{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:25:01Z","timestamp":1772781901825,"version":"3.50.1"},"reference-count":124,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T00:00:00Z","timestamp":1650931200000},"content-version":"vor","delay-in-days":115,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The contemporary literature on cybersecurity and related interstate interactions often cites the need to overcome uncertainty due to an inherent information deficit about cyber operations. While this notion remains relevant in studies that advance our understanding of state behavior in cyberspace, noticeable gaps persist. These stem from the limited utility of cyber operations to shift the balance of strategic power between states or to signal intent and resolve effectively. In response, this article advances a cognitive-cultural framework, wherein behavior reflects preferences derived from schema usage. Using cross-national wargames, the article illustrates the schematic use of strategic culture as a basis for deriving strategic objectives and the means of achieving these. Consequently, the article is an initial foray aimed at expanding our understanding of interstate behavior in cyberspace.<\/jats:p>","DOI":"10.1093\/cybsec\/tyac005","type":"journal-article","created":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T16:45:26Z","timestamp":1650991526000},"source":"Crossref","is-referenced-by-count":9,"title":["Unpacking strategic behavior in cyberspace: a schema-driven approach"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8575-2188","authenticated-orcid":false,"given":"Miguel Alberto","family":"Gomez","sequence":"first","affiliation":[{"name":"Center for Security Studies , ETH, Haldeneggsteig 4, IFW, Z\u00fcrich 8092, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4522-465X","authenticated-orcid":false,"given":"Christopher","family":"Whyte","sequence":"additional","affiliation":[{"name":"L. Douglas Wilder School of Government and Public Affairs, Virginia Commonwealth University , Scherer Hall, 923 W. Franklin St., Richmond, VA 23284, USA"}]}],"member":"286","published-online":{"date-parts":[[2022,4,26]]},"reference":[{"key":"2023052911513899200_bib1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01402390.2020.1732354","article-title":"Cyber campaigns and strategic outcomes","author":"Harknett","year":"2020","journal-title":"J Strat Stud"},{"key":"2023052911513899200_bib2","doi-asserted-by":"crossref","first-page":"1298","DOI":"10.1073\/pnas.1322638111","article-title":"Timing of cyber conflict","volume":"111","author":"Axelrod","year":"2014","journal-title":"Proc Natl Acad Sci"},{"key":"2023052911513899200_bib3"},{"key":"2023052911513899200_bib4","first-page":"267","article-title":"Persistent engagement, agreed competition, and cyberspace interaction dynamics and escalation","author":"Fischerkeller","year":"2019","journal-title":"Cyber Def Rev"},{"key":"2023052911513899200_bib5","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/13523260.2013.771031","article-title":"Cyber posturing and the offense-defense balance","volume":"34","author":"Saltzman","year":"2013","journal-title":"Contemp Secur Pol"},{"key":"2023052911513899200_bib6","first-page":"451","article-title":"Cyber attack: a dull tool to shape foreign policy","volume-title":"Proceedings of the 2013 Fifth International Conference on Cyber Conflict","author":"Iasiello","year":"2013"},{"key":"2023052911513899200_bib7","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780190618094.001.0001","volume-title":"Cyber Strategy: The Evolving Character of Power and Coercion","author":"Valeriano","year":"2018"},{"key":"2023052911513899200_bib8","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1162\/ISEC_a_00267","article-title":"What is the cyber offense-defense balance? Conceptions, causes, and assessment","volume":"41","author":"Slayton","year":"2017","journal-title":"Int Secur"},{"key":"2023052911513899200_bib9","first-page":"65","article-title":"Power, rivalry, and cyber conflict: an empirical analysis","volume-title":"Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives","author":"Pytlak","year":"2016"},{"key":"2023052911513899200_bib10","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1177\/0095327X15572997","article-title":"The impact of cyber conflict on international interactions","volume":"42","author":"Maness","year":"2016","journal-title":"Armed Forces