{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T07:20:38Z","timestamp":1765610438158,"version":"3.38.0"},"reference-count":57,"publisher":"Walter de Gruyter GmbH","issue":"3","license":[{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000275","name":"Leverhulme Trust","doi-asserted-by":"crossref","award":["RF-2019-466"],"award-info":[{"award-number":["RF-2019-466"]}],"id":[{"id":"10.13039\/501100000275","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Hague J. Dipl."],"published-print":{"date-parts":[[2024,2,26]]},"abstract":"<jats:title>Summary<\/jats:title>\n<jats:p>It is only in the last two decades that states have started to focus on the need to use traditional diplomatic means in discussions surrounding cyber-policy. This article explores how these discussions have been progressively \u2018diplomatised\u2019. Diplomatisation is proposed in this article as a process which involves external and internal dynamics of institutionalisation and positioning, both of which are essential for the successful creation of a new diplomatic field. Understanding the emergence of cyber-diplomacy is crucial to recognise the successes, frustrations and opportunities associated with the (lack of) regulation when it comes responsible state behaviour in this domain. This article does so based on 40 interviews conducted with diplomats and experts involved in the emergence of cyber-diplomacy. It looks at the idiosyncratic evolution of this field within specific nation states as well as overall developments at the international level, particularly within the context of the United Nations.<\/jats:p>","DOI":"10.1163\/1871191x-bja10183","type":"journal-article","created":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T10:45:57Z","timestamp":1709030757000},"page":"439-466","source":"Crossref","is-referenced-by-count":8,"title":["Cyber-diplomacy: The Emergence of a Transient Field"],"prefix":"10.1163","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6650-3730","authenticated-orcid":true,"given":"Andr\u00e9","family":"Barrinha","sequence":"first","affiliation":[{"name":"Senior Lecturer (Associate Professor) in International Relations, Department of Politics, Languages and International Studies, University of Bath https:\/\/dx.doi.org\/1555 UK"}]}],"member":"374","reference":[{"series-title":"Opting Out of the European Union: Diplomacy, Sovereignty and European Integration","author":"Adler-Nissen, Rebecca","key":"R000001","unstructured":"Adler-Nissen, Rebecca. Opting Out of the European Union: Diplomacy, Sovereignty and European Integration (Cambridge: Cambridge University Press, 2014)."},{"issue":"4-5","key":"R000002","series-title":"Global Affairs","first-page":"353","article-title":"Cyber-diplomacy: The Making of an International Society in the Digital Age","volume":"3","author":"Barrinha, Andr\u00e9","unstructured":"Barrinha, Andr\u00e9 and Thomas Renard. \u2018Cyber-diplomacy: The Making of an International Society in the Digital Age\u2019. Global Affairs 3 (4-5) (2017), 353-364. DOI 10.1080\/23340460.2017.1414924."},{"issue":"3","key":"R000003","series-title":"International Affairs","first-page":"749","article-title":"Power and Diplomacy in the Post-liberal Cyberspace","volume":"96","author":"Barrinha, Andr\u00e9","unstructured":"Barrinha, Andr\u00e9 and Thomas Renard. \u2018Power and Diplomacy in the Post-liberal Cyberspace\u2019. International Affairs 96 (3) (2020), 749-766. DOI 10.1093\/ia\/iiz274."},{"series-title":"Modern Diplomacy","author":"Barston, R. P.","key":"R000004","unstructured":"Barston, R. P. Modern Diplomacy (Abingdon: Routledge, 2019)."