{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T11:28:52Z","timestamp":1750418932823,"version":"3.28.0"},"reference-count":51,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/cycon.2016.7529427","type":"proceedings-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T20:28:26Z","timestamp":1470342506000},"page":"65-80","source":"Crossref","is-referenced-by-count":16,"title":["The cyber-doom effect: The impact of fear appeals in the US cyber security debate"],"prefix":"10.1109","author":[{"given":"Sean T.","family":"Lawson","sequence":"first","affiliation":[]},{"given":"Sara K.","family":"Yeo","sequence":"additional","affiliation":[]},{"family":"Haoran Yu","sequence":"additional","affiliation":[]},{"given":"Ethan","family":"Greene","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"journal-title":"defense of food an eater s manifesto","year":"2008","author":"pollan","key":"ref38"},{"key":"ref33","article-title":"Senate overwhehningly passes historic cybersecurity bill","author":"pagliery","year":"2015","journal-title":"CNN"},{"key":"ref32","article-title":"Remarks by the president at the cybersecurity and consumer protection summit","author":"obama","year":"2015","journal-title":"The White House Office of the Press Secretary"},{"key":"ref31","article-title":"Cyberwar could be worse than a tsunami","author":"meyer","year":"2010","journal-title":"ZDNet"},{"key":"ref30","article-title":"Napolitano: Us financial institutions &#x2018;actively under attack&#x2019; by hackers","author":"martinez","year":"2012","journal-title":"The Hill"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1353\/par.2007.0024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/17437199.2012.703527"},{"key":"ref34","article-title":"Defending the National From Cyber Attacks","author":"panetta","year":"2012","journal-title":"Presentation to Business Executives for National Security"},{"key":"ref28","article-title":"NSA's Rogers makes the case forcyber norms","author":"lyngaas","year":"2015","journal-title":"FCW"},{"key":"ref27","article-title":"The CyberWar Has Not Begun","author":"lewis","year":"2010","journal-title":"Center for Strategic and International Studies"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"journal-title":"Creating fear news and the construction of crisis","year":"2002","author":"altheide","key":"ref2"},{"key":"ref1","article-title":"Civilization's high stakes cyber-struggle: Q&A with Gen. Wesley Clark (ret.)","author":"adhikari","year":"2009","journal-title":"TechNewsWorld"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"ref22","article-title":"Of cyber doom, dots, and distractions","author":"lawson","year":"2012","journal-title":"Forbes com"},{"key":"ref21","article-title":"Lights Out: A Cyberattack, A Nation Unprepared","author":"koppel","year":"2015","journal-title":"Surviving the Aftermath"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2659-1.ch007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2012.759059"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600879344"},{"key":"ref25","article-title":"America's top fears 2015","author":"ledbetter","year":"2015","journal-title":"Chapman University Blog"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/10576100590905110"},{"key":"ref51","first-page":"41","article-title":"Cyber-terrorism: Are we barking at the wrong tree?","volume":"9","author":"weimann","year":"2008","journal-title":"Harvard Asia Pacific Review"},{"journal-title":"Cyber War The next Threat to National Security and What to Do about It","year":"2010","author":"clarke","key":"ref10"},{"key":"ref11","article-title":"Senator Collins continues to sound the alarm on the urgent need to bolster cybersecurity","author":"collins","year":"2015","journal-title":"Press Release Office of Senator Susan Collins"},{"key":"ref40","article-title":"Quantum technology sold by cyberweapons arms manufacturers","author":"schneier","year":"2014","journal-title":"Schneier on Security"},{"key":"ref12","first-page":"109","article-title":"Media, fear and the hyperreal: the construction of cyberterrorism as the ultimate threat to critical infrastructures","author":"conway","year":"2008","journal-title":"Securing the &#x2018;Homeland&#x2019; Critical Infrastructure Risk and (In)Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/10402130120042415"},{"journal-title":"Cyber-Security and Threat Politics US Efforts to Secure the Information Age","year":"2008","author":"dunn cavelty","key":"ref14"},{"key":"ref15","first-page":"21","article-title":"A tale of two cities: Or how wrong metaphors lead to less security","author":"dunn cavelty","year":"2015","journal-title":"Georgetown Journal of International Affairs"},{"key":"ref16","first-page":"10f","article-title":"Toffler: Computer attacks wave of future","author":"elias","year":"1994","journal-title":"South Bend Tribune (Indiana)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"197","DOI":"10.5553\/ELR221026712009002002005","article-title":"Precautionary culture and the rise of possibilistic risk assessment","volume":"2","author":"furedi","year":"2009","journal-title":"Erasmus Law Rev"},{"key":"ref18","article-title":"HowtheNSAplansto infect &#x2018;millions&#x2019; of computers with malware","author":"gallagher","year":"2014","journal-title":"Interceptors"},{"journal-title":"The culture of fear why americans are afraid of the wrong things","year":"1999","author":"glassner","key":"ref19"},{"key":"ref4","article-title":"Revealed: How US and UK spy agencies defeat internet privacy and security","author":"ball","year":"2013","journal-title":"The Guardian"},{"journal-title":"Terrorism and the politics of fear","year":"2006","author":"altheide","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors","author":"boss","year":"2015","journal-title":"MIS Quarterly"},{"journal-title":"Behold a pale farce cyberwar threat inflation & the malware-industrial complex","year":"2014","author":"blunden","key":"ref5"},{"journal-title":"Collective defense Applying public health models to the Internet","year":"2010","author":"charney","key":"ref8"},{"key":"ref7","article-title":"Gen. Michael Hayden gives an update on the cyberwar","author":"bussey","year":"2016","journal-title":"Wall Street Journal"},{"journal-title":"Scare tactics arguments that appeal to fear and threats","year":"2000","author":"walton","key":"ref49"},{"key":"ref9","article-title":"Statement for the Record: Worldwide Cyber Threats","author":"clapper","year":"2015","journal-title":"House Permanent Select Committee on Intelligence"},{"journal-title":"The Atlantic","article-title":"Fmr. Intelligence director: New cyberattack may be worse than 9\/11","year":"2010","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-007-9061-9"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001"},{"key":"ref47","first-page":"309","article-title":"Technopanics, threat inflation, and the danger of an information technology precautionary principle","volume":"14","author":"thierer","year":"2013","journal-title":"Minn JL Sci & Tech"},{"key":"ref42","article-title":"List of how many homes each cable network is in as of February 2015","author":"seidman","year":"2015","journal-title":"TV by the Numbers"},{"journal-title":"Terminal Compromise","year":"1991","author":"schwartau","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"ref43","article-title":"Cybersecurity and Cyberwar: What Everyone Needs to Know","author":"singer","year":"2016","journal-title":"Presentation to College of Wooster"}],"event":{"name":"2016 8th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2016,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 8th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7524181\/7529414\/07529427.pdf?arnumber=7529427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T18:06:06Z","timestamp":1718733966000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7529427\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/cycon.2016.7529427","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}