{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:30:12Z","timestamp":1758709812198,"version":"3.28.0"},"reference-count":71,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,28]]},"DOI":"10.1109\/istas52410.2021.9629152","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T21:19:56Z","timestamp":1638825596000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity as the protection of cyberspace"],"prefix":"10.1109","author":[{"given":"Greg","family":"Adamson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"A United Nations Sustainable Development Journal","article-title":"4. Quality education","year":"2015","key":"ref71"},{"key":"ref70","article-title":"Who Are the Shadow Brokers?","author":"schneier","year":"2017","journal-title":"The Atlantic"},{"journal-title":"The Power of Love","year":"0","author":"deverich","key":"ref39"},{"journal-title":"Neuromancer","year":"1995","author":"gibson","key":"ref38"},{"journal-title":"Hobbes&#x2019; Internet timeline version 5 4","year":"2001","author":"zakon","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/44.3.152"},{"journal-title":"On Distributed Communications","year":"1964","author":"baran","key":"ref31"},{"key":"ref30","article-title":"The global media: the new missionaries of corporate capitalism","author":"herman","year":"1997","journal-title":"London Casell"},{"key":"ref37","first-page":"26","article-title":"Cyborgs and space","volume":"74 46","author":"clynes","year":"1960","journal-title":"Astronautics"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2260.001.0001"},{"journal-title":"The eye of the storm how John Chambers steered Cisco through the technology collapse","year":"2003","author":"slater","key":"ref35"},{"journal-title":"The Road Ahead","year":"1995","author":"gates","key":"ref34"},{"key":"ref60","article-title":"A Brief History of Cryptography","author":"sidhpurwala","year":"2013","journal-title":"Red Hat Customer Portal"},{"journal-title":"What is the CIA Triad? Definition Explanation and Examples","year":"2021","author":"chai","key":"ref62"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1515\/9783110669701"},{"journal-title":"The Most Popular Types of DNS Attacks","year":"2018","author":"borges","key":"ref63"},{"journal-title":"dot con the greatest story every sold","year":"2002","author":"cassidy","key":"ref28"},{"key":"ref64","article-title":"Lessons From the Dyn DDoS Attack","author":"schneier","year":"2016","journal-title":"Schneier on Security"},{"journal-title":"Where Wizards Stay Up Late The Origins of the Internet","year":"1998","author":"hafner","key":"ref27"},{"key":"ref65","article-title":"What is Cybersecurity?","author":"shea","year":"2021","journal-title":"Search Security"},{"journal-title":"What is cyber security?","year":"2021","key":"ref66"},{"journal-title":"online adj and adv &#x2019; OED Online","year":"2021","key":"ref29"},{"journal-title":"JP 1- 02 Department of Defense Dictionary of Military and Associated Terms US Department of Defense","article-title":"cyberspace superiority","year":"2016","key":"ref67"},{"key":"ref68","article-title":"U.S. Escalates Online Attacks on Russia&#x2019;s Power Grid","author":"sanger","year":"2019","journal-title":"The New York Times"},{"key":"ref69","article-title":"The human use of human beings: Cybernetics and society","author":"wiener","year":"1954","journal-title":"Houghton Mifflin"},{"journal-title":"The Third Wave The Classic Study of Tomorrow","year":"1990","author":"toffler","key":"ref2"},{"journal-title":"Cybernetics Or Control and Communication in the Animal and the Machine","year":"1948","author":"wiener","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1928.5055024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/68814.68815"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.274660"},{"journal-title":"You Say You Want A Revolution A Story of Information Age Politics","year":"2000","author":"hundt","key":"ref24"},{"journal-title":"Being Digital","year":"1995","author":"negroponte","key":"ref23"},{"journal-title":"The six immutable laws of mobile business","year":"2010","author":"sugai","key":"ref26"},{"journal-title":"OECD Paris DSTI\/ICCP\/IE(97)10\/FINAL","article-title":"France&#x2019;s experience with the Minitel: lessons for electronic commerce over the Internet","year":"1998","key":"ref25"},{"key":"ref50","first-page":"171","article-title":"Habitat: Reports from an online community","author":"morningstar","year":"2001","journal-title":"True names by Vernor Vinge and the opening of the cyberspace frontier"},{"journal-title":"Gizmodo","article-title":"Ashley Madison Code Shows More Women, and More