{"id":"https://openalex.org/W7128184655","doi":"https://doi.org/10.1093/cybsec/tyaf017","title":"Cybersecurity of weapon systems: international law requirements and technical standards","display_name":"Cybersecurity of weapon systems: international law requirements and technical standards","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7128184655","doi":"https://doi.org/10.1093/cybsec/tyaf017"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf017","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf017","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyaf017","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013720716","display_name":"Aleksi Kajander","orcid":"https://orcid.org/0000-0001-7164-2973"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]},{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Aleksi Kajander","raw_affiliation_strings":["Law Branch, NATO Cooperative Cyber Defence Centre of Excellence , 10132 Tallinn ,","Tallinn University of Technology Department of Law, , 12616 Tallinn ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Law Branch, NATO Cooperative Cyber Defence Centre of Excellence , 10132 Tallinn ,","institution_ids":["https://openalex.org/I2802296436"]},{"raw_affiliation_string":"Tallinn University of Technology Department of Law, , 12616 Tallinn ,","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020137184","display_name":"Rain Liivoja","orcid":"https://orcid.org/0000-0002-0226-0936"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rain Liivoja","raw_affiliation_strings":["School of Law, University of Queensland , Brisbane QLD 4072 ,"],"raw_orcid":"https://orcid.org/0000-0002-0226-0936","affiliations":[{"raw_affiliation_string":"School of Law, University of Queensland , Brisbane QLD 4072 ,","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083304301","display_name":"Maarja Naagel","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127609","display_name":"Ministry of Social Affairs","ror":"https://ror.org/02yx0ge43","country_code":"EE","type":"government","lineage":["https://openalex.org/I4210127609"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Maarja Naagel","raw_affiliation_strings":["Estonian Ministry of Foreign Affairs International Law Division, Legal Department, , 15049 Tallinn ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Estonian Ministry of Foreign Affairs International Law Division, Legal Department, , 15049 Tallinn ,","institution_ids":["https://openalex.org/I4210127609"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013720716"],"corresponding_institution_ids":["https://openalex.org/I111112146","https://openalex.org/I2802296436"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":7.4099,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.97518409,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.609499990940094,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.609499990940094,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14086","display_name":"Military and Defense Studies","score":0.035599999129772186,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.020800000056624413,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obligation","display_name":"Obligation","score":0.7644000053405762},{"id":"https://openalex.org/keywords/battlefield","display_name":"Battlefield","score":0.576200008392334},{"id":"https://openalex.org/keywords/international-law","display_name":"International law","score":0.47350001335144043},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.45350000262260437},{"id":"https://openalex.org/keywords/international-humanitarian-law","display_name":"International humanitarian law","score":0.430400013923645},{"id":"https://openalex.org/keywords/nuclear-weapon","display_name":"Nuclear weapon","score":0.3711000084877014},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.36169999837875366},{"id":"https://openalex.org/keywords/weapon-system","display_name":"Weapon system","score":0.3257000148296356}],"concepts":[{"id":"https://openalex.org/C2778447849","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Obligation","level":2,"score":0.7644000053405762},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6733999848365784},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.576200008392334},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.47350001335144043},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.45350000262260437},{"id":"https://openalex.org/C2778573023","wikidata":"https://www.wikidata.org/wiki/Q381148","display_name":"International humanitarian law","level":3,"score":0.430400013923645},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.40529999136924744},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3871999979019165},{"id":"https://openalex.org/C194110935","wikidata":"https://www.wikidata.org/wiki/Q12802","display_name":"Nuclear weapon","level":2,"score":0.3711000084877014},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.36169999837875366},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.33000001311302185},{"id":"https://openalex.org/C2777061396","wikidata":"https://www.wikidata.org/wiki/Q7978064","display_name":"Weapon system","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.3147999942302704},{"id":"https://openalex.org/C2776588390","wikidata":"https://www.wikidata.org/wiki/Q1334738","display_name":"International standard","level":2,"score":0.2969000041484833},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.28040000796318054},{"id":"https://openalex.org/C2777107957","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Moral obligation","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.27250000834465027},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C509929229","wikidata":"https://www.wikidata.org/wiki/Q3312693","display_name":"International security","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C135397884","wikidata":"https://www.wikidata.org/wiki/Q317623","display_name":"Technical standard","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.26330000162124634},{"id":"https://openalex.org/C2778868856","wikidata":"https://www.wikidata.org/wiki/Q18394273","display_name":"Threat assessment","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C196687647","wikidata":"https://www.wikidata.org/wiki/Q21489913","display_name":"Technical management","level":2,"score":0.26269999146461487}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf017","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf017","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf017","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf017","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8168178200721741}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307849","display_name":"North Atlantic Treaty Organization","ror":"https://ror.org/05xagc088"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1921864689","https://openalex.org/W1944646000","https://openalex.org/W2082088244","https://openalex.org/W2153594315","https://openalex.org/W2585796599","https://openalex.org/W2884614920","https://openalex.org/W2891660173","https://openalex.org/W3127528000","https://openalex.org/W3165040846","https://openalex.org/W3208482077","https://openalex.org/W4229013709","https://openalex.org/W4385562826","https://openalex.org/W4391725279","https://openalex.org/W4398176746","https://openalex.org/W4402252317","https://openalex.org/W4404102715"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Many":[1],"weapons":[2],"operate":[3],"within":[4],"complex":[5],"computerized":[6],"systems,":[7,100],"and":[8,13,23,45],"are":[9],"integrated":[10],"with":[11,70,84],"sensors":[12],"platforms.":[14],"Armed":[15],"forces":[16],"rely":[17],"extensively":[18],"on":[19],"digital":[20],"battlefield":[21],"management":[22],"decision":[24],"support":[25],"systems.":[26,74,115],"Exploitation":[27],"of":[28,49],"vulnerabilities":[29],"in":[30],"such":[31],"systems":[32],"can":[33,40],"render":[34],"them":[35,104],"unreliable":[36],"or":[37,88,94,105],"unusable,":[38],"which":[39],"adversely":[41],"affect":[42],"national":[43],"security":[44],"lead":[46],"to":[47,55,66,72,82,98,107,113],"losses":[48],"human":[50],"life.":[51],"This":[52],"paper":[53,77],"seeks":[54],"establish,":[56],"first,":[57],"whether":[58,79],"states":[59,80],"have":[60],"an":[61],"obligation":[62],"under":[63],"international":[64],"law":[65],"take":[67],"cybersecurity":[68,91],"measures":[69],"respect":[71],"weapon":[73,99],"Second,":[75],"the":[76],"examines":[78],"have,":[81],"comply":[83],"their":[85],"legal":[86],"obligations":[87],"otherwise,":[89],"set":[90],"requirements,":[92],"standards,":[93],"guidelines":[95],"that":[96,111],"apply":[97,112],"either":[101],"by":[102],"articulating":[103],"referring":[106],"previously":[108],"existing":[109],"standards":[110],"cyber\u2013physical":[114]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2026-02-08T00:00:00"}
