{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:08:07Z","timestamp":1742990887248,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030803865"},{"type":"electronic","value":"9783030803872"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80387-2_17","type":"book-chapter","created":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T06:05:06Z","timestamp":1625292306000},"page":"174-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Integrated Game Transformation Framework and Cyberwar: What 2\u00d72 Games Tell Us About Cyberattacks"],"prefix":"10.1007","author":[{"given":"Alexander L.","family":"Fretz","sequence":"first","affiliation":[]},{"given":"Jose J.","family":"Padilla","sequence":"additional","affiliation":[]},{"given":"Erika F.","family":"Frydenlund","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,4]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Liff, A.P.: Cyberwar: a new \u2018absolute weapon\u2019? The proliferation of cyberwarfare capabilities and interstate war. J. Strat. Stud. 35, 401\u2013428 (2012)","DOI":"10.1080\/01402390.2012.663252"},{"key":"17_CR2","unstructured":"Mazanec, B.M.: Why international order in cyberspace is not inevitable. Strat. Stud. Q. 9(2), 78\u201398 (2015)"},{"key":"17_CR3","unstructured":"Lin, H.S., Kerr, J.: On cyber-enabled information\/influence warfare and manipulation. SSRN, pp. 4\u20135, 13 August 2017"},{"key":"17_CR4","unstructured":"Cohen, D., Bar\u2019el, O.: The use of cyberwarfare in influence operations. In: Yuval Ne\u2019eman Workshop for Science, Technology and Security. Tel-Aviv University, October 2017"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Brangetto, P., Veenendaal, M.A.: Influence cyber operation: the use of cyberattacks in support of influence operations. In: 8th International Conference on Cyber Conflict, pp. 113\u2013126. IEEE, June 2016","DOI":"10.1109\/CYCON.2016.7529430"},{"key":"17_CR6","unstructured":"INSA Cyber Council: Getting Ahead of Foreign Influence Operations. Intelligence and National Security Alliance, p. 2, May 2018"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Andress, J., Winterfeld, S.: Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. 2nd edn. Elsevier, Amsterdam (2014). Ch. 9","DOI":"10.1016\/B978-0-12-416672-1.00001-5"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2018.06.055","volume":"89","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., et al.: Detection of advanced persistent threat using machine-learning correlation analysis. Futur. Gener. Comput. Syst. 89, 349\u2013359 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Nandakumar, G.S., Padilla, J.: A game-transformation-based framework to understand initial conditions and outcomes in the context of cyber-enabled influence operations (CIOs). In: 13th International Conference SBP-BRiMS. Washington, DC, 18\u201321 October 2020","DOI":"10.1007\/978-3-030-61255-9_28"},{"key":"17_CR10","unstructured":"Snyder, G.H.: Alliance Politics. Cornell University Press (2007)."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Powell, R.: Nuclear Deterrence Theory: The Search for Credibility. Cambridge University Press, Cambridge (1990)","DOI":"10.1017\/CBO9780511551598"},{"issue":"2","key":"17_CR12","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/2009958","volume":"30","author":"R Jervis","year":"1978","unstructured":"Jervis, R.: Cooperation under the security dilemma. World Polit. 30(2), 167\u2013214 (1978)","journal-title":"World Polit."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Green, JA.: The regulation of cyber warfare under the jus ad bellum. In: Cyber Warfare: A Multidisciplinary Analysis, pp. 96\u2013124 (2015)","DOI":"10.4324\/9781315761565-6"},{"key":"17_CR14","unstructured":"Sklerov, M.J.: Solving the dilemma of state responses to cyberattacks: a justification for the use of active defenses against states who neglect their duty to prevent. Military Law Rev. 201, 1\u201385 (2009)"},{"key":"17_CR15","unstructured":"Shackelford, S.: From nuclear war to net war: analogizing cyber attacks in international law. Berkley J. Int. Law (BJIL) 25(3), 193\u2013224 (2009)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Rowe, N.C.: The attribution of cyber warfare. In: Cyber Warfare: A Ultidisciplinary Analysis, pp. 75\u201386. Routledge (2015)","DOI":"10.4324\/9781315761565-4"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Lemnitzer, J.: Power, Law, and the End of Privateering. Springer, London (2014). https:\/\/doi.org\/10.1057\/9781137318633","DOI":"10.1057\/9781137318633"},{"key":"17_CR18","unstructured":"Buchanan, B.: The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations. Oxford University Press, New York (2016)"},{"issue":"1","key":"17_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1017\/S0043887100014763","volume":"50","author":"CL Glaser","year":"1997","unstructured":"Glaser, C.L.: The security dilemma revisited. World Politics 50(1), 171\u2013201 (1997)","journal-title":"World Politics"},{"issue":"1","key":"17_CR20","doi-asserted-by":"publisher","first-page":"226","DOI":"10.2307\/2010357","volume":"38","author":"R Axelrod","year":"1985","unstructured":"Axelrod, R., Keohane, R.O.: Achieving cooperation under anarchy: strategies and institutions. World Politics 38(1), 226\u2013254 (1985)","journal-title":"World Politics"},{"key":"17_CR21","unstructured":"Jormakka, J., M\u00f6ls\u00e4, J.V.E.: Modelling information warfare as a game. J. Inf. Warfare 4(2), 12\u201325 (2005)"},{"issue":"1","key":"17_CR22","first-page":"21","volume":"11","author":"Z Ma","year":"2012","unstructured":"Ma, Z., Chen, H., Zhang, J., Krings, A.W.: Has the cyber warfare threat been overstated?: A cheap talk game-theoretic analysis on the google-hacking claim? J. Inf. Warfare 11(1), 21\u201329 (2012)","journal-title":"J. Inf. Warfare"},{"key":"17_CR23","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-14039-1_1","volume-title":"Cyber Warfare","author":"S Goel","year":"2015","unstructured":"Goel, S., Hong, Y.: Cyber war games: strategic jostling among traditional adversaries. In: Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V., Wang, C. (eds.) Cyber Warfare. AIS, vol. 56, pp. 1\u201313. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14039-1_1"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Matusitz, J.: A postmodern theory of cyberterrorism: game theory. Inf. Secur. J. Global Persp. 18(6), 273\u2013281 (2009)","DOI":"10.1080\/19393550903200474"},{"key":"17_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/0470024747","volume-title":"Environment & Statecraft: The Strategy of Environmental Treaty-Making","author":"S Barrett","year":"2003","unstructured":"Barrett, S.: Environment & Statecraft: The Strategy of Environmental Treaty-Making. Oxford University Press, Oxford (2003)"},{"key":"17_CR26","unstructured":"Maness, R.C., Valeriano, B., Jensen, B.: Dyadic Cyber Incidents Database. Version 1.5, 1 June 2019"},{"key":"17_CR27","volume-title":"The Topology of the 2 \u00d7 2 Games: A New Periodic Table","author":"D Robinson","year":"2005","unstructured":"Robinson, D., Goforth, D.: The Topology of the 2 \u00d7 2 Games: A New Periodic Table. Routledge, New York (2005)"},{"issue":"2","key":"17_CR28","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1162\/ISEC_a_00136","volume":"38","author":"E Gartze","year":"2013","unstructured":"Gartze, E.: The myth of cyberwar: bringing war in cyberspace back down to earth. Int. Secur. 38(2), 41\u201373 (2013)","journal-title":"Int. Secur."},{"key":"17_CR29","unstructured":"Healy, J., Jervis, R.: The escalation inversion and other oddities of situational cyber stability. Texas Natl. Secur. Rev. 3, 30\u201353 (2020)"}],"container-title":["Lecture Notes in Computer Science","Social, Cultural, and Behavioral Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80387-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T14:01:20Z","timestamp":1710252080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80387-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030803865","9783030803872"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80387-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SBP-BRiMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sbp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sbp-brims.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}