{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:09:21Z","timestamp":1756166961430,"version":"3.44.0"},"reference-count":186,"publisher":"Informa UK Limited","issue":"5","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1080\/19393555.2025.2484348","type":"journal-article","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:43:10Z","timestamp":1743381790000},"page":"424-454","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Managing cyber harm: a survey of challenges, practices, and opportunities"],"prefix":"10.1080","volume":"34","author":[{"given":"Ekramul","family":"Islam","sequence":"first","affiliation":[{"name":"Monash University","place":["Melbourne, Australia"]}]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Monash University","place":["Melbourne, Australia"]}]},{"given":"Gillian","family":"Oliver","sequence":"additional","affiliation":[{"name":"Monash University","place":["Melbourne, Australia"]}]}],"member":"301","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"ACSC. (2023). Guidelines for cyber security incidents. Guidelines Australian Singnals Directorate."},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2022.661"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2828646"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006"},{"issue":"5","key":"e_1_3_2_6_1","first-page":"1117","article-title":"The pivotal role of international human rights law in defeating cybercrime: Amid a (un-backed) global treaty on cybercrime","volume":"55","author":"Albader F.","year":"2022","unstructured":"Albader, F. (2022). The pivotal role of international human rights law in defeating cybercrime: Amid a (un-backed) global treaty on cybercrime. Vanderbilt Journal of Transnational Law, 55(5),1117. https:\/\/scholarship.law.vanderbilt.edu\/vjtl\/vol55\/iss5\/1\/","journal-title":"Vanderbilt Journal of Transnational Law"},{"issue":"1","key":"e_1_3_2_7_1","first-page":"1","article-title":"Contemporary cyber security social engineering solutions, measures, policies, tools and applications: A critical appraisal","volume":"10","author":"Aldawood H.","year":"2019","unstructured":"Aldawood, H., & Skinner, G. (2019). Contemporary cyber security social engineering solutions, measures, policies, tools and applications: A critical appraisal. International Journal of Security (IJS), 10(1), 1.","journal-title":"International Journal of Security (IJS)"},{"issue":"1","key":"e_1_3_2_8_1","first-page":"29","article-title":"Clear thinking about protecting the nation in the cyber domain","volume":"2","author":"Alexander K. B.","year":"2017","unstructured":"Alexander, K. B., Jaffer, J. N., & Brunet, J. S. (2017). Clear thinking about protecting the nation in the cyber domain. The Cyber Defense Review, 2(1), 29\u201338.","journal-title":"The Cyber Defense Review"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.B3601.129219"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.5220\/0012374500003648"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0309132516664800"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.08.007"},{"key":"e_1_3_2_13_1","unstructured":"Austin G. & Withers G. (2021). Valuation of reputation damage for transport cyber attack."},{"key":"e_1_3_2_14_1","volume-title":"Engineering safe and secure software systems","author":"Axelrod C. W.","year":"2013","unstructured":"Axelrod, C. W. (2013a). Engineering safe and secure software systems. Artech House."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2013.6578215"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2019.8899641"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12347"},{"key":"e_1_3_2_18_1","volume-title":"The Third International Conference on Cyber-Technologies and Cyber-Systems","author":"Bada M.","year":"2019","unstructured":"Bada, M., Von Solms, B., & Agrafiotis, I. (2019). Reviewing national cybersecurity awareness in Africa: An empirical study. The Third International Conference on Cyber-Technologies and Cyber-Systems, Porto, Portugal."