{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T10:07:12Z","timestamp":1648548432519},"reference-count":20,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1093\/cybsec\/tyx002","type":"journal-article","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:44:41Z","timestamp":1488440681000},"source":"Crossref","is-referenced-by-count":0,"title":["Introduction to the special issue on strategic dimensions of offensive cyber operations"],"prefix":"10.1093","author":[{"given":"Herbert","family":"Lin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amy","family":"Zegart","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"286","published-online":{"date-parts":[[2017,3,2]]},"reference":[{"key":"key\n\t\t\t\t20170315151045_tyx002-B1"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B2"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B3","year":"2012"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B4"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B5"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B6"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B7"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B8"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B9"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B10"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B11"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B12","article-title":"The making of America's cyberweapons","year":"24  2016","journal-title":"Christian Science Monitor"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B13","first-page":"313","volume-title":"Cyber Insecurity: Navigating the Perils of the Next Information Age","year":"2016"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B14","volume-title":"The Absolute Weapon: Atomic Power and World Order","year":"1946"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B15","volume-title":"Strategy in the Missile Age","year":"1959"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B16","volume-title":"On Escalation: Metaphors and Scenarios","year":"1965"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B17","volume-title":"Strategy and Arms Control","year":"1961"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B18","year":"2017"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B19"},{"key":"key\n\t\t\t\t20170315151045_tyx002-B20","first-page":"3","article-title":"Activating the power of ideas","volume":"7","year":"2014","journal-title":"Carnegie Rep"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/cybersecurity\/article-pdf\/3\/1\/1\/13686457\/tyx002.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T14:48:38Z","timestamp":1503586118000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/3060285\/Introduction"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyx002","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,2]]}}}