{"response":{"docs":[{"system_create_dtsi":"2025-05-12T22:32:58Z","system_modified_dtsi":"2025-08-29T02:31:28Z","has_model_ssim":["Dataset"],"id":"tm70mw831","accessControl_ssim":["13806dca-9658-4a08-add7-b64d5355e1a7"],"hasRelatedMediaFragment_ssim":["p8418p98p"],"hasRelatedImage_ssim":["p8418p98p"],"depositor_ssim":["ivanovid@ucmail.uc.edu"],"depositor_tesim":["ivanovid@ucmail.uc.edu"],"title_tesim":["Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents"],"date_uploaded_dtsi":"2025-05-12T22:32:56Z","date_modified_dtsi":"2025-08-29T02:31:27Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/n1h7-wv34"],"alternate_title_tesim":["VoICS Dataset: Text Analysis Dataset"],"geo_subject_tesim":["Global"],"time_period_tesim":["2003-2023"],"college_tesim":["Arts and Sciences"],"department_tesim":["School of Public and International Affairs"],"required_software_tesim":["MS Excel"],"note_tesim":["This NSS database 1.0 provides important insights into how allies in Europe and North America conceptualize their national cybersecurity strategies. It is an excellent tool for researchers and policymakers to study the evolution of strategic thinking in this part of the world and to explore its different independent and dependent effects."],"creator_tesim":["Millard, Matthew","Kovac, Igor","Ivanov, Ivan Dinev"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Politica Science, Cybersecurity, National Strategies"],"language_tesim":["English"],"description_tesim":["Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents is a project that compares and contrasts the three main approaches to conceptualize national cybersecurity strategies (NSS): deterrence, norm-based approach (NBA) and cyber persistence engagement (CPE). Scholars and policymakers have initially conceptualized NSS in terms of deterrence or NBA. More recent academic research has demonstrated that these frameworks are inadequate for cyber space. As a result, Cyber Persistence Engagement (CPE) emerged as a third option.\r\nThe first version (1.0) of the VoICS database on National Cybersecurity Strategies focuses on nations in Europe and North America and includes a total of 77 NCS of the states in the North Atlantic Area—NATO allies, EU members and Switzerland—released from 2003 until the end of 2023. The current 1.2 version includes 83 strategies from 36 allies and partners. It consists of 27 variables, including country and strategy identifiers, EU and NATO membership, their respective accession dates, and total length of the documents. VoICS include eighteen variables representing different measures of relative and absolute weights of the three NSS types—deterrence, NBA and CPE.\r\nThe text analysis is based on official NSS documents provided by the NATO Cooperative Cyber Defence Centre of Excellence library (2024) and ENISA’s interactive map for National Cyber Security Strategies (2023). Both sources rely on voluntary submission from the member states. Unfortunately, some official documents were not available or accessible or were not listed at all. Authors have used various sources and contacts with a variety of cyber attachés in Brussels to determine if any additional strategies were released and to obtain the missing documents.\r\nThe 18 text analysis variables compare and contrast the extent to which different NCS are associated with a specific strategy. They represent different frequency scores based either on words, phrases, or words and phrases combined. These calculations are associated with either deterrence, NBA, or CPE in each strategy. The authors have generated respective vocabularies for the three strategic ideas through which each of these approaches are operationalized. We have conducted a text analysis using WordStat text analysis software by Provialis (https://provalisresearch.com/products/content-analysis-software/). A detailed codebook for NSS Dataset 1.2 along with a NSS Dictionary 1.2 have been included in this collection/ repository.