Soc"},{"key":"2023052911513899200_bib11","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190665012.001.0001","volume-title":"The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations","author":"Buchanan","year":"2017"},{"key":"2023052911513899200_bib12","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1080\/09636412.2015.1038188","article-title":"Weaving tangled webs: offense, defense, and deception in cyberspace","volume":"24","author":"Gartzke","year":"2015","journal-title":"Secur Stud"},{"key":"2023052911513899200_bib13","first-page":"75","article-title":"Attribution of malicious cyber incidents: from soup to nuts","volume":"70","author":"Lin","year":"2016","journal-title":"J Int Aff"},{"key":"2023052911513899200_bib14","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/01495939108402827","article-title":"A theory of strategic culture","volume":"10","author":"Klein","year":"1991","journal-title":"Comp Strat"},{"key":"2023052911513899200_bib15","first-page":"1","article-title":"Interests, ideas, and the study of state behaviour in neoclassical realism","volume":"46","author":"Meibauer","year":"2019","journal-title":"Rev Int Stud"},{"key":"2023052911513899200_bib16","volume-title":"Reluctant Crusaders: Power, Culture, and Change in American Grand Strategy","author":"Dueck","year":"2006"},{"key":"2023052911513899200_bib17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1017\/S0260210509990532","article-title":"Systemic pressures and domestic ideas: a neoclassical realist model of grand strategy formation","volume":"36","author":"Kitchen","year":"2010","journal-title":"Rev Int Stud"},{"key":"2023052911513899200_bib18","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1080\/13523260.2012.727679","article-title":"Time to move on: reconceptualizing the strategic culture debate","volume":"33","author":"Bloomfield","year":"2012","journal-title":"Contemp Secur Pol"},{"key":"2023052911513899200_bib19","first-page":"1","article-title":"Putting things in perspective: mental simulation in experimental political science","author":"Kertzer","year":"2015"},{"key":"2023052911513899200_bib20","author":"Kertzer","year":"2018","journal-title":"Strategic Empathy and the Security Dilemma: Cross-National Experimental Evidence from China and the United States"},{"key":"2023052911513899200_bib21","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1111\/pops.12623","article-title":"The empathic foundations of security dilemma de-escalation","volume":"40","author":"Baker","year":"2019","journal-title":"Pol Psychol"},{"key":"2023052911513899200_bib22","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1111\/j.1743-8594.2009.00088.x","article-title":"Empathy and strategic interaction in crises: a poliheuristic perspective","volume":"5","author":"Keller","year":"2009","journal-title":"Foreign Pol Anal"},{"key":"2023052911513899200_bib23","first-page":"14","article-title":"Wargaming for social science","author":"Valeriano","year":"2021","journal-title":"SSRN Pap"},{"key":"2023052911513899200_bib24","first-page":"83","article-title":"Wargaming for international relations research","volume":"28","author":"Lin-Greenberg","year":"2022","journal-title":"Eur J Int Secur"},{"key":"2023052911513899200_bib25","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1177\/1046878120987581","article-title":"Wargaming as a methodology: the international crisis wargame and experimental wargaming","volume":"52","author":"Schechter","year":"2021","journal-title":"Simul Gam"},{"key":"2023052911513899200_bib26","first-page":"24","article-title":"From cyberspace to cyberpower: defining the problem","volume-title":"Cyberpower and National Security","author":"Kuehl","year":"2009"},{"key":"2023052911513899200_bib27","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1080\/09636412.2017.1306396","article-title":"The logic of coercion in cyberspace","volume":"26","author":"Borghard","year":"2017","journal-title":"Secur Stud"},{"key":"2023052911513899200_bib28","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1080\/09636412.2013.816122","article-title":"Stuxnet and the limits of cyber warfare","volume":"22","author":"Lindsay","year":"2013","journal-title":"Secur Stud"},{"key":"2023052911513899200_bib29","volume-title":"Cyber War","author":"Clarke","year":"2010"},{"key":"2023052911513899200_bib30","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1111\/misr.12023","article-title":"From cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse","volume":"15","author":"Dunn-Cavelty","year":"2013","journal-title":"Int Stud Rev"},{"key":"2023052911513899200_bib31","doi-asserted-by":"crossref","DOI":"10.1353\/book45365","volume-title":"The Decision to Attack: Military and Intelligence Cyber