{"id":"https://openalex.org/W1568969642","doi":"https://doi.org/10.1109/cycon.2015.7158469","title":"Civil-military relations and international military cooperation in cyber security: Common challenges &amp;amp; state practices across Asia and Europe","display_name":"Civil-military relations and international military cooperation in cyber security: Common challenges &amp;amp; state practices across Asia and Europe","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1568969642","doi":"https://doi.org/10.1109/cycon.2015.7158469","mag":"1568969642"},"language":"en","primary_location":{"id":"doi:10.1109/cycon.2015.7158469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2015.7158469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067514703","display_name":"Sergei Boeke","orcid":"https://orcid.org/0000-0002-9829-1381"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Sergei Boeke","raw_affiliation_strings":["Leiden University Centre for Terrorism and Counterterrorism, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Leiden University Centre for Terrorism and Counterterrorism, The Hague, The Netherlands","institution_ids":["https://openalex.org/I121797337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064093299","display_name":"Caitr\u00edona H. Heinl","orcid":null},"institutions":[{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Caitriona H. Heinl","raw_affiliation_strings":["NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia","Centre of Excellence for National Security S. Rajaratnam School of International Studies, Singapore"],"affiliations":[{"raw_affiliation_string":"NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia","institution_ids":["https://openalex.org/I2802296436"]},{"raw_affiliation_string":"Centre of Excellence for National Security S. Rajaratnam School of International Studies, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067377841","display_name":"Matthijs A. Veenendaal","orcid":null},"institutions":[{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Matthijs A. Veenendaal","raw_affiliation_strings":["Centre of Excellence for National Security, S. Rajaratnam School of International Studies, Singapore","NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"Centre of Excellence for National Security, S. Rajaratnam School of International Studies, Singapore","institution_ids":[]},{"raw_affiliation_string":"NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia","institution_ids":["https://openalex.org/I2802296436"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067514703"],"corresponding_institution_ids":["https://openalex.org/I121797337"],"apc_list":null,"apc_paid":null,"fwci":6.9504,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.96273043,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8720865249633789},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.725948691368103},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6221686005592346},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5997928380966187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5897013545036316},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.5822203159332275},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.497651606798172},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.44886529445648193},{"id":"https://openalex.org/keywords/international-security","display_name":"International security","score":0.4430353343486786},{"id":"https://openalex.org/keywords/civil\u2013military-relations","display_name":"Civil\u2013military relations","score":0.42337051033973694},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.38855209946632385},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.32164475321769714},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24684438109397888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.24157238006591797},{"id":"https://openalex.org/keywords/public-administration","display_name":"Public administration","score":0.20152077078819275},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.19567614793777466},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18286347389221191},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.11864793300628662}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8720865249633789},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.725948691368103},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6221686005592346},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5997928380966187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5897013545036316},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.5822203159332275},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.497651606798172},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.44886529445648193},{"id":"https://openalex.org/C509929229","wikidata":"https://www.wikidata.org/wiki/Q3312693","display_name":"International security","level":2,"score":0.4430353343486786},{"id":"https://openalex.org/C2781145704","wikidata":"https://www.wikidata.org/wiki/Q5124770","display_name":"Civil\u2013military relations","level":3,"score":0.42337051033973694},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.38855209946632385},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.32164475321769714},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24684438109397888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.24157238006591797},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.20152077078819275},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.19567614793777466},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18286347389221191},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.11864793300628662},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cycon.2015.7158469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2015.7158469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarlypublications.universiteitleiden.nl:item_3201894","is_oa":false,"landing_page_url":"https://hdl.handle.net/1887/3201894","pdf_url":null,"source":{"id":"https://openalex.org/S4306400850","display_name":"Leiden Repository (Leiden University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121797337","host_organization_name":"Leiden University","host_organization_lineage":["https://openalex.org/I121797337"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article / Letter to editor"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2374270253","https://openalex.org/W2078167669","https://openalex.org/W1510448193","https://openalex.org/W4250327053","https://openalex.org/W2385674486","https://openalex.org/W279204092","https://openalex.org/W306982053","https://openalex.org/W2466051799","https://openalex.org/W4386125109","https://openalex.org/W2405741346"],"abstract_inverted_index":{"While":[0],"many":[1],"states":[2],"are":[3,75,78],"developing":[4],"national":[5,64,73],"cyber":[6,69,83,109,126],"security":[7,70,84],"strategies,":[8],"the":[9,15,93],"exact":[10],"role":[11],"and":[12,33,44,100,132],"responsibilities":[13],"of":[14,53,122],"armed":[16],"forces":[17],"in":[18,37,61,96],"cyberspace":[19],"often":[20],"remain":[21],"unclear.":[22],"Although":[23],"attention":[24],"has":[25],"been":[26],"devoted":[27],"to":[28,35,67,102,124],"acquiring":[29],"specific":[30],"technical":[31],"capacities":[32],"expertise":[34],"act":[36],"cyberspace,":[38],"decision-making":[39],"processes,":[40],"doctrines":[41],"for":[42,108],"deployment,":[43],"procedures":[45],"generally":[46],"lack":[47],"systematic":[48],"analysis.":[49],"The":[50,89],"first":[51],"part":[52],"this":[54],"article":[55,90],"therefore":[56],"focuses":[57],"on":[58],"whether":[59],"militaries":[60],"their":[62],"own":[63],"context":[65],"contribute":[66],"defensive":[68],"tasks.":[71],"Common":[72],"challenges":[74],"identified,":[76],"as":[77],"approaches":[79],"that":[80],"potentially":[81],"improve":[82],"through":[85],"better":[86,104,120],"civil-military":[87],"cooperation.":[88],"then":[91],"examines":[92],"organisational":[94],"structures":[95],"place":[97],"across":[98],"Asia":[99,131],"Europe":[101],"enable":[103],"international":[105,115],"military":[106],"cooperation":[107,116],"related":[110],"incidents.":[111],"It":[112],"outlines":[113],"how":[114],"might":[117],"assist":[118],"a":[119],"exchange":[121],"information":[123],"increase":[125],"defence":[127],"effectiveness,":[128],"specifically":[129],"between":[130],"Europe.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