},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68647-5_9"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0892679417000454"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/23340460.2017.1414924"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iiz274"},{"issue":"2","key":"e_1_3_2_23_1","first-page":"1361","article-title":"The impact of cybersecurity threats on national security: Strategies","volume":"2","author":"Basak B.","year":"2024","unstructured":"Basak, B. (2024). The impact of cybersecurity threats on national security: Strategies. International Journal of Humanities Social Science and Management (IJHSSM), 2(2), 1361\u20131382.","journal-title":"International Journal of Humanities Social Science and Management (IJHSSM)"},{"issue":"2","key":"e_1_3_2_24_1","first-page":"1","article-title":"What is cybersecurity?","volume":"6","author":"Bay M.","year":"2016","unstructured":"Bay, M. (2016). What is cybersecurity? French Journal for Media Research, 6(2), 1\u201328.","journal-title":"French Journal for Media Research"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-07-2020-0149"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/15027570.2017.1284463"},{"key":"e_1_3_2_27_1","unstructured":"Bendiek A. (2018). The EU as a force for peace in international cyber diplomacy volume 19\/2018 of SWP comment. Stiftung Wissenschaft und Politik -SWP- Deutsches Institut f\u00fcr Internationale Politik und Sicherheit."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8897-9.ch062"},{"key":"e_1_3_2_29_1","volume-title":"Vulnerabilities and cyberspace: A new kind of crisis","author":"Berg B.","year":"2022","unstructured":"Berg, B., & Kuipers, S. (2022). Vulnerabilities and cyberspace: A new kind of crisis. Oxford Research Encyclopedia of Politics."},{"key":"e_1_3_2_30_1","first-page":"38","volume-title":"International workshop on graphical models for security","author":"Bernsmed K.","year":"2017","unstructured":"Bernsmed, K., Froystad, C., Meland, P. H., Nesheim, D. A., & R\u00f8dseth, O. J. (2017). Visualizing cyber security risks with bow-tie diagrams. In P. Liu, S. Mauw, & K. Stolen (Eds.), International workshop on graphical models for security (pp. 38\u201356). Springer."},{"key":"e_1_3_2_31_1","unstructured":"Beskow D. M. & Carley K. M. (2019). Social cybersecurity: An emerging national security requirement. Report. Carnegie Mellon University Pittsburgh United States."},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2340"},{"issue":"1","key":"e_1_3_2_33_1","first-page":"18","article-title":"Study regarding the cyber threats to the national security","volume":"25","author":"Bobric G.-D.","year":"2020","unstructured":"Bobric, G.-D. (2020). Study regarding the cyber threats to the national security. Scientific Bulletin-Nicolae Balcescu Land Forces Academy, 25(1), 18\u201325.","journal-title":"Scientific Bulletin-Nicolae Balcescu Land Forces Academy"},{"issue":"2","key":"e_1_3_2_34_1","first-page":"161","article-title":"A fundamental approach to cyber risk analysis","volume":"12","author":"B\u00f6hme R.","year":"2019","unstructured":"B\u00f6hme, R., Laube, S., & Riek, M. (2019). A fundamental approach to cyber risk analysis. Variance, 12(2), 161\u2013185.","journal-title":"Variance"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS52267.2021.9483736"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1017\/S002081832000051X"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/2399654418791825"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107770"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003277675-4"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e12808"},{"key":"e_1_3_2_41_1","volume-title":"The soft threat: The story of the Bangladesh bank reserve heist","author":"Bukth T.","year":"2017","unstructured":"Bukth, T., & Huda, S. S. (2017). The soft threat: The story of the Bangladesh bank reserve heist. SAGE Publications: SAGE Business Cases Originals."},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2020.1856903"},{"key":"e_1_3_2_43_1","unstructured":"Calderaro A. (2020). Overcoming fragmentation in cyber diplomacy: The promise of cyber capacity building."},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/01436597.2020.1729729"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-020-09322-9"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.b4bb506a"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101959"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105840"},{"key":"e_1_3_2_49_1","volume-title":"Cyber-intelligence and diplomacy: The secret link","author":"Coward A.","year":"2016","unstructured":"Coward, A., & Bjola, C. (2016). Cyber-intelligence and diplomacy: The secret link. Routledge."},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01569-6"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41288-022-00266-6"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-02-2020-0026"},{"key":"e_1_3_2_53_1","unstructured":"Csrc N. (2024). Cybersecurity glossary. Retrieved June 5 2024."