Decision-Making","author":"Brantly","year":"2016"},{"key":"2023052911513899200_bib32","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1111\/j.1468-2478.2007.00463.x","article-title":"Uncertain about uncertainty: understanding the multiple meanings of a crucial concept in international relations theory","volume":"51","author":"Rathbun","year":"2007","journal-title":"Int Stud Quart"},{"key":"2023052911513899200_bib33","first-page":"112","article-title":"Structural causes and cyber effects why international order is inevitable in cyberspace","volume":"8","author":"Forsyth","year":"2014","journal-title":"Strat Stud Q"},{"key":"2023052911513899200_bib34","volume-title":"Normal Accidents: Living With High-Risk Technologies","author":"Perrow","year":"1984"},{"key":"2023052911513899200_bib35","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1080\/01402390.2019.1627209","article-title":"The capability\/vulnerability paradox and military revolutions: implications for computing, cyber, and the onset of war","volume":"42","author":"Schneider","year":"2019","journal-title":"J Strat Stud"},{"key":"2023052911513899200_bib36","first-page":"493","article-title":"Restrained by design: the political economy of cybersecurity","volume":"19","author":"Lindsay","year":"2017","journal-title":"Digit Pol Regul Gov"},{"key":"2023052911513899200_bib37","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1111\/j.1468-2478.2009.00572.x","article-title":"Digital disaster, cyber security, and the copenhagen school","volume":"53","author":"Hansen","year":"2009","journal-title":"Int Stud Quart"},{"key":"2023052911513899200_bib38","volume-title":"The Sources of Military Doctrine: France, Britain, and Germany Between the World Wars","author":"Posen","year":"1986"},{"key":"2023052911513899200_bib39","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/CYCON.2016.7529425","article-title":"Winning and losing in cyberspace","author":"Healey","year":"2016","journal-title":"Proceedings of the 2016 Eight International Conference on Cyber Conflict (CyCon)"},{"key":"2023052911513899200_bib40","volume-title":"The Cyber Index: International Security Trends and Realities","author":"United Nations Institute for Disarmament Research","year":"2013"},{"key":"2023052911513899200_bib41","doi-asserted-by":"crossref","first-page":"233","DOI":"10.23919\/CyCon51939.2021.9467807","article-title":"The global spread of cyber forces, 2000\u20132018","author":"Blessing","year":"2021","journal-title":"Proceedings of the 2021 Thirteenth International Conference on Cyber Conflict (CyCon)"},{"key":"2023052911513899200_bib42","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.orbis.2017.05.003","article-title":"Deterrence is not a credible strategy for cyberspace","volume":"61","author":"Fischerkeller","year":"2017","journal-title":"Orbis"},{"key":"2023052911513899200_bib43","article-title":"What do we know about cyber escalation? Observations from simulations and surveys","author":"Jensen"},{"key":"2023052911513899200_bib44","doi-asserted-by":"crossref","first-page":"tyaa012","DOI":"10.1093\/cybsec\/tyaa012","article-title":"Public attribution of cyber intrusion","volume":"6","author":"Egloff","year":"2020","journal-title":"J Cybersecur"},{"key":"2023052911513899200_bib45","first-page":"37","article-title":"Thermonuclear cyberwar","volume":"3","author":"Gartzke","year":"2017","journal-title":"J Cybersecur"},{"key":"2023052911513899200_bib46","article-title":"Israel and iran just showed us the future of cyberwar with their unusual attacks","author":"Foreign Policy"},{"key":"2023052911513899200_bib47","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1111\/0020-8833.00050","article-title":"Images in international relations: an experimental test of cognitive schemata","volume":"41","author":"Herrmann","year":"1997","journal-title":"Int Stud Quart"},{"key":"2023052911513899200_bib48","first-page":"16","article-title":"Cognitive dynamics and images of the enemy","volume":"21","author":"Holsti","year":"1967","journal-title":"J Int Affairs"},{"key":"2023052911513899200_bib49","doi-asserted-by":"crossref","first-page":"tyab001","DOI":"10.1093\/cybsec\/tyab001","article-title":"Risk and uncertainty can be analyzed in cyberspace","volume":"7","author":"Brantly","year":"2021","journal-title":"J Cybersecur"},{"key":"2023052911513899200_bib50","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1037\/h0034747","article-title":"On the psychology of prediction","volume":"80","author":"Kahneman","year":"1973","journal-title":"Psychol Rev"},{"key":"2023052911513899200_bib51","article-title":"Who wasn't responsible for olympic destroyer?","author":"Virus