{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:42:53Z","timestamp":1730342573782,"version":"3.28.0"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10181978","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:28:49Z","timestamp":1689791329000},"page":"141-160","source":"Crossref","is-referenced-by-count":0,"title":["Digital Supply Chain Dependency and Resilience"],"prefix":"10.23919","author":[{"given":"Lars","family":"Gjesvik","sequence":"first","affiliation":[{"name":"Senior Researcher, Norsk Utenrikpolitisk Institute,Oslo,Norway"}]},{"given":"Azan Latif","family":"Khanyari","sequence":"additional","affiliation":[{"name":"PhD Candidate, Simula Metropolitan Centre for Digital Engineering,Oslo,Norway"}]},{"given":"Haakon","family":"Bryhni","sequence":"additional","affiliation":[{"name":"Research Professor, Simula Metropolitan Centre for Digital Engineering,Oslo,Norway"}]},{"given":"Alfred","family":"Arouna","sequence":"additional","affiliation":[{"name":"PhD Candidate, Simula Metropolitan Centre for Digital Engineering,Oslo,Norway"}]},{"given":"Niels Nagelhus","family":"Schia","sequence":"additional","affiliation":[{"name":"Senior Researcher, Norsk Utenrikpolitisk Institute,Oslo,Norway"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01968-5_2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.5406\/illinois\/9780252039362.001.0001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14763\/2020.3.1494"},{"key":"ref56","article-title":"Dead Roombas, Stranded Packages and Delayed Exams. How the AWS Outage Wreaked Havoc Across the U.S.","author":"palmer","year":"2021","journal-title":"CNBC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819865984"},{"journal-title":"Commissioned by Dutch Ministry of Justice and Security","article-title":"Google Workspace DPIA for Dutch DPA","year":"2021","key":"ref59"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3748098"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14763\/2020.4.1532"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1080\/0163660X.2020.1734303"},{"journal-title":"Tiltaksoversikt til nasjonal strategi for digital sikkerhet","year":"2019","key":"ref52"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/1367549417751151"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1177\/20594364221139729"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9701.2006.00860.x"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9589-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3347446"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/13523260.2019.1678855"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/misr.12023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2346.12189"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1057\/9781137483591"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2101883"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818320000387"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/isr\/viz044"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262014595.001.0001"},{"journal-title":"French Police Probe Multiple Cuts of Major Internet Cables","year":"2022","author":"leicester","key":"ref42"},{"key":"ref41","article-title":"Narratives of Digital Sovereignty in German Political Discourse","author":"lambach","year":"2022","journal-title":"Governance"},{"key":"ref44","article-title":"Cable Breakage. When and How Cables Go Down","author":"mauldin","year":"2017","journal-title":"TeleGeography"},{"journal-title":"The Age of Unpeace How Connectivity Causes Conflict","year":"2021","author":"leonard","key":"ref43"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.1080\/13501763.2023.2171090","article-title":"The Securitization of the EU&#x2019;s Digital Tech Regulation","author":"m\u00fcgge","year":"2023","journal-title":"Journal of European Public Policy"},{"key":"ref8","first-page":"97","article-title":"Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment","author":"bowker","year":"2010","journal-title":"International Handbook of Internet Research"},{"journal-title":"Tubes A Journey to the Center of the Internet","year":"2013","author":"blum","key":"ref7"},{"key":"ref9","article-title":"NATO Seeks Ways of Protecting Undersea Cables from Russian Attacks","author":"brzozowksi","year":"2020","journal-title":"Euractiv"},{"journal-title":"Europe&#x2019;s Quest for Digital Sovereignty GAIA-X as a Case Study","year":"2021","author":"autolitano","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0967010610382687"},{"key":"ref6","article-title":"Cyber Sovereignty and Data Sovereignty","author":"baezner","year":"2018","journal-title":"CSS Cyberdefense Trend Analyses"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01968-5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/0306396818823172"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720982012"},{"key":"ref34","article-title":"Technological Momentum","author":"hughes","year":"1994","journal-title":"Does Technology Drive History? The Dilemma of Technological Determinism"},{"journal-title":"The Great Decoupling China America and the Struggle for Technological Supremacy","year":"2021","author":"inkster","key":"ref37"},{"key":"ref36","article-title":"The Technological Sovereignty Dilemma and How New Technology Can Offer a Way Out","volume":"6","author":"ilves","year":"2020","journal-title":"Eur Cybersecurity J"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195152661.001.0001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/isq\/sqac033"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/17544750.2019.1687536"},{"journal-title":"Automatic Diversity in the Software Supply Chain","year":"2021","author":"harrand","key":"ref32"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0309132516662147"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/S1474745618000198"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14763\/2021.3.1582"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/isec_a_00351"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14540-8_5"},{"journal-title":"EU Strategic Dependencies and Capacities Second Stage of In-depth Reviews","year":"2022","key":"ref23"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-polisci-041719-102405"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/0163660X.2020.1770962"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2020.1759010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4324\/9781003110224"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1017\/S1537592721003145"},{"key":"ref63","article-title":"Loss of Tonga&#x2019;s Telecommunication. What Happened, How Was It Managed and What Were the Consequences?","author":"schia","year":"2022","journal-title":"Nupic"},{"journal-title":"Digital Sovereignty on Paper Russia&#x2019;s Ambitious Laws Conflict with Its Tech Dependence","year":"2020","author":"epifanova","key":"ref22"},{"key":"ref66","article-title":"Facebook Outage. What Went Wrong and Why Did It Take So Long to Fix After Social Platform Went Down?","author":"taylor","year":"2021","journal-title":"Guardian"},{"journal-title":"Evaluating and Mitigating Software Supply Chain Security Risks","year":"2010","author":"ellison","key":"ref21"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.17645\/pag.v6i2.1569"},{"key":"ref28","first-page":"1","article-title":"Private infrastructure in weaponized interdependence","volume":"3","author":"gjesvik","year":"2022","journal-title":"Review of International Political Economy"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131380"},{"key":"ref29","first-page":"1","article-title":"Finance\/Security Infrastructures","volume":"28","author":"goede","year":"2020","journal-title":"Review of International Political Economy"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-923X.1994.tb00441.x"},{"key":"ref62","article-title":"Losing Control? Sovereignty in the Age of Globalization","author":"sassen","year":"1996","journal-title":"Leonard Hastings Schoff Lectures"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.278"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","start":{"date-parts":[[2023,5,30]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10181978.pdf?arnumber=10181978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T22:13:15Z","timestamp":1689804795000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10181978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":68,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10181978","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}