{"id":"https://openalex.org/W2159086172","doi":"https://doi.org/10.1109/isi.2012.6284146","title":"Towards cyber operations - The new role of academic cyber security research and education","display_name":"Towards cyber operations - The new role of academic cyber security research and education","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2159086172","doi":"https://doi.org/10.1109/isi.2012.6284146","mag":"2159086172"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2012.6284146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005087883","display_name":"Jan Kallberg","orcid":"https://orcid.org/0000-0002-0609-6985"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jan Kallberg","raw_affiliation_strings":["CySREC, Erik Jonsson School of Engineering and Computer Science, University of Texas, Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"CySREC, Erik Jonsson School of Engineering and Computer Science, University of Texas, Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072193842","display_name":"Bhavani Thuraisingham","orcid":"https://orcid.org/0000-0003-4653-2080"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhavani Thuraisingham","raw_affiliation_strings":["CySREC, Erik Jonsson School of Engineering and Computer Science, University of Texas, Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"CySREC, Erik Jonsson School of Engineering and Computer Science, University of Texas, Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5005087883"],"corresponding_institution_ids":["https://openalex.org/I162577319"],"apc_list":null,"apc_paid":null,"fwci":4.2633,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.94635101,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"132","last_page":"134"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9632999897003174,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.7091124057769775},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6880249977111816},{"id":"https://openalex.org/keywords/information-operations","display_name":"Information Operations","score":0.6350071430206299},{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.6034741401672363},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.5376068353652954},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5211043953895569},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.48932358622550964},{"id":"https://openalex.org/keywords/national-strategy-to-secure-cyberspace","display_name":"National Strategy to Secure Cyberspace","score":0.45903754234313965},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4067356288433075},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.35236042737960815},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.27502912282943726},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.1316278576850891},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1266154944896698}],"concepts":[{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.7091124057769775},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6880249977111816},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.6350071430206299},{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.6034741401672363},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.5376068353652954},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5211043953895569},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.48932358622550964},{"id":"https://openalex.org/C20780181","wikidata":"https://www.wikidata.org/wiki/Q6978718","display_name":"National Strategy to Secure Cyberspace","level":4,"score":0.45903754234313965},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4067356288433075},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.35236042737960815},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.27502912282943726},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.1316278576850891},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1266154944896698}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2012.6284146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2617806318","https://openalex.org/W111049861","https://openalex.org/W1939670987","https://openalex.org/W2314320979","https://openalex.org/W2058550488","https://openalex.org/W572753062","https://openalex.org/W303786982","https://openalex.org/W4285062827","https://openalex.org/W1947736446","https://openalex.org/W2159086172"],"abstract_inverted_index":{"The":[0,77,115,142],"shift":[1,7,210],"towards":[2,211],"cyber":[3,17,23,80,112,117,140,146,212],"operations":[4,93],"represents":[5],"a":[6,104],"not":[8,152],"only":[9,153],"for":[10,75],"the":[11,54,65,68,71,101,110,184,191,199,209,215],"defense":[12,59,90,113,118,147],"establishments":[13],"worldwide":[14],"but":[15,162],"also":[16,163],"security":[18,24,47,56,81],"research":[19,25,48,148,196,203],"and":[20,26,43,49,58,70,88,96,106,132,159,177,214],"education.":[21],"Traditionally":[22],"education":[27,50],"has":[28],"been":[29],"founded":[30],"on":[31],"information":[32,85,92],"assurance,":[33],"expressed":[34],"in":[35,64,100,135,139],"underlying":[36],"subfields":[37],"such":[38],"as":[39],"forensics,":[40],"network":[41],"security,":[42,161],"penetration":[44],"testing.":[45],"Cyber":[46],"is":[51,82,183],"connected":[52],"to":[53,121,127,150,206,208],"homeland":[55],"agencies":[57],"through":[60],"funding,":[61],"mutual":[62],"interest":[63],"outcome":[66],"of":[67,79,103,109,186,190,202],"research,":[69],"potential":[72],"job":[73],"market":[74],"graduates.":[76],"future":[78,143],"both":[83],"defensive":[84],"assurance":[86],"measures":[87],"active":[89],"driven":[91],"that":[94],"jointly":[95],"coordinately":[97],"are":[98],"launched,":[99],"pursuit":[102],"cohesive":[105,116],"decisive":[107],"execution":[108],"national":[111],"strategy.":[114],"requires":[119],"universities":[120],"optimize":[122],"their":[123],"campus":[124],"wide":[125],"resources":[126],"fuse":[128],"knowledge,":[129],"intellectual":[130],"capacity,":[131],"practical":[133],"skills":[134],"an":[136,187],"unprecedented":[137],"way":[138],"security.":[141],"will":[144],"require":[145],"teams":[149],"address":[151],"computer":[154],"science,":[155,169],"electrical":[156],"engineering,":[157],"software":[158],"hardware":[160],"political":[164],"theory,":[165,167,171],"institutional":[166],"behavioral":[168],"deterrence":[170],"ethics,":[172],"international":[173,175],"law,":[174],"relations,":[176],"additional":[178],"social":[179],"sciences.":[180],"This":[181],"paper":[182],"result":[185],"ocular":[188],"survey":[189],"U.S.":[192],"48":[193],"academic":[194],"CAE-R":[195],"centers,":[197],"evaluating":[198],"collective":[200],"group":[201],"centers'":[204],"ability":[205],"adapt":[207],"operations,":[213],"challenges":[216],"therein.":[217]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
