{"id":"https://openalex.org/W2152732778","doi":"https://doi.org/10.1186/s13388-014-0013-5","title":"Security informatics research challenges for mitigating cyber friendly fire","display_name":"Security informatics research challenges for mitigating cyber friendly fire","publication_year":2014,"publication_date":"2014-09-24","ids":{"openalex":"https://openalex.org/W2152732778","doi":"https://doi.org/10.1186/s13388-014-0013-5","mag":"2152732778"},"language":"en","primary_location":{"id":"doi:10.1186/s13388-014-0013-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0013-5","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-014-0013-5","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-014-0013-5","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080470693","display_name":"Thomas E. Carroll","orcid":null},"institutions":[{"id":"https://openalex.org/I142606810","display_name":"Pacific Northwest National Laboratory","ror":"https://ror.org/05h992307","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I142606810","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thomas E Carroll","raw_affiliation_strings":["Pacific Northwest National Laboratory, P.O. Box 999, Richland, 99352, Washington, USA"],"affiliations":[{"raw_affiliation_string":"Pacific Northwest National Laboratory, P.O. Box 999, Richland, 99352, Washington, USA","institution_ids":["https://openalex.org/I142606810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023344712","display_name":"Frank L. Greitzer","orcid":"https://orcid.org/0000-0003-0687-1774"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Frank L Greitzer","raw_affiliation_strings":["PsyberAnalytix LLC, Richland, 99352, Washington, USA"],"affiliations":[{"raw_affiliation_string":"PsyberAnalytix LLC, Richland, 99352, Washington, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052454696","display_name":"Adam Roberts","orcid":"https://orcid.org/0000-0003-1621-1964"},"institutions":[{"id":"https://openalex.org/I142606810","display_name":"Pacific Northwest National Laboratory","ror":"https://ror.org/05h992307","country_code":"US","type":"facility","lineage":["https://openalex.org/I1325736334","https://openalex.org/I1330989302","https://openalex.org/I142606810","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam D Roberts","raw_affiliation_strings":["Pacific Northwest National Laboratory, P.O. Box 999, Richland, 99352, Washington, USA"],"affiliations":[{"raw_affiliation_string":"Pacific Northwest National Laboratory, P.O. Box 999, Richland, 99352, Washington, USA","institution_ids":["https://openalex.org/I142606810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080470693"],"corresponding_institution_ids":["https://openalex.org/I142606810"],"apc_list":null,"apc_paid":null,"fwci":2.3667,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91375577,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9569000005722046,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9484999775886536,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.8271610736846924},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7346829771995544},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6821795105934143},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6401904821395874},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5678659081459045},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5011861324310303},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.44143643975257874},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12371262907981873},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.10945945978164673}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.8271610736846924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7346829771995544},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6821795105934143},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6401904821395874},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5678659081459045},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5011861324310303},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.44143643975257874},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12371262907981873},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.10945945978164673},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/s13388-014-0013-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0013-5","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-014-0013-5","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/s13388-014-0013-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0013-5","pdf_url":"https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-014-0013-5","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"},{"id":"https://openalex.org/F4320338354","display_name":"Pacific Northwest National Laboratory","ror":"https://ror.org/05h992307"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2152732778.pdf","grobid_xml":"https://content.openalex.org/works/W2152732778.