{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T11:49:33Z","timestamp":1753876173382,"version":"3.41.2"},"reference-count":88,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"vor","delay-in-days":107,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>When governments go public with accusations of cyberattacks by rival powers, what impact does it have on public sensitivity to cyber threats and public demand for defensive or possibly offensive countermeasures? Based on an original survey experiment in nationwide surveys in the USA (N\u00a0=\u00a01336) and Russia (N\u00a0=\u00a02000) during May\u2013June 2021, we find that Americans are more sensitive to cyberattacks than Russians, which could reflect greater US exposure to and government priming on foreign threats to cybersecurity. While both Russians and Americans prefer de-escalation over escalation in responding to cyberattacks, Americans are more willing than Russians to support escalation, including kinetic military options. To explain Americans\u2019 increased inclination to escalate, we examine how threat sensitivity and beliefs about the justifiability of offensive actions are amplified when governments go public about cyberattacks from rivals. We discuss the implications of potential regime-type differences in threat sensitivity and response escalation for crises involving cyberattacks.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf007","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T07:56:22Z","timestamp":1744962982000},"source":"Crossref","is-referenced-by-count":0,"title":["Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4856-5225","authenticated-orcid":false,"given":"Sam","family":"Whitt","sequence":"first","affiliation":[{"name":"Department of Political Science, High Point University , One University Parkway, High Point, NC 27262 ,","place":["United States"]}]},{"given":"Vitali","family":"Shkliarov","sequence":"additional","affiliation":[{"name":"Russia & Eurasia Program Fellow, The Fletcher School of Law & Diplomacy, Tufts University , 114 Curtis Street, Somerville, MA 02144 ,","place":["United States"]}]},{"given":"Vera","family":"Mironova","sequence":"additional","affiliation":[{"name":"Non-Resident Fellow, Middle East Institute , 1763 N St NW, Washington, DC 20036 ,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2025,4,18]]},"reference":[{"key":"2025041803561617800_bib1","doi-asserted-by":"publisher","first-page":"ogz077","DOI":"10.1093\/jogss\/ogz077","article-title":"The microfoundations of state cybersecurity: cyber risk perceptions and the mass public","volume":"6","author":"Kostyuk","year":"2021","journal-title":"J Glob Secur Stud"},{"key":"2025041803561617800_bib2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyab019","article-title":"Cyberattacks, cyber threats, and attitudes toward cybersecurity policies","volume":"7","author":"Snider","year":"2021","journal-title":"J Cybersecurity"},{"key":"2025041803561617800_bib3","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1080\/09700161.2014.918445","article-title":"National perceptions of cyber threats","volume":"38","author":"Lewis","year":"2014","journal-title":"Strateg Anal"},{"key":"2025041803561617800_bib4","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1093\/jogss\/ogy022","article-title":"Rethinking secrecy in cyberspace: the politics of voluntary attribution","volume":"3","author":"Poznansky","year":"2018","journal-title":"J Glob Secur Stud"},{"key":"2025041803561617800_bib5","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1080\/23738871.2023.2184708","article-title":"A sliding scale of secrecy: toward a better understanding of the role of publicity in offensive cyber operations","volume":"7","author":"Baram","year":"2022","journal-title":"J Cyber Policy"},{"key":"2025041803561617800_bib6","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1353\/anq.2021.0037","article-title":"The cultural construction of cybersecurity: digital threats and dangerous rhetoric","volume":"94","author":"Bernal","year":"2021","journal-title":"Anthropol Qtly"},{"key":"2025041803561617800_bib7","doi-asserted-by":"crossref","DOI":"10.1017\/9781108893251","volume-title":"Elections, Protest, and Authoritarian Regime Stability: Russia 2008\u20132020","author":"Smyth","year":"2020"},{"volume-title":"Russia's New Authoritarianism: Putin and the Politics of Order","year":"2020","author":"Lewis","key":"2025041803561617800_bib8"},{"key":"2025041803561617800_bib9","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1080\/01402390.2020.1734570","article-title":"Revisiting plausible deniability","volume":"45","author":"Poznansky","year":"2022","journal-title":"J Strat Stud"},{"key":"2025041803561617800_bib10","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1080\/01402390.2021.1895117","article-title":"Publicly attributing cyber attacks: a framework","volume":"46","author":"Egloff","year":"2023","journal-title":"J Strat Stud"},{"key":"2025041803561617800_bib11","doi-asserted-by":"publisher","first-page":"ogad013","DOI":"10.1093\/jogss\/ogad013","article-title":"Public