{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T12:59:30Z","timestamp":1778677170587,"version":"3.51.4"},"reference-count":31,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T00:00:00Z","timestamp":1548115200000},"content-version":"vor","delay-in-days":21,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"DOI":"10.1093\/cybsec\/tyy009","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T13:19:45Z","timestamp":1548335985000},"source":"Crossref","is-referenced-by-count":55,"title":["The end of the road for the UN GGE process: The future regulation of cyberspace"],"prefix":"10.1093","volume":"5","author":[{"given":"Anders","family":"Henriksen","sequence":"first","affiliation":[{"name":"University of Copenhagen, Karen Blixens Plads 16, Copenhagen S, Denmark"}]}],"member":"286","published-online":{"date-parts":[[2019,1,22]]},"reference":[{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B1","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1017\/S0002930000016894","article-title":"Constructing norms for global cybersecurity","volume":"110","author":"Finnemore","year":"2016","journal-title":"Am J Int L"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B2","first-page":"887","article-title":"International norm dynamics and political change\u2019. Int","volume":"52","author":"Finnemore","year":"1998","journal-title":"Organ"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B3","first-page":"151","volume-title":"Conflict in Cyber Space: Theoretical, Strategic and Legal Pespectives","author":"Henriksen","year":"2016"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B4","author":"Ku","year":"1707"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B5","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139169288","volume-title":"The Tallinn Manual on the International Law Applicable to Cyber Warfare","author":"Schmitt","year":"2013"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B6","author":"Rodriguez","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B7","author":"Schmitt","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B8","year":"2015"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B9","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B10","doi-asserted-by":"crossref","DOI":"10.1017\/9781316822524","volume-title":"The Tallinn Manual on the International Law Applicable to Cyber Operations","author":"Schmitt","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B11","first-page":"119","article-title":"Key issues and future development of international cyberspace law","volume":"2","author":"Xinmin","year":"2016","journal-title":"CQISS"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B12","article-title":"From cyber norms to cyber rules: re-engaging states as law-makers","author":"Macak","year":"2017","journal-title":"Leiden J Int L"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B13","article-title":"Fighting the Wrong Enemy: aka the Stalemate in Cybersecurity","author":"Lewis","year":"2017","journal-title":"the Cipher Brief"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B14","author":", Weapons: Statement of the ICRC to the United Nations","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B15","article-title":"The rules of the brave new cyberworld","author":"Burns","year":"2017","journal-title":"Foreign Policy"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B16","first-page":"35","article-title":"Military aspects of ensuring international information security in the context of elaborating universally acknowledged principles of international law","volume":"3","author":"Komov","year":"2007","journal-title":"Disarmament Forum"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B17","first-page":"52","article-title":"The trouble with cyber arms control","author":"Ford","year":"2010","journal-title":"The New Atlantis"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B18","first-page":"75","article-title":"A better defense: examining the united states\u2019 new norms-based approach to cyber deterrence","volume":"14","author":"Lotrionte","year":"2013","journal-title":"Georgetown J Int Affairs"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B19"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B20","author":"UK Attorney General","year":"2018"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B21","author":"Fact","year":"2015"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B22","author":"Fitschen"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B23","first-page":"421","article-title":"Cyber-attacks and the use of force: back to the future of article 2(4","volume":"36","author":"Waxman","year":"2011","journal-title":"Yale J Int L"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B24","year":"2012"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B25","first-page":"3","year":"2018"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B26","author":"Bossert","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B27","year":"2016"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B28","volume-title":"The Making of International Law","author":"Boyle","year":"2017"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B29","author":"Microsoft, International Cybersecurity Norms","year":"2014"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B30","author":"Microsoft","year":"2016"},{"key":"key\n\t\t\t\t2019012209583837000_tyy009-B31","author":"Smith","year":"2017"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/5\/1\/tyy009\/27578141\/tyy009.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T04:41:24Z","timestamp":1573792884000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyy009\/5298865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1,22]]},"published-print":{"date-parts":[[2019,1,1]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyy009","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2019]]},"published":{"date-parts":[[2019,1,1]]}}}