{"id":"https://openalex.org/W3038512817","doi":"https://doi.org/10.23919/cycon49761.2020.9131728","title":"Cyber Weapons Review in Situations Below the Threshold of Armed Conflict","display_name":"Cyber Weapons Review in Situations Below the Threshold of Armed Conflict","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3038512817","doi":"https://doi.org/10.23919/cycon49761.2020.9131728","mag":"3038512817"},"language":"en","primary_location":{"id":"doi:10.23919/cycon49761.2020.9131728","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon49761.2020.9131728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 12th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003187088","display_name":"Ivana Kudl\u00e1\u010dkov\u00e1","orcid":null},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Ivana Kudlackova","raw_affiliation_strings":["Faculty of Law, Masaryk University, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Faculty of Law, Masaryk University, Brno, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008126759","display_name":"David A. Wallace","orcid":"https://orcid.org/0000-0002-7943-9248"},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Wallace","raw_affiliation_strings":["Department of Law, United States Military Academy, West Point, New York, US"],"affiliations":[{"raw_affiliation_string":"Department of Law, United States Military Academy, West Point, New York, US","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086310558","display_name":"Jakub Hara\u0161ta","orcid":"https://orcid.org/0000-0002-5722-0325"},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Jakub Harasta","raw_affiliation_strings":["Faculty of Law, Masaryk University, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Faculty of Law, Masaryk University, Brno, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003187088"],"corresponding_institution_ids":["https://openalex.org/I21449261"],"apc_list":null,"apc_paid":null,"fwci":0.8361,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.80559807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"97","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9388999938964844,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10749","display_name":"International Law and Human Rights","score":0.9351999759674072,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/international-humanitarian-law","display_name":"International humanitarian law","score":0.7899504899978638},{"id":"https://openalex.org/keywords/obligation","display_name":"Obligation","score":0.6710044145584106},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.6678293943405151},{"id":"https://openalex.org/keywords/armed-conflict","display_name":"Armed conflict","score":0.605868935585022},{"id":"https://openalex.org/keywords/international-law","display_name":"International law","score":0.5442450642585754},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.5384412407875061},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5266100168228149},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5105246305465698},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.45977863669395447},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.4277305006980896},{"id":"https://openalex.org/keywords/law-of-war","display_name":"Law of war","score":0.42613059282302856},{"id":"https://openalex.org/keywords/geneva-conventions","display_name":"Geneva Conventions","score":0.4208945631980896},{"id":"https://openalex.org/keywords/customary-international-law","display_name":"Customary international law","score":0.415809690952301},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3068959414958954},{"id":"https://openalex.org/keywords/public-international-law","display_name":"Public international law","score":0.2511160969734192}],"concepts":[{"id":"https://openalex.org/C2778573023","wikidata":"https://www.wikidata.org/wiki/Q381148","display_name":"International humanitarian law","level":3,"score":0.7899504899978638},{"id":"https://openalex.org/C2778447849","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Obligation","level":2,"score":0.6710044145584106},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.6678293943405151},{"id":"https://openalex.org/C3019338729","wikidata":"https://www.wikidata.org/wiki/Q198","display_name":"Armed conflict","level":2,"score":0.605868935585022},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.5442450642585754},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.5384412407875061},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5266100168228149},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5105246305465698},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.45977863669395447},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.4277305006980896},{"id":"https://openalex.org/C2779280718","wikidata":"https://www.wikidata.org/wiki/Q14783702","display_name":"Law of war","level":3,"score":0.42613059282302856},{"id":"https://openalex.org/C2779100428","wikidata":"https://www.wikidata.org/wiki/Q133536","display_name":"Geneva Conventions","level":4,"score":0.4208945631980896},{"id":"https://openalex.org/C2779921323","wikidata":"https://www.wikidata.org/wiki/Q1194894","display_name":"Customary international law","level":4,"score":0.415809690952301},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3068959414958954},{"id":"https://openalex.org/C185436325","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"Public international law","level":3,"score":0.2511160969734192},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon49761.2020.9131728","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon49761.2020.9131728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 12th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2781364889","https://openalex.org/W2102130412","https://openalex.org/W4386720806","https://openalex.org/W1978991762","https://openalex.org/W2796123331","https://openalex.org/W4243043064","https://openalex.org/W3183187542","https://openalex.org/W2107788931","https://openalex.org/W2809005551","https://openalex.org/W3156220618"],"abstract_inverted_index":{"The":[0,249],"use":[1,42,99,169,200],"of":[2,9,14,21,37,46,62,69,76,100,113,152,170,207,221,246,264,288],"cyber":[3,22,38,63,101,136,142,171,239],"weapons":[4,23,39,102,137,143,172,193,240],"raises":[5],"many":[6,232],"issues,":[7],"one":[8],"which":[10],"is":[11,55,128,158,165,173,201,251,254],"the":[12,18,35,44,49,60,67,72,94,98,109,150,168,177,189,205,212,218,244],"scope":[13],"legal":[15,19,95,131,190,214],"requirements":[16,191],"affecting":[17,97],"review":[20,36,138,194,260],"under":[24],"Additional":[25,114,265],"Protocol":[26,115,266],"I":[27,116],"and":[28,53,59,74,117,216],"customary":[29,118],"international":[30,77,119,162,285],"law.":[31],"This":[32],"paper":[33,227],"explores":[34],"intended":[40,199],"for":[41,181,192,202],"below":[43,66,149,204,243],"threshold":[45,68,151,206,245],"armed":[47,70,104,153,208,247],"conflictAs":[48],"line":[50],"between":[51],"war":[52],"peace":[54],"often":[56],"increasingly":[57],"blurred":[58],"majority":[61],"incidents":[64],"are":[65,121,144,188,231,272],"conflict,":[71],"laws":[73],"principles":[75],"humanitarian":[78,163],"law":[79,120,164,286],"do":[80],"not":[81,122,166,174],"apply.":[82],"In":[83,106],"this":[84],"paper,":[85,178],"we":[86,179],"engage":[87],"in":[88,139,146,195,241,276],"a":[89,125,135,259,289],"scenario-based":[90],"thought":[91],"experiment":[92],"exploring":[93],"framework":[96,215],"outside":[103,261],"conflict.":[105,154,248],"such":[107],"situations,":[108],"well-known":[110],"article":[111],"36":[112,263],"triggered.":[123],"As":[124],"result,":[126],"there":[127,230,253,271],"no":[129,255],"explicit":[130],"obligation":[132,256],"to":[133,183,234,257,281,284],"conduct":[134,258],"situations":[140,147,196,203,242],"when":[141,237],"deployed":[145],"falling":[148],"Our":[155],"starting":[156],"point":[157],"that":[159,229,252],"even":[160],"though":[161],"applicable,":[167],"completely":[175],"unregulated.In":[176],"search":[180],"answer":[182],"following":[184],"research":[185],"question:":[186],"what":[187],"where":[197,225],"their":[198],"conflict?":[209],"We":[210],"identify":[211],"black-letter":[213],"explore":[217],"state":[219],"practice":[220],"NATO":[222],"member":[223],"states":[224],"available.The":[226],"argues":[228],"obligations":[233,287],"be":[235],"considered":[236],"deploying":[238],"conclusion":[250],"Article":[262],"I.":[267],"That":[268],"being":[269],"said,":[270],"definitely":[273],"policy":[274],"benefits":[275],"conducting":[277],"broader":[278],"software":[279],"assessment":[280],"ensure":[282],"respect":[283],"state.":[290]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