secrets: the dynamics of publicity and secrecy in offensive cyber operations","volume":"8","author":"Baram","year":"2023","journal-title":"J Glob Secur Stud"},{"key":"2025041803561617800_bib12","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1093\/isq\/sqaa081","article-title":"Doubling down: the danger of disclosing secret action","volume":"65","author":"Otto","year":"2021","journal-title":"Int Stud Q"},{"key":"2025041803561617800_bib13","first-page":"49","article-title":"Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes","volume":"3","author":"Gross","year":"2017","journal-title":"J Cybersecurity"},{"key":"2025041803561617800_bib14","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1111\/misr.12023","article-title":"From cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse","volume":"15","author":"Dunn\u00a0Cavelty","year":"2013","journal-title":"Int Stud Rev"},{"key":"2025041803561617800_bib15","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1080\/00963402.2016.1216502","article-title":"The psychological effects of cyber terrorism","volume":"72","author":"Gross","year":"2016","journal-title":"Bull At Sci"},{"key":"2025041803561617800_bib16","first-page":"49","article-title":"How we stopped worrying about cyber doom and started collecting data","volume":"6","author":"Valeriano","year":"2018","journal-title":"Polit Gov"},{"key":"2025041803561617800_bib17","doi-asserted-by":"crossref","DOI":"10.4324\/9781315505619","volume-title":"Cybersecurity Discourse in the United States: Cyber-doom Rhetoric and beyond","author":"Lawson","year":"2019"},{"key":"2025041803561617800_bib18","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1093\/isq\/sqab034","article-title":"Breaking the myth of cyber doom: securitization and normalization of novel threats","volume":"65","author":"Gomez","year":"2021","journal-title":"Int Stud Q"},{"key":"2025041803561617800_bib19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1521\/soco.2014.32.supp.1","article-title":"Understanding priming effects in social psychology: what is \u201csocial priming\u201d and how does it occur?","volume":"32","author":"Molden","year":"2014","journal-title":"Soc Cogn"},{"key":"2025041803561617800_bib20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1080\/19331681.2022.2112796","article-title":"The hidden threat of cyberattacks\u2013undermining public confidence in government","volume":"20","author":"Shandler","year":"2023","journal-title":"J Inf Technol Polit"},{"key":"2025041803561617800_bib21","first-page":"61","article-title":"Fear, uncertainty, and dread: cognitive heuristics and cyber threats","volume":"6","author":"Gomez","year":"2018","journal-title":"Polit Gov"},{"key":"2025041803561617800_bib22","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1177\/0010414005278419","article-title":"What are the political consequences of trust? A test of cultural and institutional theories in Russia","volume":"38","author":"Mishler","year":"2005","journal-title":"Comp Political Stud"},{"key":"2025041803561617800_bib23","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1353\/jod.2020.0013","article-title":"The puzzle of authoritarian legitimacy","volume":"31","author":"Nathan","year":"2020","journal-title":"J Democr"},{"key":"2025041803561617800_bib24","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1162\/ISEC_a_00136","article-title":"The myth of cyberwar: bringing war in cyberspace back down to earth","volume":"38","author":"Gartzke","year":"2013","journal-title":"Int Secur"},{"key":"2025041803561617800_bib25","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001","volume-title":"Cyber War versus Cyber Realities: Cyber Conflict in the International System","author":"Valeriano","year":"2015"},{"key":"2025041803561617800_bib26","first-page":"1","article-title":"Cyber and crisis escalation: insights from wargaming","volume":"43","author":"Schneider","year":"2017","journal-title":"USASOC Futures Forum"},{"key":"2025041803561617800_bib27","doi-asserted-by":"publisher","first-page":"tyz007","DOI":"10.1093\/cybsec\/tyz007","article-title":"Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics","volume":"5","author":"Kreps","year":"2019","journal-title":"J Cybersecur"},{"key":"2025041803561617800_bib28","first-page":"ogaa023","article-title":"Cyberattacks and public opinion: assessing priming effects on national and personal cybersecurity","volume":"6","author":"Kostyuk","year":"2021","journal-title":"J Glob Secur Stud"},{"key":"2025041803561617800_bib29","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.im.2018.04.008","article-title":"Are we ready for cyberterrorist attacks?