},{"issue":"1","key":"R000005","series-title":"International Organization","first-page":"39","article-title":"What\u2019s in a Name? Metaphors and Cybersecurity","volume":"75","author":"Branch, Jordan","unstructured":"Branch, Jordan. \u2018What\u2019s in a Name? Metaphors and Cybersecurity\u2019. International Organization 75 (1) (2020), 39-70. DOI 10.1017\/S002081832000051X."},{"series-title":"The Cyber Deterrence Problem","key":"R000006","unstructured":"Brantly, Aaron, ed. The Cyber Deterrence Problem (Lanham, MD: Rowman & Littlefield, 2020)."},{"key":"R000007","series-title":"The Anarchical Society at 40: Contemporary Challenges & Prospects","first-page":"162","article-title":"Cyberspace and International Order","author":"Carr, Madeline","unstructured":"Carr, Madeline. \u2018Cyberspace and International Order\u2019. In The Anarchical Society at 40: Contemporary Challenges & Prospects, eds. Hidemi Suganami, Madeline Carr and Andrew Humphreys (Oxford: Oxford University Press, 2017), 162-178."},{"series-title":"Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest","author":"Chesney, Robert","key":"R000008","unstructured":"Chesney, Robert and Max Smeets. Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest (Washington, DC: Georgetown University Press, 2023)."},{"key":"R000009","series-title":"Cyber-diplomacy: Managing Foreign Policy in the Twenty-First Century","first-page":"140","article-title":"Snapshots of an Emergent Cyber-diplomacy: The Greenpeace Campaign against French Nuclear Testing and the Spain\u2013Canada \u201cFish War\u201d","author":"Cooper, Andrew F.","unstructured":"Cooper, Andrew F. \u2018Snapshots of an Emergent Cyber-diplomacy: The Greenpeace Campaign against French Nuclear Testing and the Spain\u2013Canada \u201cFish War\u201d\u2019. In Cyber-diplomacy: Managing Foreign Policy in the Twenty-First Century, ed. Evan H. Potter (Montreal: McGill-Queen\u2019s University Press, 2002), 140-162."},{"series-title":"The Oxford Handbook of Modern Diplomacy","key":"R000010","unstructured":"Cooper, Andrew F., Jorge Heine and Ramesh Thakur, eds. The Oxford Handbook of Modern Diplomacy (Oxford: Oxford University Press, 2015)."},{"key":"R000011","series-title":"The SAGE Handbook of Diplomacy","first-page":"133","article-title":"Diplomatic Knowledge","author":"Cornago, No\u00e9","unstructured":"Cornago, No\u00e9. \u2018Diplomatic Knowledge\u2019. In The SAGE Handbook of Diplomacy, eds. Costas M. Constantinou, Pauline Kerr and Paul Sharp (London: SAGE, 2016), 133-141."},{"issue":"3","key":"R000012","series-title":"Cooperation and Conflict","first-page":"385","article-title":"To Be a Diplomat Abroad: Diplomatic Practice at Embassies","volume":"50","author":"Cornut, J\u00e9r\u00e9mie","unstructured":"Cornut, J\u00e9r\u00e9mie. \u2018To Be a Diplomat Abroad: Diplomatic Practice at Embassies\u2019. Cooperation and Conflict 50 (3) (2015), 385-401. DOI 1 0.1 177\/0010836715574912."},{"article-title":"Closing the Gap: Expanding Cyber Deterrence","author":"Daniel, Michael","key":"R000013","unstructured":"Daniel, Michael. \u2018Closing the Gap: Expanding Cyber Deterrence\u2019. Cyberstability Paper Series July 2021. https:\/\/hcss.nl\/wp-content\/uploads\/2021\/07\/Closing-the-Gap-Expanding-Cyber-Deterrence.pdf."},{"series-title":"On Diplomacy: A Genealogy of Western Estrangement","author":"Der Derian, James","key":"R000014","unstructured":"Der Derian, James. On Diplomacy: A Genealogy of Western Estrangement (New York: Basil Blackwell, 1987)."