{"id":"https://openalex.org/W2998575056","doi":"https://doi.org/10.4018/ijcwt.2019100103","title":"Cyber Counterintelligence","display_name":"Cyber Counterintelligence","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2998575056","doi":"https://doi.org/10.4018/ijcwt.2019100103","mag":"2998575056"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2019100103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2019100103","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082537708","display_name":"Petrus Duvenage","orcid":"https://orcid.org/0000-0002-4265-7962"},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Petrus Duvenage","raw_affiliation_strings":["University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046209230","display_name":"Thenjiwe Sithole","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Thenjiwe Sithole","raw_affiliation_strings":["University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113458128","display_name":"Basie von Solms","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Basie von Solms","raw_affiliation_strings":["University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082537708"],"corresponding_institution_ids":["https://openalex.org/I24027795"],"apc_list":null,"apc_paid":null,"fwci":2.0435,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.9165017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"4","first_page":"44","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9785000085830688,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/counterintelligence","display_name":"Counterintelligence","score":0.7289267778396606},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6456891298294067},{"id":"https://openalex.org/keywords/espionage","display_name":"Espionage","score":0.638131320476532},{"id":"https://openalex.org/keywords/industrial-espionage","display_name":"Industrial espionage","score":0.5844678282737732},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5187273621559143},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.4839049279689789},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.45230770111083984},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.44918757677078247},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4402365982532501},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.42579758167266846},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.3711174726486206},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.31338489055633545},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.21270594000816345},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1915055513381958},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.07625839114189148}],"concepts":[{"id":"https://openalex.org/C173127888","wikidata":"https://www.wikidata.org/wiki/Q501700","display_name":"Counterintelligence","level":2,"score":0.7289267778396606},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6456891298294067},{"id":"https://openalex.org/C558872910","wikidata":"https://www.wikidata.org/wiki/Q165950","display_name":"Espionage","level":2,"score":0.638131320476532},{"id":"https://openalex.org/C99712631","wikidata":"https://www.wikidata.org/wiki/Q1160650","display_name":"Industrial espionage","level":2,"score":0.5844678282737732},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5187273621559143},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.4839049279689789},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.45230770111083984},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.44918757677078247},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4402365982532501},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.42579758167266846},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.3711174726486206},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.31338489055633545},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.21270594000816345},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1915055513381958},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.07625839114189148},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijcwt.2019100103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2019100103","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1508973173","https://openalex.org/W1524362626","https://openalex.org/W1548666001","https://openalex.org/W2092823325","https://openalex.org/W2105982203","https://openalex.org/W2139394602","https://openalex.org/W2484995704","https://openalex.org/W2535605864","https://openalex.org/W2998575056"],"related_works":["https://openalex.org/W99495784","https://openalex.org/W4386241123","https://openalex.org/W3049379152","https://openalex.org/W2917449234","https://openalex.org/W1969390830","https://openalex.org/W4386243844","https://openalex.org/W2795682744","https://openalex.org/W2587031600","https://openalex.org/W3209489214","https://openalex.org/W34491042"],"abstract_inverted_index":{"This":[0],"article":[1],"advances":[2],"a":[3,11,84],"conceptual":[4],"framework":[5],"for":[6,81],"cyber":[7,60],"counterintelligence":[8,61],"(FCCI)":[9],"as":[10,98],"theoretical":[12],"construct,":[13],"hopefully":[14],"useful":[15],"not":[16,107],"only":[17,108],"to":[18,25,106,114,127],"this":[19],"field's":[20],"academic":[21,100,110],"development,":[22],"but":[23,112],"also":[24,89,113],"sound":[26,115],"practice.":[27,116],"It":[28],"is":[29,63,104,131],"submitted":[30],"within":[31],"the":[32,35,65],"context":[33],"of":[34,39,59,70,121],"sharp":[36],"increasing":[37],"targeting":[38],"state":[40],"and":[41,54,68,86,97,132],"non-state":[42],"actors":[43,47],"by":[44,78],"adversarial":[45,72],"intelligence":[46],"(such":[48],"other":[49],"nation":[50,79],"states,":[51],"crime":[52],"syndicates":[53],"competitors).":[55],"The":[56,117],"signature":[57],"role":[58],"(CCI)":[62],"precisely":[64],"engagement,":[66],"exploitation":[67],"neutralisation":[69],"such":[71],"actors.":[73],"CCI":[74,130],"has":[75,87],"been":[76,90],"practised":[77],"states":[80],"well":[82],"over":[83],"decade":[85],"recently":[88],"gaining":[91],"traction":[92],"in":[93],"corporate":[94],"board":[95],"rooms":[96],"an":[99],"field.":[101],"Sound":[102],"theory":[103],"critical":[105],"CCI's":[109],"evolvement":[111],"proposed":[118],"FCCI":[119],"comprises":[120],"eight":[122],"notional":[123],"building":[124],"blocks":[125],"essential":[126],"explaining":[128],"what":[129],"how":[133],"it":[134],"works.":[135]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
