{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T07:27:58Z","timestamp":1768289278135,"version":"3.49.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/cycon51939.2021.9468296","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T20:27:07Z","timestamp":1625516827000},"page":"215-231","source":"Crossref","is-referenced-by-count":5,"title":["The Cyberspace \u2018Great Game\u2019. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms"],"prefix":"10.23919","author":[{"given":"Nikola","family":"Pijovic","sequence":"first","affiliation":[{"name":"Cyber Security Cooperative Research Centre Postdoctoral Research Fellow, School of Politics and International Relations \/ Law School, University of Adelaide,Australia"}]}],"member":"263","reference":[{"key":"ref39","author":"trump","year":"2019","journal-title":"Executive Order on Securing the Information and Communications Technology and Services Supply Chain"},{"key":"ref38","author":"meaghan","year":"2019","journal-title":"New Zealand Bans Huawei from 5G China Has Message for New Zealand"},{"key":"ref33","year":"2013","journal-title":"Seoul Framework for and Commitment to Open and Secure Cyberspace (Seoul Framework)"},{"key":"ref32","author":"adam","year":"2020","journal-title":"Peering into the Future of Sino-Russian Cyber Security Cooperation"},{"key":"ref31","author":"adam","year":"2017","journal-title":"Chinese Cyber Diplomacy in a New Era of Uncertainty"},{"key":"ref30","author":"richelson","year":"2016","journal-title":"The U S Intelligence Community"},{"key":"ref37","author":"eneken","year":"2017","journal-title":"The Alleged Demise of the UN GGE An Autopsy and Eulogy"},{"key":"ref36","author":"michael","year":"2018","journal-title":"Huawei Banned from 5G Mobile Infrastructure Rollout in Australia"},{"key":"ref35","year":"2009","journal-title":"Agreement on Cooperation in Ensuring International Information Security between the Member States of the Shanghai Cooperation Organization"},{"key":"ref34","author":"adrian","year":"2018","journal-title":"Freedom on the Net 2018 The Rise of Digital Authoritarianism"},{"key":"ref28","year":"2015","journal-title":"Review of the Search and Surveillance Act 2012"},{"key":"ref27","year":"2015","journal-title":"New Zealand's Cyber Security Strategy 2015 Action Plan"},{"key":"ref29","author":"colin","year":"2019","journal-title":"Exclusive Australia Concluded China Was Behind Hack on Parliament Political Parties _ Sources"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198719519.001.0001"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1093\/ia\/iiz274","article-title":"Power and Diplomacy in the Post-Liberal Cyberspace","volume":"96","author":"andrew","year":"2020","journal-title":"International Affairs"},{"key":"ref20","author":"hadas","year":"2020","journal-title":"UK Bans Huawei from its 5G Network in Rapid About-Face"},{"key":"ref22","first-page":"129","article-title":"The Past, Present, and Future of Russia's Cyber Strategy and Forces","author":"bilyana","year":"2020","journal-title":"12th International Conference on Cyber Conflict 20\/20 Vision The Next Decade"},{"key":"ref21","first-page":"56","article-title":"The Past, Present and Future of Anglosphere Security Networks: Constitutive Reduction of a Shared Identity","author":"tim","year":"2019","journal-title":"The Anglosphere Continuity Dissonance and Location"},{"key":"ref24","year":"2017","journal-title":"International Strategy of Cooperation on Cyberspace"},{"key":"ref23","author":"alexander","year":"2018","journal-title":"China and Russia The New Rapprochement"},{"key":"ref26","year":"0","journal-title":"UKUSA Agreement 1956"},{"key":"ref25","author":"louise","year":"2019","journal-title":"Donald Trump's Huawei Ban is a More Severe Threat to Global Economy than Trade War Tariffs Economists Say"},{"key":"ref50","author":"ben","year":"2019","journal-title":"The Anglosphere Continuity Dissonance and Location"},{"key":"ref51","author":"christopher","year":"2019","journal-title":"Understanding Cyber Warfare Politics Policy and Strategy"},{"key":"ref53","author":"jeremy","year":"2018","journal-title":"Cyber and International Law in the 21st Century"},{"key":"ref52","year":"0","journal-title":"World Internet Conference"},{"key":"ref10","year":"0","journal-title":"Convention on Cybercrime"},{"key":"ref11","author":"james","year":"2012","journal-title":"Canada