{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:37:34Z","timestamp":1768415854924,"version":"3.49.0"},"reference-count":72,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10182095","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T14:28:49Z","timestamp":1689776929000},"page":"417-435","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Diplomacy: NATO\/EU Engaging with the Global South"],"prefix":"10.23919","author":[{"given":"Eduardo","family":"Izycki","sequence":"first","affiliation":[{"name":"PhD Candidate \/ Researcher, University of Bras&#x00ED;lia (UnB),International Relations Institute (IRel),Bras&#x00ED;lia,DF,Brazil"}]},{"given":"Brett","family":"van Niekerk","sequence":"additional","affiliation":[{"name":"Senior Lecturer, Durban University of Technology,Department of Information Technology,Durban,South Africa"}]},{"given":"Trishana","family":"Ramluckan","sequence":"additional","affiliation":[{"name":"Honorary Research Fellow, University of KwaZulu-Natal,School of Law,Durban,South Africa"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.36643\/mjrl.24.2.digital"},{"key":"ref57","author":"roy","year":"2022","journal-title":"China&#x2019;s Growing Influence in Latin America"},{"key":"ref12","article-title":"Hypocrisy Hype: Can Washington Still Walk and Talk Differently?","author":"cohen","year":"2013","journal-title":"Foreign Affairs"},{"key":"ref56","author":"roguski","year":"2020","journal-title":"Russian Cyber Attacks Against Georgia Public Attributions and Sovereignty in Cyberspace"},{"key":"ref15","year":"2022","journal-title":"Workshop on Advancing the Cyber Programme of Action (PoA)"},{"key":"ref59","author":"scott-railton","year":"2017","journal-title":"Reckless Exploit Mexican Journalists Lawyers and a Child Targeted with NSO Spyware"},{"key":"ref14","article-title":"Cyber Diplomacy: A New Way to Visualise UN Voting Records","author":"collett","year":"2021","journal-title":"Cybercapacity org"},{"key":"ref58","author":"scott","year":"2008","journal-title":"The Chinese Century? The Challenge to Global Order"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.4236\/jss.2019.77032"},{"key":"ref52","author":"call","year":"2022","journal-title":"South-South Cooperation in Cyber Capacity Building and Good Practices"},{"key":"ref11","article-title":"The Return of Statecraft: Back to Basics in the Post-American World","author":"cohen","year":"2022","journal-title":"Foreign Affairs"},{"key":"ref55","year":"2022","journal-title":"Panama Ex-president Martinelli to Stand Trial on Money Laundering Charge"},{"key":"ref10","year":"2018","journal-title":"NotPetya"},{"key":"ref54","author":"reuters","year":"2021","journal-title":"Mexico Detains Man Implicated in Pegasus Spy Plot against Journalist"},{"key":"ref17","article-title":"Countering Cyber Proliferation: Zeroing in on Access-as-a-Service","author":"desombre","year":"2021","journal-title":"Atlantic Council"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4324\/9781315167305-5"},{"key":"ref19","article-title":"Tracking UN Voting Patterns on Cybercrime","author":"dietrich","year":"2022","journal-title":"Direction B"},{"key":"ref18","year":"2016","journal-title":"Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security"},{"key":"ref51","year":"2022","journal-title":"The Right to Privacy in the Digital Age"},{"key":"ref50","first-page":"2","article-title":"The Future of American Power: Dominance and Decline in Perspective","author":"nye","year":"2010","journal-title":"Foreign Affairs"},{"key":"ref46","article-title":"Pegasus and Surveillance Spyware","author":"marzocchi","year":"2022","journal-title":"European Parliament"},{"key":"ref45","article-title":"The Future of the Internet Is up for Vote at the U.N","author":"martin","year":"2022","journal-title":"The Record"},{"key":"ref48","year":"2016","journal-title":"Cyber Defence"},{"key":"ref47","author":"moreno","year":"2022","journal-title":"China Seen Backing&#x201C;Digital Authoritarianism&#x201D; in Latin America"},{"key":"ref42","author":"marczak","year":"2021","journal-title":"Hooking Candiru Another Mercenary Spyware Vendor Comes into Focus"},{"key":"ref41","author":"marczak","year":"2021","journal-title":"Pegasus vs Predator Dissident&#x2019;s Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware"},{"key":"ref44","author":"marczak","year":"2020","journal-title":"Running in Circles"},{"key":"ref43","author":"marczak","year":"2018","journal-title":"Hide and Seek Tracking NSO Group&#x2019;s Pegasus Spyware to Operations in 45 Countries"},{"key":"ref49","year":"2022","journal-title":"The Concept of Strategy"},{"key":"ref8","article-title":"Statement on Russia&#x2019;s Malicious Cyber Activity Affecting Europe and Ukraine","year":"2022","journal-title":"Canada Global Affairs"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.22456\/2178-8839.54617","article-title":"The Brazilian Reactions to the Snowden Affairs: Implications for the Study of International Relations in an Interconnected World","volume":"6","author":"canabarro","year":"2015","journal-title":"Conjuntura Austral Porto Alegre"},{"key":"ref9","author":"cave","year":"2019","journal-title":"Mapping More of China&#x2019;s Tech Giants AI and Surveillance"},{"key":"ref4","author":"bateman","year":"2022","journal-title":"The Purposes of U S Government Public Cyber&#x2019; Carnegie Endowment for International Peace"},{"key":"ref3","year":"2022","journal-title":"Attribution to Russia of Malicious Cyber Activity against Ukraine"},{"key":"ref6","article-title":"Addition of Certain Entities to the Entity List","year":"2021","journal-title":"Federal Register"},{"key":"ref5","article-title":"Cyber