},{"issue":"1-2","key":"R000015","series-title":"The Hague Journal of Diplomacy","first-page":"155","article-title":"Distributed Agency: Foreign Policy sans MFA","volume":"15","author":"Dittmer, Jason","unstructured":"Dittmer, Jason. \u2018Distributed Agency: Foreign Policy sans MFA\u2019. The Hague Journal of Diplomacy 15 (1-2) (2020), 155-164. DOI 10.1163\/1871191X-15101087."},{"series-title":"Cyber Persistence Theory: Redefining National Security in Cyberspace","author":"Fischerkeller, Michael P.","key":"R000016","unstructured":"Fischerkeller, Michael P., Emily O. Goldman and Richard J. Harknett. Cyber Persistence Theory: Redefining National Security in Cyberspace (New York: Oxford University Press, 2022)."},{"series-title":"Russia, the United States and Cyber Diplomacy: Opening the Doors","author":"Gady, Franz-Stefan","key":"R000017","unstructured":"Gady, Franz-Stefan and Greg Austin. Russia, the United States and Cyber Diplomacy: Opening the Doors (New York: EastWest Institute, 2010). https:\/\/www.eastwest.ngo\/sites\/default\/files\/ideas-files\/USRussiaCyber_WEB.pdf."},{"issue":"4","key":"R000018","series-title":"Texas National Security Review","first-page":"84","article-title":"From Reaction to Action: Adopting a Competitive Posture in Cyber Diplomacy","volume":"3","author":"Goldman, Emily O.","unstructured":"Goldman, Emily O. \u2018From Reaction to Action: Adopting a Competitive Posture in Cyber Diplomacy\u2019. Texas National Security Review 3 (4) (2020), 84-101. DOI 10.26153\/tsw\/10950."},{"key":"R000019","series-title":"Bourdieu in International Relations","first-page":"79","article-title":"Power: Bourdieu\u2019s Field Analysis of Relational Capital, Misrecognition and Domination","author":"Guzzini, Stefano","unstructured":"Guzzini, Stefano. \u2018Power: Bourdieu\u2019s Field Analysis of Relational Capital, Misrecognition and Domination\u2019 In Bourdieu in International Relations, ed. Rebecca Adler-Nissen (London: Routledge, 2013), 79-91."},{"article-title":"A Brief Primer on International Law and Cyberspace","author":"Hollis, Duncan B.","key":"R000020","unstructured":"Hollis, Duncan B. \u2018A Brief Primer on International Law and Cyberspace\u2019. Carnegie Endowment for International Peace. June 2021. Available at: https:\/\/carnegieendowment.org\/files\/Hollis_Law_and_Cyberspace.pdf."},{"issue":"1","key":"R000021","series-title":"Journal of Cyber Policy","first-page":"61","article-title":"Unpacking Cyber Norms: Private Companies as Norm Entrepreneurs","volume":"3","author":"Hurel, Louise Marie","unstructured":"Hurel, Louise Marie and Luisa Cruz Lobato. \u2018Unpacking Cyber Norms: Private Companies as Norm Entrepreneurs\u2019. Journal of Cyber Policy 3 (1) (2018), 61-76. DOI 10.1080\/23738871.2018.1467942."},{"issue":"3","key":"R000022","series-title":"International Studies Quarterly","first-page":"1","article-title":"Microsoft\u2019s Challenge to US Militarization of Cyberspace: A Lacanian Study of Norm Entrepreneurship","volume":"67","author":"Jacobsen, Jeppe T.","unstructured":"Jacobsen, Jeppe T. \u2018Microsoft\u2019s Challenge to US Militarization of Cyberspace: A Lacanian Study of Norm Entrepreneurship\u2019. International Studies Quarterly 67 (3) (2023), 1-11. DOI 10.1093\/isq\/sqad051."},{"key":"R000023","series-title":"The SAGE Handbook of Diplomacy","first-page":"79","article-title":"Diplomacy, Communication and Signalling","author":"J\u00f6nsson, Christer","unstructured":"J\u00f6nsson, Christer. \u2018Diplomacy, Communication and Signalling\u2019. In The SAGE Handbook of Diplomacy, eds. Costas M. Constantinou, Pauline Kerr and Paul Sharp (London: SAGE, 2016), 79-91."