{"id":"https://openalex.org/W2796901328","doi":"https://doi.org/10.4018/ijcwt.2018040101","title":"Measuring the World","display_name":"Measuring the World","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2796901328","doi":"https://doi.org/10.4018/ijcwt.2018040101","mag":"2796901328"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2018040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2018040101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010820800","display_name":"Dirk Westhoff","orcid":null},"institutions":[{"id":"https://openalex.org/I913140155","display_name":"Offenburg University of Applied Sciences","ror":"https://ror.org/03zh5eq96","country_code":"DE","type":"education","lineage":["https://openalex.org/I913140155"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Dirk Westhoff","raw_affiliation_strings":["University of Applied Sciences Offenburg, Offenburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Offenburg, Offenburg, Germany","institution_ids":["https://openalex.org/I913140155"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072983817","display_name":"Maximilian Zeiser","orcid":null},"institutions":[{"id":"https://openalex.org/I913140155","display_name":"Offenburg University of Applied Sciences","ror":"https://ror.org/03zh5eq96","country_code":"DE","type":"education","lineage":["https://openalex.org/I913140155"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maximilian Zeiser","raw_affiliation_strings":["University of Applied Sciences Offenburg, Offenburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Offenburg, Offenburg, Germany","institution_ids":["https://openalex.org/I913140155"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010820800"],"corresponding_institution_ids":["https://openalex.org/I913140155"],"apc_list":null,"apc_paid":null,"fwci":1.0005,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82305496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":"2","first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8128852844238281},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.6619318127632141},{"id":"https://openalex.org/keywords/geopolitics","display_name":"Geopolitics","score":0.6214280724525452},{"id":"https://openalex.org/keywords/negotiation","display_name":"Negotiation","score":0.5931398868560791},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.5086246728897095},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4932181239128113},{"id":"https://openalex.org/keywords/business-intelligence","display_name":"Business intelligence","score":0.46641528606414795},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4222587049007416},{"id":"https://openalex.org/keywords/militarization","display_name":"Militarization","score":0.41987767815589905},{"id":"https://openalex.org/keywords/international-trade","display_name":"International trade","score":0.3915545344352722},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3746090531349182},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2869407534599304},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.186641126871109},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.14096340537071228},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13951599597930908},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1359441578388214}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8128852844238281},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.6619318127632141},{"id":"https://openalex.org/C201960208","wikidata":"https://www.wikidata.org/wiki/Q159385","display_name":"Geopolitics","level":3,"score":0.6214280724525452},{"id":"https://openalex.org/C199776023","wikidata":"https://www.wikidata.org/wiki/Q202875","display_name":"Negotiation","level":2,"score":0.5931398868560791},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.5086246728897095},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4932181239128113},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.46641528606414795},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4222587049007416},{"id":"https://openalex.org/C2778227311","wikidata":"https://www.wikidata.org/wiki/Q2575688","display_name":"Militarization","level":3,"score":0.41987767815589905},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.3915545344352722},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3746090531349182},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2869407534599304},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.186641126871109},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.14096340537071228},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13951599597930908},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1359441578388214},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2018040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2018040101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:opus.hs-offenburg.de:4593","is_oa":false,"landing_page_url":"https://opus.hs-offenburg.de/frontdoor/index/index/docId/4593","pdf_url":null,"source":{"id":"https://openalex.org/S4377196587","display_name":"Opus-HSO (Offenburg University of Applied Sciences)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I913140155","host_organization_name":"Offenburg University of Applied Sciences","host_organization_lineage":["https://openalex.org/I913140155"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W303786982","https://openalex.org/W2039966474","https://openalex.org/W2117934391","https://openalex.org/W2144580411","https://openalex.org/W2402432091","https://openalex.org/W2625441990","https://openalex.org/W2767098552","https://openalex.org/W2777635197","https://openalex.org/W4285719527","https://openalex.org/W6610666135","https://openalex.org/W6790406278"],"related_works":["https://openalex.org/W2970570078","https://openalex.org/W4383429013","https://openalex.org/W4226049922","https://openalex.org/W3213154368","https://openalex.org/W3198349397","https://openalex.org/W2969941952","https://openalex.org/W2519475542","https://openalex.org/W340041622","https://openalex.org/W3123268236","https://openalex.org/W2959262516"],"abstract_inverted_index":{"The":[0,88],"authors":[1,66],"claim":[2],"that":[3],"location":[4],"information":[5,30],"of":[6,62,75,85,93,100,125],"stationary":[7],"ICT":[8],"components":[9],"can":[10],"never":[11],"be":[12],"unclassified.":[13],"They":[14],"describe":[15],"how":[16,68],"swarm-mapping":[17],"(crowd":[18],"sourcing)":[19],"is":[20],"used":[21],"by":[22,108],"Apple":[23],"and":[24,35,77,90],"Google":[25],"to":[26,41,96],"worldwide":[27],"harvest":[28],"geo-location":[29],"on":[31],"wireless":[32],"access":[33,49],"points":[34],"mobile":[36],"telecommunication":[37],"systems'":[38],"base":[39],"stations":[40],"build":[42],"up":[43],"gigantic":[44],"databases":[45,102],"with":[46],"very":[47],"exclusive":[48],"rights.":[50],"After":[51],"having":[52],"highlighted":[53],"the":[54,59,65,80,97],"known":[55],"technical":[56,121],"facts,":[57],"in":[58],"speculative":[60],"part":[61],"this":[63,69],"article,":[64],"argue":[67],"may":[70,103],"impact":[71],"cyber":[72,126],"deterrence":[73],"strategies":[74],"states":[76,89],"alliances":[78,91],"understanding":[79,110],"cyberspace":[81],"as":[82,113],"another":[83],"domain":[84],"geostrategic":[86],"relevance.":[87],"spectrum":[92],"activities":[94],"due":[95],"potential":[98],"existence":[99],"such":[101],"range":[104],"from":[105],"geopolitical":[106],"negotiations":[107],"institutions":[109],"international":[111],"affairs":[112],"their":[114],"core":[115],"business,":[116],"mitigation":[117],"approaches":[118],"at":[119],"a":[120],"level,":[122],"over":[123],"means":[124],"deterrence-by-retaliation.":[127]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