diplomacy and shifting geopolitical landscapes","author":"borrel","year":"2020","journal-title":"EU Cyber Forum"},{"key":"ref40","author":"marczak","year":"2015","journal-title":"Hacking Team Reloaded? US-Based Ethiopian Journalists Again Targeted with Spyware"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iix249"},{"key":"ref34","author":"la?ici","year":"2020","journal-title":"Understanding the EU&#x2019;s Approach to Cyber Diplomacy and Cyber Defence"},{"key":"ref37","author":"malena","year":"2021","journal-title":"The Extension of the Digital Silk Road to Latin America Advantages and Potential Risks"},{"key":"ref36","year":"2020","journal-title":"Six Paris Call Working Groups Announced"},{"key":"ref31","article-title":"International Cooperation and Cybersecurity in Africa","author":"ifeanyi-ajufo","year":"2022","journal-title":"Directions"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.25148\/GSR.2.009786"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.48021\/978-65-252-1471-9"},{"key":"ref32","first-page":"79","article-title":"Cyber Power Diffusion: Global, Regional and Local Implications","author":"izycki","year":"0","journal-title":"Modelling Nation-State Information Warfare and Cyber-operations"},{"key":"ref2","article-title":"Zimbabwe Turns to Chinese Technology to Expand Surveillance of Citizens","year":"2023","journal-title":"ADF Magazine"},{"key":"ref1","author":"acharya","year":"2018","journal-title":"The End of American World Order"},{"key":"ref39","author":"marczak","year":"2017","journal-title":"Champing at the Cyberbit Ethiopian Dissidents Targeted with New Commercial Spyware"},{"key":"ref38","author":"marczak","year":"2014","journal-title":"Hacking Team and the Targeting of Ethiopian Journalists"},{"key":"ref71","year":"2021","journal-title":"Background Press Call by Senior Administration Officials on Malicious Cyber Activity Attributable to the People&#x2019;s Republic of China"},{"key":"ref70","author":"weber","year":"2022","journal-title":"How to Strengthen the Program of Action for Advancing Responsible State Behavior in Cyberspace"},{"key":"ref72","year":"2015","journal-title":"Hacking Team"},{"key":"ref24","article-title":"An EU Strategy on Standardisation &#x2013; Setting Global Standards in Support of a Resilient, Green and Digital EU Single Market","year":"2022","journal-title":"COM(2022) 31 final"},{"key":"ref68","year":"2022","journal-title":"Attribution to Russia of Malicious Cyber Activity against Ukraine"},{"key":"ref23","year":"2022","journal-title":"European Declaration on Digital Rights and Principles"},{"key":"ref67","year":"2022","journal-title":"Russia Behind Cyber-Attack with Europe-wide Impact an Hour Before Ukraine Invasion"},{"key":"ref26","year":"2020","journal-title":"Declaration by the High Representative on Behalf of the European Union &#x2013; Call to Promote and Conduct Responsible Behaviour in Cyberspace"},{"key":"ref25","year":"2023","journal-title":"Global Gateway EU Latin America and Caribbean partners launch in Colombia the EU-LAC Digital Alliance"},{"key":"ref69","year":"2023"},{"key":"ref20","article-title":"Publicly Attributing Cyber Attacks: A Framework","author":"egloff","year":"2021","journal-title":"Journal of Strategic Studies"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1093\/ia\/iiz055"},{"key":"ref63","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780197661628.001.0001","author":"smeets","year":"2022","journal-title":"No Shortcuts Why States Struggle to Develop a Military Cyber-Force"},{"key":"ref22","year":"2020","journal-title":"The EU's Cybersecurity Strategy for the Digital Decade"},{"key":"ref66","article-title":"Road Map for Digital Cooperation: Implementation of the Recommendations of the High-Level Panel on Digital Cooperation","year":"2020","journal-title":"United Nations General Assembly"},{"key":"ref21","article-title":"Grupo Guacamaya hacke&#x00F3; SEDENA (Secretar&#x00ED;a de la Defensa Nacional de M&#x00E9;xico) y filtr&#x00F3; 6 TB informaci&#x00F3;n","author":"elhacker","year":"2022","journal-title":"ElHacker"},{"key":"ref65","article-title":"China&#x2019;s Digital Silk Road in Africa and the Future of Internet Governance","author":"tugendhat","year":"2021","journal-title":"China-Africa Research Initiative Policy Brief No 60"},{"key":"ref28","year":"2022","journal-title":"Statement on behalf of the Chair of the Freedom Online Coalition A Call to Action on State-Sponsored Disinformation in Ukraine"},{"key":"ref27","year":"2022","journal-title":"Russian cyber operations against Ukraine Declaration by the High Representative on behalf of the European Union"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.19088\/K4D.2022.123"},{"key":"ref60","author":"scott-railton","year":"2017","journal-title":"Reckless III &#x2013; Investigation Into Mexican Mass Disappearance Targeted with NSO Spyware"},{"key":"ref62","author":"scott-railton","year":"2020","journal-title":"Nothing Sacred &#x2013; Religious and Secular Voices for Reform in Togo Targeted with NSO Spyware"},{"key":"ref61","author":"scott-railton","year":"2017","journal-title":"Bitter Sweet Supporters of Mexico&#x2019;s Soda Tax Targeted With NSO Exploit Links"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2023,5,30]]},"end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10182095.pdf?arnumber=10182095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T13:24:47Z","timestamp":1689859487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10182095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":72,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10182095","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}