},{"series-title":"Essence of Diplomacy","author":"J\u00f6nsson, Christer","key":"R000024","unstructured":"J\u00f6nsson, Christer and Martin Hall. Essence of Diplomacy (London: Palgrave Macmillan, 2005)."},{"key":"R000025","series-title":"EU Cyber Direct","article-title":"Quiet Conversations: Observations from a Decade of Practice in Cyber-related Track 1.5 and Track 2 Diplomacy","author":"Kavanagh, Camino","unstructured":"Kavanagh, Camino, Madeline Carr and Nils Berglund. \u2018Quiet Conversations: Observations from a Decade of Practice in Cyber-related Track 1.5 and Track 2 Diplomacy\u2019. Digital Dialogue, EU Cyber Direct. November 2021. https:\/\/eucyberdirect.eu\/research\/quiet-conversations-observations-from-a-decade-of-practice-in-cyber-related-track-1-5-and-track-2-diplomacy."},{"issue":"1","key":"R000026","series-title":"Journal of Cybersecurity","article-title":"Cyber Legalism: Why It Fails and What to Do about It","volume":"7","author":"Kello, Lucas","unstructured":"Kello, Lucas. \u2018Cyber Legalism: Why It Fails and What to Do about It\u2019. Journal of Cybersecurity 7 (1) (2021). DOI 10.1093\/cybsec\/tyab014."},{"issue":"1","key":"R000027","series-title":"World Politics","first-page":"39","article-title":"Transgovernmental Relations and International Organizations","volume":"27","author":"Keohane, Robert","unstructured":"Keohane, Robert and Joseph Nye. \u2018Transgovernmental Relations and International Organizations\u2019. World Politics 27 (1) (1974), 39-62. DOI 10.2307\/2009925."},{"issue":"2","key":"R000028","series-title":"Diplomacy and Statecraft","first-page":"1","article-title":"The Inertia of Diplomacy","volume":"19","author":"Kleiner, Juergen","unstructured":"Kleiner, Juergen. \u2018The Inertia of Diplomacy\u2019. Diplomacy and Statecraft 19 (2) (2008), 1-89. DOI 10.1080\/09592290802096380."},{"series-title":"The Darkening Web: The War for Cyberspace","author":"Klimburg, Alexander","key":"R000029","unstructured":"Klimburg, Alexander. The Darkening Web: The War for Cyberspace (New York: Penguin Books, 2016)."},{"issue":"4","key":"R000030","series-title":"Symbolic Interaction","first-page":"547","article-title":"Classic Grounded Theory \u2014 The Latest Version: Interpretation of Classic Grounded Theory as a Meta-theory for Research","volume":"41","author":"Konecki, Krzysztof T.","unstructured":"Konecki, Krzysztof T. \u2018Classic Grounded Theory \u2014 The Latest Version: Interpretation of Classic Grounded Theory as a Meta-theory for Research\u2019. Symbolic Interaction 41 (4) (2018), 547-564. DOI 10.1002\/symb.361."},{"issue":"4","key":"R000031","series-title":"The Hague Journal of Diplomacy","first-page":"331","article-title":"Navigating Discretion: A Diplomatic Practice in Moments of Socio-political Rupture","volume":"14","author":"Kuschnitzki, Judit","unstructured":"Kuschnitzki, Judit. \u2018Navigating Discretion: A Diplomatic Practice in Moments of Socio-political Rupture\u2019. The Hague Journal of Diplomacy 14 (4) (2013), 331-356. DOI 10.1163\/1871191X-14401074."},{"issue":"3","key":"R000032","series-title":"Cooperation and Conflict","first-page":"368","article-title":"Symbolic Power in Diplomatic Practice: Matters of Style in Brussels","volume":"50","author":"Kuus, Merje","unstructured":"Kuus, Merje. \u2018Symbolic Power in Diplomatic Practice: Matters of Style in Brussels\u2019. Cooperation and Conflict 50 (3) (2015), 368-384. DOI 0.1177\/0010836715574914."