{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:51:49Z","timestamp":1772794309023,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.23919\/cycon.2018.8405008","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T19:16:45Z","timestamp":1531163805000},"page":"9-30","source":"Crossref","is-referenced-by-count":2,"title":["Rethinking the data wheel: Automating open-access, public data on cyber conflict"],"prefix":"10.23919","author":[{"given":"Christopher","family":"Whyte","sequence":"first","affiliation":[]},{"given":"Brandon","family":"Valeriano","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Maness","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"899","article-title":"The realist paradigm and degenerative versus progressive research programs: An appraisal of neotraditional research on Waltz's balancing proposition","volume":"91 4","year":"1997","journal-title":"American Political Science Review"},{"key":"ref32","author":"brandon","year":"2018","journal-title":"Cyber Coercion The Evolving Character of Cyber Power and Strategy"},{"key":"ref31","author":"brandon","year":"2015","journal-title":"Cyber War Versus Cyber Realities Cyber Conflict in the International System"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1177\/0022343313518940","article-title":"The dynamics of cyber conflict between rival antagonists, 2001-11","volume":"51","author":"brandon","year":"2014","journal-title":"Journal of Peace Research"},{"key":"ref36","author":"christopher","year":"2017","journal-title":"Out of the Shadows Subversion and Counterculture in the Digital Age"},{"key":"ref35","article-title":"Ending cyber coercion: Computer network attack, exploitation and the case of North Korea","author":"christopher","year":"2016","journal-title":"Comparative Strategy"},{"key":"ref34","first-page":"267","article-title":"Comparing GDELT and ICEWS event data","volume":"21","year":"2013","journal-title":"Analysis"},{"key":"ref10","article-title":"Extracting systematic social science meaning from text","volume":"20","author":"daniel","year":"2007","journal-title":"Manuscript"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5907.2009.00428.x"},{"key":"ref12","author":"jason","year":"2013","journal-title":"A Fierce Domain Conflict in Cyberspace 1986 to 2012"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1017\/S0260210508007948","article-title":"Foregrounding ontology: dualism, monism, and IR theory","volume":"34","year":"2008","journal-title":"Review of International Studies"},{"key":"ref14","author":"lucas","year":"2017","journal-title":"The Virtual Weapon and International Order"},{"key":"ref15","first-page":"617","article-title":"An Automated Information Extraction Tool For International Conflict Data with Performance as Good as Human Coders: A Rare Events Evaluation Design","volume":"57","author":"gary","year":"2002","journal-title":"International Organization"},{"key":"ref16","article-title":"Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?","author":"nadiya","year":"2017","journal-title":"Journal of Conflict Resolution"},{"key":"ref17","first-page":"91","article-title":"Falsification and the Methodology of Scientific Research Programmes","author":"imre","year":"1970","journal-title":"Criticism and the Growth of Knowledge"},{"key":"ref18","article-title":"GDELT: Global data on events, location, and tone","author":"kalev","year":"2013","journal-title":"ISA Annual Convention"},{"key":"ref19","year":"2002","journal-title":"Assessing the Risks of Cyber Terrorism Cyber War and Other Cyber Threats"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1162\/ISEC_a_00267","article-title":"What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment","volume":"41","author":"rebecca","year":"2017","journal-title":"International Security"},{"key":"ref4","article-title":"ICEWS Coded Event Data","volume":"22","author":"elizabeth","year":"2015","journal-title":"Harvard dataverse"},{"key":"ref27","article-title":"Three's a Charm?: Open Event Data Coding with EL: DIABLO, PETRARCH, and the Open Event Data Alliance","year":"2014","journal-title":"ISA Annual Convention"},{"key":"ref3","author":"john","year":"2016","journal-title":"Generating politically-relevant event data"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1162\/ISEC_a_00136","article-title":"The myth of cyberwar: bringing war in cyberspace back down to earth","volume":"38","author":"erik","year":"2013","journal-title":"International Security"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1145\/42411.42412","article-title":"Stalking the wily hacker","volume":"31","author":"clifford","year":"1988","journal-title":"Communications of the ACM"},{"key":"ref5","first-page":"553","article-title":"Negative case analysis","author":"brodsky","year":"2008","journal-title":"The SAGE Encyclopedia of Qualitative Research Methods"},{"key":"ref8","article-title":"The creation of CAMEO (Conflict and Mediation Event Observations): An event data framework for a post cold war world","volume":"29","year":"2002","journal-title":"annual meeting of the American Political Science Association"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1080\/09636412.2015.1038188","article-title":"Weaving tangled webs: offense, defense, and deception in cyberspace","volume":"24","author":"erik","year":"2015","journal-title":"Security Studies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/002200278002400106"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2014.941543"},{"key":"ref1","year":"2015","journal-title":"Equation Group The Crown Creator of Cyber-Espionage"},{"key":"ref20","year":"2012","journal-title":"Crisis and Escalation in Cyberspace"},{"key":"ref22","first-page":"53","article-title":"Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack","volume":"1","year":"2015","journal-title":"Cybersecurity"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2013.816122"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00266"},{"key":"ref23","first-page":"55","article-title":"The Stanford CoreNLP Natural Language Processing Toolkit","year":"2014","journal-title":"Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics System Demonstrations"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/01402390.2014.977382","article-title":"Attributing cyber attacks","volume":"38","author":"thomas","year":"2015","journal-title":"Journal of Strategic Studies"},{"key":"ref25","year":"2016","journal-title":"Automated Learning of Event Coding Dictionaries for Novel Domains with an Application to Cyberspace"}],"event":{"name":"2018 10th International Conference on Cyber Conflict (CyCon)","location":"Tallinn","start":{"date-parts":[[2018,5,29]]},"end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 10th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399711\/8405000\/08405008.pdf?arnumber=8405008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T10:38:44Z","timestamp":1571567924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8405008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.23919\/cycon.2018.8405008","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}