},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/03461238.2023.2191869"},{"issue":"2","key":"e_1_3_2_55_1","first-page":"1","article-title":"Cyber mercenaries: A new threat to national security","volume":"96","author":"da Cruz J. A.","year":"2020","unstructured":"da Cruz, J. A., & Pedron, S. (2020). Cyber mercenaries: A new threat to national security. International Social Science Review (Online), 96(2), 1\u201333.","journal-title":"International Social Science Review (Online)"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.4230\/DagRep.11.10.36"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1511\/2019.107.2.83"},{"key":"e_1_3_2_58_1","unstructured":"Digwatch. (2021). Un gge 2019\/2021 publishes advance copy of final report."},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11104580"},{"key":"e_1_3_2_60_1","volume-title":"Smart peacekeeping: Toward tech-enabled UN operations","author":"Dorn A.","year":"2016","unstructured":"Dorn, A. (2016). Smart peacekeeping: Toward tech-enabled UN operations (A. Walter Dorn, ed.). International Peace Institute."},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.66"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1017\/eis.2021.20"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/rmir.12169"},{"key":"e_1_3_2_64_1","unstructured":"ENISA. (2024). Risk management inventory glossary. Retrieved June 5 2024."},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102545"},{"key":"e_1_3_2_66_1","first-page":"180","volume-title":"Comprehensible science","author":"Eybers S.","year":"2021","unstructured":"Eybers, S., & Mvundla, Z. (2021). Investigating cyber security awareness (csa) amongst managers in small and medium enterprises (smes). In T. Antipova (Ed.), Comprehensible science (pp. 180\u2013191). Springer International Publishing."},{"key":"e_1_3_2_67_1","volume-title":"Cyber diplomacy: An Australian perspective","author":"Feakin T.","year":"2020","unstructured":"Feakin, T., & Weaver, J. (2020). Cyber diplomacy: An Australian perspective. Routledge."},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.69554\/PRJY4917"},{"key":"e_1_3_2_69_1","unstructured":"Ferdinand J. & Benham R. (2017). The cyber security ecosystem: Defining a taxonomy of existing emerging and future cyber threats. SWIFT institute research paper series."},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011883.3011887"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-017-0299-6"},{"key":"e_1_3_2_72_1","unstructured":"Fischer L. Uslar M. Morrill D. D\u00f6ring M. & Haesen E. (2018). Study on the evaluation of risks of cyber-incidents and on costs of preventing cyber-incidents in the energy sector. European Commission."},{"key":"e_1_3_2_73_1","unstructured":"Forum W. E. (2015). Partnering for cyber resilience: Towards the quantification of cyber threats."},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171535"},{"key":"e_1_3_2_76_1","doi-asserted-by":"crossref","unstructured":"GCSCC. (2016). Cybersecurity capacity maturity model for nations (cmm). Revised Edition no. CMM.","DOI":"10.2139\/ssrn.3657116"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/10242694.2022.2161739"},{"key":"e_1_3_2_78_1","unstructured":"Gold J. (2020). The five eyes and offensive cyber capabilities: Building a \u2018cyber deterrence initiative\u2019."},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.5204\/IJCJSD.2215"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2017.1399730"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105458"},{"key":"e_1_3_2_82_1","volume-title":"SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies","author":"Hameed F.","year":"2018","unstructured":"Hameed, F., Agrafiotis, I., Weisser, C., Goldsmith, M., & Creese, S. (2018). Analysing trends and success factors of international cybersecurity capacity-building initiatives. SECURWARE 2018, The Twelfth International Conference on Emerging Security Information, Systems and Technologies, Venice, Italy, International Academy, Research and Industry Association."},{"issue":"1","key":"e_1_3_2_83_1","first-page":"25","article-title":"Swift bank heists and article 4a","volume":"22","author":"Hill J. A.","year":"2018","unstructured":"Hill, J. A. (2018). Swift bank heists and article 4a. Journal of Consumer and Commercial Law, 22(1), 25.","journal-title":"Journal of Consumer and Commercial Law"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102498"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/16544951.2023.2179244"},{"issue":"1","key":"e_1_3_2_86_1","first-page":"988","article-title":"Artificial intelligence and diplomacy: Transforming international relations in the digital age","volume":"9","author":"Hussain S. S.","year":"2024","unstructured":"Hussain, S. S. (2024). Artificial intelligence and diplomacy: Transforming international relations in the digital age. Remittances Review, 9(1), 988\u20131001.","journal-title":"Remittances Review"},{"key":"e_1_3_2_87_1","unstructured":"Hykk\u00f6nen O. (2024). Tallinn manual restrictions on cyber warfare [Master\u2019s thesis]. \u00c3 \u2026 bo Akademi University."