},{"issue":"4","key":"R000033","series-title":"Journal of Cyber Security Technology","first-page":"240","article-title":"Cyber-diplomacy: Cyberwarfare and the Rules of Engagement","volume":"4","author":"Lancelot, Jonathan F.","unstructured":"Lancelot, Jonathan F. \u2018Cyber-diplomacy: Cyberwarfare and the Rules of Engagement\u2019. Journal of Cyber Security Technology 4 (4) (2020), 240-254. DOI 10.1080\/23742917.2020.1798155."},{"article-title":"Understanding the EU\u2019s Approach to Cyber Diplomacy and Cyber Defence","author":"Latici, Tania","key":"R000034","unstructured":"Latici, Tania. \u2018Understanding the EU\u2019s Approach to Cyber Diplomacy and Cyber Defence\u2019. Briefing, EU Policy Insights, European Parliamentary Research Service, May 2020. https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2020)651937."},{"issue":"3","key":"R000035","series-title":"International Political Sociology","first-page":"294","article-title":"The Promises, Problems, and Potentials of a Bourdieu-Inspired Staging of International Relations","volume":"5","author":"Leander, Anna","unstructured":"Leander, Anna. \u2018The Promises, Problems, and Potentials of a Bourdieu-Inspired Staging of International Relations\u2019. International Political Sociology 5 (3) (2011), 294-313. DOI 10.1111\/j.1749-5687.2011.00135.x."},{"issue":"1-2","key":"R000036","series-title":"The Hague Journal of Diplomacy","first-page":"1","article-title":"Ministries of Foreign Affairs: A Crucial Institution Revisited","volume":"15","author":"Lequesne, Christian","unstructured":"Lequesne, Christian. \u2018Ministries of Foreign Affairs: A Crucial Institution Revisited\u2019. The Hague Journal of Diplomacy 15 (1-2) (2020), 1-12. DOI 10.1163\/1871191X-BJA10003."},{"key":"R000037","series-title":"Inside Cyber Diplomacy","article-title":"A Diplomacy Master Class with Ambassador Lauber","author":"Lewis, James Andrew","unstructured":"Lewis, James Andrew and Christopher Painter (hosts). \u2018A Diplomacy Master Class with Ambassador Lauber\u2019. Inside Cyber Diplomacy, CSIS, 23 April 2021. https:\/\/www.csis.org\/node\/60682."},{"key":"R000038","series-title":"Soft Power and the Future of US Foreign Policy","first-page":"161","article-title":"Soft Power and Cyber Security: The Evolution of US Cyber Diplomacy","author":"Lilli, Eugenio","unstructured":"Lilli, Eugenio and Christopher Painter. \u2018Soft Power and Cyber Security: The Evolution of US Cyber Diplomacy\u2019. In Soft Power and the Future of US Foreign Policy, ed. Hendrik W. Ohnesorge (Manchester: Manchester University Press, 2023), 161-179."},{"issue":"4","key":"R000039","series-title":"Australian Journal of International Affairs","first-page":"432","article-title":"Advancing Cyber Diplomacy in the Asia Pacific: Japan and Australia","volume":"75","author":"Manantan, Mark Bryan F.","unstructured":"Manantan, Mark Bryan F. \u2018Advancing Cyber Diplomacy in the Asia Pacific: Japan and Australia\u2019. Australian Journal of International Affairs 75 (4) (2021), 432-459. DOI 10.1080\/10357718.2021.1926423."},{"issue":"1","key":"R000040","series-title":"The RUSI Journal","first-page":"14","article-title":"Diplomatic Alternatives to Cyber-warfare: A Near Term A-genda","volume":"157","author":"Meyer, Paul","unstructured":"Meyer, Paul. \u2018Diplomatic Alternatives to Cyber-warfare: A Near Term A-genda\u2019. The RUSI Journal 157 (1) (2012), 14-19.DOI 10.1080\/03071847.2012.664357."