{"id":"https://openalex.org/W4416058965","doi":"https://doi.org/10.1093/cybsec/tyaf031","title":"Non-kinetic naval strategy: the role of cyber operations in modern maritime conflict","display_name":"Non-kinetic naval strategy: the role of cyber operations in modern maritime conflict","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416058965","doi":"https://doi.org/10.1093/cybsec/tyaf031"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf031","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf031","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf031/65235155/tyaf031.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf031/65235155/tyaf031.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092779917","display_name":"Francesco Ferazza","orcid":"https://orcid.org/0009-0005-3280-2678"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I4210166050","display_name":"H\u00f4pital Militaire Moulay Ismail","ror":"https://ror.org/02x0hgx61","country_code":"MA","type":"healthcare","lineage":["https://openalex.org/I4210166050"]}],"countries":["GB","MA"],"is_corresponding":true,"raw_author_name":"Francesco Ferazza","raw_affiliation_strings":["Marina Militare , Rome 00196 ,","Royal Holloway, University of London , London TW200EX ,"],"raw_orcid":"https://orcid.org/0009-0005-3280-2678","affiliations":[{"raw_affiliation_string":"Marina Militare , Rome 00196 ,","institution_ids":["https://openalex.org/I4210166050"]},{"raw_affiliation_string":"Royal Holloway, University of London , London TW200EX ,","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081617903","display_name":"Konstantinos Mersinas","orcid":"https://orcid.org/0000-0002-4402-2987"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Konstantinos Mersinas","raw_affiliation_strings":["Royal Holloway, University of London , London TW200EX ,"],"raw_orcid":"https://orcid.org/0000-0002-4402-2987","affiliations":[{"raw_affiliation_string":"Royal Holloway, University of London , London TW200EX ,","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092779917"],"corresponding_institution_ids":["https://openalex.org/I184558857","https://openalex.org/I4210166050"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36734433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.7383000254631042,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.7383000254631042,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.0786999985575676,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12985","display_name":"Maritime Security and History","score":0.023900000378489494,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5181999802589417},{"id":"https://openalex.org/keywords/maritime-security","display_name":"Maritime security","score":0.5139999985694885},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47699999809265137},{"id":"https://openalex.org/keywords/cyber-space","display_name":"Cyber Space","score":0.47690001130104065},{"id":"https://openalex.org/keywords/strategic-intelligence","display_name":"Strategic intelligence","score":0.4672999978065491},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4323999881744385},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.4275999963283539}],"concepts":[{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5181999802589417},{"id":"https://openalex.org/C2778204415","wikidata":"https://www.wikidata.org/wiki/Q16796341","display_name":"Maritime security","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47699999809265137},{"id":"https://openalex.org/C2909575446","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyber Space","level":3,"score":0.47690001130104065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4684999883174896},{"id":"https://openalex.org/C2778542649","wikidata":"https://www.wikidata.org/wiki/Q4443415","display_name":"Strategic intelligence","level":2,"score":0.4672999978065491},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4323999881744385},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.4275999963283539},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.40709999203681946},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3693999946117401},{"id":"https://openalex.org/C49504249","wikidata":"https://www.wikidata.org/wiki/Q4168000","display_name":"Military intelligence","level":2,"score":0.3617999851703644},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.35370001196861267},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.35109999775886536},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34860000014305115},{"id":"https://openalex.org/C2987597579","wikidata":"https://www.wikidata.org/wiki/Q155930","display_name":"Maritime industry","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C3019338729","wikidata":"https://www.wikidata.org/wiki/Q198","display_name":"Armed conflict","level":2,"score":0.3125999867916107},{"id":"https://openalex.org/C2994576272","wikidata":"https://www.wikidata.org/wiki/Q107292204","display_name":"Maritime safety","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.29280000925064087},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2892000079154968},{"id":"https://openalex.org/C48243021","wikidata":"https://www.wikidata.org/wiki/Q932522","display_name":"Strategic planning","level":2,"score":0.27399998903274536}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf031","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf031","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf031/65235155/tyaf031.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf031","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf031","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/11/1/tyaf031/65235155/tyaf031.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416058965.pdf"},"referenced_works_count":2,"referenced_works":["https://openalex.org/W3194046251","https://openalex.org/W4302417921"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2,96],"examines":[3],"the":[4,59,90,112,116],"strategic":[5,60,113],"logic":[6],"of":[7,20,26,53,79,92,118],"cyber":[8,34,86,100],"attacks":[9],"on":[10],"maritime":[11,38,99],"and":[12,43,110],"naval":[13],"assets,":[14],"positioning":[15],"them":[16],"as":[17,103],"key":[18],"elements":[19],"modern":[21],"hybrid":[22],"warfare.":[23],"During":[24],"periods":[25],"intense":[27],"state-on-state":[28],"competition,":[29],"nations":[30],"increasingly":[31],"use":[32],"non-kinetic":[33],"operations":[35,69,101],"in":[36],"contested":[37],"spaces":[39],"to":[40],"disrupt,":[41],"coerce,":[42],"project":[44],"power.":[45],"Through":[46],"a":[47],"qualitative,":[48],"theory-developing":[49],"case":[50],"study":[51,57],"analysis":[52],"high-profile":[54],"incidents,":[55],"this":[56,95],"identifies":[58],"purpose":[61],"behind":[62],"these":[63],"campaigns.":[64],"We":[65],"argue":[66],"that":[67],"such":[68],"are":[70,76],"not":[71],"simply":[72],"tactical":[73],"disruptions":[74],"but":[75],"calculated":[77],"components":[78],"gray":[80],"zone":[81],"strategy.":[82],"By":[83],"applying":[84],"contemporary":[85],"conflict":[87],"theory,":[88],"including":[89],"concept":[91],"\u201cpersistent":[93],"engagement,\u201d":[94],"demonstrates":[97],"how":[98],"serve":[102],"instruments":[104],"for":[105],"ongoing":[106],"intelligence":[107],"contests,":[108],"signaling,":[109],"shaping":[111],"environment":[114],"below":[115],"threshold":[117],"armed":[119],"conflict.":[120]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-11-09T00:00:00"}
