{"id":"https://openalex.org/W2004690835","doi":"https://doi.org/10.4018/ijcwt.2013100106","title":"What Lawyers Want","display_name":"What Lawyers Want","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2004690835","doi":"https://doi.org/10.4018/ijcwt.2013100106","mag":"2004690835"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013100106","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100106","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004737020","display_name":"Yaroslav Radziwill","orcid":null},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yaroslav Radziwill","raw_affiliation_strings":["University of Warwick, Coventry, UK","[University Of Warwick, Coventry, UK]"],"affiliations":[{"raw_affiliation_string":"University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]},{"raw_affiliation_string":"[University Of Warwick, Coventry, UK]","institution_ids":["https://openalex.org/I39555362"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5004737020"],"corresponding_institution_ids":["https://openalex.org/I39555362"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20529057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"4","first_page":"52","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10749","display_name":"International Law and Human Rights","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10749","display_name":"International Law and Human Rights","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12752","display_name":"Global Peace and Security Dynamics","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.6721623539924622},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5850393176078796},{"id":"https://openalex.org/keywords/international-humanitarian-law","display_name":"International humanitarian law","score":0.5833484530448914},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5406020283699036},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.535076379776001},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.5288283228874207},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.4923170804977417},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.4855513274669647},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4662553071975708},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.40796831250190735},{"id":"https://openalex.org/keywords/international-law","display_name":"International law","score":0.3593437373638153},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.3523961305618286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30832040309906006},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.21392223238945007},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20333680510520935}],"concepts":[{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.6721623539924622},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5850393176078796},{"id":"https://openalex.org/C2778573023","wikidata":"https://www.wikidata.org/wiki/Q381148","display_name":"International humanitarian law","level":3,"score":0.5833484530448914},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5406020283699036},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.535076379776001},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.5288283228874207},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.4923170804977417},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.4855513274669647},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4662553071975708},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.40796831250190735},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.3593437373638153},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.3523961305618286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30832040309906006},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.21392223238945007},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20333680510520935},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2013100106","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100106","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:4:p:52-57","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013100106","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W117849576","https://openalex.org/W2020721863","https://openalex.org/W2099101461","https://openalex.org/W2104104505","https://openalex.org/W2153112485","https://openalex.org/W2312815489","https://openalex.org/W2500936479","https://openalex.org/W2562436035","https://openalex.org/W3021636027","https://openalex.org/W3121252995","https://openalex.org/W3122729806","https://openalex.org/W3125074536","https://openalex.org/W3173312292","https://openalex.org/W6744846577"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W1480190076","https://openalex.org/W2385701518","https://openalex.org/W4237464767","https://openalex.org/W1658340114","https://openalex.org/W3122105331","https://openalex.org/W2903394889"],"abstract_inverted_index":{"During":[0],"the":[1,37,49,71,77,91,116,137,148,158,166],"last":[2],"decade":[3],"international":[4,121],"lawyers":[5,57],"and":[6,59,84,111,156],"IT":[7,50],"specialists":[8,109],"are":[9,32],"brought":[10],"together":[11],"to":[12,35,98,162],"conferences":[13],"on":[14,90],"issues":[15,103,124],"of":[16,28,102,118,120,130,150,160,168],"cyber-security.":[17],"With":[18],"various":[19],"topics":[20],"covered":[21],"from":[22,115],"such":[23],"different":[24],"perspectives,":[25],"a":[26,100,142],"clash":[27],"educations":[29],"occurs.":[30],"Lawyers":[31],"rarely":[33],"able":[34],"understand":[36],"deep":[38,72],"technological":[39,73],"discussions,":[40],"while":[41],"legal":[42,64],"presentations":[43],"might":[44],"seem":[45],"too":[46],"philosophical":[47],"for":[48,127,145],"professionals,":[51],"leaving":[52],"them":[53],"wondering,":[54],"what":[55],"do":[56],"want":[58],"why.":[60],"In":[61],"this":[62,95],"environment":[63],"questions":[65],"that":[66,104],"cannot":[67],"be":[68,81],"answered":[69],"without":[70],"knowledge":[74],"possessed":[75],"by":[76],"computer":[78],"experts,":[79],"should":[80],"formulated":[82],"carefully":[83],"very":[85],"precisely.":[86],"Therefore,":[87],"with":[88],"emphasis":[89],"jus":[92],"in":[93,165],"bello,":[94],"article":[96],"aims":[97],"outline":[99],"list":[101],"inevitably":[105],"require":[106],"joint":[107],"lawyer-IT":[108],"dialogue":[110],"explain":[112],"their":[113],"significance":[114],"point":[117],"view":[119],"law.":[122],"These":[123],"include":[125],"possibilities":[126],"digital":[128],"\u201cmarking\u201d":[129],"internationally":[131],"protected":[132],"objects":[133],"online":[134],"required":[135],"under":[136],"existing":[138],"humanitarian":[139],"law,":[140],"developing":[141],"\u201cdistinctive":[143],"sign\u201d":[144],"cyber-combatants,":[146],"forewarning":[147],"enemy":[149],"incoming":[151],"attacks":[152],"(\u201ccarrying":[153],"arms":[154],"visibly\u201d)":[155],"re-evaluating":[157],"concept":[159],"\u201cvicinity\u201d":[161],"dangerous":[163],"installations":[164],"context":[167],"cyber-space.":[169]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