\r\nThe process of generating vocabulary associated with the three cybersecurity approaches involved several steps. First, upon reviewing the literature, the authors generated independently a list of words and phrases associated with each type of cybersecurity strategy. Second, the authors compared their lists to determine the degree of overlap in vocabulary. Those words and phrases that included in at least two different lists were reviewed and, if there was consensus, were incorporated in the dictionary. Finally, words and phrases which were identified in only one of lists were once again reviewed and, in case there was a consensus among the authors, these were also included in the dictionary. Third, the three vocabularies were updated on several instances when it was unanimously agreed that these words or phrases should be included in the analysis. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2025-04-18"],"thumbnail_path_ss":"/downloads/p8418p98p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p8418p98p","hx11xg95q","5712m802b"],"file_set_ids_ssim":["p8418p98p","hx11xg95q","5712m802b"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VARIETIES OF INTERNATIONAL CYBER STRATEGIES VOICS TEXT ANALYSIS OF NATIONAL CYBERSECURITY DOCUMENTS","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ivanovid@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["tm70mw831"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1858747763445989376,"timestamp":"2026-03-04T16:00:02.676Z","score":0.00049999997},{"system_create_dtsi":"2024-09-01T16:56:57Z","system_modified_dtsi":"2024-09-01T17:00:02Z","has_model_ssim":["Dataset"],"id":"w66345355","accessControl_ssim":["4c32edf7-b178-4a98-928b-f2a4dd701c87"],"hasRelatedMediaFragment_ssim":["ks65hd76w"],"hasRelatedImage_ssim":["ks65hd76w"],"depositor_ssim":["mattersf@ucmail.uc.edu"],"depositor_tesim":["mattersf@ucmail.uc.edu"],"title_tesim":["Goff MS Thesis Data and Code Chapter 1"],"date_uploaded_dtsi":"2024-09-01T16:56:56Z","date_modified_dtsi":"2024-09-01T16:56:56Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/xh2a-w422"],"geo_subject_tesim":["Global"],"time_period_tesim":["1950-2020"],"college_tesim":["Arts and Sciences"],"department_tesim":["Biological Sciences"],"creator_tesim":["Goff, Jennifer","Matter, Stephen F."],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Ecology, Climate Change, Butterfly Flight"],"language_tesim":["English"],"description_tesim":["Data and code for analysis of thermal constraints on flight for butterflies"],"license_tesim":["http://creativecommons.org/licenses/by-nc/4.0/"],"date_created_tesim":["2024-6"],"thumbnail_path_ss":"/downloads/ks65hd76w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ks65hd76w","vm40xt15r","5d86p173t","wh246t72x","2801ph743"],"file_set_ids_ssim":["ks65hd76w","vm40xt15r","5d86p173t","wh246t72x","2801ph743"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"GOFF MS THESIS DATA AND CODE CHAPTER 1","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["mattersf@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["w66345355"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1809013805840072704,"timestamp":"2024-09-01T17:00:04.654Z","score":0.00049999997},{"system_create_dtsi":"2021-09-18T15:00:45Z","system_modified_dtsi":"2021-09-18T15:01:18Z","has_model_ssim":["Article"],"id":"vm40xt01d","accessControl_ssim":["fa7c8572-94ae-4e68-b6ab-454207137f97"],"hasRelatedMediaFragment_ssim":["5d86p167p"],"hasRelatedImage_ssim":["5d86p167p"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["Reassessing US Grand Strategy – Part 1: The Current State of US Grand Strategy"],"date_uploaded_dtsi":"2021-09-18T15:00:42Z","date_modified_dtsi":"2021-09-18T15:00:42Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/j7zk-c143"],"alternate_title_tesim":["Reassessing US Grand Strategy"],"geo_subject_tesim":["World","Global","United States of America","United States"],"time_period_tesim":["Unipolar Moment","21st Century","WWII","Pre-9/11","20th Century","Post-9/11","Cold War","19th Century"],"college_tesim":["Arts and Sciences"],"department_tesim":["Interdisciplinary Studies"],"creator_tesim":["Turner, Grant"],"publisher_tesim":["Plot Politics"],"subject_tesim":["U.S. Grand Strategy","Unipolar","Great Power Competition","Reflexivity","Military","Neoclassical Realism","Neoliberal","Grand Strategy","Realism","Security","Hegemony","Doctrines","Multipolar","Empire","Strategic Studies","International Relations","Liberal","Primacy","NSC 68","United States","Restraint","Realists","Strategy","Balance of Power","Realpolitik","Foreign Policy","National Security","Classical Realism","Politics","Deterrence","Defense","Bipolar","Presidential Doctrines","Security Studies"],"language_tesim":["English"],"description_tesim":["This is part one of a mini-series attempting to grapple with US grand strategy and the potential need for its re-assessment. The goal of this series is to introduce readers to grand strategy, ideally prompting more to grapple with US grand strategy and grand strategy more broadly. The author is fleshing out their own ideas, so don’t take the work as gospel, but rather as a starting point for your own journey.