","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,31]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}