{"response":{"docs":[{"system_create_dtsi":"2025-05-12T22:32:58Z","system_modified_dtsi":"2025-08-29T02:31:28Z","has_model_ssim":["Dataset"],"id":"tm70mw831","accessControl_ssim":["13806dca-9658-4a08-add7-b64d5355e1a7"],"hasRelatedMediaFragment_ssim":["p8418p98p"],"hasRelatedImage_ssim":["p8418p98p"],"depositor_ssim":["ivanovid@ucmail.uc.edu"],"depositor_tesim":["ivanovid@ucmail.uc.edu"],"title_tesim":["Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents"],"date_uploaded_dtsi":"2025-05-12T22:32:56Z","date_modified_dtsi":"2025-08-29T02:31:27Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/n1h7-wv34"],"alternate_title_tesim":["VoICS Dataset: Text Analysis Dataset"],"geo_subject_tesim":["Global"],"time_period_tesim":["2003-2023"],"college_tesim":["Arts and Sciences"],"department_tesim":["School of Public and International Affairs"],"required_software_tesim":["MS Excel"],"note_tesim":["This NSS database 1.0 provides important insights into how allies in Europe and North America conceptualize their national cybersecurity strategies. It is an excellent tool for researchers and policymakers to study the evolution of strategic thinking in this part of the world and to explore its different independent and dependent effects."],"creator_tesim":["Millard, Matthew","Kovac, Igor","Ivanov, Ivan Dinev"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Politica Science, Cybersecurity, National Strategies"],"language_tesim":["English"],"description_tesim":["Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents is a project that compares and contrasts the three main approaches to conceptualize national cybersecurity strategies (NSS): deterrence, norm-based approach (NBA) and cyber persistence engagement (CPE). Scholars and policymakers have initially conceptualized NSS in terms of deterrence or NBA. More recent academic research has demonstrated that these frameworks are inadequate for cyber space. As a result, Cyber Persistence Engagement (CPE) emerged as a third option.\r\nThe first version (1.0) of the VoICS database on National Cybersecurity Strategies focuses on nations in Europe and North America and includes a total of 77 NCS of the states in the North Atlantic Area—NATO allies, EU members and Switzerland—released from 2003 until the end of 2023. The current 1.2 version includes 83 strategies from 36 allies and partners. It consists of 27 variables, including country and strategy identifiers, EU and NATO membership, their respective accession dates, and total length of the documents. VoICS include eighteen variables representing different measures of relative and absolute weights of the three NSS types—deterrence, NBA and CPE.\r\nThe text analysis is based on official NSS documents provided by the NATO Cooperative Cyber Defence Centre of Excellence library (2024) and ENISA’s interactive map for National Cyber Security Strategies (2023). Both sources rely on voluntary submission from the member states. Unfortunately, some official documents were not available or accessible or were not listed at all. Authors have used various sources and contacts with a variety of cyber attachés in Brussels to determine if any additional strategies were released and to obtain the missing documents.\r\nThe 18 text analysis variables compare and contrast the extent to which different NCS are associated with a specific strategy. They represent different frequency scores based either on words, phrases, or words and phrases combined. These calculations are associated with either deterrence, NBA, or CPE in each strategy. The authors have generated respective vocabularies for the three strategic ideas through which each of these approaches are operationalized. We have conducted a text analysis using WordStat text analysis software by Provialis (https://provalisresearch.com/products/content-analysis-software/). A detailed codebook for NSS Dataset 1.2 along with a NSS Dictionary 1.2 have been included in this collection/ repository.\r\nThe process of generating vocabulary associated with the three cybersecurity approaches involved several steps. First, upon reviewing the literature, the authors generated independently a list of words and phrases associated with each type of cybersecurity strategy. Second, the authors compared their lists to determine the degree of overlap in vocabulary. Those words and phrases that included in at least two different lists were reviewed and, if there was consensus, were incorporated in the dictionary. Finally, words and phrases which were identified in only one of lists were once again reviewed and, in case there was a consensus among the authors, these were also included in the dictionary. Third, the three vocabularies were updated on several instances when it was unanimously agreed that these words or phrases should be included in the analysis. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2025-04-18"],"thumbnail_path_ss":"/downloads/p8418p98p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p8418p98p","hx11xg95q","5712m802b"],"file_set_ids_ssim":["p8418p98p","hx11xg95q","5712m802b"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VARIETIES OF INTERNATIONAL CYBER STRATEGIES VOICS TEXT ANALYSIS OF NATIONAL CYBERSECURITY DOCUMENTS","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ivanovid@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["tm70mw831"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1858747763445989376,"timestamp":"2026-03-04T16:00:02.676Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Ivanov, Ivan Dinev","hits":1,"label":"Ivanov, Ivan Dinev"},{"value":"Kovac, Igor","hits":1,"label":"Kovac, Igor"},{"value":"Millard, Matthew","hits":1,"label":"Millard, Matthew"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Politica Science, Cybersecurity, National Strategies","hits":1,"label":"Politica Science, Cybersecurity, National Strategies"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":1,"label":"Arts and Sciences"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"School of Public and International Affairs","hits":1,"label":"School of Public and International Affairs"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2025-04-18","hits":1,"label":"2025-04-18"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}