Bulletin"},{"key":"2023052911513899200_bib52","article-title":"The solar sunrise case: mak, stimpy, and analyzer give the dod a run for its money","author":"informIT"},{"key":"2023052911513899200_bib53","volume-title":"Cyber and Crisis Escalation: Insights from Wargaming. USASOC Futures Forum","author":"Schneider","year":"2017"},{"key":"2023052911513899200_bib54","doi-asserted-by":"crossref","first-page":"tyz012","DOI":"10.1093\/cybsec\/tyz012","article-title":"Past behavior and future judgements: seizing and freezing in response to cyber operations","volume":"5","author":"Gomez","year":"2019","journal-title":"J Cybersecur"},{"key":"2023052911513899200_bib55","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/01402390.2014.977382","article-title":"Attributing cyber attacks","volume":"38","author":"Rid","year":"2015","journal-title":"J Strat Stud"},{"key":"2023052911513899200_bib56","doi-asserted-by":"crossref","DOI":"10.5040\/9798400629549","volume-title":"Compellence and the Strategic Culture of Imperial Japan Implications for Coercive Diplomacy in the Twenty-First Century","author":"Morgan","year":"2003"},{"key":"2023052911513899200_bib57","first-page":"16","article-title":"Understanding beliefs and threat inflation","volume-title":"American Foreign Policy and the Politics of Fear: Threat Inflation Since 9\/11","author":"Jervis","year":"2009"},{"key":"2023052911513899200_bib58","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1017\/eis.2019.2","article-title":"Sound the alarm! updating beliefs and degradative cyber operations","volume":"4","author":"Gomez","year":"2019","journal-title":"Eur J Int Secur"},{"key":"2023052911513899200_bib59","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/3791437","article-title":"The role of belief systems and schemas in foreign policy decision-making","volume":"15","author":"Larson","year":"1994","journal-title":"Pol Psychol"},{"key":"2023052911513899200_bib60","volume-title":"The Soviet Strategic Culture. Implications for Limited Nuclear Operations","author":"Snyder","year":"1977"},{"key":"2023052911513899200_bib61","doi-asserted-by":"crossref","first-page":"21","DOI":"10.2307\/2538645","article-title":"National style in strategy: the American example","volume":"6","author":"Gray","year":"1981","journal-title":"Int Secur"},{"key":"2023052911513899200_bib62","doi-asserted-by":"crossref","first-page":"32","DOI":"10.2307\/2539119","article-title":"Thinking about strategic culture","volume":"19","author":"Johnston","year":"1995","journal-title":"Int Secur"},{"key":"2023052911513899200_bib63","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1017\/S026021050011335X","article-title":"Hegemony and strategic culture: American power projection and alliance defence politics","volume":"14","author":"Klein","year":"1988","journal-title":"Rev Int Stud"},{"key":"2023052911513899200_bib64","author":"Lin","year":"2017","journal-title":"On Cyber-Enabled Information\/Influence Warfare and Manipulation"},{"key":"2023052911513899200_bib65","volume-title":"Cooperation Under Fire: Anglo-German Restraint During World War II","author":"Legro","year":"1995"},{"key":"2023052911513899200_bib66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/0033-295X.88.1.1","article-title":"Categorization of action slips","volume":"88","author":"Norman","year":"1981","journal-title":"Psychol Rev"},{"key":"2023052911513899200_bib67","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1146\/annurev.soc.23.1.263","article-title":"Culture and cognition","volume":"23","author":"DiMaggio","year":"1997","journal-title":"Ann Rev Sociol"},{"key":"2023052911513899200_bib68","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1093\/isq\/sqv012","article-title":"Taking foreign policy personally: personal values and foreign policy attitudes","volume":"60","author":"Rathbun","year":"2016","journal-title":"Int Stud Quart"},{"key":"2023052911513899200_bib69","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1080\/14702436.2016.1165595","article-title":"Explaining the security paradigm shift: strategic culture, epistemic communities, and Israel's changing national security policy","volume":"16","author":"Libel","year":"2016","journal-title":"Def Stud"},{"key":"2023052911513899200_bib70","doi-asserted-by":"crossref","DOI":"10.4324\/9781315683584","volume-title":"Strategic Culture, Securitisation and the Use of Force","author":"Mirow","year":"2016"},{"key":"2023052911513899200_bib71","volume-title":"Perception and Misperception in International Politics","author":"Jervis","year":"1976"},{"key":"2023052911513899200_bib72","first-page":"211","article-title":"The