{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:38Z","timestamp":1750307018613,"version":"3.41.0"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2012,6]]},"abstract":"<jats:p>Cybersecurity and policy issues for computer scientists.<\/jats:p>","DOI":"10.1145\/2184319.2184334","type":"journal-article","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T15:47:01Z","timestamp":1337788021000},"page":"41-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Why computer scientists should care about cyber conflict and U.S. national security policy"],"prefix":"10.1145","volume":"55","author":[{"given":"Herbert","family":"Lin","sequence":"first","affiliation":[{"name":"National Academies"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2012,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Wall Street Journal (May 31","author":"Gorman S.","year":"2011","unstructured":"Gorman , S. Cyber combat : Act of war . Wall Street Journal (May 31 , 2011 ); http:\/\/online.wsj.com\/article\/SB10001424052702304563104576355623135782718.html#ixzz109BF3ADz. Gorman, S. Cyber combat: Act of war. Wall Street Journal (May 31, 2011); http:\/\/online.wsj.com\/article\/SB10001424052702304563104576355623135782718.html#ixzz109BF3ADz."},{"key":"e_1_2_1_2_1","volume-title":"Israeli military plots to cripple Iran in cyberspace. Sunday Times (Aug. 7","author":"Mahnaimi U.","year":"2011","unstructured":"Mahnaimi , U. Israeli military plots to cripple Iran in cyberspace. Sunday Times (Aug. 7 , 2011 ). Mahnaimi, U. Israeli military plots to cripple Iran in cyberspace. Sunday Times (Aug. 7, 2011)."},{"key":"e_1_2_1_3_1","volume-title":"A code for chaos. New York Times (Oct. 2","author":"Markoff J.","year":"2010","unstructured":"Markoff , J. A code for chaos. New York Times (Oct. 2 , 2010 ); http:\/\/www.nytimes.com\/2010\/10\/03\/weekinreview\/03markoff.html?ref=stuxnet. Markoff, J. A code for chaos. New York Times (Oct. 2, 2010); http:\/\/www.nytimes.com\/2010\/10\/03\/weekinreview\/03markoff.html?ref=stuxnet."},{"key":"e_1_2_1_4_1","first-page":"1","volume-title":"Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy","author":"National Research Council.","year":"2010","unstructured":"National Research Council. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy , National Academies Press , 2010 ; http:\/\/www.nap.edu\/openbook.php?record_id=12886&page= 1 . National Research Council. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press, 2010; http:\/\/www.nap.edu\/openbook.php?record_id=12886&page=1."},{"key":"e_1_2_1_5_1","volume-title":"Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities","author":"National Research Council.","year":"2009","unstructured":"National Research Council. Technology , Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities , W.A. Owens, K.W. Dam, and H.S. Lin, Eds., National Academies Press , 2009 ; http:\/\/www.nap.edu\/catalog.php?record_id=12651. National Research Council. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W.A. Owens, K.W. Dam, and H.S. Lin, Eds., National Academies Press, 2009; http:\/\/www.nap.edu\/catalog.php?record_id=12651."},{"key":"e_1_2_1_6_1","volume-title":"At the Abyss: An Insider's History of the Cold War","author":"Reed T.C.","year":"2004","unstructured":"Reed , T.C. At the Abyss: An Insider's History of the Cold War . Ballantine Books , New York , 2004 . Reed, T.C. At the Abyss: An Insider's History of the Cold War. Ballantine Books, New York, 2004."},{"key":"e_1_2_1_7_1","unstructured":"White House. International Strategy for Cyberspace May 2011; http:\/\/www.whitehouse.gov\/sites\/default\/files\/rss_viewer\/international_strategy_for_cyberspace.pdf.  White House. International Strategy for Cyberspace May 2011; http:\/\/www.whitehouse.gov\/sites\/default\/files\/rss_viewer\/international_strategy_for_cyberspace.pdf."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184319.2184334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184319.2184334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:10Z","timestamp":1750236550000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184319.2184334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":7,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["10.1145\/2184319.2184334"],"URL":"https:\/\/doi.org\/10.1145\/2184319.2184334","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2012,6]]},"assertion":[{"value":"2012-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}