{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:49:21Z","timestamp":1753890561525,"version":"3.41.2"},"reference-count":33,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>This study aims to investigate Offensive Cyber Operations (OCO) planner development, focusing on addressing the need for tailored training paths and the continuous evolution of frameworks. As the complexity of global challenges and security threats grows, OCO planners play a pivotal role in operationalising and executing operations effectively. The research utilized a qualitative case study approach, combining literature reviews and interviews with OCO military professionals, to explore OCO planners' competencies and training frameworks at the operational level. Interviews emphasize the need for comprehensive training, trust, and standardized training pathways in OCO planning, with real-time exposure being the most effective approach for practical planning. The literature review highlights key OCO training options, including Cyber Range Integration, cognitive architectures, and Persistent Cyber Training Environment platforms. It emphasizes educational initiatives, industry contributions, and practical experience in developing expertise in OCO. Discussions highlight the importance of Cyber Range Integration, educational initiatives, and practical experience in OCO. It emphasizes the need for a dual skill set and a structured training path for OCO planners. Real-time exposure through exercises and courses is the most effective approach to becoming a practical OCO planner.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1400360","type":"journal-article","created":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T18:50:33Z","timestamp":1718131833000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing offensive cyber operation planner\u2018s development: exploring tailored training paths and framework evolution"],"prefix":"10.3389","volume":"6","author":[{"given":"Marko","family":"Arik","sequence":"first","affiliation":[]},{"given":"Ricardo Gregorio","family":"Lugo","sequence":"additional","affiliation":[]},{"given":"Rain","family":"Ottis","sequence":"additional","affiliation":[]},{"given":"Adrian Nicholas","family":"Venables","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"B1","unstructured":"Retrieved from Exercise Crossed Swords Tests Allied Cyber Operations2023"},{"key":"B2","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TETC.2021.3093444","article-title":"A cybersecurity educated community","volume":"10","author":"Ahmad","year":"2022","journal-title":"IEEE Transact. Emerg. Top. Comp."},{"key":"B3","unstructured":"Allied Joint Doctrine For Cyberspace Operations2020"},{"volume-title":"Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, 2nd Edn","year":"2013","author":"Andress","key":"B4"},{"volume-title":"A Primer on the Proliferation of Offensive Cyber Capabilities.","year":"2021","key":"B5"},{"key":"B6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.5038\/2378-0789.1.1.1003","article-title":"Cyberspace operations planning: operating a technical military","volume":"1","author":"Barber","year":"2016","journal-title":"Milit. Cyber Aff."},{"key":"B7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","article-title":"Using thematic analysis in psychology","volume":"3","author":"Braun","year":"2006","journal-title":"Qual. Res. Psychol."},{"key":"B8","unstructured":"Towards a cyber leader course modeled on Army Ranger School\n            ContiG.\n            WeigandM.\n            SkoudisE.\n            RaymondD.\n            CookT.\n            ArnoldtT.\n          Small Wars J2014"},{"key":"B9","doi-asserted-by":"publisher","first-page":"399","DOI":"10.5937\/tehnika2203399D","article-title":"How to transfer cyber security skill","volume":"77","author":"Deki\u0107","year":"2022","journal-title":"Tehnika"},{"key":"B10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/09537325.2021.1901874","article-title":"A conceptual framework for the cognitive enterprise: pillars, maturity, value drivers","volume":"34","author":"Elia","year":"2022","journal-title":"Technol. Anal. Strat. Manag."},{"volume-title":"From Intuition to Reflexive Construction: Research Design and Triangulation in Grounded Theory Research","year":"2019","author":"Flick","key":"B11"},{"volume-title":"Cyber Command Needs to Develop Metrics to Assess Warfighting Capabilities.","year":"2022","key":"B12"},{"key":"B13","unstructured":"GozdziewiczW.\n          Cyber Defence Magazine2019"},{"key":"B14","doi-asserted-by":"crossref","unstructured":"HerrickD.