cyber threat to national security: why can't we agree?","author":"Hare","year":"2010","journal-title":"Proceedings of the 2010 Conference on Cyber Conflict"},{"key":"2023052911513899200_bib73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01402390.2019.1663411","article-title":"Theory of strategic culture: an analytical framework for Russian cyber threat perception","author":"Kari","year":"2019","journal-title":"J Strat Stud"},{"key":"2023052911513899200_bib74","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1177\/002200276200600306","article-title":"The belief system and national images: a case study","volume":"6","author":"Holsti","year":"1962","journal-title":"J Confl Resol"},{"key":"2023052911513899200_bib75","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-8251-5_10","article-title":"Schematic bases of belief change","volume-title":"Attitudinal Judgement","author":"Crocker","year":"1984"},{"key":"2023052911513899200_bib76","doi-asserted-by":"crossref","first-page":"tyz007","DOI":"10.1093\/cybsec\/tyz007","article-title":"Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics","volume":"5","author":"Kreps","year":"2019","journal-title":"J Cybersecur"},{"key":"2023052911513899200_bib77","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1017\/eis.2019.2","article-title":"Sound the alarm! Updating beliefs and degradative cyber operations","volume":"4","author":"Gomez","year":"2019","journal-title":"Eur J Int Secur"},{"key":"2023052911513899200_bib78","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctt7s4jw","volume-title":"Painful Choices: A Theory of Foreign Policy Change","author":"Welch","year":"2011"},{"key":"2023052911513899200_bib79","first-page":"198","article-title":"The motivated construction of political judgments","volume-title":"Citizens and Politics: Perspectives from Political Psychology","author":"Taber","year":"2011"},{"key":"2023052911513899200_bib80","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1177\/0146167295219009","article-title":"Effects of epistemic motivations on the use of accessible constructs in social judgment","volume":"21","author":"Ford","year":"1995","journal-title":"Personal Soc Psychol Bull"},{"key":"2023052911513899200_bib81","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1037\/0033-295X.103.2.263","article-title":"Motivated closing of the mind: \u201cseizing\u201d and \u201cfreezing\u201d","volume":"103","author":"Kruglanski","year":"1996","journal-title":"Psychol Rev"},{"key":"2023052911513899200_bib82","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1162\/ISEC_a_00266","article-title":"Deterrence and dissuasion in cyberspace","volume":"41","author":"Nye","year":"2017","journal-title":"Int Secur"},{"key":"2023052911513899200_bib83","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1080\/17419166.2020.1773807","article-title":"Entanglement in cyberspace: minding the deterrence gap","volume":"16","author":"Brantly","year":"2020","journal-title":"Democr Secur"},{"key":"2023052911513899200_bib84","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1057\/s41268-016-0075-8","article-title":"Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks","volume":"21","author":"Hansel","year":"2016","journal-title":"J Int Relat Dev"},{"key":"2023052911513899200_bib85","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1017\/S0020818300033324","article-title":"Rationalist explanations for war","volume":"49","author":"Fearon","year":"1995","journal-title":"Int Organ"},{"key":"2023052911513899200_bib86","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1017\/S0002930000016894","article-title":"Constructing norms for global cybersecurity","volume":"110","author":"Finnemore","year":"2016","journal-title":"Am J Int Law"},{"key":"2023052911513899200_bib87","doi-asserted-by":"crossref","first-page":"tyz008","DOI":"10.1093\/cybsec\/tyz008","article-title":"The implications of persistent (and permanent) engagement in cyberspace","volume":"5","author":"Healey","year":"2019","journal-title":"J Cybersecur"},{"key":"2023052911513899200_bib88","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1146\/annurev.polisci.4.1.67","article-title":"Psychology and international relations theory","volume":"4","author":"Goldgeier","year":"2001","journal-title":"Ann Rev Pol Sci"},{"key":"2023052911513899200_bib89","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1177\/1046878109334330","article-title":"The long history of gaming in military training","volume":"41","author":"Smith","year":"2010","journal-title":"Simul