{"id":"https://openalex.org/W3149265432","doi":"https://doi.org/10.1093/cybsec/tyab010","title":"Private active cyber defense and (international) cyber security\u2014pushing the line?","display_name":"Private active cyber defense and (international) cyber security\u2014pushing the line?","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3149265432","doi":"https://doi.org/10.1093/cybsec/tyab010","mag":"3149265432"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyab010","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyab010","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyab010/37019168/tyab010.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyab010/37019168/tyab010.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059361701","display_name":"Dennis Broeders","orcid":"https://orcid.org/0000-0002-8827-2814"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]},{"id":"https://openalex.org/I2801375708","display_name":"Hague Institute for Global Justice","ror":"https://ror.org/0363anr51","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I2801375708"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Dennis Broeders","raw_affiliation_strings":["The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-8827-2814","affiliations":[{"raw_affiliation_string":"The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5059361701"],"corresponding_institution_ids":["https://openalex.org/I121797337","https://openalex.org/I2801375708"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":11.7317,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.98107624,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/legitimacy","display_name":"Legitimacy","score":0.6752145886421204},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4954296350479126},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.46840140223503113},{"id":"https://openalex.org/keywords/international-security","display_name":"International security","score":0.4673481583595276},{"id":"https://openalex.org/keywords/private-sector","display_name":"Private sector","score":0.45418843626976013},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4439062178134918},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.418617308139801},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.41664227843284607},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3973260223865509},{"id":"https://openalex.org/keywords/public-administration","display_name":"Public administration","score":0.38076481223106384},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3275769352912903},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.32616788148880005},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.2641987204551697},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.14866194128990173},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.10088688135147095}],"concepts":[{"id":"https://openalex.org/C46295352","wikidata":"https://www.wikidata.org/wiki/Q207982","display_name":"Legitimacy","level":3,"score":0.6752145886421204},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4954296350479126},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.46840140223503113},{"id":"https://openalex.org/C509929229","wikidata":"https://www.wikidata.org/wiki/Q3312693","display_name":"International security","level":2,"score":0.4673481583595276},{"id":"https://openalex.org/C121426985","wikidata":"https://www.wikidata.org/wiki/Q591763","display_name":"Private sector","level":2,"score":0.45418843626976013},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4439062178134918},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.418617308139801},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.41664227843284607},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3973260223865509},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.38076481223106384},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3275769352912903},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.32616788148880005},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.2641987204551697},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.14866194128990173},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.10088688135147095},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyab010","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyab010","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyab010/37019168/tyab010.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:scholarlypublications.universiteitleiden.nl:item_3249231","is_oa":false,"landing_page_url":"https://hdl.handle.net/1887/3249231","pdf_url":null,"source":{"id":"https://openalex.org/S4306400850","display_name":"Leiden Repository (Leiden University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121797337","host_organization_name":"Leiden University","host_organization_lineage":["https://openalex.org/I121797337"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity","raw_type":"Article / Letter to editor"},{"id":"pmh:ul:oai:scholarlypublications.universiteitleiden.nl:item_3249231","is_oa":true,"landing_page_url":"http://hdl.handle.net/1887/3249231","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity, 7(1), 1 - 14. Oxford University Press (OUP)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyab010","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyab010","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyab010/37019168/tyab010.