},{"issue":"2","key":"R000041","series-title":"The Washington Quarterly","first-page":"47","article-title":"Seizing the Diplomatic Initiative to Control Cyber Conflict","volume":"38","author":"Meyer, Paul","unstructured":"Meyer, Paul. \u2018Seizing the Diplomatic Initiative to Control Cyber Conflict\u2019. The Washington Quarterly 38 (2) (2015), 47-61. DOI 10.1080\/0163660X.2015.1064709."},{"issue":"1","key":"R000042","series-title":"The Review of Faith & International Affairs","first-page":"23","article-title":"De-securitizing through Diplomacy: De-sectarianization and the View from the Islamic Republic","volume":"18","author":"Nasirzadeh, Samira","unstructured":"Nasirzadeh, Samira and Edward Wastnidge. \u2018De-securitizing through Diplomacy: De-sectarianization and the View from the Islamic Republic\u2019. The Review of Faith & International Affairs 18 (1) (2020), 23-33. DOI 10.1080\/15570274.2020.1729529."},{"issue":"1","key":"R000043","series-title":"International Journal of Peace Studies","first-page":"7","article-title":"Identity and the Outbreak of War: Or Why the Copenhagen School of Security Studies Should Include the Idea of \u2018Violisation\u2019 in Its Framework of Analysis","volume":"3","author":"Neumann, Iver B.","unstructured":"Neumann, Iver B. \u2018Identity and the Outbreak of War: Or Why the Copenhagen School of Security Studies Should Include the Idea of \u2018Violisation\u2019 in Its Framework of Analysis\u2019. International Journal of Peace Studies 3 (1) (1998), 7-22."},{"key":"R000044","series-title":"Baltic Journal of Political Science","first-page":"7","article-title":"After Securitisation: Diplomats as De-securitisers","volume":"1","author":"Neumann, Iver B.","unstructured":"Neumann, Iver B. \u2018After Securitisation: Diplomats as De-securitisers\u2019. Baltic Journal of Political Science 1 (2012a), 7-21."},{"series-title":"At Home with the Diplomats: Inside a European Foreign Ministry","author":"Neumann, Iver B.","key":"R000045","unstructured":"Neumann, Iver B. At Home with the Diplomats: Inside a European Foreign Ministry (Ithaca, NY and London: Cornell University Press, 2012b)."},{"series-title":"Cyber-diplomacy: Managing Foreign Policy in the Twenty-First Century","key":"R000046","unstructured":"Potter, Evan H., ed. Cyber-diplomacy: Managing Foreign Policy in the Twenty-First Century (Montreal: McGill-Queen\u2019s University Press, 2002)."},{"series-title":"International Pecking Orders: The Politics and Practice of Multilateral Diplomacy","author":"Pouliot, Vincent","key":"R000047","unstructured":"Pouliot, Vincent. International Pecking Orders: The Politics and Practice of Multilateral Diplomacy (Cambridge and New York: Cambridge University Press, 2016)."},{"issue":"3","key":"R000048","series-title":"Cooperation and Conflict","first-page":"297","article-title":"Practice Theory and the Study of Diplomacy: A Research Agenda","volume":"50","author":"Pouliot, Vincent","unstructured":"Pouliot, Vincent and J\u00e9r\u00e9mie Cornut. \u2018Practice Theory and the Study of Diplomacy: A Research Agenda\u2019. Cooperation and Conflict 50 (3) (2015), 297-315. DOI 1177\/0010836715574913."},{"issue":"3","key":"R000049","series-title":"International Organization","first-page":"427","article-title":"Diplomacy and Domestic Politics: The Logic of Two-Level Games","volume":"42","author":"Putnam, Robert D.","unstructured":"Putnam, Robert D. \u2018Diplomacy and Domestic Politics: The Logic of Two-Level Games\u2019. International Organization 42 (3) (1988), 427-460. DOI 10.1017\/S0020818300027697."},{"series-title":"Social Practices of Rule-Making in World Politics","author":"Raymond, Mark","key":"R000050","unstructured":"Raymond, Mark. Social Practices of Rule-Making in World Politics (Cambridge: Cambridge University Press, 2019)."