{"id":"https://openalex.org/W4283821032","doi":"https://doi.org/10.23919/cycon55549.2022.9811084","title":"Cyber Resilience versus Cybersecurity as Legal Aspiration","display_name":"Cyber Resilience versus Cybersecurity as Legal Aspiration","publication_year":2022,"publication_date":"2022-05-31","ids":{"openalex":"https://openalex.org/W4283821032","doi":"https://doi.org/10.23919/cycon55549.2022.9811084"},"language":"en","primary_location":{"id":"doi:10.23919/cycon55549.2022.9811084","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091429620","display_name":"Lee A. Bygrave","orcid":null},"institutions":[{"id":"https://openalex.org/I144648426","display_name":"Norwegian Computing Center","ror":"https://ror.org/02gm7te43","country_code":"NO","type":"nonprofit","lineage":["https://openalex.org/I144648426"]},{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Lee A. Bygrave","raw_affiliation_strings":["University of Oslo,Law Norwegian Research Center for Computers and Law,Department of Private Law,Oslo,Norway","Department of Private Law, Law Norwegian Research Center for Computers and Law, University of Oslo, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"University of Oslo,Law Norwegian Research Center for Computers and Law,Department of Private Law,Oslo,Norway","institution_ids":["https://openalex.org/I144648426"]},{"raw_affiliation_string":"Department of Private Law, Law Norwegian Research Center for Computers and Law, University of Oslo, Oslo, Norway","institution_ids":["https://openalex.org/I184942183"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091429620"],"corresponding_institution_ids":["https://openalex.org/I144648426","https://openalex.org/I184942183"],"apc_list":null,"apc_paid":null,"fwci":2.4245,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.90478045,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12921","display_name":"European Criminal Justice and Data Protection","score":0.9063000082969666,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12921","display_name":"European Criminal Justice and Data Protection","score":0.9063000082969666,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.841771125793457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.734743595123291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5877892374992371},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3519233465194702}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.841771125793457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.734743595123291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5877892374992371},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3519233465194702},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon55549.2022.9811084","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"In":[0,52],"recent":[1,297],"years,":[2],"\u2018cyber":[3,37],"resilience\u2019":[4,38],"has":[5,260],"sailed":[6],"up":[7],"as":[8,26,110,117,213,241,324],"a":[9,45,67,96,99,134,214,279],"supplement":[10],"to":[11,21,43,103,147,168,208,222,268,277],"the":[12,24,55,62,72,76,86,89,124,161,234,275,286],"more":[13,100,163],"traditional":[14,125],"discourse":[15],"on":[16,152],"\u2018cybersecurity\u2019.":[17],"It":[18,188],"even":[19],"threatens":[20],"take":[22,209],"over":[23,211],"latter":[25],"an":[27,111,172,318],"engineering":[28,293],"and":[29,121,144,239,244,252,255,304],"regulatory":[30],"goal.":[31],"Some":[32],"policy":[33,216,246],"entrepreneurs":[34],"believe":[35],"that":[36,64,82,129,193,203,325],"rather":[39],"than":[40,123,165],"\u2018cybersecurity\u2019":[41],"ought":[42,206,221],"be":[44,223],"primary":[46],"aim":[47],"of":[48,71,78,107,141,236,258,265,312],"information":[49],"systems":[50],"development.":[51],"their":[53,266],"view,":[54],"quest":[56,280,287],"for":[57,127,175,281,288],"cybersecurity":[58,212,240,308],"downplays":[59],"or":[60],"overlooks":[61],"fact":[63],"insecurity":[65],"is":[66,81,171,189,196,202,227,248,315],"fundamental,":[68],"inescapable":[69],"element":[70],"digital":[73],"world,":[74],"whereas":[75],"premise":[77],"cyber":[79,83,91,108,153,204,237,282,313],"resilience":[80,92,109,154,176,205,238,283,314],"threats":[84],"are":[85,130],"rule,":[87],"not":[88,207],"exception;":[90],"thereby":[93],"allegedly":[94],"embraces":[95],"perspective":[97],"offering":[98,118],"realistic":[101],"approach":[102],"threat":[104,136,305],"management.":[105],"Proponents":[106],"overarching":[112],"goal":[113],"also":[114],"see":[115],"it":[116],"greater":[119,302],"flexibility":[120,303],"pragmatism":[122],"concern":[126,174],"cybersecurity\u2014characteristics":[128],"especially":[131],"important":[132],"in":[133,139,184],"fast-changing":[135],"environment.":[137],"Yet":[138],"terms":[140],"methodology,":[142],"operationalization":[143,311],"legal":[145,179],"norms,":[146],"what":[148,169],"degree":[149,170,276],"does":[150],"focusing":[151],"actually":[155],"differ":[156],"from":[157],"cybersecurity-focused":[158],"discourse?":[159],"Are":[160],"differences":[162,267],"cosmetic":[164],"substantial?":[166],"And":[167],"overriding":[173],"compatible":[177],"with":[178,190,296],"requirements,":[180],"particularly":[181],"those":[182],"recognized":[183],"human":[185],"rights":[186],"jurisprudence?":[187],"such":[191,323],"questions":[192],"this":[194,256],"paper":[195],"concerned.":[197],"The":[198],"paper\u2019s":[199],"underlying":[200],"message":[201,226],"priority":[210],"public":[215,245],"goal;":[217],"rather,":[218],"both":[219],"goals":[220,247],"met.":[224],"This":[225],"buttressed":[228],"by":[229,250],"four":[230],"basic":[231],"points.":[232],"First,":[233],"interrelationship":[235],"conceptual":[242],"constructs":[243],"marked":[249],"ambiguity":[251],"normative":[253],"muddle,":[254],"state":[257],"affairs":[259],"helped":[261],"allow":[262],"misleading":[263],"characterizations":[264],"proliferate.":[269],"Second,":[270],"existing":[271],"law":[272],"significantly":[273],"restricts":[274],"which":[278],"may":[284],"replace":[285],"cybersecurity.":[289],"Third,":[290],"contemporary":[291],"security":[292],"methods":[294],"together":[295],"legislative":[298],"reforms":[299],"have":[300],"injected":[301],"awareness":[306],"into":[307],"thinking.":[309],"Fourth,":[310],"achievable":[316],"within":[317],"appropriately":[319],"comprehensive":[320],"\u2018security-by-design\u2019":[321],"framework,":[322],"required":[326],"under":[327],"EU":[328],"law.":[329]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
