{"id":"https://openalex.org/W4283812687","doi":"https://doi.org/10.23919/cycon55549.2022.9811090","title":"The Promise and Perils of Allied Offensive Cyber Operations","display_name":"The Promise and Perils of Allied Offensive Cyber Operations","publication_year":2022,"publication_date":"2022-05-31","ids":{"openalex":"https://openalex.org/W4283812687","doi":"https://doi.org/10.23919/cycon55549.2022.9811090"},"language":"en","primary_location":{"id":"doi:10.23919/cycon55549.2022.9811090","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071848503","display_name":"Erica D. Lonergan","orcid":null},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Erica D. Lonergan","raw_affiliation_strings":["Army Cyber Institute at West Point United States Military Academy,West Point,NY,United States","Army Cyber Institute at West Point United States Military Academy, West Point, NY, United States"],"affiliations":[{"raw_affiliation_string":"Army Cyber Institute at West Point United States Military Academy,West Point,NY,United States","institution_ids":["https://openalex.org/I192545095"]},{"raw_affiliation_string":"Army Cyber Institute at West Point United States Military Academy, West Point, NY, United States","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039460772","display_name":"Mark R. Montgomery","orcid":"https://orcid.org/0000-0002-9612-6446"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mark Montgomery","raw_affiliation_strings":["Center on Cyber and Technology Innovation Foundation for Defense of Democracies,Washington,DC,United States","Center on Cyber and Technology Innovation Foundation for Defense of Democracies, Washington, DC, United States"],"affiliations":[{"raw_affiliation_string":"Center on Cyber and Technology Innovation Foundation for Defense of Democracies,Washington,DC,United States","institution_ids":[]},{"raw_affiliation_string":"Center on Cyber and Technology Innovation Foundation for Defense of Democracies, Washington, DC, United States","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071848503"],"corresponding_institution_ids":["https://openalex.org/I192545095"],"apc_list":null,"apc_paid":null,"fwci":0.8375,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78422388,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"92"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.9883453845977783},{"id":"https://openalex.org/keywords/alliance","display_name":"Alliance","score":0.7965392470359802},{"id":"https://openalex.org/keywords/information-operations","display_name":"Information Operations","score":0.678719699382782},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6402339935302734},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.6318975687026978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6229755878448486},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.5744614601135254},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39312198758125305},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3235045075416565},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.2746550738811493},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.27239489555358887},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2314896583557129},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10609713196754456}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.9883453845977783},{"id":"https://openalex.org/C2778431023","wikidata":"https://www.wikidata.org/wiki/Q878249","display_name":"Alliance","level":2,"score":0.7965392470359802},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.678719699382782},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6402339935302734},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.6318975687026978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6229755878448486},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.5744614601135254},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39312198758125305},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3235045075416565},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2746550738811493},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.27239489555358887},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2314896583557129},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10609713196754456},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon55549.2022.9811090","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon55549.2022.9811090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1536360977","https://openalex.org/W2944860159","https://openalex.org/W2491884324","https://openalex.org/W4283812687","https://openalex.org/W2617806318","https://openalex.org/W111049861","https://openalex.org/W316278467","https://openalex.org/W1939670987","https://openalex.org/W2314320979","https://openalex.org/W2058550488"],"abstract_inverted_index":{"NATO":[0,36,100,103],"strategy":[1,56],"and":[2,15,57,170],"policy":[3,105,172],"has":[4,43,106],"increasingly":[5],"focused":[6,107],"on":[7,67,108],"incorporating":[8],"cyber":[9,20,33,52,69,97,104,109,120,137],"operations":[10,21,53,98,110,121,138],"to":[11,35,39,45,64],"support":[12],"deterrence,":[13],"warfighting,":[14],"intelligence":[16],"objectives.":[17],"However,":[18,59],"offensive":[19,51,68,96,136],"in":[22,71,79,89,99,111,141],"particular":[23],"have":[24],"presented":[25],"a":[26,86,112,157],"delicate":[27],"challenge":[28],"for":[29,135,174,177],"the":[30,41,74,93,116,123,132,146,162,167,178],"alliance.":[31,179],"As":[32],"threats":[34],"members":[37],"continue":[38],"grow,":[40],"alliance":[42],"begun":[44],"address":[46],"how":[47],"it":[48],"could":[49],"incorporate":[50],"into":[54],"its":[55],"policy.":[58,101],"there":[60,84],"are":[61],"significant":[62],"hurdles":[63],"meaningful":[65],"cooperation":[66],"operations,":[70],"contrast":[72],"with":[73],"high":[75],"levels":[76,169],"of":[77,92,95,118,125,148,159],"integration":[78],"other":[80],"operational":[81],"domains.":[82],"Moreover,":[83],"is":[85],"critical":[87],"gap":[88],"existing":[90],"conceptualizations":[91],"role":[94,134],"Specifically,":[102],"warfighting":[113],"context":[114],"at":[115,161],"expense":[117],"considering":[119],"below":[122,145],"level":[124],"conflict.":[126,150],"In":[127,151],"this":[128],"article,":[129],"we":[130,154],"explore":[131,156],"potential":[133],"not":[139],"only":[140],"wartime":[142],"but":[143],"also":[144],"threshold":[147],"armed":[149],"doing":[152],"so,":[153],"systematically":[155],"number":[158],"challenges":[160],"political/strategic":[163],"as":[164,166],"well":[165],"operational/tactical":[168],"provide":[171],"recommendations":[173],"next":[175],"steps":[176]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-24T08:23:43.765630","created_date":"2025-10-10T00:00:00"}
