{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:55:46Z","timestamp":1774400146986,"version":"3.50.1"},"reference-count":64,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/cycon51939.2021.9467807","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T16:27:07Z","timestamp":1625502427000},"page":"233-255","source":"Crossref","is-referenced-by-count":9,"title":["The Global Spread of Cyber Forces, 2000\u20132018"],"prefix":"10.23919","author":[{"given":"Jason","family":"Blessing","sequence":"first","affiliation":[{"name":"Foreign Policy Institute, Johns Hopkins School of Advanced International Studies,Washington,DC,United States"}]}],"member":"263","reference":[{"key":"ref39","author":"drew","year":"2013","journal-title":"A New Approach to Force-Mix Analysis A Case Study Comparing Air Force Active and Reserve Forces Conducting Cyber Missions"},{"key":"ref38","first-page":"129","article-title":"The Past, Present, and Future of Russia's Cyber Strategy and Forces","author":"bilyana","year":"2020","journal-title":"20\/20 Vision The Next Decade"},{"key":"ref33","author":"kadri","year":"2015","journal-title":"National Cyber Security Organisation The Netherlands"},{"key":"ref32","year":"2018","journal-title":"11 Sottosegratario Tofalo visita il Comando C4 Difesa e il CIOC"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1080\/04597222.2018.1561032","article-title":"Asia","volume":"119","author":"jason","year":"2019","journal-title":"The Military Balance"},{"key":"ref30","first-page":"89","article-title":"International Institute for Strategic Studies","volume":"113","year":"2013","journal-title":"The Military Balance"},{"key":"ref37","author":"lewis","year":"2013","journal-title":"The Cyber Index International Security Trends and Realities"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/08850607.2018.1488501"},{"key":"ref35","first-page":"143","article-title":"The All-Purpose Sword: North Korea's Cyber Operations and Strategies","author":"kong","year":"2019","journal-title":"2019 11th International Conference on Cyber Conflict Silent Battle"},{"key":"ref34","author":"zachary","year":"2014","journal-title":"South Korea Seeks Offensive Cyber Capabilities"},{"key":"ref60","author":"tom","year":"2018","journal-title":"Australia's Offensive Cyber Capability"},{"key":"ref62","author":"brandon","year":"2015","journal-title":"Cyber War Versus Cyber Realities Cyber Conflict in the International System"},{"key":"ref61","year":"0","journal-title":"U S Cyber Command History"},{"key":"ref63","author":"wiener","year":"2016","journal-title":"Penetrate Exploit Disrupt Destroy The Rise of Computer Network Operations as a Major Military Innovation"},{"key":"ref28","first-page":"256","article-title":"Mimetic and Normative Isomorphism in the Establishment and Maintenance of Independent Air Forces","volume":"32","author":"james","year":"2016","journal-title":"Defense & Security Analysis"},{"key":"ref64","article-title":"World Bank","year":"2018","journal-title":"World Development Indicators"},{"key":"ref27","author":"matteo","year":"2013","journal-title":"Military Cyber Defense Structures of NATO Members An Overview"},{"key":"ref29","author":"jason","year":"2013","journal-title":"A Fierce Domain Conflict in Cyberspace 1986 to 2012"},{"key":"ref2","author":"applegate","year":"2012","journal-title":"Leveraging Cyber Militias as a Force Multiplier in Cyber Operations"},{"key":"ref1","article-title":"Moldova: A Defence Sector Reform Assessment","author":"adriana lins de","year":"2016","journal-title":"FOI-R-4350-SE"},{"key":"ref20","author":"ertan","year":"2020","journal-title":"Cyber Threats and NATO 2030 Horizon Scanning and Analysis"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1080\/01402399608437629","article-title":"Figuring Out Fighting Organisations: The New Organisational Analysis in Strategic Studies","volume":"19","author":"theo","year":"1996","journal-title":"Journal of Strategic Studies"},{"key":"ref21","year":"0","journal-title":"Estonian Defence Forces n d"},{"key":"ref24","first-page":"2016","author":"felongco","year":"2016","journal-title":"Philippine Armed Forces Build Up Capability to Fight in Cyberspace"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1080\/01402390.2010.489712","article-title":"Improving in War: Military Adaptation and the British in Helman Province, Afghanistan, 2006&#x2013;2009","volume":"33","author":"theo","year":"2010","journal-title":"Journal of Strategic Studies"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.31235\/0sf.io\/fc6sg"},{"key":"ref25","author":"gederts","year":"2014","journal-title":"Latvia Launches Cyber Defence Unit to Beef Up Online Security"},{"key":"ref50","author":"anna-maria","year":"2015","journal-title":"National Cyber Security Organisation Tallinn Estonia NATO CCD COE"},{"key":"ref51","author":"piret","year":"2018","journal-title":"Preparing for Cyber Conflict Case Studies of Cyber Command"},{"key":"ref59","author":"max","year":"2019","journal-title":"NATO Allies Need to Come to Terms With Offensive Cyber Operations"},{"key":"ref58","first-page":"163","article-title":"NATO Members&#x2019; Organizational Path Towards Conducting Offensive Cyber Operations: A Framework for Analysis","author":"max","year":"0","journal-title":"11 th International Conference on Cyber Conflict Silent Battle"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1080\/01402390.2017.1288107","article-title":"A