Gam"},{"key":"2023052911513899200_bib90","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1177\/1046878117732845","article-title":"Historical roots and new fruits of gaming and simulation","volume":"48","author":"Kriz","year":"2017","journal-title":"Simul Gam"},{"key":"2023052911513899200_bib91","volume-title":"On Wargaming: How Wargames Have Shaped History and How they May Shape the Future","author":"Caffrey","year":"2019"},{"key":"2023052911513899200_bib92","article-title":"The cyber character of crisis escalation","volume-title":"Annual Meeting of the International Studies Association","author":"Jensen","year":"2019"},{"key":"2023052911513899200_bib93","first-page":"98","article-title":"Cyber wargaming: grappling with uncertainty in a complex domain","volume":"10","author":"Gomez","year":"2020","journal-title":"Def Strat Assess J"},{"key":"2023052911513899200_bib94","volume-title":"The Art of Wargaming: A Guide for Professionals and Hobbyists","author":"Perla","year":"1990"},{"key":"2023052911513899200_bib95","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1126\/science.1168244","article-title":"Lab experiments are a major source of knowledge in the social sciences","volume":"326","author":"Falk","year":"2009","journal-title":"Science"},{"key":"2023052911513899200_bib96","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1093\/pan\/10.4.325","article-title":"Experimental methodology in political science","volume":"10","author":"McDermott","year":"2002","journal-title":"Pol Anal"},{"key":"2023052911513899200_bib97","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511762888","volume-title":"Experimental Political Science and the Study of Causality: From Nature to the Lab","author":"Morton","year":"2010"},{"key":"2023052911513899200_bib98","volume-title":"Field Experiments: Design, Analysis, and Interpretation","author":"Gerber","year":"2012"},{"key":"2023052911513899200_bib99","first-page":"219","article-title":"Conclusions: security culture and the non-proliferation, arms control and disarmament agenda","volume-title":"Culture and Security: Multilateralism, Arms Control, and Security Building","author":"Krause","year":"1999"},{"key":"2023052911513899200_bib100","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001","volume-title":"Cyber War Versus Cyber Realities: Cyber Conflict in the International System","author":"Valeriano","year":"2015"},{"key":"2023052911513899200_bib101","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1515\/peps-2020-0046","article-title":"Rivalry type and cyber operations: \u201chot\u201d rivalries, \u201ccold\u201d rivalries, and cyber incidents, 1990\u20132009","volume":"27","author":"Mauslein","year":"2021","journal-title":"Peace Econ Peace Sci Publ Pol"},{"key":"2023052911513899200_bib102","volume-title":"Handbook of Simulation Gaming in Social Education","author":"Stadsklev","year":"2013"},{"key":"2023052911513899200_bib103","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1177\/0022002706291052","article-title":"Can we generalize from student experiments to the real world in political science, military affairs, and international relations?","volume":"50","author":"Mintz","year":"2006","journal-title":"J Confl Resol"},{"key":"2023052911513899200_bib104","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1111\/j.1751-9004.2010.00308.x","article-title":"Lay epistemic theory: the motivational, cognitive, and social aspects of knowledge formation","volume":"4","author":"Kruglanski","year":"2010","journal-title":"Soc Personal Psychol Compass"},{"key":"2023052911513899200_bib105","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1017\/S0020818300001673","article-title":"The causal effects of ideas on policies","volume":"50","author":"Yee","year":"1996","journal-title":"Int Organ"},{"key":"2023052911513899200_bib106","doi-asserted-by":"crossref","first-page":"601","DOI":"10.2307\/2600514","article-title":"American public attitudes toward foreign policy","volume":"25","author":"Maggiotto","year":"1981","journal-title":"Int Stud Quart"},{"key":"2023052911513899200_bib107","doi-asserted-by":"crossref","first-page":"S109","DOI":"10.1017\/S0020818316000424","article-title":"Resolve, time, and risk","volume":"71","author":"Kertzer","year":"2017","journal-title":"Int Organ"},{"key":"2023052911513899200_bib108","doi-asserted-by":"crossref","first-page":"ogz077","DOI":"10.1093\/jogss\/ogz077","article-title":"The microfoundations of state cybersecurity: cyber risk perceptions and the mass public","volume":"6","author":"Kostyuk","year":"2021","journal-title":"J Glob Secur