},{"issue":"2","key":"R000051","series-title":"Journal of Global Security Studies","article-title":"Social Practices of Rule-Making for International Law in the Cyber Domain","volume":"6","author":"Raymond, Mark","unstructured":"Raymond, Mark. \u2018Social Practices of Rule-Making for International Law in the Cyber Domain\u2019. Journal of Global Security Studies 6 (2) (2021). DOI 10.1093\/jogss\/ogz065."},{"series-title":"Cyberdiplomacy: Managing Security and Governance Online","author":"Riordan, Shaun","key":"R000052","unstructured":"Riordan, Shaun. Cyberdiplomacy: Managing Security and Governance Online (Cambridge: Polity Press, 2019)."},{"key":"R000053","series-title":"Washington Post","article-title":"It\u2019s a Big Day at the State Department for U.S. Cyberdiplomacy","author":"Schaffer, Aaron","unstructured":"Schaffer, Aaron. \u2018It\u2019s a Big Day at the State Department for U.S. Cyberdiplomacy\u2019. Washington Post, 4 April 2022. https:\/\/www.washingtonpost.com\/politics\/2022\/04\/04\/its-big-day-state-department-us-cyberdiplomacy\/."},{"issue":"6","key":"R000054","series-title":"The World Today","first-page":"156","article-title":"Driving Diplomacy into Cyberspace","volume":"35","author":"Smith, Gordon S.","unstructured":"Smith, Gordon S. \u2018Driving Diplomacy into Cyberspace\u2019. The World Today 35 (6) (1997), 156-158. DOI 10.4135\/9781446215883."},{"article-title":"The Alleged Demise of the UN GGE: An Autopsy and Eulogy","author":"Tikk, Eneken","key":"R000055","unstructured":"Tikk, Eneken and Mika Kerttunen. \u2018The Alleged Demise of the UN GGE: An Autopsy and Eulogy\u2019. Cyber Policy Institute, 2017. https:\/\/cyber-peace.org\/wp-content\/uploads\/2018\/11\/Tikk-Kerttunen-2017-The-Alleged-Demise-of-the-UN-GGE-An-Autopsy-and-Eulogy.pdf."},{"article-title":"National Cyber Power Index 2022","author":"Voo, Julia","key":"R000056","unstructured":"Voo, Julia, Irfan Hemani and Daniel Cassidy. \u2018National Cyber Power Index 2022\u2019. Cyber Power, 2022. https:\/\/www.belfercenter.org\/sites\/default\/files\/files\/publication\/CyberProject_National%20Cyber%20Power%20Index%202022_v3_220922.pdf."},{"article-title":"How a 2011 Hack You\u2019ve Never Heard of Changed the Internet\u2019s Infrastructure","author":"Wolff, Josephine","key":"R000057","unstructured":"Wolff, Josephine. \u2018How a 2011 Hack You\u2019ve Never Heard of Changed the Internet\u2019s Infrastructure\u2019. Slate, 21 December 2016. https:\/\/slate.com\/technology\/2016\/12\/how-the-2011-hack-of-diginotar-changed-the-internets-infrastructure.html."}],"container-title":["The Hague Journal of Diplomacy"],"original-title":[],"link":[{"URL":"https:\/\/brill.com\/view\/journals\/hjd\/19\/3\/article-p439_1.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/brill.com\/downloadpdf\/journals\/hjd\/19\/3\/article-p439_1.xml","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/brill.com\/downloadpdf\/journals\/hjd\/19\/3\/article-p439_1.xml","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T13:34:31Z","timestamp":1722432871000},"score":1,"resource":{"primary":{"URL":"https:\/\/brill.com\/view\/journals\/hjd\/19\/3\/article-p439_1.xml"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,26]]},"references-count":57,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1163\/1871191x-bja10183","relation":{},"ISSN":["1871-1901","1871-191X"],"issn-type":[{"type":"print","value":"1871-1901"},{"type":"electronic","value":"1871-191X"}],"subject":[],"published":{"date-parts":[[2024,2,26]]}}}