{"id":"https://openalex.org/W4210283038","doi":"https://doi.org/10.1093/cybsec/tyac001","title":"Overcoming information-sharing challenges in cyber defence exercises","display_name":"Overcoming information-sharing challenges in cyber defence exercises","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4210283038","doi":"https://doi.org/10.1093/cybsec/tyac001"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyac001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac001/42321122/tyac001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac001/42321122/tyac001.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068836405","display_name":"Agn\u0117 Brilingait\u0117","orcid":"https://orcid.org/0000-0001-9768-4258"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]},{"id":"https://openalex.org/I4210087704","display_name":"Vilnius University of Applied Sciences","ror":"https://ror.org/004gnah66","country_code":"LT","type":"education","lineage":["https://openalex.org/I4210087704"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"Agn\u0117 Brilingait\u0117","raw_affiliation_strings":["Institute of Computer Science, Vilnius University , Didlaukio str. 47, LT-08303 Vilnius , Lithuania","Institute of Computer Science, Vilnius University, Didlaukio str. 47, LT-08303 Vilnius, Lithuania and"],"raw_orcid":"https://orcid.org/0000-0001-9768-4258","affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Vilnius University , Didlaukio str. 47, LT-08303 Vilnius , Lithuania","institution_ids":["https://openalex.org/I173212132","https://openalex.org/I4210087704"]},{"raw_affiliation_string":"Institute of Computer Science, Vilnius University, Didlaukio str. 47, LT-08303 Vilnius, Lithuania and","institution_ids":["https://openalex.org/I173212132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054840982","display_name":"Benjamin P. Linas","orcid":"https://orcid.org/0000-0002-9781-9690"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]},{"id":"https://openalex.org/I4210087704","display_name":"Vilnius University of Applied Sciences","ror":"https://ror.org/004gnah66","country_code":"LT","type":"education","lineage":["https://openalex.org/I4210087704"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Linas Bukauskas","raw_affiliation_strings":["Institute of Computer Science, Vilnius University , Didlaukio str. 47, LT-08303 Vilnius , Lithuania","Institute of Computer Science, Vilnius University, Didlaukio str. 47, LT-08303 Vilnius, Lithuania and"],"raw_orcid":"https://orcid.org/0000-0002-9781-9690","affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Vilnius University , Didlaukio str. 47, LT-08303 Vilnius , Lithuania","institution_ids":["https://openalex.org/I173212132","https://openalex.org/I4210087704"]},{"raw_affiliation_string":"Institute of Computer Science, Vilnius University, Didlaukio str. 47, LT-08303 Vilnius, Lithuania and","institution_ids":["https://openalex.org/I173212132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090603033","display_name":"Au\u0161rius Juozapavi\u010dius","orcid":"https://orcid.org/0000-0002-8852-8605"},"institutions":[{"id":"https://openalex.org/I4210138806","display_name":"General Jonas \u017demaitis Military Academy of Lithuania","ror":"https://ror.org/048m2aa35","country_code":"LT","type":"government","lineage":["https://openalex.org/I4210138806"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Au\u0161rius Juozapavi\u010dius","raw_affiliation_strings":["General Jonas \u017demaitis Military Academy of Lithuania , \u0160ilo g. 5A., LT-10322 Vilnius , Lithuania"],"raw_orcid":"https://orcid.org/0000-0002-8852-8605","affiliations":[{"raw_affiliation_string":"General Jonas \u017demaitis Military Academy of Lithuania , \u0160ilo g. 5A., LT-10322 Vilnius , Lithuania","institution_ids":["https://openalex.org/I4210138806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091555903","display_name":"Eduardas Kutka","orcid":"https://orcid.org/0000-0002-4817-2202"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]},{"id":"https://openalex.org/I4210087704","display_name":"Vilnius University of Applied Sciences","ror":"https://ror.org/004gnah66","country_code":"LT","type":"education","lineage":["https://openalex.org/I4210087704"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Eduardas Kutka","raw_affiliation_strings":["Institute of Computer Science, Vilnius University , Didlaukio str. 47, LT-08303 Vilnius , Lithuania","Institute of Computer Science, Vilnius University, Didlaukio str. 47, LT-08303 Vilnius, Lithuania and"],"raw_orcid":"https://orcid.org/0000-0002-4817-2202","affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Vilnius University , Didlaukio str. 47, LT-08303 Vilnius , Lithuania","institution_ids":["https://openalex.org/I173212132","https://openalex.org/I4210087704"]},{"raw_affiliation_string":"Institute of Computer Science, Vilnius University, Didlaukio str. 47, LT-08303 Vilnius, Lithuania and","institution_ids":["https://openalex.org/I173212132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068836405"],"corresponding_institution_ids":["https://openalex.org/I173212132","https://openalex.org/I4210087704"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":4.4664,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.94824154,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.6552059054374695},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.5629668831825256},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5328844785690308},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.532416820526123},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.45999109745025635},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4595367908477783},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4533977508544922},{"id":"https://openalex.org/keywords/business-intelligence","display_name":"Business