\r\n\r\nIn part one, an overview of the current state of US grand strategy is given. In part two, grand strategy is defined as a concept, a more detailed argument for the need of reassessment is put forth, and resources on grand strategy are listed for interested readers. In part three, four typologies of US grand strategic thought are summarized and contrasted with what US grand strategy has arguably been since the end of WWII. In part four, some general thoughts on the means and ends of reassessing US grand strategy will be described. Additional articles on grand strategy may appear over time. \r\n"],"license_tesim":["http://creativecommons.org/licenses/by/4.0/"],"date_created_tesim":["2021-08-11"],"related_url_tesim":["https://plotpolitics.com/2021/08/11/reassessing-us-grand-strategy-part-1-the-current-state-of-us-grand-strategy/"],"thumbnail_path_ss":"/downloads/5d86p167p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5d86p167p"],"file_set_ids_ssim":["5d86p167p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"REASSESSING US GRAND STRATEGY PART 1 THE CURRENT STATE OF US GRAND STRATEGY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__pathnames_ssim":["vm40xt01d"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1711252219936899072,"timestamp":"2021-09-18T15:01:31.047Z","score":0.00049999997},{"system_create_dtsi":"2020-06-18T20:43:53Z","system_modified_dtsi":"2020-10-07T21:38:56Z","has_model_ssim":["StudentWork"],"id":"7m01bn01j","accessControl_ssim":["addc7a12-d9b1-4b5c-9c57-8d63c8e81b90"],"hasRelatedMediaFragment_ssim":["qf85nc779"],"hasRelatedImage_ssim":["qf85nc779"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["Interdisciplinary Capstone: Bringing Dialogue in the Dark to Cincinnati"],"date_uploaded_dtsi":"2020-06-18T20:43:53Z","date_modified_dtsi":"2020-10-07T21:38:53Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/ygp7-wf27"],"alternate_title_tesim":["Dialogue in the Dark, Theory of Grand Irrationality, and Social Pulse Theory"],"geo_subject_tesim":["Earth","Global","Cincinnati, Ohio"],"advisor_tesim":["Sanders, Rebecca","Ris, Cynthia"],"degree_tesim":["BIS (Bachelor of Interdisciplinary Studies)"],"college_tesim":["Arts and Sciences"],"department_tesim":["Bachelor of Interdisciplinary Studies"],"genre_tesim":["Document"],"note_tesim":["The first half of this work is a report on my capstone project. The latter half of this work contains a rushed and imperfect attempt to distill frameworks, theories, and thoughts I developed in the course of my undergraduate program, and which I did and do intend to formalize as a book at some point in my career. Shortly after submitting my capstone, I realized I had made some errors in trying to communicate my ideas in the latter half, and in my private documents I wrote notes concerning these. \r\nIn this sense, this uploaded document is not the best representation of what I thought or was/am attempting to say, but I felt it is still worth formally documenting the existence of, and may even be of interest to some."],"creator_tesim":["Turner, Grant"],"publisher_tesim":["Grant W. Turner"],"subject_tesim":["Social Change","Social Psychology","Interdisciplinary","Ontology","Action Research","Peace and Conflict Studies","Philosophy","Education","Sociology","Ethics and Morality","Visual Anthropology","Development","Axiology","Organizational Psychology","Epistemology","Metaphysics"],"language_tesim":["English"],"description_tesim":["      The purpose of this capstone was to organize and pursue the creation of a Dialogue in the Dark exhibition in Cincinnati. Dialogue in the Dark is an organization that, since 1988, has internationally utilized exhibits that allow visitors to be led through an hour long