{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:43:48Z","timestamp":1774644228092,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/cycon51939.2021.9467806","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T20:27:07Z","timestamp":1625516827000},"page":"189-214","source":"Crossref","is-referenced-by-count":2,"title":["Building a National Cyber Strategy: The Process and Implications of the Cyberspace Solarium Commission Report"],"prefix":"10.23919","author":[{"given":"Brandon","family":"Valeriano","sequence":"first","affiliation":[{"name":"Donald Bren Chair of Military Innovation Marine Corps University,Quantico,VA,USA"}]},{"given":"Benjamin","family":"Jensen","sequence":"additional","affiliation":[{"name":"School of Advanced Warfighting Marine Corps University,Quantico,VA,USA"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Escalation Firebreaks in the Cyber, Conventional, and Nuclear Domains: Moving Beyond Effects-Based Logics","volume":"5","author":"kreps","year":"2019","journal-title":"Cybersecurity"},{"key":"ref38","author":"klimburg","year":"2012","journal-title":"National Cyber Security - Framework Manual"},{"key":"ref33","article-title":"Layered Cyber Deterrence: A Strategy for Security Connectivity in the 21st Century","author":"jensen","year":"2020","journal-title":"Lawfare"},{"key":"ref32","author":"jensen","year":"0","journal-title":"What Do We Know about Cyber Escalation? Observations from Simulations and Surveys"},{"key":"ref31","article-title":"Cyber Escalation Dynamics: Resultsfrom War Game Experiments","author":"jensen","year":"2019","journal-title":"Annual Meeting of the International Studies Association"},{"key":"ref30","author":"jensen","year":"2018","journal-title":"Cyber Operations in Conflict Lessons from Analytic Wargames"},{"key":"ref37","author":"kingdon","year":"1984","journal-title":"Agendas Alternatives and Public Policies"},{"key":"ref36","author":"kahn","year":"1968","journal-title":"On Escalation Metaphors and Scenarios"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/2009945"},{"key":"ref34","author":"jervis","year":"1970","journal-title":"The Logic of Images in International Relations"},{"key":"ref60","author":"zenko","year":"2015","journal-title":"Red Team How to Succeed by Thinking Like the Enemy"},{"key":"ref28","first-page":"20","article-title":"Depleted Trust in the Cyber Commons","volume":"6","author":"hurwitz","year":"2012","journal-title":"Strategic Studies Quarterly"},{"key":"ref27","article-title":"The Implications of Persistent (and Permanent) Engagement in Cyberspace","volume":"5","author":"healey","year":"2019","journal-title":"Cybersecurity"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/14702436.2018.1497928"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1541-1338.2009.00393.x"},{"key":"ref1","author":"baldwin","year":"2020","journal-title":"Economic Statecraft"},{"key":"ref20","article-title":"Persistent Engagement and Cost Imposition: Distinguishing Between Cause and Effect","author":"fischerkeller","year":"0","journal-title":"Lawfare"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12729"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2014.885203"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2015.1102543"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2017.1399730"},{"key":"ref26","first-page":"42","article-title":"The Idea of a &#x2018;Fleet in Being&#x2019; in Historical Perspective","volume":"67","author":"hattendorf","year":"2014","journal-title":"Naval War College Review"},{"key":"ref25","article-title":"SolarWinds: The Need for Persistent Engagement","author":"harknett","year":"0","journal-title":"Lawfare"},{"key":"ref50","author":"sanger","year":"0","journal-title":"Scope of Russian Hacking Becomes Clear Multiple U S Agencies Were Hit"},{"key":"ref51","author":"schelling","year":"1960","journal-title":"The Strategy of Conflict"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1177\/0022002718785693"},{"key":"ref58","author":"yarhi-milo","year":"2014","journal-title":"Knowing the Adversary Leaders Intelligence and Assessment of Intentions in International Relations"},{"key":"ref57","article-title":"De-Escalation Pathways and Disruptive Technology: Cyber Operations as Off-Ramps to War","author":"valeriano","year":"2021","journal-title":"Cyber Peace"},{"key":"ref56","article-title":"The Myth of the Cyber Offense: The Case for Cyber Restraint","author":"valeriano","year":"2019","journal-title":"Cato Institute Policy Analysis"},{"key":"ref55","author":"valeriano","year":"2018","journal-title":"Cyber Coercion The Evolving Character of Cyber Power and Strategy"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976636"},{"key":"ref53","article-title":"The Nature of International Law Cyber Norms","author":"schmitt","year":"2014","journal-title":"Tallinn Paper"},{"key":"ref52","author":"schelling","year":"1966","journal-title":"Arms and Influence"},{"key":"ref10","author":"cleveland","year":"2018","journal-title":"Military Strategy for the 21st Century People Connectivity and Competition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2307\/2392088"},{"key":"ref40","author":"libicki","year":"2016","journal-title":"Cyber war and peace"},{"key":"ref12","article-title":"McCain National Defense Authorization Act for Fiscal Year","author":"john","year":"2019","journal-title":"US Congress Washington DC"},{"key":"ref13","article-title":"SolarWinds is Bad, but Retreat From Defend Forward Would Be Worse","author":"corn","year":"0","journal-title":"Lawfare"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.11.004"},{"key":"ref15","first-page":"381","article-title":"Use of Force and Armed Attack Thresholds in Cyber Conflict: The Looming Definitional Gaps and the Growing Need for Formal UN Response","volume":"50","author":"dev","year":"2015","journal-title":"Texas International Law Journal"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/S0143814X00008114"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1017\/S0002930000016894"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.orbis.2017.05.003"},{"key":"ref19","first-page":"267","article-title":"Persistent Engagement, Agreed Competition, and Cyberspace Interaction Dynamics and Escalation","author":"fischerkeller","year":"2019","journal-title":"Cyber Defense Rev"},{"key":"ref4","first-page":"122","article-title":"Cyber Operations as Imperfect Tools of Escalation","volume":"13","author":"borghard","year":"2019","journal-title":"Strategic Studies Quarterly"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2017.1306396"},{"key":"ref6","author":"carson","year":"2020","journal-title":"Secret Wars Covert Conflict in International Politics"},{"key":"ref5","article-title":"Russia's Hack Wasn't Cyberwar. That Complicates US Strategy","author":"borghard","year":"0","journal-title":"Wired"},{"key":"ref8","first-page":"1","article-title":"Patchwork of Confusion: The Cybersecurity Coordination Problem","volume":"4","author":"chaudhary","year":"2018","journal-title":"Cybersecurity"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2017.1243921"},{"key":"ref49","author":"rovner","year":"0","journal-title":"Did the Cyberspace Solarium Commission Live Up to Its Name?"},{"key":"ref9","author":"clarke","year":"2014","journal-title":"Cyber War Old Saybrook"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00266"},{"key":"ref45","article-title":"How to Compete in Cyberspace","author":"nakasone","year":"2020","journal-title":"Foreign Affairs"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1017\/S1752971915000081"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1093\/jogss\/ogz065"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2111674"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511762659"},{"key":"ref44","first-page":"10","article-title":"A Cyber Force for Persistent Operations","volume":"92","author":"nakasone","year":"2019","journal-title":"Joint Forces Quart"},{"key":"ref43","author":"montgomery","year":"2020","journal-title":"Cyberspace Solarium Commission Report"}],"event":{"name":"2021 13th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2021,5,25]]},"end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 13th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467797\/9467799\/09467806.pdf?arnumber=9467806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:56:02Z","timestamp":1659484562000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9467806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":60,"URL":"https:\/\/doi.org\/10.23919\/cycon51939.2021.9467806","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}