{"id":"https://openalex.org/W3037318313","doi":"https://doi.org/10.4018/ijcwt.2020070103","title":"Cyber Warfare","display_name":"Cyber Warfare","publication_year":2020,"publication_date":"2020-06-24","ids":{"openalex":"https://openalex.org/W3037318313","doi":"https://doi.org/10.4018/ijcwt.2020070103","mag":"3037318313"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2020070103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2020070103","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009260054","display_name":"Helaine Leggat","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Helaine Leggat","raw_affiliation_strings":["ICTLC Australia Pty Ltd, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"ICTLC Australia Pty Ltd, Melbourne, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5009260054"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12887107,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"3","first_page":"28","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.867063581943512},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.6323814392089844},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.5785098075866699},{"id":"https://openalex.org/keywords/international-law","display_name":"International law","score":0.5394601821899414},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.5059375166893005},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.4818252623081207},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.47445568442344666},{"id":"https://openalex.org/keywords/statute","display_name":"Statute","score":0.47057291865348816},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4501674771308899},{"id":"https://openalex.org/keywords/tort","display_name":"Tort","score":0.4418317675590515},{"id":"https://openalex.org/keywords/treaty","display_name":"Treaty","score":0.41296982765197754},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.33179771900177},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.263431191444397},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2465631365776062},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18677693605422974},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.16723433136940002},{"id":"https://openalex.org/keywords/liability","display_name":"Liability","score":0.09254816174507141}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.867063581943512},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.6323814392089844},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.5785098075866699},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.5394601821899414},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.5059375166893005},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.4818252623081207},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.47445568442344666},{"id":"https://openalex.org/C17319257","wikidata":"https://www.wikidata.org/wiki/Q21189184","display_name":"Statute","level":2,"score":0.47057291865348816},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4501674771308899},{"id":"https://openalex.org/C200635333","wikidata":"https://www.wikidata.org/wiki/Q158970","display_name":"Tort","level":3,"score":0.4418317675590515},{"id":"https://openalex.org/C2779010840","wikidata":"https://www.wikidata.org/wiki/Q131569","display_name":"Treaty","level":2,"score":0.41296982765197754},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.33179771900177},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.263431191444397},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2465631365776062},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18677693605422974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.16723433136940002},{"id":"https://openalex.org/C2777834853","wikidata":"https://www.wikidata.org/wiki/Q96776939","display_name":"Liability","level":2,"score":0.09254816174507141},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijcwt.2020070103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2020070103","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1454791451","https://openalex.org/W1489958209","https://openalex.org/W2153594315","https://openalex.org/W2500936479","https://openalex.org/W2562141051"],"related_works":["https://openalex.org/W2374270253","https://openalex.org/W2078167669","https://openalex.org/W1510448193","https://openalex.org/W4250327053","https://openalex.org/W2385674486","https://openalex.org/W279204092","https://openalex.org/W306982053","https://openalex.org/W1947736446","https://openalex.org/W2466051799","https://openalex.org/W4386125109"],"abstract_inverted_index":{"The":[0,64,133],"Tallinn":[1,149],"Manual":[2],"on":[3],"the":[4,20,36,108,130,148],"International":[5],"Law":[6],"Applicable":[7],"to":[8,41,54,79,97,103,123,136,139,142,147],"Cyber":[9],"Warfare":[10],"(2013)":[11],"sets":[12],"out":[13],"ninety-five":[14],"\u2018black-letter":[15],"rules'":[16],"governing":[17],"conflicts":[18],"and":[19,26,82,114,126],"basis":[21,48],"for":[22,57,70],"each":[23],"in":[24,77,87,121,129],"treaty":[25],"customary":[27],"law.":[28],"An":[29],"earlier":[30],"version":[31],"of":[32,38,74,85,110],"this":[33],"article":[34,90],"considered":[35],"applicability":[37,109],"national":[39,51,95,100,112,144],"law":[40,52,101,116],"cyberspace.":[42,88,104],"Specifically,":[43],"whether":[44],"there":[45],"was":[46],"sufficient":[47],"at":[49,60],"a":[50,71],"level":[53],"establish":[55],"norms":[56,84],"acceptable":[58,83],"behavior":[59,86],"an":[61],"international":[62,75],"level.":[63],"proposition":[65],"being":[66],"it":[67],"is":[68,135],"time":[69],"new":[72],"kind":[73],"cooperation":[76],"relation":[78,122],"cyber":[80],"warfare":[81],"This":[89],"provides":[91],"detail":[92],"from":[93],"various":[94],"statutes":[96],"illustrate":[98],"how":[99],"applies":[102],"Both":[105],"papers":[106],"consider":[107],"current":[111],"criminal":[113],"tort":[115],"by":[117],"using":[118],"hypothetical":[119],"scenarios":[120],"self-defence,":[124],"conspiracy":[125],"corporate":[127],"responsibility":[128],"private":[131],"sector.":[132],"intention":[134],"encourage":[137],"experts":[138],"cooperate":[140],"internationally":[141],"recognise":[143],"rules":[145],"equivalent":[146],"work.":[150]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-07-02T00:00:00"}
