{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T13:28:34Z","timestamp":1650547714823},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,5,23]],"date-time":"2017-05-23T00:00:00Z","timestamp":1495497600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Minds & Machines"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11023-017-9436-3","type":"journal-article","created":{"date-parts":[[2017,5,23]],"date-time":"2017-05-23T00:53:40Z","timestamp":1495500820000},"page":"265-268","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cyber Conflicts and Political Power in Information Societies"],"prefix":"10.1007","volume":"27","author":[{"given":"Mariarosaria","family":"Taddeo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,23]]},"reference":[{"issue":"4","key":"9436_CR1","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1080\/15027570.2010.536404","volume":"9","author":"R Dipert","year":"2010","unstructured":"Dipert, R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384\u2013410.","journal-title":"Journal of Military Ethics"},{"issue":"3","key":"9436_CR2","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1177\/0192512106064462","volume":"27","author":"J Eriksson","year":"2006","unstructured":"Eriksson, J., & Giacomello, G. (2006). The information revolution, security, and international relations: (IR)relevant theory? International Political Science Review, 27(3), 221\u2013244. doi:\n 10.1177\/0192512106064462\n \n .","journal-title":"International Political Science Review"},{"issue":"1","key":"9436_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13347-016-0214-6","volume":"29","author":"L Floridi","year":"2016","unstructured":"Floridi, L. (2016). Mature information societies\u2014A matter of expectations. Philosophy & Technology, 29(1), 1\u20134. doi:\n 10.1007\/s13347-016-0214-6\n \n .","journal-title":"Philosophy & Technology"},{"key":"9436_CR4","volume-title":"The ethics of information warfare","year":"2014","unstructured":"Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer."},{"key":"9436_CR5","unstructured":"Freedberg, S. (2014). NATO hews to strategic ambiguity on cyber deterrence.\u00a0\n http:\/\/breakingdefense.com\/2014\/11\/natos-hews-to-strategic-ambiguity-on-cyber-deterrence\/\n \n ."},{"issue":"4","key":"9436_CR6","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1111\/1468-2346.00044","volume":"74","author":"L Freedman","year":"1998","unstructured":"Freedman, L. (1998). Military power and political influence. International Affairs, 74(4), 763\u2013780. doi:\n 10.1111\/1468-2346.00044\n \n .","journal-title":"International Affairs"},{"issue":"1","key":"9436_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/01402398408437174","volume":"7","author":"CS Gray","year":"1984","unstructured":"Gray, C. S. (1984). War-fighting for deterrence. Journal of Strategic Studies, 7(1), 5\u201328. doi:\n 10.1080\/01402398408437174\n \n .","journal-title":"Journal of Strategic Studies"},{"key":"9436_CR8","unstructured":"International Security Advisory Board. (2014). A framework for international cyber stability. United States Department of State. \n http:\/\/goo.gl\/azdM0B\n \n ."},{"key":"9436_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-017-0252-8","author":"DJ Lonsdale","year":"2017","unstructured":"Lonsdale, D. J. (2017). Warfighting for cyber deterrence: A strategic and moral imperative. Philosophy & Technology. doi:\n 10.1007\/s13347-017-0252-8\n \n .","journal-title":"Philosophy & Technology"},{"key":"9436_CR10","volume-title":"Soft power: The means to success in world politics","author":"JS Nye","year":"2004","unstructured":"Nye, J. S. (2004). Soft power: The means to success in world politics (1st ed.). New York: Public Affairs.","edition":"1"},{"key":"9436_CR11","unstructured":"Nye, J. (2010). Cyber power. Boston, MA: Harvard Kennedy School, Belfer Center for Science and International Affairs. \n http:\/\/www.belfercenter.org\/sites\/default\/files\/legacy\/files\/cyber-power.pdf\n \n ."},{"issue":"1","key":"9436_CR12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s13347-011-0040-9","volume":"25","author":"M Taddeo","year":"2012","unstructured":"Taddeo, M. (2012). Information warfare: A philosophical perspective. Philosophy and Technology, 25(1), 105\u2013120.","journal-title":"Philosophy and Technology"},{"key":"9436_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11245-014-9245-8","author":"M Taddeo","year":"2014","unstructured":"Taddeo, M. (2014a). Just information warfare. Topoi. doi:\n 10.1007\/s11245-014-9245-8\n \n .","journal-title":"Topoi"},{"key":"9436_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-014-9586-0","author":"M Taddeo","year":"2014","unstructured":"Taddeo, M. (2014b). The struggle between liberties and authorities in the information age. Science and Engineering Ethics. doi:\n 10.1007\/s11948-014-9586-0\n \n .","journal-title":"Science and Engineering Ethics"},{"issue":"4","key":"9436_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11023-016-9408-z","volume":"26","author":"M Taddeo","year":"2016","unstructured":"Taddeo, M. (2016). On the risks of relying on analogies to understand cyber conflicts. Minds and Machines, 26(4), 317\u2013321. doi:\n 10.1007\/s11023-016-9408-z\n \n .","journal-title":"Minds and Machines"},{"key":"9436_CR16","unstructured":"UK Government. (2014). Deterrence in the twenty-first century: Government response to the committee\u2019s eleventh report. \n http:\/\/www.publications.parliament.uk\/pa\/cm201415\/cmselect\/cmdfence\/525\/52504.htm\n \n ."},{"key":"9436_CR17","unstructured":"UN Institute for Disarmament Research. (2014). Cyber stability seminar 2014: Preventing cyber conflict. \n http:\/\/link.law.upenn.edu\/portal\/UNIDIR-cyber-stability-seminar-2014--preventing\/FegECNo01q0\/\n \n ."},{"key":"9436_CR18","unstructured":"Weber, M. (1947). In A. M. Henderson, & T. Parsons (Eds.), The theory of social and economic organization. New York: Oxford University Press."}],"container-title":["Minds and Machines"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11023-017-9436-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11023-017-9436-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11023-017-9436-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T11:37:05Z","timestamp":1496144225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11023-017-9436-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,23]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9436"],"URL":"https:\/\/doi.org\/10.1007\/s11023-017-9436-3","relation":{},"ISSN":["0924-6495","1572-8641"],"issn-type":[{"value":"0924-6495","type":"print"},{"value":"1572-8641","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,23]]}}}