\u2014Examining the role of individual resilience","volume":"55","author":"Hua","year":"2018","journal-title":"Inf & Manag"},{"key":"2025041803561617800_bib30","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/13523260.2020.1868836","article-title":"A fragile public preference for cyber strikes: evidence from survey experiments in the United States, United Kingdom, and Israel","volume":"42","author":"Shandler","year":"2021","journal-title":"Contemp Secur Policy"},{"key":"2025041803561617800_bib31","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1017\/S0007123420000812","article-title":"Cyber terrorism and public support for retaliation\u2014a multi-country survey experiment","volume":"52","author":"Shandler","year":"2022","journal-title":"Brit J Polit Sci"},{"volume-title":"Thinking, Fast and Slow","year":"2011","author":"Kahneman","key":"2025041803561617800_bib32"},{"volume-title":"The Cybersecurity Dilemma: Hacking, Trust and Fear between Nations","year":"2016","author":"Buchanan","key":"2025041803561617800_bib33"},{"key":"2025041803561617800_bib34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpubeco.2020.104158","article-title":"A theory of informational autocracy","volume":"186","author":"Guriev","year":"2020","journal-title":"Journal of Public Economics"},{"key":"2025041803561617800_bib35","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1093\/jogss\/ogy022","article-title":"Rethinking secrecy in cyberspace: the politics of voluntary attribution","volume":"3","author":"Poznansky","year":"2018","journal-title":"J Glob Secur Stud"},{"volume-title":"Russian Military Strategy: Impacting 21st-century Reform and Geopolitics","year":"2015","author":"Thomas","key":"2025041803561617800_bib36"},{"key":"2025041803561617800_bib37","doi-asserted-by":"crossref","first-page":"58","DOI":"10.4324\/9781003009207-4","article-title":"Fancy bears and digital trolls: cyber strategy with a Russian twist","volume-title":"Military Strategy in the 21st Century","author":"Jensen","year":"2020"},{"key":"2025041803561617800_bib38","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctv2k88t3d","volume-title":"Russian Cyber Operations: Stategy and Politics in Cyberspace","author":"Jasper","year":"2022"},{"key":"2025041803561617800_bib39","first-page":"265","article-title":"Cybersecurity in the energy sector: are we really prepared?","volume":"39","author":"Smith","year":"2021","journal-title":"J Energy Nat Resour Law"},{"key":"2025041803561617800_bib40","doi-asserted-by":"publisher","first-page":"171","DOI":"10.14207\/ejsd","article-title":"Cybersecurity as an essential sustainable economic development factor","volume":"7","author":"Vasiu","year":"2018","journal-title":"Eur J Sustain Dev"},{"key":"2025041803561617800_bib41","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/S2212-5671(15)01077-1","article-title":"Cyber-attacks\u2014Trends, patterns and security countermeasures","volume":"28","author":"Bendovschi","year":"2015","journal-title":"Procedia Econ Financ"},{"key":"2025041803561617800_bib42","first-page":"24","article-title":"The global cyber threat","volume":"58","author":"Maurer","year":"2021","journal-title":"Finance & Development"},{"key":"2025041803561617800_bib43","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1111\/risa.13511","article-title":"A risk analysis framework for cyber security and critical infrastructure protection of the US electric power grid","volume":"40","author":"Baggot","year":"2020","journal-title":"Risk Analysis"},{"key":"2025041803561617800_bib44","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1111\/puar.13322","article-title":"An improvised patchwork: success and failure in cybersecurity policy for critical infrastructure","volume":"81","author":"Atkins","year":"2021","journal-title":"Public Adm Rev"},{"key":"2025041803561617800_bib45","doi-asserted-by":"crossref","DOI":"10.4135\/9781529789768","volume-title":"The Colonial Pipeline Hack: Exposing Vulnerabilities in US Cybersecurity","author":"Hobbs","year":"2021"},{"key":"2025041803561617800_bib46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1134\/S101933161801001X","article-title":"Challenges and opportunities in forming a digital economy in Russia","volume":"88","author":"Beletin","year":"2018","journal-title":"Her Russ Acad Sci"},{"volume-title":"The Paranoid Style in American Politics","year":"2012","author":"Hofstadter","key":"2025041803561617800_bib47"},{"key":"2025041803561617800_bib48","first-page":"1","article-title":"Paranoia: American foreign policy since 1948 and how to overcome it","author":"Landis","year":"2013","journal-title":"American Diplomacy"},{"volume-title":"The Russia Anxiety: And How History Can Resolve It","year":"2019","author":"Smith","key":"2025041803561617800_bib49"},{"key":"2025041803561617800_bib50","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1162\/isec.2010.34.3.7","article-title":"Same as it ever was: nuclear alarmism, proliferation, and the Cold War","volume":"34","author":"Gavin","year":"2010","journal-title":"Int Secur"},{"key":"2025041803561617800_bib51","first-page":"20","article-title":"Nuclear threats and alerts","volume":"52","author":"Burr","year":"2022","journal-title":"Arms Control Today"},{"key":"2025041803561617800_bib52","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1093\/ijpor\/edz003","article-title":"A new Cold War? International public opinion of Russia and the United States","volume":"32","author":"Fisher","year":"2020","journal-title":"Int