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W22281619","https://openalex.org/W64801907","https://openalex.org/W139507382","https://openalex.org/W179711194","https://openalex.org/W201578715","https://openalex.org/W304473861","https://openalex.org/W612128116","https://openalex.org/W615012739","https://openalex.org/W627009432","https://openalex.org/W628796688","https://openalex.org/W655293066","https://openalex.org/W1537487497","https://openalex.org/W1571192096","https://openalex.org/W1576234442","https://openalex.org/W1598466811","https://openalex.org/W1633862057","https://openalex.org/W1703043657","https://openalex.org/W1730934115","https://openalex.org/W2004603793","https://openalex.org/W2016540947","https://openalex.org/W2020194695","https://openalex.org/W2021712299","https://openalex.org/W2024200058","https://openalex.org/W2026031776","https://openalex.org/W2027599174","https://openalex.org/W2050202048","https://openalex.org/W2054597050","https://openalex.org/W2058905653","https://openalex.org/W2060872467","https://openalex.org/W2064806746","https://openalex.org/W2066046769","https://openalex.org/W2072589191","https://openalex.org/W2085366382","https://openalex.org/W2088541859","https://openalex.org/W2091044704","https://openalex.org/W2119896685","https://openalex.org/W2122809874","https://openalex.org/W2122887771","https://openalex.org/W2124646315","https://openalex.org/W2131906261","https://openalex.org/W2143049370","https://openalex.org/W2146948159","https://openalex.org/W2155822737","https://openalex.org/W2157491566","https://openalex.org/W2161907754","https://openalex.org/W2169613734","https://openalex.org/W2251985815","https://openalex.org/W2309113855","https://openalex.org/W2889356772","https://openalex.org/W2952483035","https://openalex.org/W3020392407","https://openalex.org/W3128056588","https://openalex.org/W3205595721","https://openalex.org/W4232475800","https://openalex.org/W4243795252","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2994202640","https://openalex.org/W272387213","https://openalex.org/W4308285224","https://openalex.org/W1994406184","https://openalex.org/W3176850402","https://openalex.org/W185206218","https://openalex.org/W3108748202","https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W4385452087"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"cognitive":[3],"implications":[4],"and":[5,58,126,134,142,151,162,166,205,210],"research":[6,186],"needs":[7],"surrounding":[8],"the":[9,44,129,140,145,149,154,157,163],"problem":[10],"of":[11,47,55,87,121,128,144,156],"cyber":[12,18,30,39,56,69,77,88,190,199],"friendly":[13,48,103],"fire":[14,104],"(FF).":[15],"We":[16,52,177],"define":[17],"FF":[19,57,78,97],"as":[20,92,139],"intentional":[21],"offensive":[22,167],"or":[23,35,49,159],"defensive":[24,165],"cyber/electronic":[25],"actions":[26],"intended":[27],"to":[28,36,82,84,101,113,173,183,197],"protect":[29],"systems":[31],"against":[32],"enemy":[33,38],"forces":[34],"attack":[37],"systems,":[40],"which":[41],"unintentionally":[42],"harms":[43],"mission":[45],"effectiveness":[46],"neutral":[50],"forces.":[51],"describe":[53,178],"examples":[54],"discuss":[59,194],"how":[60],"it":[61,73],"fits":[62],"within":[63],"a":[64,85,122,132,179],"general":[65],"conceptual":[66],"framework":[67],"for":[68,207],"security":[70,89],"failures.":[71],"Because":[72],"involves":[74],"human":[75],"failure,":[76],"may":[79,170],"be":[80,171],"considered":[81],"belong":[83],"sub-class":[86],"failures":[90],"characterized":[91],"unintentional":[93],"insider":[94],"threats.":[95],"Cyber":[96,117],"is":[98,111],"closely":[99],"related":[100],"combat":[102,198],"in":[105,131],"that":[106,147,169],"maintaining":[107],"situation":[108],"awareness":[109],"(SA)":[110],"paramount":[112],"avoiding":[114],"unintended":[115],"consequences.":[116],"SA":[118],"concerns":[119],"knowledge":[120,136],"system\u2019s":[123],"topology":[124],"(connectedness":[125],"relationships":[127],"nodes":[130],"system),":[133],"critical":[135],"elements":[137],"such":[138],"characteristics":[141],"vulnerabilities":[143],"components":[146],"comprise":[148],"system":[150],"its":[152],"nodes,":[153],"nature":[155],"activities":[158],"work":[160],"performed,":[161],"available":[164],"countermeasures":[168],"applied":[172],"thwart":[174],"network":[175],"attacks.":[176],"test":[180],"bed":[181],"designed":[182],"support":[184],"empirical":[185],"on":[187],"factors":[188],"affecting":[189],"FF.":[191],"Finally,":[192],"we":[193],"mitigation":[195],"strategies":[196],"FF,":[200],"including":[201],"both":[202],"training":[203],"concepts":[204],"suggestions":[206],"decision":[208],"aids":[209],"visualization":[211],"approaches.":[212]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