simulation of blindness as lead by a visually impaired guide through four pitch back simulated environments. The purpose of this exhibit is twofold. In an immediate sense it is meant to demonstrate to visitors that those who we often marginalize due to their disabilities are in fact quite capable, effectively serving as a platform to recognize, address, and overcome problems created by perceived \"otherness\". The larger lessons derive from experiencing a profoundly different reality than is normally accessible in terms of both the specific type of experience and the degree of contrast of realities it poses. Such jarring experiences open a brief window for dialogue. \r\n\r\n      Drawing from actor-network theory, various principles and techniques from action research, and from fields such as organizational psychology, visual anthropology, and sociology, this capstone contains workable processes and objectives relevant to both the creation of a Cincinnati based Dialogue in the Dark and the framework for a Coalition for Community Action and Cooperation. These processes and objectives are to be constantly ongoing in development, and are only rudimentary in presentation style. \r\n\r\n      Additionally, this project contains a reflection on both the process of bringing Dialogue in the Dark to Cincinnati thus far, a discussion of post-capstone plans for Dialogue in the Dark, and, in the spirit of demonstrating my BIS inspired work in general, a condensed introduction to my “Theory of Grand Irrationality” and my “Social Pulse Theory”, both of which are central starting points for the grad school experience I am both seeking and planning.\r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2014"],"thumbnail_path_ss":"/downloads/qf85nc779?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["qf85nc779"],"file_set_ids_ssim":["qf85nc779"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTERDISCIPLINARY CAPSTONE BRINGING DIALOGUE IN THE DARK TO CINCINNATI","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__pathnames_ssim":["7m01bn01j"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697105475459350528,"timestamp":"2021-04-15T11:25:04.178Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Dataset","hits":2,"label":"Dataset"},{"value":"Article","hits":1,"label":"Article"},{"value":"Student Work","hits":1,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Turner, Grant","hits":2,"label":"Turner, Grant"},{"value":"Goff, Jennifer","hits":1,"label":"Goff, Jennifer"},{"value":"Ivanov, Ivan Dinev","hits":1,"label":"Ivanov, Ivan Dinev"},{"value":"Kovac, Igor","hits":1,"label":"Kovac, Igor"},{"value":"Matter, Stephen F.","hits":1,"label":"Matter, Stephen F."},{"value":"Millard, Matthew","hits":1,"label":"Millard, Matthew"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Action Research","hits":1,"label":"Action Research"},{"value":"Axiology","hits":1,"label":"Axiology"},{"value":"Balance of Power","hits":1,"label":"Balance of Power"},{"value":"Bipolar","hits":1,"label":"Bipolar"},{"value":"Classical Realism","hits":1,"label":"Classical Realism"},{"value":"Defense","hits":1,"label":"Defense"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":4,"label":"Arts and Sciences"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Bachelor of Interdisciplinary Studies","hits":1,"label":"Bachelor of Interdisciplinary Studies"},{"value":"Biological Sciences","hits":1,"label":"Biological Sciences"},{"value":"Interdisciplinary Studies","hits":1,"label":"Interdisciplinary Studies"},{"value":"School of Public and International Affairs","hits":1,"label":"School of Public and International Affairs"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":4,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":2,"label":"University of Cincinnati"},{"value":"Grant W. Turner","hits":1,"label":"Grant W. Turner"},{"value":"Plot Politics","hits":1,"label":"Plot Politics"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2014","hits":1,"label":"2014"},{"value":"2021-08-11","hits":1,"label":"2021-08-11"},{"value":"2024-6","hits":1,"label":"2024-6"},{"value":"2025-04-18","hits":1,"label":"2025-04-18"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":4,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":4,"first_page?":true,"last_page?":true}}}