\n            HerrT.\n          Combating Complexity: Offensive Cyber Capabilities and Integrated Warfighting2016","DOI":"10.2139\/ssrn.2845709"},{"key":"B15","first-page":"592","article-title":"A whole-of-society approach to organise for offensive cyberspace operations: the case of the smart state Sweden","volume-title":"Proceedings of the 22nd European Conference on Cyber Warfare and Security, ECCWS 2023","author":"Huskaj","year":"2023"},{"key":"B16","unstructured":"Joint Publication 1 Volume 1.2023"},{"key":"B17","unstructured":"Modeling and integrating cognitive agents within the emerging cyber\n            JonesR. M.\n          Arlington, VAInterservice\/Industry Training, Simulation, and Education Conference (I\/ITSEC) 2015 (p. 2015 Paper No. #15232 Page 1 of 10)2015"},{"key":"B18","first-page":"505","volume-title":"Cognitive Agents for Adaptive Training in Cyber Operations. HCII 2019: Adaptive Instructional Systems","author":"Jones","year":"2019"},{"key":"B19","doi-asserted-by":"publisher","first-page":"875","DOI":"10.3389\/fpsyg.2019.00875","article-title":"Self-regulation and cognitive agility in cyber operations","volume":"10","author":"J\u00f8sok","year":"2019","journal-title":"Front. Psychol"},{"key":"B20","article-title":"Cognitive education framework for cyber security: a collaborative community approach aligning to tenets of Ako","volume-title":"Proceedings of the 2019 Conference","author":"Khanna","year":"2019"},{"volume-title":"Cyberdeterrence and Cyberwar.","year":"2009","author":"Libicki","key":"B21"},{"key":"B22","doi-asserted-by":"crossref","unstructured":"McNeeseM. D.\n            HallD. L.\n          FrankfurtSpringerThe Cognitive Sciences of Cyber-Security: A Framework for Advancing Socio-Cyber Systems. Theory and Models for Cyber Situation Awareness2017","DOI":"10.1007\/978-3-319-61152-5_7"},{"key":"B23","unstructured":"The North Atlantic Treaty Organization2016"},{"key":"B24","unstructured":"The North Atlantic Treaty Organization2018"},{"key":"B25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1162\/ISEC_a_00266","article-title":"Deterrence and dissuasion in cyberspace","volume":"41","author":"Nye","year":"2017","journal-title":"Int. Secur."},{"key":"B26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.32565\/aarms.2023.3.1","article-title":"Assessing offensive cyber capabilities","volume":"22","author":"Selj\u00e1n","year":"2023","journal-title":"Acad. Appl. Res. Milit. Public Manag. Sci."},{"key":"B27","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1080\/14702436.2018.1508349","article-title":"Integrating offensive cyber capabilities: meaning, dilemmas, and assessment","volume":"18","author":"Smeets","year":"2018","journal-title":"Defence Stud."},{"key":"B28","doi-asserted-by":"crossref","first-page":"55","DOI":"10.23919\/CYCON.2018.8405010","article-title":"Offensive cyber capabilities: To what ends?","volume-title":"2018 10th International Conference on Cyber Conflict (CyCon)","author":"Smeets","year":"2018"},{"key":"B29","first-page":"6","article-title":"A cognitive framework to secure smart cities","volume-title":"2018 3rd International Conference on Measurement Instrumentation and Electronics (ICMIE 2018)","author":"Tayeb","year":"2018"},{"key":"B30","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1177\/1077800410383121","article-title":"Qualitative quality: eight \u201cbig-tent\u201d criteria for excellent qualitative research","volume":"16","author":"Tracy","year":"2010","journal-title":"Qual. Inq."},{"key":"B31","unstructured":"32969015The DoD Cyber Strategy.2015"},{"key":"B32","unstructured":"Training cyber forces without warfighting715\n            WalcottT.\n          J. Inf. Warfare142015"},{"key":"B33","doi-asserted-by":"publisher","first-page":"14","DOI":"10.5465\/amj.2007.24160637","article-title":"The generative properties of richness","volume":"50","author":"Weick","year":"2007","journal-title":"Acad. Manag. J."}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1400360\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T18:50:41Z","timestamp":1718131841000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1400360\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":33,"alternative-id":["10.3389\/fcomp.2024.1400360"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1400360","relation":{},"ISSN":["2624-9898"],"issn-type":[{"type":"electronic","value":"2624-9898"}],"subject":[],"published":{"date-parts":[[2024,6,7]]},"article-number":"1400360"}}