{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:34:40Z","timestamp":1762868080628,"version":"3.37.3"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1444755"],"award-info":[{"award-number":["1444755"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2393"],"award-info":[{"award-number":["N00014-18-1-2393"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2971960","type":"journal-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T23:34:36Z","timestamp":1580945676000},"page":"28301-28310","source":"Crossref","is-referenced-by-count":18,"title":["Perspective: The Cyber Frontier and Infrastructure"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9354-2102","authenticated-orcid":false,"given":"Mikhail V.","family":"Chester","sequence":"first","affiliation":[]},{"given":"Braden R.","family":"Allenby","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards","year":"2019","author":"raggi","key":"ref39"},{"key":"ref38","article-title":"Cyber-sabotage is easy","author":"rid","year":"0","journal-title":"Foreign Policy"},{"article-title":"Statement for the record: Worldwide cyber threats","year":"2015","author":"clapper","key":"ref33"},{"journal-title":"The resilience of the electric power delivery system in response to terrorism and natural disasters summary of a workshop","year":"2013","key":"ref32"},{"article-title":"Tracking and tracing cyber-attacks: Technical challenges and global policy issues","year":"2002","author":"lipson","key":"ref31"},{"article-title":"A common language for computer security incidents","year":"1998","author":"howard","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref36","first-page":"1","article-title":"Challenges for securing cyber physical systems","volume":"5","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref35","first-page":"216","article-title":"Impact of smartphones on society","volume":"98","author":"sarwar","year":"2013","journal-title":"Eur J Sci Res"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1525\/elementa.360"},{"journal-title":"The Fifth Discipline The Art & Practice of the Learning Organization","year":"1990","author":"senge","key":"ref60"},{"key":"ref61","article-title":"5G, AI, and big data: We&#x2019;re building a new cognitive infrastructure and don&#x2019;t even know it yet","author":"allenby","year":"0","journal-title":"Bull At Scientists"},{"journal-title":"Guide for Conducting Risk Assessments","year":"2012","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"article-title":"Cyber prep 2.0: Motivating organizational cyber strategies in terms of threat preparedness","year":"2017","author":"bodeau","key":"ref29"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update","year":"2019","key":"ref2"},{"journal-title":"Cisco visual networking index Forecast and trends 2017&#x2013;2022","year":"2019","key":"ref1"},{"journal-title":"Computer Chips Inside the Car","year":"2020","key":"ref20"},{"journal-title":"Connected Cars are &#x2018;Driving Microchip Development&#x2019;","year":"2017","author":"katwala","key":"ref22"},{"year":"1999","author":"turley","key":"ref21"},{"key":"ref24","first-page":"17","article-title":"Classifying cyber events: A proposed taxonomy","volume":"17","author":"harry","year":"2018","journal-title":"J Info Warfare"},{"year":"2013","author":"amick","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"article-title":"Towards a new cyber threat actor typology","year":"2017","author":"de bruijne","key":"ref25"},{"key":"ref50","article-title":"The value of science is in the foresight","author":"gerasimov","year":"0","journal-title":"Mil Rev"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1881.001.0001","author":"hutchins","year":"1995","journal-title":"Cognition in the Wild"},{"article-title":"Disruptive transportation: The adoption, utilization, and impacts of ride-hailing in the United States","year":"2017","author":"clemlow","key":"ref59"},{"key":"ref58","first-page":"203","article-title":"Algorithmic harms beyond Facebook and Google: Emergent challenges of computational agency symposium essays","volume":"13","author":"tufekci","year":"2015","journal-title":"Colorado Technology Law J"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2014.10.002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1080\/15472450.2016.1171151"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36309-2_6"},{"article-title":"Hobbling Huawei: Inside the U.S. ware on China&#x2019;s tech giant","year":"2019","author":"bryan-low","key":"ref54"},{"journal-title":"Google and Facebook are Gobbling Up the Internet&#x2019;s Subsea Cables","year":"2018","author":"burgess","key":"ref53"},{"journal-title":"Does Hardware Even Matter Anymore","year":"2015","author":"shih","key":"ref52"},{"journal-title":"The Evolutionary Trajectory The Growth of Information in the History and Future of Earth","year":"2003","author":"coren","key":"ref10"},{"journal-title":"Les Arbres de L&#x2019;&#x00E9;volution Univers Vie Soci&#x00E9;t&#x00E9;","year":"2000","author":"nottale","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/13518040490450529"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1515\/9781400827817"},{"journal-title":"How the West Grew Rich The Economic Transformation of the Industrial World","year":"1986","author":"rosenberg","key":"ref13"},{"key":"ref14","first-page":"12","article-title":"Anthropocene: An epoch of our making","volume":"78","author":"syvitski","year":"2012","journal-title":"Global Change"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2011.07.006"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/MSPEC.2010.5644774","article-title":"Ray Kurzweil&#x2019;s slippery futurism","author":"rennie","year":"2010","journal-title":"IEEE Spectrum Technology Engineering and Science News"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189915"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1076-0342(2004)10:3(79)"},{"journal-title":"History of Automotive Electronics","year":"1998","author":"jurgen","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05642-4_16"},{"journal-title":"Ericsson Mobility Report","year":"2017","key":"ref3"},{"key":"ref6","first-page":"28","article-title":"How China will use cyber warfare to leapfrog in military competiitiveness","volume":"8","author":"fritz","year":"2008","journal-title":"Culture Mandala The Bulletin of the Centre for East-West Cultural and Economic Studies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/23789689.2017.1416846"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0096340215571911"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5038\/1944-0472.4.2.1"},{"journal-title":"LikeWar The Weaponization of Social Media","year":"2018","author":"singer","key":"ref49"},{"journal-title":"The Phenomenon of Man","year":"2008","author":"de chardin","key":"ref9"},{"journal-title":"The New Rules of War Victory in the Age of Durable Disorder","year":"2019","author":"mcfate","key":"ref46"},{"journal-title":"World Order","year":"2014","author":"kissinger","key":"ref45"},{"article-title":"Weaponized narrative: The new battlespace","year":"2017","author":"allenby","key":"ref48"},{"journal-title":"Unrestricted Warfare","year":"1999","author":"liang","key":"ref47"},{"key":"ref42","article-title":"Russia in Ukraine 2013&#x2013;2016: The application of the new type of warfare maximizing the exploitation of cyber, IO, and media","author":"sprang","year":"0","journal-title":"Small Wars Journal"},{"article-title":"Reflexive control and disinformation in putin&#x2019;s wars","year":"2018","author":"king","key":"ref41"},{"key":"ref44","first-page":"387","article-title":"In an age of civilizational conflict","volume":"56","author":"allenby","year":"2016","journal-title":"Jurimetrics"},{"journal-title":"Department of Homeland Security&#x2019;s Cybersecurity and Infrastructure Security Agency","year":"2018","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/8948470\/8984360-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08984360.pdf?arnumber=8984360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T03:16:16Z","timestamp":1722395776000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8984360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2971960","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}