and the Five Eyes Intelligence Community"},{"key":"ref40","article-title":"UN A\/Res\/65\/201","year":"2010","journal-title":"Report of the Group of Governmental Experts on developments in the field of information and telecommunications in the context of international security"},{"key":"ref12","year":"2017","journal-title":"Australia's International Cyber Engagement Strategy"},{"key":"ref13","year":"2016","journal-title":"Joint Statementfrom the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security"},{"key":"ref14","year":"0","journal-title":"About"},{"key":"ref15","author":"chris","year":"2020","journal-title":"Canadian Major Telcos Effectively Lock Huawei out of 5G Build"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1017\/S0002930000016894","article-title":"Constructing Norms for Global Cybersecurity","volume":"110","author":"martha","year":"2016","journal-title":"The American Journal of International Law"},{"key":"ref17","year":"0","journal-title":"Freedom Online Coalition Factsheet"},{"key":"ref18","year":"2019","journal-title":"Advancing Cyberstability The Hague Centre for Strategic Studies and EastWest Institute"},{"key":"ref19","year":"0","journal-title":"Share of the Population Using the Internet 1990 to 2017"},{"key":"ref4","year":"2016","journal-title":"National Cyber Security Strategy 2016-2021"},{"key":"ref3","year":"2011","journal-title":"The UK Cyber Security Strategy Protecting and Promoting the UK in a Digital World"},{"key":"ref6","year":"2016","journal-title":"National Cyberspace Security Strategy"},{"key":"ref5","year":"2015","journal-title":"Sino-Russian Cybersecurity Agreement 2015"},{"key":"ref8","year":"2016","journal-title":"The Australia's Cyber Security Strategy Enabling innovation growth & prosperity"},{"key":"ref7","author":"carl von","year":"2007","journal-title":"On War"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1080\/09557570903535755","article-title":"Anglobal Governance?","volume":"23","author":"srdjan","year":"2010","journal-title":"Cambridge Review of International Affairs"},{"key":"ref9","year":"0","journal-title":"About Us\/History"},{"key":"ref46","year":"2011","journal-title":"International Strategy for Cyberspace"},{"key":"ref45","article-title":"United Nations Institute for Disarmament Research (UNIDIR)","year":"2016","journal-title":"Report of the International Security Cyber Issues Workshop Series"},{"key":"ref48","article-title":"National Cyber Power Index 2020","author":"julia","year":"2020","journal-title":"China Cyber Policy Initiative Belfer Center for Science and and International Affairs"},{"key":"ref47","year":"2018","journal-title":"National Cyber Strategy of the United States of America"},{"key":"ref42","article-title":"UN AIRes\/68\/98","year":"2013","journal-title":"Report of the Group of Governmental Experts on developments in the field of information and telecommunications in the context of international security"},{"key":"ref41","article-title":"UN A\/66\/359","year":"2011","journal-title":"Annex to the Letter Dated 12 September 2011 from the Permanent Representatives of China the Russian Federation Tajikistan and Uzbekistan to the United Nations Addressed to the Secretary-General"},{"key":"ref44","article-title":"UN A\/69\/723","year":"2015","journal-title":"Annex to the Letter Dated 9 January 2015 from the Permanent Representatives of China Kazakhstan Kyrgyzstan the Russian Federation Tajikistan and Uzbekistan to the United Nations Addressed to the Secretary General"},{"key":"ref43","article-title":"UN A\/Res\/70\/174","year":"2015","journal-title":"Report of the Group of Governmental Experts on developments in the field of information and telecommunications in the context of international security"}],"event":{"name":"2021 13th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2021,5,25]]},"end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 13th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467797\/9467799\/09468296.pdf?arnumber=9468296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:56:00Z","timestamp":1659484560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9468296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":53,"URL":"https:\/\/doi.org\/10.23919\/cycon51939.2021.9468296","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}