{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:00Z","timestamp":1742914200449,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031613814"},{"type":"electronic","value":"9783031613821"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61382-1_2","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"20-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Competencies Required for the Offensive Cyber Operations Planners"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4541-3365","authenticated-orcid":false,"given":"Marko","family":"Arik","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2012-5700","authenticated-orcid":false,"given":"Ricardo Gregorio","family":"Lugo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1362-1733","authenticated-orcid":false,"given":"Rain","family":"Ottis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5869-3610","authenticated-orcid":false,"given":"Adrian Nicholas","family":"Venables","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"2_CR1","unstructured":"AJP-3.20. Allied joint doctrine for cyberspace operations. Nato Standardization Office (NSO) (2020). https:\/\/www.gov.uk\/government\/publications\/allied-joint-doctrine-for-cyberspace-operations-ajp-320"},{"key":"2_CR2","unstructured":"Arik, M., et al.: Planning cyberspace operations: exercise crossed swords case study. J. Inf. Warfare 70 (2022)"},{"issue":"1","key":"2_CR3","first-page":"3","volume":"1","author":"DE Barber","year":"2016","unstructured":"Barber, D.E., et al.: Cyberspace operations planning: operating a technical military. Military Cyber Aff. 1(1), 3 (2016)","journal-title":"Military Cyber Aff."},{"key":"2_CR4","unstructured":"Bender, J.M.: The cyberspace operations planner. Small Wars J. 16 (2013)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3573205","volume":"23","author":"D Bendler","year":"2023","unstructured":"Bendler, D., Felderer, M.: Competency models for information security and cybersecurity professionals: analysis of existing work and a new model. ACM Trans. Comput. Educ. 23, 1\u201333 (2023)","journal-title":"ACM Trans. Comput. Educ."},{"key":"2_CR6","volume-title":"Implications of Service Cyberspace Component Commands for Army Cyberspace Operations","author":"JL Caton","year":"2019","unstructured":"Caton, J.L.: Implications of Service Cyberspace Component Commands for Army Cyberspace Operations. USAWC Press, Carlisle (2019)"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1108\/ICS-07-2020-0121","volume":"29","author":"N Chowdhury","year":"2021","unstructured":"Chowdhury, N., Gkioulos, V.: Key competencies for critical infrastructure cyber-security: a systematic literature review. Inf. Comput. Secur. 29, 697\u2013723 (2021)","journal-title":"Inf. Comput. Secur."},{"key":"2_CR8","unstructured":"Curnutt, A.J., Sikes, S.R.: Naval postgraduate school. Thesis - knowledge management application to cyber protection team defense operations (2021). https:\/\/apps.dtic.mil\/sti\/citations\/AD1164246"},{"key":"2_CR9","unstructured":"ENISA. Information Operations \u2013 Active Defence and Offensive Countermeasures. ENISA (2016). https:\/\/www.enisa.europa.eu\/topics\/incident-response\/glossary\/information-operations-2013-active-defence-and-offensive-countermeasures"},{"key":"2_CR10","unstructured":"Houston, R.: Thriving Cybersecurity Professionals: Building a Resilient Workforce and Psychological Safety in the Federal Government. University of Pennsylvania, Pennsylvania (2019"},{"key":"2_CR11","unstructured":"Huskaj, G., Axelsson, S.: A whole-of-society approach to organise for offensive cyberspace operations: the case of the smart state Sweden. In: Proceedings of the 22nd European Conference on Cyber Warfare and Security, ECCWS 2023 (2023. https:\/\/pdfs.semanticscholar.org\/b106\/105500fcefd1d554a7dae6f06b2bd1d2c41a.pdf"},{"key":"2_CR12","unstructured":"Jensen, M.S.: Five good reasons for NATO\u2019s pragmatic approach to. Def. Stud. 465 (2022)"},{"key":"2_CR13","unstructured":"Joint Pub 5-0. Doctrine for Planning Joint Operations. Retrieved from Doctrine for Planning Joint Operations (1995). https:\/\/edocs.nps.edu\/dodpubs\/topic\/jointpubs\/JP5\/JP5-0_950413.pdf"},{"key":"2_CR14","unstructured":"Joint Publication 1. Doctrine for the Armed Forces of the United States. Retrieved from Joint Doctrine Publications - Joint Chiefs of Staff (2013). https:\/\/irp.fas.org\/doddir\/dod\/jp1.pdf"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"J\u00f8sok, \u00d8., et al.: Self-regulation and cognitive agility in cyber operations. Front. Psychol. 