{"id":"https://openalex.org/W4411884073","doi":"https://doi.org/10.1093/cybsec/tyaf014","title":"Peer(ing) pressure: a cybersecurity intervention at global scale in the internet infrastructure","display_name":"Peer(ing) pressure: a cybersecurity intervention at global scale in the internet infrastructure","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411884073","doi":"https://doi.org/10.1093/cybsec/tyaf014"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf014","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf014","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf014/63635986/tyaf014.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf014/63635986/tyaf014.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032343519","display_name":"Ben Collier","orcid":"https://orcid.org/0000-0002-9207-3068"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ben Collier","raw_affiliation_strings":["School of Social and Political Science, University of Edinburgh , Edinburgh EH8 9LD ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Social and Political Science, University of Edinburgh , Edinburgh EH8 9LD ,","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090866479","display_name":"Richard Clayton","orcid":"https://orcid.org/0000-0002-1673-918X"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Richard Clayton","raw_affiliation_strings":["University of Cambridge Department of Computer Science and Technology, , Cambridge CB3 0FD ,"],"raw_orcid":"https://orcid.org/0000-0002-1673-918X","affiliations":[{"raw_affiliation_string":"University of Cambridge Department of Computer Science and Technology, , Cambridge CB3 0FD ,","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032343519"],"corresponding_institution_ids":["https://openalex.org/I98677209"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21465905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6911698579788208},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6911453008651733},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.5933331251144409},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.569648802280426},{"id":"https://openalex.org/keywords/peer-pressure","display_name":"Peer pressure","score":0.554054856300354},{"id":"https://openalex.org/keywords/intervention","display_name":"Intervention (counseling)","score":0.522402286529541},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.33064091205596924},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.327629029750824},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.23082494735717773},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22053897380828857},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18970927596092224},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08629840612411499},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.05723994970321655}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6911698579788208},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6911453008651733},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.5933331251144409},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.569648802280426},{"id":"https://openalex.org/C2778722457","wikidata":"https://www.wikidata.org/wiki/Q784843","display_name":"Peer pressure","level":2,"score":0.554054856300354},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.522402286529541},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33064091205596924},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.327629029750824},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.23082494735717773},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22053897380828857},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18970927596092224},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08629840612411499},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.05723994970321655},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1093/cybsec/tyaf014","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf014","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf014/63635986/tyaf014.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/423136db-1a77-4fd7-8ae6-a6a6308f917d","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/423136db-1a77-4fd7-8ae6-a6a6308f917d","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Collier, B & Clayton, R 2025, 'Peer(ing) pressure : A cybersecurity intervention at global scale in the internet infrastructure', Journal of Cybersecurity, vol. 11, no. 1, tyaf014, pp. 1-14. https://doi.org/10.1093/cybsec/tyaf014","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:www.repository.cam.ac.uk:1810/386299","is_oa":true,"landing_page_url":"https://www.repository.cam.ac.uk/handle/1810/386299","pdf_url":"https://www.repository.cam.ac.uk/bitstreams/2a3c75bf-17b5-474d-892a-f8120f9c36e5/download","source":{"id":"https://openalex.org/S4306401777","display_name":"Apollo (University of Cambridge)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I241749","host_organization_name":"University of Cambridge","host_organization_lineage":["https://openalex.org/I241749"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"pmh:oai:www.repository.cam.ac.uk:1810/393095","is_oa":true,"landing_page_url":"https://www.repository.cam.ac.uk/handle/1810/393095","pdf_url":"https://www.repository.cam.ac.uk/bitstreams/233922cf-d9d8-4dc2-8121-23c0c0ab0e9d/download","source":{"id":"https://openalex.org/S4306401777","display_name":"Apollo (University of Cambridge)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I241749","host_organization_name":"University of Cambridge","host_organization_lineage":["https://openalex.org/I241749"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf014","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf014","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf014/63635986/tyaf014.