{"id":"https://openalex.org/W2026305298","doi":"https://doi.org/10.4018/ijcwt.2013070101","title":"The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies","display_name":"The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2026305298","doi":"https://doi.org/10.4018/ijcwt.2013070101","mag":"2026305298"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028650754","display_name":"Martti Lehto","orcid":"https://orcid.org/0000-0002-8122-3155"},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Martti Lehto","raw_affiliation_strings":["University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"],"affiliations":[{"raw_affiliation_string":"University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland","institution_ids":["https://openalex.org/I94722563"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5028650754"],"corresponding_institution_ids":["https://openalex.org/I94722563"],"apc_list":null,"apc_paid":null,"fwci":1.6179,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.87939984,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"3","issue":"3","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9207000136375427,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8428205847740173},{"id":"https://openalex.org/keywords/national-strategy-to-secure-cyberspace","display_name":"National Strategy to Secure Cyberspace","score":0.7953959703445435},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.6701318025588989},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.650459885597229},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.5888861417770386},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5641974210739136},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4965370297431946},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4698053002357483},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.4435359239578247},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.43272554874420166},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.39529216289520264},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2887510359287262},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.246992290019989},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1736985743045807},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11156764626502991}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8428205847740173},{"id":"https://openalex.org/C20780181","wikidata":"https://www.wikidata.org/wiki/Q6978718","display_name":"National Strategy to Secure Cyberspace","level":4,"score":0.7953959703445435},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.6701318025588989},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.650459885597229},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.5888861417770386},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5641974210739136},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4965370297431946},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4698053002357483},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.4435359239578247},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.43272554874420166},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.39529216289520264},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2887510359287262},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.246992290019989},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1736985743045807},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11156764626502991},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2013070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:3:p:1-18","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013070101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W11088508","https://openalex.org/W125992922","https://openalex.org/W1968255217","https://openalex.org/W2948863716","https://openalex.org/W3205720099","https://openalex.org/W4232069328","https://openalex.org/W4252728296","https://openalex.org/W6763134564"],"related_works":["https://openalex.org/W2913449642","https://openalex.org/W3021831513","https://openalex.org/W2255978900","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W3096091498","https://openalex.org/W2188004526","https://openalex.org/W23337523","https://openalex.org/W2770241567","https://openalex.org/W4200456794"],"abstract_inverted_index":{"Threats":[0],"in":[1,6,181,208],"cyberspace":[2,174],"can":[3],"be":[4,121],"classified":[5],"many":[7],"ways.":[8],"This":[9,58,212],"is":[10,28,194],"evident":[11],"when":[12,44],"you":[13],"look":[14],"at":[15,167],"cyber":[16,50,66,69,71,74,91,183,191,210,217,222,226],"security":[17,51,92,192,218,227],"on":[18,33],"a":[19,29,42,46,124,169],"multinational":[20],"level.":[21],"One":[22],"of":[23,88,127,142,190,197,229],"the":[24,62,83,89,97,101,116,130,143,182,188,195,209,216,225,230,243,245,249],"most":[25],"common":[26],"models":[27],"threefold":[30],"classification":[31],"based":[32],"motivational":[34],"factors.":[35],"Most":[36],"nations":[37],"use":[38,61],"this":[39,186],"model":[40],"as":[41,53],"foundation":[43],"creating":[45],"strategy":[47],"to":[48,56,106,132,147,172,204],"handle":[49],"threats":[52],"it":[54],"pertains":[55],"them.":[57],"paper":[59,213],"will":[60,104,120,214],"five":[63],"level":[64,189],"model:":[65],"activism,":[67],"cybercrime,":[68],"espionage,":[70],"terrorism":[72],"and":[73,86,94,149,161,175,200,221,224,248],"warfare.":[75],"The":[76,110],"National":[77,164],"Cyber":[78,111,231],"Security":[79,112,232],"Strategy":[80,113],"defines":[81],"articulates":[82],"overall":[84],"aim":[85,166],"objectives":[87,118,228],"nation's":[90],"policy":[93],"sets":[95],"out":[96],"strategic":[98,135],"priorities":[99],"that":[100,119],"national":[102,144,162,199],"government":[103],"pursue":[105],"achieve":[107,133],"these":[108,134],"objectives.":[109],"also":[114],"describes":[115],"key":[117],"undertaken":[122],"through":[123],"comprehensive":[125],"body":[126],"work":[128],"across":[129],"nation":[131],"priorities.":[136],"Cyberspace":[137],"underpins":[138],"almost":[139],"every":[140],"facet":[141],"functions":[145],"vital":[146],"society":[148],"provides":[150],"critical":[151,156],"support":[152],"for":[153],"areas":[154,180],"like":[155],"infrastructure,":[157],"economy,":[158],"public":[159],"safety,":[160],"security.":[163],"governments":[165],"making":[168],"substantial":[170],"contribution":[171],"secure":[173],"they":[176],"have":[177],"different":[178],"focus":[179],"ecosystem.":[184,211],"In":[185],"context":[187],"reached":[193],"sum":[196],"all":[198,206],"international":[201],"measures":[202],"taken":[203],"protect":[205],"activities":[207],"analyze":[215],"threats,":[219],"vulnerabilities":[220],"weaponry":[223],"Strategies":[233],"made":[234],"by":[235],"Australia,":[236],"Canada,":[237],"Czech":[238],"Republic,":[239],"Estonia,":[240],"Finland,":[241],"Germany,":[242],"Netherlands,":[244],"United":[246,250],"Kingdom":[247],"States.":[251]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
