{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:37:17Z","timestamp":1725784637470},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T00:00:00Z","timestamp":1671494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,20]]},"DOI":"10.1109\/icca56443.2022.10039571","type":"proceedings-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T19:11:38Z","timestamp":1676401898000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["The Digital and Cyberspace Modernization Strategy; A Possible Strategical Roadmap to Transform Traditional Military Organizations into a Smart Military through the Emerging Information Technology"],"prefix":"10.1109","author":[{"given":"Saleem","family":"Ahmed","sequence":"first","affiliation":[{"name":"OUC Universal College in partnership with Liverpool John Moores University, UK,Doha,Qatar"}]}],"member":"263","reference":[{"volume-title":"Emerging technologies and military capability - ETH Z","year":"2022","author":"James","key":"ref1"},{"volume-title":"Chief information officer - U.S. department of defense","year":"2022","key":"ref2"},{"volume-title":"How military strategy can improve cyber response","year":"2022","author":"Golden","key":"ref3"},{"volume-title":"Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles","year":"2022","author":"Snyder","key":"ref4"},{"volume-title":"Defense Technical Information Center","year":"2022","key":"ref5"},{"volume-title":"Dni.gov","year":"2022","key":"ref6"},{"volume-title":"Organisational Structure and Information Technology (IT): Exploring the Implications of IT for Future Military Structures","year":"2022","author":"Fidock","key":"ref7"},{"volume-title":"How the military might expand its cyber skills","year":"2022","author":"Ryseff","key":"ref8"},{"volume-title":"Federation of American scientists","year":"2022","author":"Sayler","key":"ref9"},{"volume-title":"The impact of new technologies in the Military Arena \u2026 - air university","year":"2022","author":"Nunes","key":"ref10"},{"volume-title":"How to implement a digital transformation plan in five steps","year":"2022","author":"Jupudy","key":"ref11"},{"volume-title":"Eye to eye in AI: Developing artificial intelligence for national security and defense","year":"2022","author":"Nurtin","key":"ref12"},{"volume-title":"U.S. Army Strategic Cyber Posture - events.afcea.org","year":"2022","key":"ref13"}],"event":{"name":"2022 International Conference on Computer and Applications (ICCA)","start":{"date-parts":[[2022,12,20]]},"location":"Cairo, Egypt","end":{"date-parts":[[2022,12,22]]}},"container-title":["2022 International Conference on Computer and Applications (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10038978\/10039482\/10039571.pdf?arnumber=10039571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:58:23Z","timestamp":1710395903000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10039571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,20]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icca56443.2022.10039571","relation":{},"subject":[],"published":{"date-parts":[[2022,12,20]]}}}