10, 410188 (2019)","DOI":"10.3389\/fpsyg.2019.00875"},{"key":"2_CR16","unstructured":"Libicki, M.C., Tkacheva, O.: Cyberspace escalation: ladders or lattices? In: CCDCOE, Tallinn (2020)"},{"key":"2_CR17","unstructured":"Lidestri, M.R.: Incorporating perishability and obsolescence into cyberweapon scheduling, MONTEREY, California, U.S (2022"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Moher, D., et al.: Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement. Syst. Rev. 4, 1\u20139 (2015)","DOI":"10.1186\/2046-4053-4-1"},{"key":"2_CR19","unstructured":"Mulford, L.A.: Let slip the dogs of (cyber) war: progressing towards a warfighting US cyber command. Joint Advanced Warfighting School, Norfolk (2013)"},{"key":"2_CR20","unstructured":"National Institute of Health. What are competencies? Retrieved from Office of Human Resources (2023). https:\/\/hr.nih.gov\/about\/faq\/working-nih\/competencies\/what-are-competencies"},{"key":"2_CR21","unstructured":"NATO CCDCOE. NATO CCDCOE Training Catalogue 2023 (2023). https:\/\/ccdcoe.org\/uploads\/2023\/09\/2023_NATO_CCD_COE_Training_Catalogue_final.pdf"},{"key":"2_CR22","unstructured":"NATO Standardization Office. Allied Joint Publication-3.20. Allied Joint Doctrine for Cyberspace Operations (2020). https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/899678\/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf"},{"key":"2_CR23","unstructured":"Navy Personnel Command. Chapter 20 Cryptologic technician (Networks) (CTN). Navy Personnel Command (2023). https:\/\/www.mynavyhr.navy.mil\/Portals\/55\/Reference\/NEOCS\/Vol1\/CTN_occs_CH_95_Jul23.pdf?ver=CWQ8uOEoG-z0c7PLZqXKRg%3d%3d"},{"key":"2_CR24","unstructured":"Neville, K., et al.: United States Army Research Institute for the Behavioral and Social Sciences. A Cognitive Skills Research Framework for Complex Operational Environments (2020). https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1091744.pdf"},{"key":"2_CR25","unstructured":"NICCS. Cyber Operational Planning. National Initiative for Cybersecurity Careers And Studies (2023). https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\/specialty-areas\/cyber-operational-planning"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Nizich, M.: Emerald insight. The Cyberhero and the Cybercriminal (2023): https:\/\/www.emerald.com\/insight\/content\/doi\/https:\/\/doi.org\/10.1108\/978-1-80382-915-920231006\/full\/html","DOI":"10.1108\/978-1-80382-915-920231006\/full\/html"},{"key":"2_CR27","unstructured":"RAND Corporation. Educating for Evolving Operational Domains. RAND Corporation, California (2022)"},{"key":"2_CR28","unstructured":"Rand Corporation. A Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons. Santa Monica: RAND Corporation. For more information on this publication (2023). www.rand.org\/t\/RRA1124-1"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Shoemaker, D., Kohnke, A., Sigler, K.: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0). CRC Press, Boca Raton (2016)","DOI":"10.1201\/b19962"},{"key":"2_CR30","unstructured":"Smart, S.J.: Joint Targeting in Cyberspace. Washington, Pentagon, U.S (2011)"},{"key":"2_CR31","doi-asserted-by":"publisher","first-page":"467","DOI":"10.7326\/M18-0850","volume":"169","author":"AC Tricco","year":"2018","unstructured":"Tricco, A.C., et al.: PRISMA extension for scoping reviews (PRISMA-ScR): checklist and explanation. Ann. Internal Med. 169, 467\u2013473 (2018)","journal-title":"Ann. Internal Med."},{"key":"2_CR32","unstructured":"U.S. General Services Administration. U.S. General Services Administration. General services administration Federal Supply Service Federal Supply Schedule Price List (2022). https:\/\/www.gsaadvantage.gov\/ref_text\/47QTCA22D00C8\/0XKGIE.3TATEZ_47QTCA22D00C8_NNDATA47QTCA22D00C8A81509012022.PDF"},{"key":"2_CR33","unstructured":"United States Army War College. Strategic Cyberspace Operations Guide (2022). https:\/\/media.defense.gov\/2023\/Oct\/02\/2003312499\/-1\/-1\/0\/STRATEGIC_CYBERSPACE_OPERATIONS_GUIDE.PDF"},{"key":"2_CR34","unstructured":"Go\u017adziewicz, W.: Cyber Defense Magazine. Retrieved from Voluntarily by Allies (SCEPVA) (2019). https:\/\/www.cyberdefensemagazine.com\/sovereign-cyber\/"},{"issue":"3","key":"2_CR35","first-page":"148","volume":"21","author":"P Withers","year":"2018","unstructured":"Withers, P.: Integrating cyber with air power in the second century of the royal air force. Royal Air Force Air Power Rev. 21(3), 148\u2013151 (2018)","journal-title":"Royal Air Force Air Power Rev."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61382-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:52:43Z","timestamp":1717206763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61382-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613814","9783031613821"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61382-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}