{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:11:22Z","timestamp":1725786682009},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529424","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T16:28:26Z","timestamp":1470328106000},"page":"23-36","source":"Crossref","is-referenced-by-count":3,"title":["Hard power in cyberspace: CNA as a political means"],"prefix":"10.1109","author":[{"given":"Ragnhild Endresen","family":"Siedler","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Politics Who gets what when how","year":"1936","author":"lasswell","key":"ref10"},{"journal-title":"Cyberdeterrence and Cyberwar","year":"2009","author":"libicki","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2013.816122"},{"key":"ref13","first-page":"103","article-title":"Technical Methods, Techniques, Tools and Effects of Cyber Operations","author":"maybaum","year":"2013","journal-title":"Peacetime Regime for State Activities in Cyberspace International Law International Relations and Diplomacy"},{"year":"2014","key":"ref14","article-title":"Wales Summit Declaration"},{"journal-title":"(AAP-06 (2014)) NATO Standardization Agency","article-title":"NATO Glossary of Terms and Definitions","year":"2014","key":"ref15"},{"journal-title":"Soft Power The Means to Success in World Politics","year":"2004","author":"nye","key":"ref16"},{"journal-title":"Cyber Power","year":"2010","author":"nye","key":"ref17"},{"journal-title":"POWER FOR THE FUTURE","year":"2011","author":"nye","key":"ref18"},{"key":"ref19","article-title":"Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective","author":"ottis","year":"2008","journal-title":"Tallinn CCD COE"},{"key":"ref4","article-title":"Major Banks Hit with Biggest Cyberattacks in History","author":"goldman","year":"2012","journal-title":"CNN"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.03.003"},{"key":"ref6","article-title":"British Military at Risk of &#x2018;Fatal&#x2019; Cyber-Attacks, MPs Warn","author":"hopkins","year":"2013","journal-title":"The Guardian"},{"journal-title":"Introduction to Political Theory","year":"2006","author":"hoffmann","key":"ref5"},{"year":"1977","key":"ref8","article-title":"Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I)"},{"article-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","year":"2011","author":"hutchins","key":"ref7"},{"key":"ref2","first-page":"1","article-title":"State Actors and their Proxies in Cyberspace","author":"czosseck","year":"2013","journal-title":"Peacetime Regime for State Activities in Cyberspace International Law International Relations and Diplomacy"},{"journal-title":"Introduction to International Relations &#x2013; Theories and approaches","year":"2007","author":"jackson","key":"ref9"},{"key":"ref1","article-title":"Destruction and Creation","author":"boyd","year":"1976","journal-title":"Version 3 September 1976"},{"journal-title":"2013 Cyber War Will Not Take Place","year":"2013","author":"rid","key":"ref20"},{"journal-title":"International Cyber Incidents &#x2013; Legal considerations","year":"2010","author":"tikk","key":"ref22"},{"journal-title":"Arms and Influence","year":"2008","author":"schelling","key":"ref21"},{"journal-title":"Version 1 0","article-title":"Joint Operational Access Concept","year":"2012","key":"ref24"},{"journal-title":"Joint Publication 3&#x2013;0 (JP 3&#x2013;0)","article-title":"Joint Operations","year":"2011","key":"ref23"},{"journal-title":"Man the State and War &#x2014;A Theoretical Analysis","year":"2001","author":"waltz","key":"ref26"},{"year":"2015","key":"ref25","article-title":"Dictionary of Military Terms"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2016,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529424.pdf?arnumber=7529424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T13:14:49Z","timestamp":1474463689000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529424","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}