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4333624210","display_name":"Interdisciplinary Cybercrime Project","funder_award_id":"949127","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7216002587","display_name":"Interdisciplinary Cybercrime Project","funder_award_id":"949127","funder_id":"https://openalex.org/F4320338335","funder_display_name":"H2020 European Research Council"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338335","display_name":"H2020 European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411884073.pdf","grobid_xml":"https://content.openalex.org/works/W4411884073.grobid-xml"},"referenced_works_count":62,"referenced_works":["https://openalex.org/W19158771","https://openalex.org/W89759755","https://openalex.org/W565671073","https://openalex.org/W748515386","https://openalex.org/W853235286","https://openalex.org/W1409078845","https://openalex.org/W1483280370","https://openalex.org/W1491727209","https://openalex.org/W1497461884","https://openalex.org/W1602366767","https://openalex.org/W1867219652","https://openalex.org/W2010533232","https://openalex.org/W2062493711","https://openalex.org/W2072402190","https://openalex.org/W2096129883","https://openalex.org/W2115755437","https://openalex.org/W2117175761","https://openalex.org/W2118991768","https://openalex.org/W2124990143","https://openalex.org/W2125639892","https://openalex.org/W2138696332","https://openalex.org/W2144096866","https://openalex.org/W2159256070","https://openalex.org/W2162668912","https://openalex.org/W2187045733","https://openalex.org/W2516979842","https://openalex.org/W2548400217","https://openalex.org/W2755335618","https://openalex.org/W2775614740","https://openalex.org/W2898094482","https://openalex.org/W2958431678","https://openalex.org/W2980771234","https://openalex.org/W2982931589","https://openalex.org/W3123534837","https://openalex.org/W3153386074","https://openalex.org/W3156488270","https://openalex.org/W3181408999","https://openalex.org/W4206993414","https://openalex.org/W4207030330","https://openalex.org/W4233216911","https://openalex.org/W4233654598","https://openalex.org/W4236465075","https://openalex.org/W4249529812","https://openalex.org/W4409720128","https://openalex.org/W6603627386","https://openalex.org/W6607843958","https://openalex.org/W6623662064","https://openalex.org/W6628063087","https://openalex.org/W6629340792","https://openalex.org/W6632833816","https://openalex.org/W6668876004","https://openalex.org/W6677491957","https://openalex.org/W6680412389","https://openalex.org/W6713862088","https://openalex.org/W6728962227","https://openalex.org/W6733222909","https://openalex.org/W6761598508","https://openalex.org/W6769497545","https://openalex.org/W6797751852","https://openalex.org/W6804830147","https://openalex.org/W6840416690","https://openalex.org/W7046723985"],"related_works":["https://openalex.org/W2116677179","https://openalex.org/W2065457896","https://openalex.org/W3173234801","https://openalex.org/W2167984027","https://openalex.org/W3021302227","https://openalex.org/W10630519","https://openalex.org/W1919377569","https://openalex.org/W3144288563","https://openalex.org/W3123907821","https://openalex.org/W2382319620"],"abstract_inverted_index":{"Abstract":[0],"We":[1,35,100,137],"evaluate":[2],"a":[3,93,124,150],"rare":[4],"successful":[5],"intervention":[6],"in":[7,65,88],"the":[8,26,37,66,73,111,119,135,166],"management":[9],"of":[10,46,113,123,127,153,168],"Internet":[11],"infrastructure\u2014an":[12],"anti-spoofing":[13],"campaign,":[14],"which":[15,41],"has":[16,24,69],"achieved":[17],"genuine":[18],"traction":[19],"against":[20,79,165],"an":[21],"issue":[22,112],"that":[23],"dogged":[25],"network":[27],"engineering":[28],"community":[29,94,126],"for":[30,56],"more":[31],"than":[32],"30":[33],"years.":[34],"study":[36],"Traceback":[38],"initiative\u2014an":[39],"intervention,":[40],"sought":[42,70],"to":[43,58,71,85,96,133,146,161],"tackle":[44],"Denial":[45],"Service":[47],"attacks":[48],"at":[49],"global":[50],"scale":[51],"by":[52],"making":[53],"it":[54],"harder":[55],"attackers":[57],"spoof":[59],"their":[60],"traffic.":[61],"While":[62],"much":[63],"scholarship":[64],"security":[67],"literature":[68],"establish":[72],"perverse":[74],"commercial":[75,120],"incentives":[76],"frustrating":[77],"action":[78],"cybercrime":[80,147],"and":[81,104],"identify":[82],"possible":[83],"ways":[84],"alter":[86],"these,":[87],"this":[89],"case":[90],"we":[91],"observe":[92],"acting":[95],"short-circuit":[97],"them":[98],"entirely.":[99],"show,":[101],"through":[102],"interviews":[103],"autoethnographic":[105],"reflection":[106],"from":[107,118,143],"key":[108],"players,":[109],"how":[110,154],"spoofing":[114],"was":[115],"relocated":[116],"away":[117],"incentive":[121],"structures":[122],"decentralized":[125],"competing":[128],"providers":[129],"with":[130],"little":[131],"motivation":[132],"solve":[134],"issue.":[136],"develop":[138],"previous":[139],"work":[140],"applying":[141],"theory":[142],"infrastructure":[144,160],"studies":[145],"economies,":[148],"developing":[149],"new":[151],"account":[152],"power":[155],"can":[156],"be":[157],"asserted":[158],"within":[159],"achieve":[162],"change,":[163],"apparently":[164],"grain":[167],"other":[169],"long-standing":[170],"incentives.":[171]},"counts_by_year":[],"updated_date":"2026-05-17T08:19:37.847499","created_date":"2025-10-10T00:00:00"}
