{"id":"https://openalex.org/W4296502866","doi":"https://doi.org/10.1093/cybsec/tyac012","title":"Is there a cyber security dilemma?","display_name":"Is there a cyber security dilemma?","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4296502866","doi":"https://doi.org/10.1093/cybsec/tyac012"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyac012","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac012","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac012/47918816/tyac012.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac012/47918816/tyac012.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025501060","display_name":"Carly Beckerman","orcid":"https://orcid.org/0000-0001-8088-7956"},"institutions":[{"id":"https://openalex.org/I190082696","display_name":"Durham University","ror":"https://ror.org/01v29qb04","country_code":"GB","type":"education","lineage":["https://openalex.org/I190082696"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Carly E Beckerman","raw_affiliation_strings":["Institute of Hazard, Risk and Resilience, School of Government and International Affairs, Durham University , Al Qasimi Building, Elvet Hill Road, Durham DH1 3TU , UK"],"raw_orcid":"https://orcid.org/0000-0001-8088-7956","affiliations":[{"raw_affiliation_string":"Institute of Hazard, Risk and Resilience, School of Government and International Affairs, Durham University , Al Qasimi Building, Elvet Hill Road, Durham DH1 3TU , UK","institution_ids":["https://openalex.org/I190082696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5025501060"],"corresponding_institution_ids":["https://openalex.org/I190082696"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":6.7003,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.96623889,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.871699869632721},{"id":"https://openalex.org/keywords/security-dilemma","display_name":"Security dilemma","score":0.7602988481521606},{"id":"https://openalex.org/keywords/dilemma","display_name":"Dilemma","score":0.7237777709960938},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.6360626220703125},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.511471152305603},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.5045229196548462},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.5031532645225525},{"id":"https://openalex.org/keywords/competition","display_name":"Competition (biology)","score":0.4358731508255005},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.4327784478664398},{"id":"https://openalex.org/keywords/international-relations","display_name":"International relations","score":0.4135643541812897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3701540231704712},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.33763039112091064},{"id":"https://openalex.org/keywords/positive-economics","display_name":"Positive economics","score":0.3271949291229248},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.28438326716423035},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.2801316976547241},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.21429920196533203},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.19398057460784912},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08883640170097351}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.871699869632721},{"id":"https://openalex.org/C2776836860","wikidata":"https://www.wikidata.org/wiki/Q1543816","display_name":"Security dilemma","level":3,"score":0.7602988481521606},{"id":"https://openalex.org/C2778496695","wikidata":"https://www.wikidata.org/wiki/Q254128","display_name":"Dilemma","level":2,"score":0.7237777709960938},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.6360626220703125},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.511471152305603},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.5045229196548462},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.5031532645225525},{"id":"https://openalex.org/C91306197","wikidata":"https://www.wikidata.org/wiki/Q45767","display_name":"Competition (biology)","level":2,"score":0.4358731508255005},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.4327784478664398},{"id":"https://openalex.org/C34355311","wikidata":"https://www.wikidata.org/wiki/Q166542","display_name":"International relations","level":3,"score":0.4135643541812897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3701540231704712},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.33763039112091064},{"id":"https://openalex.org/C118084267","wikidata":"https://www.wikidata.org/wiki/Q26110","display_name":"Positive economics","level":1,"score":0.3271949291229248},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.28438326716423035},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.2801316976547241},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.21429920196533203},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.19398057460784912},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08883640170097351},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyac012","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac012","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac012/47918816/tyac012.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:dro.dur.ac.uk.OAI2:37008","is_oa":true,"landing_page_url":"http://dro.dur.ac.uk/37008/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196258","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Journal of Cybersecurity, 2022, Vol.8(1), pp.tyac012 [Peer Reviewed Journal]","raw_type":"Article"},{"id":"pmh:oai:durham-repository.worktribe.com:1191498","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1191498","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyac012","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyac012","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/8/1/tyac012/47918816/tyac012.