{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:48:56Z","timestamp":1774406936362,"version":"3.50.1"},"reference-count":47,"publisher":"Informa UK Limited","issue":"4-5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Global Affairs"],"published-print":{"date-parts":[[2017,10,20]]},"DOI":"10.1080\/23340460.2017.1414924","type":"journal-article","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T07:07:16Z","timestamp":1514531236000},"page":"353-364","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":53,"title":["Cyber-diplomacy: the making of an international society in the digital age"],"prefix":"10.1080","volume":"3","author":[{"given":"Andr\u00e9","family":"Barrinha","sequence":"first","affiliation":[{"name":"Department of Politics, Languages and International Studies, University of Bath, Bath, UK"},{"name":"Centre for Social Studies, University of Coimbra, Coimbra, Portugal"}]},{"given":"Thomas","family":"Renard","sequence":"additional","affiliation":[{"name":"Egmont \u2013 Royal Institute for International Relations, Brussels, Belgium"},{"name":"Department of International Affairs, Vesalius College, Brussels, Belgium"}]}],"member":"301","published-online":{"date-parts":[[2017,12,28]]},"reference":[{"key":"CIT0001","volume-title":"Cyberspace and the state. Toward a strategy for cyber-power","author":"Betz D. J.","year":"2011"},{"key":"CIT0002","volume-title":"The global commons: An introduction","author":"Buck S. J.","year":"1998"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-24028-9"},{"key":"CIT0004","volume-title":"An introduction to the English school of international relations: The societal approach","author":"Buzan B.","year":"2014"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198779605.003.0010"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199297009.001.0001"},{"key":"CIT0007","first-page":"453","volume-title":"The Oxford handbook of modern diplomacy","author":"Copeland D.","year":"2015"},{"key":"CIT0008","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1525\/curh.2015.114.768.9","author":"Deibert R.","year":"2015","journal-title":"Current History"},{"key":"CIT0009","doi-asserted-by":"crossref","DOI":"10.4324\/9780203937419","volume-title":"Cyber-security and threat politics: US efforts to security the information age","author":"Dunn Cavelty M.","year":"2007"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1057\/9780230376137"},{"key":"CIT0011","volume-title":"International relations and security in the digital age","author":"Eriksson J.","year":"2010"},{"key":"CIT0012","volume-title":"Naked diplomacy: Power and statecraft in the digital age","author":"Fletcher T.","year":"2016"},{"key":"CIT0013","volume-title":"Russia, the United States and cyber diplomacy: Opening the doors","author":"Gady F. S.","year":"2010"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1057\/9780230503915_8"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.7249\/RR1335"},{"key":"CIT0016","volume-title":"Diplomacy in the digital age","author":"Hocking B.","year":"2015"},{"key":"CIT0017","volume-title":"Futures for diplomacy: Integrative diplomacy in the 21st century","author":"Hocking B.","year":"2012"},{"key":"CIT0018","volume-title":"The closing of the net","author":"Horten M.","year":"2016"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.4135\/9781446261392"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00138"},{"key":"CIT0021","volume-title":"World order","author":"Kissinger H.","year":"2014"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/09592290802096380"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2012.664357"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/0163660X.2015.1064709"},{"key":"CIT0025","volume-title":"Will the internet fragment? Sovereignty, globalization and cyberspace","author":"Mueller M.","year":"2017"},{"key":"CIT1001","doi-asserted-by":"publisher","DOI":"10.1177\/1354066110368143"},{"key":"CIT0026","volume-title":"The English School on Diplomacy","author":"Neumann I.","year":"2002"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00266"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199363865.001.0001"},{"key":"CIT0030","doi-asserted-by":"crossref","DOI":"10.1515\/9780773570368","volume-title":"Cyber-diplomacy: Managing foreign policy in the twenty-first century","author":"Potter E. H.","year":"2002"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1177\/0010836715574913"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2011.608939"},{"key":"CIT1003","unstructured":"Rid, T. (2013).Cyber war will not take place. London: Hurst & Company."},{"key":"CIT0033","volume-title":"Digital diplomacy: Conversations on innovation in foreign policy","author":"Sandre A.","year":"2015"},{"key":"CIT0034","volume-title":"The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age","author":"Segal A.","year":"2016"},{"key":"CIT0035","volume-title":"The future of diplomacy","author":"Seib P.","year":"2016"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316162903.001"},{"key":"CIT0037","doi-asserted-by":"crossref","DOI":"10.1093\/wentk\/9780199918096.001.0001","volume-title":"Cybersecurity and cyberwar: What everyone needs to know","author":"Singer P.","year":"2014"},{"key":"CIT0038","volume-title":"White Paper on the internet in China","author":"State Council of China","year":"2010"},{"key":"CIT0039","first-page":"509","volume-title":"Peacetime regime for state activities in cyberspace: International law, international relations and diplomacy","author":"Tiirmaa-Klaar H.","year":"2013"},{"key":"CIT0040","volume-title":"Cyber security strategy of the United Kingdom: Safety, security and resilience in cyber space","author":"UK Prime Minister","year":"2009"},{"key":"CIT0041","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1163\/18750230-02602004","volume":"26","author":"Van der Meer S.","year":"2016","journal-title":"Security and Human Rights"},{"key":"CIT0042","volume-title":"Diplomacy: The dialogue between states","author":"Watson A.","year":"1982"},{"key":"CIT0043","volume-title":"Systems of states","author":"Wight M.","year":"1979"},{"key":"CIT0044","volume-title":"Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure","author":"White House","year":"2009"},{"key":"CIT0045","volume-title":"International strategy for cyberspace","author":"White House","year":"2011"},{"key":"CIT0046","volume-title":"FACT SHEET: President Xi Jinping\u2019s state visit to the United States","author":"White House","year":"2015"}],"container-title":["Global Affairs"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23340460.2017.1414924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T08:26:59Z","timestamp":1693384019000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23340460.2017.1414924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,20]]},"references-count":47,"journal-issue":{"issue":"4-5","published-online":{"date-parts":[[2018,2]]},"published-print":{"date-parts":[[2017,10,20]]}},"alternative-id":["10.1080\/23340460.2017.1414924"],"URL":"https:\/\/doi.org\/10.1080\/23340460.2017.1414924","relation":{},"ISSN":["2334-0460","2334-0479"],"issn-type":[{"value":"2334-0460","type":"print"},{"value":"2334-0479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=rgaf20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=rgaf20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}