},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780198800682.013.7"},{"key":"e_1_3_2_89_1","unstructured":"Institute C. (2023). A standardized methodology to measure the harms and impacts of cyberattacks and incidents on people society and the environment."},{"key":"e_1_3_2_90_1","first-page":"454","volume-title":"ICCWS, 2021 16th International Conference on Cyber Warfare and Security","author":"Izycki E.","year":"2021","unstructured":"Izycki, E., & Vianna, E. W. (2021). Critical infrastructure: A battlefield for cyber warfare? ICCWS, 2021 16th International Conference on Cyber Warfare and Security (pp. 454). Academic Conferences Limited."},{"key":"e_1_3_2_91_1","unstructured":"Jacobs D. R. (2024). Cybersecurity for all: Towards a cyber harm framework for citizens [PhD thesis]. Arizona State University."},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61382-1_3"},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC48465.2019.00047"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510410"},{"issue":"9","key":"e_1_3_2_95_1","first-page":"1","article-title":"Establishing cyber resilience in developing countries: An exploratory investigation into institutional, legal, financial, and social challenges","volume":"8","author":"Kayode Ajala O.","year":"2023","unstructured":"Kayode Ajala, O. (2023). Establishing cyber resilience in developing countries: An exploratory investigation into institutional, legal, financial, and social challenges. International Journal of Sustainable Infrastructure for Cities and Societies, 8(9), 1\u201310.","journal-title":"International Journal of Sustainable Infrastructure for Cities and Societies"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35746-7_1"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-023-00375-4"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11167738"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE62659.2024.10620925"},{"key":"e_1_3_2_100_1","unstructured":"Kossakowski K.-P. Maj M. & Stikvoort D. (2021). Western Balkan CERT Cooperation. DCAF. https:\/\/www.dcaf.ch\/sites\/default\/files\/imce\/Events\/CybersecurityConference_BackgroundPaper_WesternBalkanCERT.pdf"},{"key":"e_1_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.5771\/9783748918844"},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.57159\/gadl.jcmm.2.3.23064"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2020.1798155"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72408-5_16"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91293-2_1"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1111\/rego.12341"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003110224-11"},{"key":"e_1_3_2_109_1","doi-asserted-by":"publisher","DOI":"10.1080\/10357718.2021.1926423"},{"key":"e_1_3_2_110_1","doi-asserted-by":"publisher","DOI":"10.1177\/0095327X15572997"},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2020.1833380"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221108369"},{"key":"e_1_3_2_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS48451.2019.8938009"},{"key":"e_1_3_2_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102820"},{"key":"e_1_3_2_115_1","doi-asserted-by":"publisher","DOI":"10.26650\/JPLC2023-1367714"},{"key":"e_1_3_2_116_1","unstructured":"Muller L. P. (2015). Cyber security capacity building in developing countries. Report. Norwegian Institute for International Affairs (NUPI)."},{"key":"e_1_3_2_117_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003121541-5"},{"key":"e_1_3_2_118_1","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajece.20200402.17"},{"key":"e_1_3_2_119_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12189241"},{"key":"e_1_3_2_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA49311.2020.9139703"},{"key":"e_1_3_2_121_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110201"},{"key":"e_1_3_2_122_1","unstructured":"Oict U. O. O. I. & Technology C. (2022). Oict cybersecurity."},{"key":"e_1_3_2_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS50802.2021.9395008"},{"key":"e_1_3_2_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2979832"},{"key":"e_1_3_2_125_1","unstructured":"Osce O. F. S. & Operation in Europe C. (2016). Permanent council decision no. 1202."},{"key":"e_1_3_2_126_1","unstructured":"Osunji O. (2022). Government\u2019s role in building trust and confidence in the internet: A case study of Uganda in the implementation of cybersecurity capacity maturity model for nations [Thesis]. Marymount University."