intelligence","score":0.43618154525756836},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4117797017097473},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38560715317726135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2759692668914795},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1911521553993225}],"concepts":[{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.6552059054374695},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.5629668831825256},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5328844785690308},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.532416820526123},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.45999109745025635},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4595367908477783},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4533977508544922},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.43618154525756836},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4117797017097473},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38560715317726135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2759692668914795},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1911521553993225},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyac001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac001/42321122/tyac001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:lka.lt:elaba:118340186","is_oa":true,"landing_page_url":"https://vb.lka.lt/LKA:ELABAPDB118340186&prefLang=en_US","pdf_url":null,"source":{"id":"https://openalex.org/S7407055230","display_name":"General Jonas \u017demaitis Military Academy of Lithuania","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"eISSN 2057-2093","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyac001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac001/42321122/tyac001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4210283038.pdf","grobid_xml":"https://content.openalex.org/works/W4210283038.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1999627326","https://openalex.org/W2014316112","https://openalex.org/W2014653722","https://openalex.org/W2087704912","https://openalex.org/W2101194406","https://openalex.org/W2132929535","https://openalex.org/W2339166448","https://openalex.org/W2533698187","https://openalex.org/W2536903920","https://openalex.org/W2782588388","https://openalex.org/W2793402936","https://openalex.org/W2806206692","https://openalex.org/W2909889155","https://openalex.org/W2938311699","https://openalex.org/W2967121092","https://openalex.org/W2971748108","https://openalex.org/W3006161904","https://openalex.org/W3125554828","https://openalex.org/W3186276894","https://openalex.org/W3199807465","https://openalex.org/W3202636126","https://openalex.org/W4225941037","https://openalex.org/W4251374861","https://openalex.org/W6729924296","https://openalex.org/W6750076101","https://openalex.org/W6766102087","https://openalex.org/W6780873544","https://openalex.org/W6796762908","https://openalex.org/W6798681010","https://openalex.org/W6801119404","https://openalex.org/W6810633315"],"related_works":["https://openalex.org/W4226389227","https://openalex.org/W68680640","https://openalex.org/W3128548422","https://openalex.org/W2800663994","https://openalex.org/W3046131361","https://openalex.org/W377587031","https://openalex.org/W2509069575","https://openalex.org/W2008550234","https://openalex.org/W2281032329","https://openalex.org/W2613169604"],"abstract_inverted_index":{"Abstract":[0],"Active":[1],"usage":[2],"of":[3,57,86,116,123,160,165],"threat":[4,16,26,39,107],"intelligence":[5,27],"information":[6,72,100,108],"supports":[7],"effective":[8],"prevention,":[9],"mitigation":[10],"and":[11,45,69,79,95,119,144],"defence":[12,128],"against":[13],"cyberattacks":[14],"by":[15,110],"actors":[17],"ranging":[18],"from":[19],"individual":[20],"amateurs":[21],"to":[22,34,66,105,141],"state":[23],"organizations.":[24],"However,":[25],"highly":[28,161],"depends":[29],"on":[30,38,112],"security":[31],"specialists\u2019":[32],"ability":[33],"share":[35],"incident":[36],"data":[37],"information-sharing":[40,50],"platforms.":[41],"Unfortunately,":[42],"business":[43],"managers":[44],"educational":[46,114],"institutions":[47,78],"undervalue":[48],"the":[49,54,80,84,87,113,117,121,158,166],"aspect":[51,115],"when":[52],"planning":[53],"professional":[55],"development":[56,159],"cybersecurity-related":[58],"specialists.":[59,168],"Consequently,":[60],"cybersecurity":[61,124],"specialists":[62,125],"are":[63],"insufficiently":[64],"motivated":[65],"correctly":[67],"communicate":[68],"propagate":[70],"relevant":[71,77,142],"with":[73],"team":[74],"members,":[75],"superiors,":[76],"global":[81],"community":[82],"about":[83],"impact":[85],"incident.":[88],"Literature":[89],"review":[90],"reveals":[91],"many":[92],"technological,":[93],"legal":[94],"psychological":[96],"obstacles":[97],"hindering":[98],"successful":[99],"exchange.":[101],"This":[102],"research":[103],"aims":[104],"improve":[106,157],"sharing":[109],"focusing":[111],"problem":[118],"analysing":[120],"attitude":[122],"during":[126],"cyber":[127],"exercises":[129],"(CDX).":[130],"Our":[131],"case":[132],"study":[133],"disclosed":[134],"nine":[135],"factors":[136],"obstructing":[137],"both":[138],"proper":[139],"reporting":[140],"authorities":[143],"adequate":[145],"communication":[146],"among":[147],"teams.":[148],"By":[149],"addressing":[150],"these":[151],"factors,":[152],"CDX":[153],"organizers":[154],"could":[155],"substantially":[156],"beneficial":[162],"soft":[163],"skills":[164],"technical":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