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320310400","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4296502866.pdf","grobid_xml":"https://content.openalex.org/works/W4296502866.grobid-xml"},"referenced_works_count":93,"referenced_works":["https://openalex.org/W55551627","https://openalex.org/W324296779","https://openalex.org/W566626746","https://openalex.org/W594028123","https://openalex.org/W635165375","https://openalex.org/W1127254853","https://openalex.org/W1532819377","https://openalex.org/W1576087156","https://openalex.org/W1634975730","https://openalex.org/W1751863014","https://openalex.org/W1937160595","https://openalex.org/W1952536104","https://openalex.org/W1972332147","https://openalex.org/W1973463496","https://openalex.org/W1973550519","https://openalex.org/W1975972788","https://openalex.org/W1978918752","https://openalex.org/W1982351723","https://openalex.org/W1997987078","https://openalex.org/W2013737776","https://openalex.org/W2020192973","https://openalex.org/W2031550080","https://openalex.org/W2038073945","https://openalex.org/W2049454285","https://openalex.org/W2053545572","https://openalex.org/W2056925564","https://openalex.org/W2060490410","https://openalex.org/W2074548145","https://openalex.org/W2075494186","https://openalex.org/W2093182843","https://openalex.org/W2095547715","https://openalex.org/W2096601805","https://openalex.org/W2109721389","https://openalex.org/W2115574315","https://openalex.org/W2125044185","https://openalex.org/W2146326094","https://openalex.org/W2158943867","https://openalex.org/W2163713221","https://openalex.org/W2171277589","https://openalex.org/W2183505269","https://openalex.org/W2245149091","https://openalex.org/W2323079023","https://openalex.org/W2341205511","https://openalex.org/W2399852725","https://openalex.org/W2495188482","https://openalex.org/W2517418312","https://openalex.org/W2520634895","https://openalex.org/W2584161158","https://openalex.org/W2585166575","https://openalex.org/W2606683559","https://openalex.org/W2767875647","https://openalex.org/W2790427991","https://openalex.org/W2889639812","https://openalex.org/W2911677438","https://openalex.org/W2937619061","https://openalex.org/W2947586196","https://openalex.org/W2951899891","https://openalex.org/W2957573285","https://openalex.org/W2980483863","https://openalex.org/W2980517529","https://openalex.org/W2995133082","https://openalex.org/W3010073352","https://openalex.org/W3013576374","https://openalex.org/W3026631274","https://openalex.org/W3045936019","https://openalex.org/W3107084079","https://openalex.org/W3122923900","https://openalex.org/W3187241870","https://openalex.org/W3194884627","https://openalex.org/W4236791226","https://openalex.org/W4240570384","https://openalex.org/W4245302024","https://openalex.org/W4245861233","https://openalex.org/W4247341265","https://openalex.org/W4247764957","https://openalex.org/W4248658403","https://openalex.org/W4250839026","https://openalex.org/W4296475980","https://openalex.org/W4299620732","https://openalex.org/W4302417921","https://openalex.org/W4367152989","https://openalex.org/W6612589943","https://openalex.org/W6676635435","https://openalex.org/W6726664002","https://openalex.org/W6726967245","https://openalex.org/W6735821406","https://openalex.org/W6745778444","https://openalex.org/W6770049853","https://openalex.org/W6771788285","https://openalex.org/W6798965641","https://openalex.org/W6811643614","https://openalex.org/W6849917537","https://openalex.org/W6852204911"],"related_works":["https://openalex.org/W2388835557","https://openalex.org/W2374270253","https://openalex.org/W2366631176","https://openalex.org/W2078167669","https://openalex.org/W4317178495","https://openalex.org/W2368256804","https://openalex.org/W2898927220","https://openalex.org/W2471800291","https://openalex.org/W2955573148","https://openalex.org/W1995445082"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"recent":[2],"years,":[3],"scholars,":[4],"commentators":[5],"and":[6,61,71,74,82,97,123],"politicians":[7],"have":[8],"discussed":[9],"the":[10,76],"prospect":[11],"of":[12,58],"a":[13,35,45,95,143],"\u2018cyber":[14],"security":[15],"dilemma\u2019.":[16],"If":[17],"states":[18],"race":[19],"to":[20,33,55,67,93,110],"develop":[21],"superior":[22],"cyberattacks,":[23],"how":[24],"far":[25],"might":[26],"this":[27],"escalate?":[28],"Are":[29],"state-led":[30],"cyberattacks":[31],"likely":[32],"provoke":[34],"full":[36],"war?":[37],"To":[38],"address":[39],"these":[40],"related":[41],"questions,":[42],"I":[43],"apply":[44],"multi-level":[46],"Neoclassical":[47],"Realist":[48],"framework":[49,89],"that":[50,129],"progresses":[51],"from":[52,105],"systemic":[53,96],"logic":[54],"an":[56],"assessment":[57],"leader":[59],"cues":[60],"cognition.":[62],"This":[63],"contributes":[64],"much-needed":[65],"coherence":[66],"debates":[68],"about":[69],"escalation":[70,104,149],"cyber":[72,130],"warfare":[73,112,131],"demonstrates":[75],"framework\u2019s":[77],"utility":[78],"for":[79,125],"addressing":[80],"contemporary":[81],"evolving":[83],"problems":[84],"in":[85,108,128,142],"international":[86],"affairs.":[87],"The":[88],"reveals":[90],"that,":[91],"according":[92],"both":[94],"societal":[98],"cue":[99],"analysis,":[100],"fears":[101],"regarding":[102],"unchecked":[103],"state":[106],"competition":[107],"cyberspace":[109],"kinetic":[111],"are":[113],"largely":[114],"unfounded.":[115],"Nevertheless,":[116],"it":[117],"also":[118],"points":[119],"toward":[120],"one":[121],"caveat":[122],"direction":[124],"further":[126],"research":[127],"directed":[132],"at":[133],"foreign":[134],"leaders\u2019":[135],"political":[136],"survival":[137],"may":[138],"be":[139],"unexpectedly":[140],"provocative":[141],"way":[144],"not":[145],"currently":[146],"addressed":[147],"by":[148],"models.":[150]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