},{"key":"e_1_3_2_127_1","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756863"},{"key":"e_1_3_2_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437120.3437335"},{"key":"e_1_3_2_129_1","unstructured":"ParisCall. (2021). Paris call for trust and security in cyberspace."},{"key":"e_1_3_2_130_1","volume-title":"Refining the blunt instruments of cybersecurity: A framework to coordinate prevention and preservation of behaviours","author":"Parkin S.","year":"2020","unstructured":"Parkin, S., & Chua, Y. T. (2020). Refining the blunt instruments of cybersecurity: A framework to coordinate prevention and preservation of behaviours. Springer International Publishing."},{"key":"e_1_3_2_131_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-210047"},{"key":"e_1_3_2_132_1","doi-asserted-by":"publisher","DOI":"10.1017\/eis.2020.6"},{"key":"e_1_3_2_133_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-022-02167-6"},{"key":"e_1_3_2_134_1","doi-asserted-by":"publisher","DOI":"10.3390\/informatics9010028"},{"key":"e_1_3_2_135_1","unstructured":"Pfanstiel S. (2022). Impact of internal control cybersecurity risk and competitive advantage on retail cybersecurity budget [Thesis]. Walden University."},{"key":"e_1_3_2_136_1","doi-asserted-by":"publisher","DOI":"10.3390\/forensicsci2020028"},{"key":"e_1_3_2_137_1","doi-asserted-by":"publisher","DOI":"10.23919\/SpliTech55088.2022.9854268"},{"key":"e_1_3_2_138_1","unstructured":"Press O. U. (2024a). Cyberspace."},{"key":"e_1_3_2_139_1","unstructured":"Press O. U. (2024b). Internet."},{"key":"e_1_3_2_140_1","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2024.2312671"},{"key":"e_1_3_2_141_1","doi-asserted-by":"crossref","unstructured":"Re S. (2017). Cyber: Getting to grips with a complex risk.","DOI":"10.12968\/sece.2017.25.8"},{"key":"e_1_3_2_142_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10183-0_7"},{"key":"e_1_3_2_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498891.3498896"},{"key":"e_1_3_2_144_1","volume-title":"Cyber diplomacy vs. Digital diplomacy: A terminological distinction","author":"Riordan S.","year":"2016","unstructured":"Riordan, S. (2016). Cyber diplomacy vs. Digital diplomacy: A terminological distinction. CPD Blog."},{"key":"e_1_3_2_145_1","volume-title":"Offensive shifts, offensive policies: Cybersecurity trends in the government private sector relationship","author":"Robertson T.","year":"2019","unstructured":"Robertson, T., Van Hoeve, S., & Costly, T. (2019). Offensive shifts, offensive policies: Cybersecurity trends in the government private sector relationship. Canadian Global Affairs Institute."},{"key":"e_1_3_2_146_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.015"},{"key":"e_1_3_2_147_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.12.001"},{"key":"e_1_3_2_148_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.287"},{"key":"e_1_3_2_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378550"},{"issue":"4","key":"e_1_3_2_150_1","first-page":"1279","article-title":"An analysis of cyber crime with special reference to cyber stalking","volume":"6","author":"Sakshi M.","year":"2022","unstructured":"Sakshi, M., & Vashishth, A. (2022). An analysis of cyber crime with special reference to cyber stalking. Journal of Positive School Psychology, 6(4) , 1279\u20131287.","journal-title":"Journal of Positive School Psychology"},{"key":"e_1_3_2_151_1","doi-asserted-by":"publisher","DOI":"10.1080\/01436597.2017.1408403"},{"key":"e_1_3_2_152_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316822524"},{"key":"e_1_3_2_153_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2022.2112796"},{"key":"e_1_3_2_154_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604673"},{"key":"e_1_3_2_155_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003319887-22"},{"issue":"3","key":"e_1_3_2_156_1","first-page":"55","article-title":"Contemporary technology in peacekeeping operations","volume":"16","author":"Singh S. P.","year":"2022","unstructured":"Singh, S. P. (2022). Contemporary technology in peacekeeping operations. Journal of Defence Studies, 16(3), 55\u201376.","journal-title":"Journal of Defence Studies"},{"key":"e_1_3_2_157_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101781"},{"key":"e_1_3_2_158_1","doi-asserted-by":"publisher","DOI":"10.1080\/14702436.2018.1508349"},{"key":"e_1_3_2_159_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2022-0147"},{"key":"e_1_3_2_160_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4769989"},{"key":"e_1_3_2_161_1","first-page":"737","article-title":"Risk and anxiety: A theory of data-breach harms","volume":"96","author":"Solove D. J.","year":"2017","unstructured":"Solove, D. J., & Citron, D. K. (2017). Risk and anxiety: A theory of data-breach harms. Texas Law Review, 96, 737.","journal-title":"Texas Law Review"},{"key":"e_1_3_2_162_1","unstructured":"Spiewak R. (2022). Overlooking the Little Guy: An analysis of cyber incidents and individual harms [PhD thesis]. Massachusetts Institute of Technology."