{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:38:53Z","timestamp":1768347533030,"version":"3.49.0"},"reference-count":5,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"vor","delay-in-days":335,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"DOI":"10.1093\/cybsec\/tyaf038","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T14:09:59Z","timestamp":1762265399000},"source":"Crossref","is-referenced-by-count":0,"title":["Journal of Cybersecurity Special Collection: Philosophy of information security"],"prefix":"10.1093","volume":"11","author":[{"given":"David J","family":"Pym","sequence":"first","affiliation":[{"name":"UCL & Institute of Philosophy, University of London , London,","place":["UK"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9356-219X","authenticated-orcid":false,"given":"Jonathan M","family":"Spring","sequence":"additional","affiliation":[{"name":"Cybersecurity and Infrastructure Security Agency ,","place":["USA"]}]}],"member":"286","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"2026011311371151900_bib1","article-title":"Practicing a science of security: A philosophy of science perspective","volume-title":"New Security Paradigms Workshop","author":"Spring","year":"2017"},{"key":"2026011311371151900_bib2","first-page":"107","article-title":"The US National Cybersecurity Strategy: A Vehicle with an International Journey","volume-title":"European Conference on Cyber Warfare and Security","author":"Carroll","year":"2024"},{"key":"2026011311371151900_bib3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8351.003.0004","article-title":"Trading with the enemy","volume-title":"Trading Zones and Interactional Expertise. Creating New Kinds of Collaboration","author":"Galison","year":"2010"},{"key":"2026011311371151900_bib4","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s13347-018-0329-z","article-title":"Building general knowledge of mechanisms in information security","volume":"32","author":"Spring","year":"2018","journal-title":"Philos Technol"},{"key":"2026011311371151900_bib5","doi-asserted-by":"publisher","first-page":"tyae007","DOI":"10.1093\/cybsec\/tyae007","article-title":"\u2018The trivial tickets build the trust\u2019: A co-design approach to understanding security support interactions in a large university","volume":"10","author":"Demjaha","year":"2024","journal-title":"J Cybersecur"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf038\/65669454\/tyaf038.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf038\/65669454\/tyaf038.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T16:37:21Z","timestamp":1768322241000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf038\/8362510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf038","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf038"}}