{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:42:51Z","timestamp":1730342571830,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,31]]},"DOI":"10.23919\/cycon55549.2022.9811075","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:32Z","timestamp":1656965372000},"page":"117-134","source":"Crossref","is-referenced-by-count":1,"title":["Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations"],"prefix":"10.23919","author":[{"given":"Miguel Alberto","family":"Gomez","sequence":"first","affiliation":[{"name":"Swiss Federal Institute of Technology,Center for Security Studies,Zurich,ZH,Switzerland"}]},{"given":"Gregory","family":"Winger","sequence":"additional","affiliation":[{"name":"University of Cincinnati,School of Public &#x0026; International Affairs,Cincinnati,OH,United States"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2600514"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/S1816383112000811"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/jogss\/ogz077"},{"key":"ref32","article-title":"Striking Back: The 1972 Munich Olympics Massacre and Israel&#x2019;s Deadly Response","author":"klein","year":"2007","journal-title":"Random House"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1111\/ajps.12314"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1162\/isec_a_00336"},{"key":"ref37","article-title":"Cyberdeterrence and Cyberwar","author":"libicki","year":"2009","journal-title":"Rand Corporation"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v24i3.9623"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1743-8594.2010.00108.x"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3998\/mpub.12963"},{"key":"ref62","article-title":"How the US Hacked ISIS","author":"temple-raston","year":"2019","journal-title":"NPR [National Public Radio]"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818319000171"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1093\/isq\/sqab015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9248.2007.00668.x"},{"journal-title":"Cyber Command Deploys Abroad to Fend off Foreign Hacking ahead of the 2020 Election","year":"2020","author":"vavra","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2346.12154"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12701"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/eis.2016.14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1747-1346.2009.00205.x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9248.2007.00664.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/eis.2019.2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1093\/isq\/sqab034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17645\/pag.v6i2.1279"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2478.2009.00572.x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyw018"},{"key":"ref26","first-page":"16","article-title":"Cognitive Dynamics and Images of the Enemy","volume":"21","author":"holsti","year":"1967","journal-title":"Journal of International Affairs"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/0020-8833.00050"},{"key":"ref50","first-page":"46","article-title":"The Four Waves of Modern Terrorism","author":"rapport","year":"2004","journal-title":"Attacking Terrorism Elements of a Grand Strategy"},{"journal-title":"One Day in September The Full Story of the 1972 Munich Olympics Massacre and the Israeli Revenge Operation &#x201C;Wrath of God","year":"2000","author":"reeve","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1080\/13523260.2020.1868836"},{"key":"ref58","first-page":"1","article-title":"Cyber Terrorism and Public Support for Retaliation: A Multi-Country Survey Experiment","author":"shandler","year":"2021","journal-title":"British Journal of Political Science"},{"key":"ref57","article-title":"Cyber and Crisis Escalation: Insights from Wargaming","author":"schneider","year":"2017","journal-title":"USASOC Futures Forum"},{"journal-title":"Counterstrike The Untold Story of America's Secret Campaign Against Al Qaeda","year":"2011","author":"schmitt","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1017\/9781316822524"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1093\/jcsl\/kru022"},{"key":"ref53","article-title":"What is an Intelligence Contest?","author":"rovner","year":"2020","journal-title":"Part 2 of &#x201C;Policy Roundtable Cyber Conflict as an Intelligence Contest &#x201D; in &#x201C;Cyber Competition &#x201D; special issue Texas National Security Review"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2015.1017827"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/misr.12023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2014.941545"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1162\/isec_a_00418"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2021.1895117"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2478.00227"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.orbis.2017.05.003"},{"key":"ref15","article-title":"Cyber Persistence, Intelligence Contests, and Strategic Competition","author":"fischerkeller","year":"2020","journal-title":"Part 5 of &#x201C;Policy Roundtable Cyber Conflict as an Intelligence Contest &#x201D; in &#x201C;Cyber Competition &#x201D; special issue Texas National Security Review"},{"key":"ref16","article-title":"US Launched &#x2018;More Than 2 Dozen&#x2019; Cyber Operations to Protect Election","author":"gazis","year":"2021","journal-title":"CBS News"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2006.00753.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0022002707313305"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz012"},{"journal-title":"Against All Enemies Inside America's War on Terror","year":"2004","author":"clarke","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2478.2008.00499.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/jogss\/ogx002"},{"journal-title":"Capabilities and Conflict in the Cyber Domain An Empirical Study","year":"2020","author":"craig","key":"ref5"},{"journal-title":"Agreed Operation Glowing Symphony Notification Plan","year":"2016","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1093\/survival\/44.2.119","article-title":"Rethinking Sovereignty: American Strategy in the Age of Terrorism","volume":"44","author":"cronin","year":"2002","journal-title":"Survival"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818300027697"},{"journal-title":"A Primer on the Proliferation of Offensive Cyber Capabilities","year":"2021","author":"desombre","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/01436590600869046"},{"journal-title":"No Easy Day The Firsthand Account of the Mission that Killed Osama Bin Laden","year":"2014","author":"owen","key":"ref45"},{"key":"ref48","article-title":"Islamic State Propaganda Sites Shut Down","author":"pop","year":"2018","journal-title":"Wall Street Journal"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.7249\/RR1339"},{"key":"ref42","article-title":"US Military Cyber Operation to Attack ISIS Last Year Sparked Heated Debate over Alerting Allies","author":"nakashima","year":"2017","journal-title":"Washington Post"},{"journal-title":"Status of Forces Agreement What Is It and How Has It Been Utilized?","year":"2010","author":"mason","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/isq\/sqaa081"},{"journal-title":"Hacking ISIS How to Destroy the Cyber Jihad","year":"2017","author":"nance","key":"ref43"}],"event":{"name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","start":{"date-parts":[[2022,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810978\/9810902\/09811075.pdf?arnumber=9811075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:49:51Z","timestamp":1661809791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":65,"URL":"https:\/\/doi.org\/10.23919\/cycon55549.2022.9811075","relation":{},"subject":[],"published":{"date-parts":[[2022,5,31]]}}}