{"response":{"docs":[{"system_create_dtsi":"2023-10-20T16:27:11Z","system_modified_dtsi":"2023-10-20T16:27:14Z","has_model_ssim":["Dataset"],"id":"f4752j25n","accessControl_ssim":["9f528988-bd61-4632-a986-f4e92e9fd155"],"depositor_ssim":["ivanovid@ucmail.uc.edu"],"depositor_tesim":["ivanovid@ucmail.uc.edu"],"title_tesim":["Organizational Response to Emerging Threats: Lessons from NATO and the European Union’s Responses to Peacebuilding, Cyber Threats and Energy Security"],"date_uploaded_dtsi":"2023-10-20T16:27:10Z","date_modified_dtsi":"2023-10-20T16:27:10Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.5064/F61MNQL0"],"geo_subject_tesim":["Europe"],"time_period_tesim":["21 century"],"college_tesim":["Arts and Sciences"],"department_tesim":["School of Public and International A"],"required_software_tesim":["none"],"note_tesim":["This is metadata for a dataset posted on the Qualitative Data Repository. "],"creator_tesim":["Ivanov, Ivan"],"publisher_tesim":["Qualitative Data Repository"],"subject_tesim":["Political Science"],"language_tesim":["English"],"description_tesim":["\"Organizational Response to Emerging Threats\" is a project that addresses three separate threat areas -- cybersecurity, peacekeeping and energy security. The data collection for cybersecurity and energy security has been completed. As of June 2019, the data collection for peacekeeping is ongoing. The project documents are organized around three topics, reflected in the filenames -- cybersecurity, peacekeeping and energy security.\r\n\r\nThe overall purpose/rationale of this research project is to develop a framework that explains how different international organizations (IOs) respond to various emerging threats in international relations. These threats can vary and include cybersecurity, energy security, food security, environmental security, and others. For the purpose of our study we focus on two major variables explaining organizational response: (1) IOs’ capacity to acquire and deploy organizational assets (also referred to as asset fungibility), and; (2) IOs’ ability to make swift decisions in response to changing internal and external environments. Drawing from primary sources including interviews with NATO and EU officials, we suggest a new model explaining when organizations are better equipped at addressing cyber threats, when they have capacity to response more effectively, and what they could do to improve their organizational responses in this area.\r\n\r\nThe QDR repository contains interviews with policy makers and senior bureaucrats conducted in 2016, 2017, 2018 and 2019 in Brussels, Belgium, and the Hague, the Netherlands. These interviews have been conducted in person or over skype. Approval to conduct interviews has been granted by the University of Cincinnati's IRB (Study ID: 2018-3371."],"license_tesim":["http://creativecommons.org/licenses/by-sa/4.0/"],"date_created_tesim":["2019-07-22"],"related_url_tesim":["https://doi.org/10.5064/F61MNQL0"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ORGANIZATIONAL RESPONSE TO EMERGING THREATS LESSONS FROM NATO AND THE EUROPEAN UNIONS RESPONSES TO PEACEBUILDING CYBER THREATS AND ENERGY SECURITY","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ivanovid@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["f4752j25n"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1780292501980053504,"timestamp":"2023-10-20T16:27:14.829Z","score":0.00049999997},{"system_create_dtsi":"2020-07-08T16:12:53Z","system_modified_dtsi":"2020-07-08T16:13:08Z","has_model_ssim":["Document"],"id":"9306t085s","accessControl_ssim":["68adf3c3-a5b0-45b2-80b1-a806e019fffe"],"hasRelatedMediaFragment_ssim":["3484zj368"],"hasRelatedImage_ssim":["3484zj368"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["WORKING DRAFT - 5G and International Security: How the UK can Lead the Way"],"date_uploaded_dtsi":"2020-07-08T16:12:52Z","date_modified_dtsi":"2020-07-08T16:12:52Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/mm4a-v130"],"geo_subject_tesim":["Britain","United Kingdom","United States","Canada","Norway","Australia","PRC","Asia","Europe","New Zealand","Japan","World","Finland","UK","China"],"genre_tesim":["Manuscript"],"time_period_tesim":["21st Century"],"note_tesim":["This draft is in progress, though mostly complete. We are uploading this draft now both as a time stamp and so we can reference it in shorter articles summarizing our work."],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Educational Studies"],"creator_tesim":["Huang, Russell","Turner, Grant"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Defense","Internet of Things","6G","Sharp Power","Complex Systems","Economics","5G","Law","International Relations","Computer Science","Action Research","Competition","Hard Power","Intelligence Studies","Cyber Security","5 Eyes","Technology","Huawei","Diplomacy","Five Eyes","Soft Power","Security Studies","Political Science","International Affairs","Supply Chain Risk Management","Globalization"],"language_tesim":["English"],"description_tesim":["The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach. \r\n\r\nThis article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.\r\n"],"license_tesim":["http://creativecommons.org/licenses/by-sa/4.0/"],"date_created_tesim":["June 30, 2020"],"thumbnail_path_ss":"/downloads/3484zj368?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3484zj368"],"member_of_collections_ssim":["International Relations - China"],"member_of_collection_ids_ssim":["vx021g49h"],"file_set_ids_ssim":["3484zj368"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"WORKING DRAFT 5G AND INTERNATIONAL SECURITY HOW THE UK CAN LEAD THE WAY","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__ancestors_ssim":["vx021g49h"],"nesting_collection__parent_ids_ssim":["vx021g49h"],"nesting_collection__pathnames_ssim":["vx021g49h/9306t085s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697121837722370048,"timestamp":"2021-04-15T15:45:08.448Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Dataset","hits":1,"label":"Dataset"},{"value":"Document","hits":1,"label":"Document"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Huang, Russell","hits":1,"label":"Huang, Russell"},{"value":"Ivanov, Ivan","hits":1,"label":"Ivanov, Ivan"},{"value":"Turner, Grant","hits":1,"label":"Turner, Grant"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Political Science","hits":2,"label":"Political Science"},{"value":"5 Eyes","hits":1,"label":"5 Eyes"},{"value":"5G","hits":1,"label":"5G"},{"value":"6G","hits":1,"label":"6G"},{"value":"Action Research","hits":1,"label":"Action Research"},{"value":"Competition","hits":1,"label":"Competition"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":1,"label":"Arts and Sciences"},{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Educational Studies","hits":1,"label":"Educational Studies"},{"value":"School of Public and International A","hits":1,"label":"School of Public and International A"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":2,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"Qualitative Data Repository","hits":1,"label":"Qualitative Data Repository"},{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2019-07-22","hits":1,"label":"2019-07-22"},{"value":"June 30, 2020","hits":1,"label":"June 30, 2020"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"vx021g49h","hits":1,"label":"vx021g49h"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":2,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":2,"first_page?":true,"last_page?":true}}}