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320324643","display_name":"Ministerie van Buitenlandse Zaken","ror":"https://ror.org/03rx2ty86"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3149265432.pdf","grobid_xml":"https://content.openalex.org/works/W3149265432.grobid-xml"},"referenced_works_count":62,"referenced_works":["https://openalex.org/W41454962","https://openalex.org/W86883428","https://openalex.org/W265253114","https://openalex.org/W610157666","https://openalex.org/W1038055200","https://openalex.org/W1512326166","https://openalex.org/W1694692804","https://openalex.org/W1901542899","https://openalex.org/W1976892625","https://openalex.org/W1988514033","https://openalex.org/W2002338014","https://openalex.org/W2022183040","https://openalex.org/W2037345444","https://openalex.org/W2040040817","https://openalex.org/W2063484152","https://openalex.org/W2076228232","https://openalex.org/W2083268155","https://openalex.org/W2097306011","https://openalex.org/W2099809745","https://openalex.org/W2104239226","https://openalex.org/W2125094572","https://openalex.org/W2153594315","https://openalex.org/W2230817826","https://openalex.org/W2479458580","https://openalex.org/W2487305077","https://openalex.org/W2503231225","https://openalex.org/W2514885554","https://openalex.org/W2530381823","https://openalex.org/W2537330718","https://openalex.org/W2554524225","https://openalex.org/W2561096337","https://openalex.org/W2573760321","https://openalex.org/W2602213083","https://openalex.org/W2736979597","https://openalex.org/W2752551227","https://openalex.org/W2753741883","https://openalex.org/W2776474406","https://openalex.org/W2798739120","https://openalex.org/W2800071259","https://openalex.org/W2808359090","https://openalex.org/W2894836300","https://openalex.org/W2915940840","https://openalex.org/W2921574544","https://openalex.org/W2927957392","https://openalex.org/W2963118802","https://openalex.org/W2974342567","https://openalex.org/W2980125160","https://openalex.org/W2995951208","https://openalex.org/W3034673956","https://openalex.org/W3038662273","https://openalex.org/W3081600542","https://openalex.org/W3119087925","https://openalex.org/W3123490911","https://openalex.org/W3125804149","https://openalex.org/W3127245530","https://openalex.org/W4234500067","https://openalex.org/W4235691474","https://openalex.org/W4250763933","https://openalex.org/W4285719527","https://openalex.org/W4298547684","https://openalex.org/W4302780024","https://openalex.org/W6781970470"],"related_works":["https://openalex.org/W2796452908","https://openalex.org/W2804734454","https://openalex.org/W2376700875","https://openalex.org/W4206588215","https://openalex.org/W3174083885","https://openalex.org/W2968672613","https://openalex.org/W2325407422","https://openalex.org/W3044657763","https://openalex.org/W2388185663","https://openalex.org/W579898874"],"abstract_inverted_index":{"Abstract":[0],"Private":[1],"sector":[2],"Active":[3],"Cyber":[4],"Defence":[5],"(ACD)":[6],"lies":[7],"on":[8,63,157],"the":[9,24,32,42,131,140,159,170,188],"intersection":[10],"of":[11,28,46,58,74,79,125,134,142,148],"domestic":[12,160,202],"security":[13,16,49,87,115,136,161,172],"and":[14,17,44,51,61,70,101,127,138,192,201,217,230],"international":[15,171,215],"is":[18,208,222],"a":[19,56,120,154,179,195],"recurring":[20],"subject,":[21],"often":[22],"under":[23],"more":[25,54],"provocative":[26,231],"flag":[27],"\u2018hack":[29],"back\u2019,":[30],"in":[31,53,83],"American":[33,104],"debate":[34],"about":[35],"cyber":[36,48,81,86,151,184],"security.":[37],"This":[38],"article":[39],"looks":[40],"at":[41],"theory":[43],"practice":[45],"private":[47,85,149],"provision":[50],"analyses":[52],"detail":[55],"number":[57],"recent":[59],"reports":[60,213],"publications":[62],"ACD":[64],"by":[65],"Washington":[66],"DC":[67],"based":[68],"commissions":[69],"think":[71],"tanks.":[72],"Many":[73],"these":[75,212],"propose":[76],"legalizing":[77],"forms":[78],"active":[80,150,183],"defence,":[82,185],"which":[84],"companies":[88],"would":[89],"be":[90,224],"allowed":[91],"to":[92,118,167,177,187,197,236],"operate":[93],"beyond":[94,103],"their":[95,98,143],"own,":[96],"or":[97],"clients\u2019":[99],"networks,":[100],"push":[102],"law":[105],"as":[106,194,227],"it":[107],"currently":[108],"stands.":[109],"Generally,":[110],"public-private":[111],"governance":[112],"solutions":[113,137],"for":[114,182],"problems":[116],"have":[117],"manage":[119],"balance":[121,198],"between":[122],"(i)":[123],"questions":[124],"capacity":[126],"assigning":[128],"responsibilities,":[129],"(ii)":[130],"political":[132,203,218],"legitimacy":[133],"public\u2013private":[135],"(iii)":[139],"mitigation":[141],"external":[144],"effects.":[145],"The":[146,174],"case":[147],"defence":[152],"reveals":[153],"strong":[155],"emphasis":[156],"addressing":[158],"(and":[162],"political)":[163],"problem,":[164],"while":[165],"failing":[166],"convincingly":[168],"address":[169],"problems.":[173],"proposals":[175],"aim":[176],"create":[178],"legitimate":[180],"market":[181],"anchored":[186],"state":[189],"through":[190],"regulation":[191],"certification":[193],"way":[196],"capacity,":[199],"responsibilities":[200],"legitimacy.":[204],"A":[205],"major":[206],"problem":[207],"that":[209],"even":[210],"though":[211],"anticipate":[214],"repercussions":[216],"pushback,":[219],"against":[220],"what":[221],"likely":[223],"received":[225],"internationally":[226],"an":[228],"escalatory":[229],"policy,":[232],"they":[233],"offer":[234],"little":[235],"mitigate":[237],"it.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
