{"id":"https://openalex.org/W2083469302","doi":"https://doi.org/10.4018/ijcwt.2013070105","title":"Strategic Communication for Supporting Cyber-Security","display_name":"Strategic Communication for Supporting Cyber-Security","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2083469302","doi":"https://doi.org/10.4018/ijcwt.2013070105","mag":"2083469302"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013070105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070105","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035064717","display_name":"Tuija Kuusisto","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109212","display_name":"National Defence University","ror":"https://ror.org/01js4x705","country_code":"FI","type":"education","lineage":["https://openalex.org/I4210109212"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Tuija Kuusisto","raw_affiliation_strings":["Department of Tactics and Operations Art, National Defence University, Helsinki, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Tactics and Operations Art, National Defence University, Helsinki, Finland","institution_ids":["https://openalex.org/I4210109212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082954869","display_name":"Rauno Kuusisto","orcid":null},"institutions":[{"id":"https://openalex.org/I94722563","display_name":"University of Jyv\u00e4skyl\u00e4","ror":"https://ror.org/05n3dz165","country_code":"FI","type":"education","lineage":["https://openalex.org/I94722563"]},{"id":"https://openalex.org/I4210109212","display_name":"National Defence University","ror":"https://ror.org/01js4x705","country_code":"FI","type":"education","lineage":["https://openalex.org/I4210109212"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Rauno Kuusisto","raw_affiliation_strings":["Department of Tactics and Operations Art, National Defence University, Helsinki, Finland & Department of Mathematical Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Tactics and Operations Art, National Defence University, Helsinki, Finland & Department of Mathematical Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland","institution_ids":["https://openalex.org/I4210109212","https://openalex.org/I94722563"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035064717"],"corresponding_institution_ids":["https://openalex.org/I4210109212"],"apc_list":null,"apc_paid":null,"fwci":0.2494,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.58922231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"3","first_page":"72","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11121","display_name":"Public Relations and Crisis Communication","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6131390333175659},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.608138918876648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5486193895339966},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5242562294006348},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.44335776567459106},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3787227272987366}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6131390333175659},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.608138918876648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5486193895339966},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5242562294006348},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.44335776567459106},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3787227272987366},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2013070105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013070105","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:3:p:72-79","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013070105","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W253437808","https://openalex.org/W1126398927","https://openalex.org/W1550177116","https://openalex.org/W1568842166","https://openalex.org/W1597835403","https://openalex.org/W2083469302","https://openalex.org/W2100317815","https://openalex.org/W2126649129","https://openalex.org/W2479571194","https://openalex.org/W2944820740","https://openalex.org/W4239302129","https://openalex.org/W6634012029"],"related_works":["https://openalex.org/W2012531322","https://openalex.org/W2785900585","https://openalex.org/W2353730437","https://openalex.org/W2490303674","https://openalex.org/W2140798747","https://openalex.org/W2609066826","https://openalex.org/W2810752900","https://openalex.org/W2948169060","https://openalex.org/W2365677836","https://openalex.org/W2531295127"],"abstract_inverted_index":{"The":[0,44,99,115],"purpose":[1],"of":[2,15,69,80,91,96,109,117,120,126,130,139,143],"this":[3,28],"paper":[4,45,63],"is":[5,83,103],"to":[6,24,35],"outline":[7],"a":[8,57,81,106],"methodology":[9,29],"for":[10,88],"figuring":[11],"out":[12],"what":[13],"types":[14],"information":[16],"shall":[17],"be":[18,41,134],"shared":[19],"via":[20],"strategic":[21,38,74,145],"level":[22,146],"communication":[23],"support":[25],"cyber-security.":[26,98,131],"With":[27],"the":[30,47,53,62,66,70,89,97,118,121,127,140,144],"key":[31,67],"development":[32],"issues":[33],"required":[34],"create":[36],"relevant":[37],"messages":[39],"can":[40,133],"sorted":[42],"out.":[43],"follows":[46],"system":[48,78,101],"modeling":[49],"approach":[50,87],"and":[51,73,94],"considers":[52],"cyber":[54,71],"world":[55,72],"as":[56,85,136],"complex":[58],"adaptive":[59],"system.":[60],"First,":[61],"studies":[64],"shortly":[65],"concepts":[68],"communication.":[75,147],"A":[76],"social":[77,100],"model":[79,102],"society":[82],"applied":[84],"an":[86],"identifying":[90],"emergent":[92,128],"phenomena":[93,129],"characteristics":[95],"populated":[104],"with":[105],"small":[107],"set":[108,138],"empirical":[110,122],"data":[111,123],"about":[112],"cyber-security":[113],"exercises.":[114],"results":[116],"analysis":[119],"are":[124],"examples":[125],"They":[132],"considered":[135],"one":[137],"focus":[141],"areas":[142]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