},{"key":"e_1_3_2_163_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.105143"},{"key":"e_1_3_2_164_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8322.12553"},{"key":"e_1_3_2_165_1","doi-asserted-by":"publisher","DOI":"10.3390\/laws7040036"},{"key":"e_1_3_2_166_1","doi-asserted-by":"publisher","DOI":"10.1111\/1758-5899.12625"},{"key":"e_1_3_2_167_1","doi-asserted-by":"publisher","DOI":"10.5817\/MUJLT2019-1-4"},{"key":"e_1_3_2_168_1","unstructured":"Tikk E. & Kerttunen M. (2018). Parabasis: Cyber-diplomacy in stalemate. NUPI report."},{"key":"e_1_3_2_169_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-9715-5.ch025"},{"key":"e_1_3_2_170_1","first-page":"167","volume-title":"International conference on secure knowledge management in artificial intelligence era","author":"Tran T.","year":"2019","unstructured":"Tran, T., Valecha, R., Rad, P., & Rao, H. R. (2019). An investigation of misinformation harms related to social media during humanitarian crises. International conference on secure knowledge management in artificial intelligence era, Goa, India (pp. 167\u2013181). Springer."},{"issue":"1","key":"e_1_3_2_171_1","first-page":"3","article-title":"Cyber peacekeeping operations and the regulation of the use of lethal force","volume":"99","author":"Tsagourias N.","year":"2022","unstructured":"Tsagourias, N., & Biggio, G. (2022). Cyber peacekeeping operations and the regulation of the use of lethal force. International Law Studies, 99(1), 3.","journal-title":"International Law Studies"},{"key":"e_1_3_2_172_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32824-9_6"},{"key":"e_1_3_2_173_1","unstructured":"UNGGE. (2022). Developments in the field of information and telecommunications in the context of international security."},{"key":"e_1_3_2_174_1","unstructured":"UNODC. (2024). United nations: Member states finalize a new cybercrime convention."},{"key":"e_1_3_2_175_1","unstructured":"Valeriano B. (2022). How cyber restraint makes us all safer. Electronic article CATO Institute."},{"key":"e_1_3_2_176_1","unstructured":"Valeriano B. & Jensen B. (2019). The myth of the cyber offense: The case for restraint. Report. CATO Institute."},{"key":"e_1_3_2_177_1","first-page":"259","volume-title":"The oxford handbook of international political theory","author":"Valeriano B.","year":"2018","unstructured":"Valeriano, B., & Maness, R. C. (2018). International relations theory and cyber security: Threats, conflicts, and ethics in an emergent domain. In B. Chris & R. Eckersley (Eds.), The oxford handbook of international political theory (p. 259)."},{"key":"e_1_3_2_178_1","doi-asserted-by":"publisher","DOI":"10.47191\/etj\/v9i07.13"},{"key":"e_1_3_2_179_1","volume-title":"Wirtschaftsinformatik 2022 Proceedings","author":"von Skarczinski B. S.","year":"2022","unstructured":"von Skarczinski, B. S., Dreissigacker, A., & Teuteberg, F. (2022). More security, less harm? exploring the link between security measures and direct costs of cyber incidents within firms using pls-pm. Wirtschaftsinformatik 2022 Proceedings, N\u00fcrnberg, Germany."},{"key":"e_1_3_2_180_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3005872"},{"key":"e_1_3_2_181_1","doi-asserted-by":"publisher","DOI":"10.48009\/2_iis_2019_162-171"},{"key":"e_1_3_2_182_1","doi-asserted-by":"publisher","DOI":"10.69554\/PFFC9196"},{"key":"e_1_3_2_183_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.07.002"},{"key":"e_1_3_2_184_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190221072.003.0005"},{"key":"e_1_3_2_185_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00053"},{"key":"e_1_3_2_186_1","doi-asserted-by":"publisher","DOI":"10.2991\/mmetss-19.2019.189"},{"key":"e_1_3_2_187_1","doi-asserted-by":"publisher","DOI":"10.17781\/P002556"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2025.2484348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T14:19:50Z","timestamp":1756131590000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2025.2484348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":186,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1080\/19393555.2025.2484348"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2025.2484348","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}