Bots","year":"2015","key":"ref51"},{"key":"ref59","article-title":"Trust and Artificial Intelligence","author":"stanton","year":"2021","journal-title":"Preprint"},{"journal-title":"What is Dell Trusted Device? Dell Australia","year":"2021","key":"ref58"},{"key":"ref57","article-title":"The gardener","author":"tagore","year":"2020","journal-title":"Lector House"},{"journal-title":"The Matrix","year":"1999","author":"wachowski","key":"ref56"},{"journal-title":"Gartner Glossary","article-title":"Definition of Operational Technology (OT) -Gartner Information Technology Glossary","year":"2021","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"journal-title":"US Department of Defense","article-title":"Joint Publication 3-12: Cyberspace Operations","year":"2018","key":"ref53"},{"key":"ref52","article-title":"Information Operations: The Fifth Dimension of Warfare","volume":"10","author":"fogleman","year":"1995","journal-title":"Defense Issues"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/1562247"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1086\/466560"},{"journal-title":"2001 A Space Odyssey (1968) - IMDb","year":"2021","author":"kubrick","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3998\/mpub.6642"},{"key":"ref13","article-title":"The Mixed Experience of Achieving Business Benefit from the Internet&#x2013;A Multi-Disciplinary Study","author":"adamson","year":"2003","journal-title":"The University of Melbourne"},{"key":"ref14","article-title":"Schools of thought in strategic management: fragmentation, integration or synthesis?","author":"elfring","year":"1996","journal-title":"Theory building in the business sciences"},{"journal-title":"Five hundred years of printing","year":"1974","author":"steinberg","key":"ref15"},{"journal-title":"Understanding Media The Extensions of Man","year":"1994","author":"mcluhan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2002.1010055"},{"journal-title":"Invention and Innovation in the Radio Industry","year":"1971","author":"maclaurin","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/PBHT022E"},{"journal-title":"The biosphere","year":"1986","author":"vernadski?","key":"ref4"},{"journal-title":"The Future of Man","year":"2004","author":"teilhard de chardin","key":"ref3"},{"journal-title":"Snow Crash","year":"1992","author":"stephenson","key":"ref6"},{"key":"ref5","article-title":"Mark Zuckerberg is betting Facebook&#x2019;s future on the metaverse","author":"newton","year":"2021","journal-title":"The Verge"},{"journal-title":"Cybersecurity Tech Accord","article-title":"Cybersecurity Tech Accord","year":"2021","key":"ref8"},{"journal-title":"GCSC","article-title":"Cyberstability Paper Series: New Conditions and Constellations in Cyber","year":"2021","key":"ref7"},{"key":"ref49","article-title":"From Cybernetics to Cyberspace","author":"healey","year":"2019","journal-title":"Air Force Magazine"},{"journal-title":"International Telecommunication Union","article-title":"Recommendation ITU-T X.1205 Overview of cybersecurity","year":"2005","key":"ref9"},{"key":"ref46","article-title":"The myth of digital nirvana","volume":"31","author":"bennahum","year":"1996","journal-title":"Educom Review"},{"journal-title":"Code and other Laws of Cyberspace","year":"1999","author":"lessig","key":"ref45"},{"key":"ref48","first-page":"33","article-title":"True nyms and cryto anarchy","author":"may","year":"2001","journal-title":"True names by Vernor Vinge and the opening of the cyberspace frontier"},{"key":"ref47","article-title":"True names by Vernor Vinge and the opening of the cyberspace frontier","author":"frenkel","year":"2001","journal-title":"Tor"},{"journal-title":"Rainbows End","year":"2006","author":"vinge","key":"ref42"},{"journal-title":"Pok&#x00E9;mon GO","year":"2016","author":"nomura","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.37514\/RNT-J.1996.3.6.21"},{"key":"ref43","first-page":"149","article-title":"A Cyborg Manifesto: Science, technology, and socialist-feminism in the late twentieth century","author":"haraway","year":"1991","journal-title":"Simians Cyborgs and Women The Reinvention of Nature"}],"event":{"name":"2021 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2021,10,28]]},"location":"Waterloo, ON, Canada","end":{"date-parts":[[2021,10,31]]}},"container-title":["2021 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9628888\/9629117\/09629152.pdf?arnumber=9629152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:01Z","timestamp":1652201641000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9629152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/istas52410.2021.9629152","relation":{},"subject":[],"published":{"date-parts":[[2021,10,28]]}}}