Matter of Time: On the Transitory Nature of Cyberweapons","volume":"41","author":"max","year":"2018","journal-title":"Journal of Strategic Studies"},{"key":"ref56","author":"esnar","year":"2018","journal-title":"National Cyber Security Organisation Turkey"},{"key":"ref55","first-page":"95","article-title":"Deterrence in and through Cyberspace","author":"jacquelyn","year":"2019","journal-title":"Cross-Domain Deterrence Strategy in an Era of Complexity"},{"key":"ref54","author":"rosen","year":"1991","journal-title":"Winning the Next War Innovation and the Modern Military"},{"key":"ref53","author":"neil","year":"2013","journal-title":"Stocktaking Study of Military Cyber Defence Capabilities in the European Union (MilCyberCAP) Unclassified Summary"},{"key":"ref52","author":"joao","year":"2007","journal-title":"Neorealism States and the Modern Mass Army"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1080\/09636410601028321","article-title":"An Autocracy at War: Explaining Military Effectiveness, 1967 and 1973","volume":"15","author":"risa","year":"2006","journal-title":"Security Studies"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/00396338.2016.1142093","article-title":"The Life Cycles of Cyber Threats","volume":"58","author":"benjamin","year":"2016","journal-title":"Survival"},{"key":"ref40","year":"2012","journal-title":"Cyberforsvaret offisielt etablert i dag"},{"key":"ref12","author":"benjamin","year":"2017","journal-title":"The Cybersecurity Dilemma Hacking Trust and Fear Between Nations"},{"key":"ref13","author":"alexander","year":"2016","journal-title":"National Cyber Security Organisation Spain"},{"key":"ref14","article-title":"The U.S. Military's Force Structure: A Primer","year":"0","journal-title":"Washington D C Congress of the United States"},{"key":"ref15","author":"john","year":"2018","journal-title":"China's Strategic Support Force A Force for a New Era"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.21140\/mcuj.2018090108","article-title":"The Provision of Cyber Manpower: Creating a Virtual Reserve","volume":"9","author":"gregg","year":"2018","journal-title":"MCU Journal"},{"key":"ref17","year":"2013","journal-title":"Colombia Rises to the Cyber Challenge"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2095101"},{"key":"ref19","year":"2015","journal-title":"Directorate of Social Communication of the Joint Command of the Armed Forces of Ecuador"},{"key":"ref4","author":"marie","year":"2020","journal-title":"Study on the Use of Reserve Forces in Military Cybersecurity A Comparative Study of Selected Countries"},{"key":"ref3","first-page":"1417","article-title":"Advancing the Field of Organizations through the Study of Military Organizations","volume":"23","author":"mie","year":"2015","journal-title":"Industrial and Corporate Change"},{"key":"ref6","author":"jason","year":"2020","journal-title":"The Diffusion of Cyber Forces Military Innovation and the Dynamic Implementation of Cyber Force Structure"},{"key":"ref5","article-title":"The Dataset on Cyber Force Structures","author":"jason","year":"2020","journal-title":"Unpublished raw data"},{"key":"ref8","first-page":"1","article-title":"Conscription and Cyber Conflict: Legal Issues","author":"brenner","year":"2011","journal-title":"2011 3rd International Conference on Cyber Conflict"},{"key":"ref7","author":"pascal","year":"2015","journal-title":"National Cyber Security Organisation France"},{"key":"ref49","article-title":"National Cyber Security Organisation: Estonia","author":"anna-maria","year":"2015","journal-title":"National Cyber Security Organisation"},{"key":"ref9","author":"laura","year":"2019","journal-title":"NATO's Role in Cyberspace"},{"key":"ref46","author":"nielsen","year":"2018","journal-title":"Framework Mechanism for the Integration of Sovereign Cyber Effects Provided Voluntarily by Allies into Alliance Operations and Missions"},{"key":"ref45","author":"nielsen","year":"2017","journal-title":"NATO Supports Jordan's National Cyber Defence Strategy"},{"key":"ref48","author":"kingsley","year":"2018","journal-title":"Nigerian Army's Cyber Warfare Command Begins Operation"},{"key":"ref47","author":"nielsen","year":"2020","journal-title":"Partnership Interoperability Initiative"},{"key":"ref42","year":"2020","journal-title":"NATO 2030 United for a New Era"},{"key":"ref41","author":"taciana","year":"2017","journal-title":"Brazilian Army Invests in Cyber Defense"},{"key":"ref44","year":"2010","journal-title":"Active Engagement Modern Defense Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization"},{"key":"ref43","first-page":"27","article-title":"The Role of the U.S. Military in Cyberspace","volume":"15","author":"nielsen","year":"2016","journal-title":"Journal of Information Warfare"}],"event":{"name":"2021 13th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2021,5,25]]},"end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 13th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467797\/9467799\/09467807.pdf?arnumber=9467807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:56:04Z","timestamp":1659470164000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9467807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":64,"URL":"https:\/\/doi.org\/10.23919\/cycon51939.2021.9467807","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}