{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T07:10:02Z","timestamp":1776755402369,"version":"3.51.2"},"reference-count":45,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172425"],"award-info":[{"award-number":["62172425"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cybersecurity at MIT Sloan"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,5,3]]},"DOI":"10.1080\/19393555.2023.2201482","type":"journal-article","created":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T14:46:47Z","timestamp":1682088407000},"page":"204-225","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process"],"prefix":"10.1080","volume":"33","author":[{"given":"Benjamin","family":"Madnick","sequence":"first","affiliation":[{"name":"The Fletcher School of Law and Diplomacy, Tufts University, Medford, Oregon, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4550-1047","authenticated-orcid":false,"given":"Keman","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Information, Renmin University of China, Perking, China"},{"name":"Sloan School of Management &amp; Cybersecurity at MIT Sloan, MIT, Cambridge, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9240-2573","authenticated-orcid":false,"given":"Stuart","family":"Madnick","sequence":"additional","affiliation":[{"name":"Sloan School of Management &amp; Cybersecurity at MIT Sloan, MIT, Cambridge, Massachusetts, USA"}]}],"member":"301","published-online":{"date-parts":[[2023,4,21]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818304582024"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2478.2010.00637.x"},{"key":"e_1_3_4_4_1","unstructured":"Ang B. (2018). Next Steps for Cyber Norms in ASEAN. 174. https:\/\/www.rsis.edu.sg\/wp-content\/uploads\/2018\/10\/CO18174.pdf."},{"key":"e_1_3_4_5_1","volume-title":"MGuardian of the Galaxy: EU Cyber Sanctions and Norms in Cyberspace","author":"Bannelier K.","year":"2019","unstructured":"Bannelier, K., Bozhkov, N., Delerue, F., Giumelli, F., Moret, E., & Horenbeeck, V. (2019). MGuardian of the Galaxy: EU Cyber Sanctions and Norms in Cyberspace (Pawlak, P. & Biersteker, T., Edited by), European Union Institute for Security Studies."},{"key":"e_1_3_4_6_1","unstructured":"Benner T. (2015). Brazil as a norm entrepreneur: \u201cResponsibility while protecting.\u201d Enduring NATO Rising Brazil. 119\u2013140. https:\/\/www.files.ethz.ch\/isn\/162234\/Benner_2013_Working-Paper_Brazil-RWP.pdf."},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1057\/9781137490353"},{"key":"e_1_3_4_8_1","unstructured":"Burke E. (2021). The Obama -Xi Summit and the prospects for a global norm against commercial IP theft. https:\/\/carnegieendowment.org\/2021\/06\/14\/obama-xi-summit-and-prospects-for-global-norm-against-commercial-ip-theft-pub-84762."},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/13523260.2015.1061765"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.17356\/ieejsp.v7il.666"},{"key":"e_1_3_4_11_1","first-page":"1","article-title":"Things we lost in the fire: How different types of contestation affect the robustness of international norms","volume":"0","author":"Deitelhoff N.","year":"2018","unstructured":"Deitelhoff, N., & Zimmermann, L. (2018). Things we lost in the fire: How different types of contestation affect the robustness of international norms. International Studies Review, 0, 1\u201326. https:\/\/academic.oup.com\/isr\/article\/22\/1\/51\/5266952","journal-title":"International Studies Review"},{"key":"e_1_3_4_12_1","volume-title":"A timeline of the biggest ransomware attacks","author":"Dosset J.","year":"2021","unstructured":"Dosset, J. (2021). A timeline of the biggest ransomware attacks. Cnet. https:\/\/www.cnet.com\/personal-finance\/crypto\/a-timeline-of-the-biggest-ransomware-attacks\/"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/3115119"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1017\/s0002930000016894"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1162\/002081898550789"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2017.1399730"},{"key":"e_1_3_4_17_1","unstructured":"Harman S. (2016). Confidence-building measure. Encyclopedia Britannica. https:\/\/www.britannica.com\/topic\/confidence-building-measure"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy009"},{"key":"e_1_3_4_19_1","unstructured":"Huang K. & Madnick S. (2020). The TikTok ban should worry every company. Harvard Business Review. https:\/\/hbr.org\/2020\/08\/the-tiktok-ban-should-worry-every-company"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2018.1467942"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40803-019-00088-0"},{"key":"e_1_3_4_22_1","volume-title":"The culture of national security : Norms and identity in world politics","author":"Katzenstein Peter J.","year":"1996","unstructured":"Katzenstein Peter, J. (1996). The culture of national security : Norms and identity in world politics. Columbia University Press."