Stud"},{"key":"2023052911513899200_bib109","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1080\/13523260.2020.1868836","article-title":"A fragile public preference for cyber strikes: evidence from survey experiments in the United States, United Kingdom, and Israel","volume":"42","author":"Shandler","year":"2021","journal-title":"Contemp Secur Pol"},{"key":"2023052911513899200_bib110","doi-asserted-by":"crossref","first-page":"2825","DOI":"10.1073\/pnas.1700442114","article-title":"Strategic aspects of cyberattack, attribution, and blame","volume":"114","author":"Edwards","year":"2017","journal-title":"Proc Natl Acad Sci"},{"key":"2023052911513899200_bib111","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1080\/01402390.2012.663252","article-title":"Cyberwar: a new \u2018absolute weapon\u2019? The proliferation of cyberwarfare capabilities and interstate war","volume":"35","author":"Liff","year":"2012","journal-title":"J Strat Stud"},{"key":"2023052911513899200_bib112","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1111\/j.1467-6486.2010.00908.x","article-title":"Sensemaking in crisis and change: inspiration and insights from Weick (1988)","volume":"47","author":"Maitlis","year":"2010","journal-title":"J Manag Stud"},{"key":"2023052911513899200_bib113","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1177\/0170840606068343","article-title":"Making sense with institutions: context, thought and action in Karl Weick'sTtheory","volume":"27","author":"Weber","year":"2006","journal-title":"Organ Stud"},{"key":"2023052911513899200_bib114","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1080\/13523260.2014.927673","article-title":"Philippine strategic culture: continuity in the face of changing regional dynamics","volume":"35","author":"De\u00a0Castro","year":"2014","journal-title":"Contemp Secur Pol"},{"key":"2023052911513899200_bib115","volume-title":"National Security Policy for Change and Wellbeing of the Filipino People","author":"National Security Council","year":"2017"},{"key":"2023052911513899200_bib116","article-title":"Singapore security outlook 2017: between a rock and a hard place","volume-title":"Security Outlook of the Asia Pacific Countries and Its Implications for the Defense Sector","author":"Er","year":"2018"},{"key":"2023052911513899200_bib117","volume-title":"Singapore's Foreign Policy: The Search for Regional Order","author":"Acharya","year":"2008"},{"key":"2023052911513899200_bib118","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1080\/14702430701559289","article-title":"Small country \u2018total defence\u2019: a case study of Singapore","volume":"7","author":"Matthews","year":"2007","journal-title":"Def Stud"},{"key":"2023052911513899200_bib119","volume-title":"Factsheet \u2013 About Total Defence","author":"Ministry of Defence","year":"2004"},{"key":"2023052911513899200_bib120","first-page":"1","article-title":"Structures, shocks and norm change: explaining the late rise of Asia's defence diplomacy","volume":"35","author":"Capie","year":"2013","journal-title":"Contemp Secur Pol"},{"key":"2023052911513899200_bib121","doi-asserted-by":"crossref","first-page":"S219","DOI":"10.1017\/S002081831600045X","article-title":"No substitute for experience: presidents, advisers, and information in group decision making","volume":"71","author":"Saunders","year":"2017","journal-title":"Int Organ"},{"key":"2023052911513899200_bib122","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1111\/j.1745-6916.2008.00058.x","article-title":"Why heuristics work","volume":"3","author":"Gigerenzer","year":"2008","journal-title":"Persp Psychol Sci"},{"key":"2023052911513899200_bib123","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1162\/ISEC_a_00136","article-title":"The myth of cyberwar: bringing war in cyberspace back down to Earth","volume":"38","author":"Gartzke","year":"2013","journal-title":"Int Secur"},{"key":"2023052911513899200_bib124","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1111\/1478-9302.12058","article-title":"Elites in action: change and continuity in strategic culture","volume":"14","author":"Pirani","year":"2016","journal-title":"Pol Stud Rev"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac005\/50476468\/tyac005.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac005\/50476468\/tyac005.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T00:17:41Z","timestamp":1727050661000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyac005\/6574438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":124,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyac005","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyac005"}}