See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
Gjesvik, L. (2018) ‘China's notion of cybersecurity: the importance of strategic cultures for cyber deterrence’, Proceedings of the European Conference on Cyberwarfare and Security, June 2018, pp.174–80, available at http://www.academic-bookshop.com/ourshop/prod_6457309-ECCWS-2018-PDF-Proceedings-of-the-17th-European-Conference-on-Cyber-Warfare-and-Security.html (accessed May 2020).
Knight, W., 2020 ‘The value and ethics of using phone data to monitor COVID-19‘, Wired, 18 March, available at https://www.wired.com/story/value-ethics-using-phone-data-monitor-covid-19/ (accessed May 2020).
Kosseff, J. (2018) ‘Defining cybersecurity law’, Iowa Law Review, 103, 985, pp.985–1032.
Libicki, M. (2016) Cyberspace in Peace and War, Naval Institute Press, Annapolis MD.
Perkovich, G. and Levite, A. (eds) (2017) Understanding Cyber Conflict: Fourteen Analogies, Georgetown University Press, Washington DC.
Segal, A. (2017) ‘Bridging the cyberspace gap: Washington and Silicon Valley’, Prism, 7, 2, pp.66–77.
Taddeo, M. and Floridi, L. (2015) ‘The debate on the moral responsibilities of online service providers’, Science and Engineering Ethics, 22, 6, pp.1575–1603.
Taddeo, M., McCutcheon, T. and Floridi, L. (2019) ‘Trusting artificial intelligence in cybersecurity is a double-edged sword’, Nature Machine Intelligence, 1, pp.557–66.
Vallor, S. (2017) ‘Robots with guns’ in Pitt, J. and Shew, A. (eds) Spaces for the Future: A Companion to the Philosophy of Technology, Routledge, New York, pp.73–81.