J Public Opin Res"},{"volume-title":"United West, Divided From The Rest: Global Public Opinion One Year Into Russia's War On Ukraine","year":"2023","author":"Ash","key":"2025041803561617800_bib53"},{"key":"2025041803561617800_bib54","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1017\/S0003055420000064","article-title":"Public opinion and foreign electoral intervention","volume":"114","author":"Tomz","year":"2020","journal-title":"Am Polit Sci Rev"},{"key":"2025041803561617800_bib55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1521\/soco.2014.32.supp.1","article-title":"Understanding priming effects in social psychology: what is \u201csocial priming\u201d and how does it occur?","volume":"32","author":"Molden","year":"2014","journal-title":"Soc Cognition"},{"key":"2025041803561617800_bib56","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1521\/soco.2014.32.supp.209","article-title":"The historical origins of priming as the preparation of behavioral responses: unconscious carryover and contextual influences of real-world importance","volume":"32","author":"Bargh","year":"2014","journal-title":"Soc Cogn"},{"key":"2025041803561617800_bib57","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1027\/1614-2241\/a000014","article-title":"Experimental vignette studies in survey research","volume":"6","author":"Atzm\u00fcller","year":"2010","journal-title":"Methodology"},{"key":"2025041803561617800_bib58","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1177\/1088868307302223","article-title":"The self in priming research: differences in active self-concept","volume":"11","author":"Wheeler","year":"2007","journal-title":"Pers Soc Psychol Rev"},{"key":"2025041803561617800_bib59","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1348\/0007126042369776","article-title":"Understanding the relationship between repetition priming and mere exposure","volume":"95","author":"Butler","year":"2004","journal-title":"Br J Psychol"},{"key":"2025041803561617800_bib60","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1521\/soco.2014.32.supp.47","article-title":"Priming is not priming is not priming","volume":"32","author":"Wentura","year":"2014","journal-title":"Soc Cogn"},{"key":"2025041803561617800_bib61","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1037\/0022-3514.85.2.197","article-title":"Understanding and using the implicit association test: I. An improved scoring algorithm","volume":"74","author":"Greenwald","year":"2003","journal-title":"J Pers Soc Psychol"},{"key":"2025041803561617800_bib62","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1037\/bul0000030","article-title":"From primed concepts to action: a meta-analysis of the behavioral effects of incidentally presented words","volume":"142","author":"Weingarten","year":"2016","journal-title":"Psychol Bull"},{"key":"2025041803561617800_bib63","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1038\/d41586-019-03755-2","article-title":"What's next for psychology's embattled field of social priming","volume":"576","author":"Chivers","year":"2019","journal-title":"Nature"},{"key":"2025041803561617800_bib64","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1073\/pnas.1416587112","article-title":"Validating vignette and conjoint survey experiments against real-world behavior","volume":"112","author":"Hainmueller","year":"2015","journal-title":"Proc Natl Acad Sci"},{"key":"2025041803561617800_bib65","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1146\/annurev-polisci-042716-115726","article-title":"Some advances in the design of survey experiments","volume":"21","author":"Sniderman","year":"2018","journal-title":"Annu Rev Polit Sci"},{"key":"2025041803561617800_bib66","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","article-title":"The moderator-mediator variable distinction in social psychological research","volume":"51","author":"Baron","year":"1986","journal-title":"J Pers Soc Psychol"},{"key":"2025041803561617800_bib67","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1037\/a0020761","article-title":"A general approach to causal mediation analysis","volume":"15","author":"Imai","year":"2010","journal-title":"Psychol Methods"},{"key":"2025041803561617800_bib68","doi-asserted-by":"crossref","DOI":"10.4324\/9780203809556","volume-title":"Introduction to Statistical Mediation Analysis","author":"MacKinnon","year":"2012"},{"key":"2025041803561617800_bib69","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1037\/tra0001421","article-title":"A brief primer on conducting regression-based causal mediation analysis","volume":"15","author":"Li","year":"2023","journal-title":"Psychol Trauma"},{"key":"2025041803561617800_bib70","doi-asserted-by":"publisher","DOI":"10.1177\/20531680221108328","article-title":"Solid support or secret dissent? A list experiment on preference falsification during the Russian war against Ukraine","volume":"9","author":"Chapkovski","year":"2022","journal-title":"Research & Politics"},{"key":"2025041803561617800_bib71","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1093\/poq\/nfn063","article-title":"Social desirability bias in CATI, IVR, and web surveys: the effects of mode and question sensitivity","volume":"72","author":"Kreuter","year":"2008","journal-title":"Public Opinion Quarterly"},{"key":"2025041803561617800_bib72","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1146\/annurev-soc-071913-043137","article-title":"Measurement equivalence in cross-national research","volume":"40","author":"Davidov","year":"2014","journal-title":"Annu Rev Sociol"},{"key":"2025041803561617800_bib73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jogss\/ogz077","article-title":"The microfoundations of state cybersecurity: cyber risk perceptions and the mass public","volume":"6","author":"Kostyuk","year":"2021","journal-title":"J Glob Secur Stud"},{"key":"2025041803561617800_bib74","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1177\/00111287231180093","article-title":"The role of cybersecurity knowledge and awareness in cybersecurity intention and behavior in the United States","volume":"70","author":"Lee","year":"2024","journal-title":"Crime Delinq"},{"key":"2025041803561617800_bib75","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001","volume-title":"Cyber War versus Cyber Realities: Cyber Conflict in the International System","author":"Valeriano","year":"2015"},{"article-title":"What do we know about cyber escalation?: observations from simulations and surveys","year":"2019","author":"Jensen","key":"2025041803561617800_bib76"},{"key":"2025041803561617800_bib77","doi-asserted-by":"crossref","DOI":"10.4324\/9780203771587","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","year":"2013"},{"key":"2025041803561617800_bib78","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1111\/misr.12023","article-title":"From cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse","volume":"15","author":"Dunn\u00a0Cavelty","year":"2013","journal-title":"International Studies Review"},{"key":"2025041803561617800_bib79","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1080\/00963402.2016.1216502","article-title":"The psychological effects of cyber terrorism","volume":"72","author":"Gross","year":"2016","journal-title":"Bull At Sci"},{"key":"2025041803561617800_bib80","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1093\/cybsec\/tyw018","article-title":"Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes","volume":"3","author":"Gross","year":"2017","journal-title":"J. Cybersecur"},{"key":"2025041803561617800_bib81","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1093\/isq\/sqab034","article-title":"Breaking the myth of cyber doom: securitization and normalization of novel threats","volume":"65","author":"Gomez","year":"2021","journal-title":"International Studies Quarterly"},{"key":"2025041803561617800_bib82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jogss\/ogz077","article-title":"The microfoundations of state cybersecurity: cyber risk perceptions and the mass public","volume":"6","author":"Kostyuk","year":"2021","journal-title":"J Glob Secur Stud"},{"key":"2025041803561617800_bib83","first-page":"1","article-title":"Cyber and crisis escalation: insights from wargaming","volume":"43","author":"Schneider","year":"2017","journal-title":"USASOC Futures Forum"},{"key":"2025041803561617800_bib84","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyz007","article-title":"Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics","volume":"5","author":"Kreps","year":"2019","journal-title":"J Cybersecur"},{"key":"2025041803561617800_bib85","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1177\/0010414005278419","article-title":"What are the political consequences of trust? A test of cultural and institutional theories in Russia","volume":"38","author":"Mishler","year":"2005","journal-title":"CPS"},{"key":"2025041803561617800_bib86","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1080\/23738871.2023.2184708","article-title":"A sliding scale of secrecy: toward a better understanding of the role of publicity in offensive cyber operations","volume":"7","author":"Baram","year":"2022","journal-title":"J Cyber Policy"},{"key":"2025041803561617800_bib87","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/jogss\/ogad013","article-title":"Public secrets: the dynamics of publicity and secrecy in offensive cyber operations","volume":"8","author":"Baram","year":"2023","journal-title":"J Glob Secur Stud"},{"volume-title":"Cyberspace in Peace and War","year":"2021","author":"Libicki","key":"2025041803561617800_bib88"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf007\/62952330\/tyaf007.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf007\/62952330\/tyaf007.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T07:56:30Z","timestamp":1744962990000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf007\/8115914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":88,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf007","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf007"}}