},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1465-3435.2010.01461.x"},{"key":"e_1_3_4_24_1","doi-asserted-by":"crossref","unstructured":"Kurusu K. (2018). Japan as a norm entrepreneur for human security. https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9781315643076-21\/japan-norm-entrepreneur-human-security-kaoru-kurusu.","DOI":"10.4324\/9781315643076-21"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0032247416000759"},{"key":"e_1_3_4_26_1","unstructured":"Levite A. & Jinghua L. (2019). Chinese-Americans relations in cyberspace: Toward collaboration or confrontation? https:\/\/carnegieendowment.org\/2019\/01\/24\/chinese-american-relations-in-cyberspace-toward-collaboration-or-confrontation-pub-78213."},{"key":"e_1_3_4_27_1","unstructured":"Louw-Vaudran L. (2016). Is South Africa a Norm Entrepreneur in Africa? Institute for Security Studies. https:\/\/www.africaportal.org\/publications\/is-south-africa-a-norm-entrepreneur-in-africa\/."},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0922156517000358"},{"key":"e_1_3_4_29_1","unstructured":"MAG International. (2021). Remembering Diana Princess of Wales and her life-saving support for a global ban on landmines. https:\/\/www.maginternational.org\/whats-happening\/remembering-princess-diana-support-landmines\/."},{"key":"e_1_3_4_30_1","unstructured":"Merriam-Webster. (2021). Merriam-Webster: Definition of \u2018Norm\u2019. https:\/\/www.merriam-webster.com\/dictionary\/norm"},{"key":"e_1_3_4_31_1","unstructured":"Olsen B. M. (2016). Norway\u2019s constructive engagement in Myanmar: A small state as a norm entrepreneur. https:\/\/nmbu.brage.unit.no\/nmbu-xmlui\/bitstream\/handle\/11250\/2436751\/Norways%20constructive%20engagement%20in%20Myanmar%20Birgitte%20Moe%20Olsen.pdf?sequence=1&isAllowed=y."},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354066101007001002"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1353\/jod.2017.0025"},{"key":"e_1_3_4_34_1","first-page":"1","article-title":"The socialization of international human rights norms into domestic practices","volume":"66","author":"Risse T.","year":"1999","unstructured":"Risse, T., & Sikkink, K. (1999). The socialization of international human rights norms into domestic practices. Cambridge Studies in International Relations, 66, 1\u201338.","journal-title":"Cambridge Studies in International Relations"},{"key":"e_1_3_4_35_1","doi-asserted-by":"crossref","unstructured":"Rosales A. (2020). Form norm entrepreneur to reluctant overachiever: Venezuela in the history of OPEC. https:\/\/www.taylorfrancis.com\/chapters\/edit\/10.4324\/9780429203190-7\/norm-entrepreneur-reluctant-overachiever-antulio-rosales.","DOI":"10.4324\/9780429203190-7"},{"key":"e_1_3_4_36_1","unstructured":"Ruhl C. Hollis D. Hoffman W. & Maurer T. (2020).Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads. https:\/\/carnegieendowment.org\/2020\/02\/26\/cyberspace-and-geopolitics-assessing-global-cybersecurity-norm-processes-at-crossroads-pub-81110"},{"key":"e_1_3_4_37_1","doi-asserted-by":"crossref","unstructured":"Sandholtz W. (2007). Prohibiting Plunder: How Norms Change. Oxford University Press. http:\/\/www.ejil.org\/pdfs\/19\/4\/1667.pdf","DOI":"10.1093\/acprof:oso\/9780195337235.001.0001"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/03147539208712807"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1163\/19426720-02003005"},{"key":"e_1_3_4_40_1","unstructured":"Smith B. (2017). The need for a digital Geneva convention. https:\/\/blogs.microsoft.com\/on-the-issues\/2017\/02\/14\/need-digital-geneva-convention"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0022278X13000785"},{"key":"e_1_3_4_42_1","unstructured":"Stoeckl K. (2015). The Russian orthodox church as a moral norm entrepreneur. https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09637494.2016.1194010."},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/sipr.12022"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2018.1487987"},{"key":"e_1_3_4_45_1","unstructured":"White House Press Release. (2015). Fact Sheet: President XiJinping\u2019s State visit to the United States. https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2015\/09\/25\/fact-sheet-president-xi-jinpings-state-visit-united-states."},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2010.526108"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2023.2201482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T13:40:56Z","timestamp":1712324456000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2023.2201482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5,3]]}},"alternative-id":["10.1080\/19393555.2023.2201482"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2023.2201482","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}