{"response":{"docs":[{"system_create_dtsi":"2025-05-12T22:32:58Z","system_modified_dtsi":"2025-08-29T02:31:28Z","has_model_ssim":["Dataset"],"id":"tm70mw831","accessControl_ssim":["13806dca-9658-4a08-add7-b64d5355e1a7"],"hasRelatedMediaFragment_ssim":["p8418p98p"],"hasRelatedImage_ssim":["p8418p98p"],"depositor_ssim":["ivanovid@ucmail.uc.edu"],"depositor_tesim":["ivanovid@ucmail.uc.edu"],"title_tesim":["Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents"],"date_uploaded_dtsi":"2025-05-12T22:32:56Z","date_modified_dtsi":"2025-08-29T02:31:27Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/n1h7-wv34"],"alternate_title_tesim":["VoICS Dataset: Text Analysis Dataset"],"geo_subject_tesim":["Global"],"time_period_tesim":["2003-2023"],"college_tesim":["Arts and Sciences"],"department_tesim":["School of Public and International Affairs"],"required_software_tesim":["MS Excel"],"note_tesim":["This NSS database 1.0 provides important insights into how allies in Europe and North America conceptualize their national cybersecurity strategies. It is an excellent tool for researchers and policymakers to study the evolution of strategic thinking in this part of the world and to explore its different independent and dependent effects."],"creator_tesim":["Millard, Matthew","Kovac, Igor","Ivanov, Ivan Dinev"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Politica Science, Cybersecurity, National Strategies"],"language_tesim":["English"],"description_tesim":["Varieties of International Cyber Strategies (VoICS): Text Analysis of National Cybersecurity Documents is a project that compares and contrasts the three main approaches to conceptualize national cybersecurity strategies (NSS): deterrence, norm-based approach (NBA) and cyber persistence engagement (CPE). Scholars and policymakers have initially conceptualized NSS in terms of deterrence or NBA. More recent academic research has demonstrated that these frameworks are inadequate for cyber space. As a result, Cyber Persistence Engagement (CPE) emerged as a third option.\r\nThe first version (1.0) of the VoICS database on National Cybersecurity Strategies focuses on nations in Europe and North America and includes a total of 77 NCS of the states in the North Atlantic Area—NATO allies, EU members and Switzerland—released from 2003 until the end of 2023. The current 1.2 version includes 83 strategies from 36 allies and partners. It consists of 27 variables, including country and strategy identifiers, EU and NATO membership, their respective accession dates, and total length of the documents. VoICS include eighteen variables representing different measures of relative and absolute weights of the three NSS types—deterrence, NBA and CPE.\r\nThe text analysis is based on official NSS documents provided by the NATO Cooperative Cyber Defence Centre of Excellence library (2024) and ENISA’s interactive map for National Cyber Security Strategies (2023). Both sources rely on voluntary submission from the member states. Unfortunately, some official documents were not available or accessible or were not listed at all. Authors have used various sources and contacts with a variety of cyber attachés in Brussels to determine if any additional strategies were released and to obtain the missing documents.\r\nThe 18 text analysis variables compare and contrast the extent to which different NCS are associated with a specific strategy. They represent different frequency scores based either on words, phrases, or words and phrases combined. These calculations are associated with either deterrence, NBA, or CPE in each strategy. The authors have generated respective vocabularies for the three strategic ideas through which each of these approaches are operationalized. We have conducted a text analysis using WordStat text analysis software by Provialis (https://provalisresearch.com/products/content-analysis-software/). A detailed codebook for NSS Dataset 1.2 along with a NSS Dictionary 1.2 have been included in this collection/ repository.\r\nThe process of generating vocabulary associated with the three cybersecurity approaches involved several steps. First, upon reviewing the literature, the authors generated independently a list of words and phrases associated with each type of cybersecurity strategy. Second, the authors compared their lists to determine the degree of overlap in vocabulary. Those words and phrases that included in at least two different lists were reviewed and, if there was consensus, were incorporated in the dictionary. Finally, words and phrases which were identified in only one of lists were once again reviewed and, in case there was a consensus among the authors, these were also included in the dictionary. Third, the three vocabularies were updated on several instances when it was unanimously agreed that these words or phrases should be included in the analysis. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2025-04-18"],"thumbnail_path_ss":"/downloads/p8418p98p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p8418p98p","hx11xg95q","5712m802b"],"file_set_ids_ssim":["p8418p98p","hx11xg95q","5712m802b"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VARIETIES OF INTERNATIONAL CYBER STRATEGIES VOICS TEXT ANALYSIS OF NATIONAL CYBERSECURITY DOCUMENTS","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ivanovid@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["tm70mw831"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1858747763445989376,"timestamp":"2026-03-04T16:00:02.676Z","score":0.00049999997},{"system_create_dtsi":"2024-09-01T16:56:57Z","system_modified_dtsi":"2024-09-01T17:00:02Z","has_model_ssim":["Dataset"],"id":"w66345355","accessControl_ssim":["4c32edf7-b178-4a98-928b-f2a4dd701c87"],"hasRelatedMediaFragment_ssim":["ks65hd76w"],"hasRelatedImage_ssim":["ks65hd76w"],"depositor_ssim":["mattersf@ucmail.uc.edu"],"depositor_tesim":["mattersf@ucmail.uc.edu"],"title_tesim":["Goff MS Thesis Data and Code Chapter 1"],"date_uploaded_dtsi":"2024-09-01T16:56:56Z","date_modified_dtsi":"2024-09-01T16:56:56Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/xh2a-w422"],"geo_subject_tesim":["Global"],"time_period_tesim":["1950-2020"],"college_tesim":["Arts and Sciences"],"department_tesim":["Biological Sciences"],"creator_tesim":["Goff, Jennifer","Matter, Stephen F."],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Ecology, Climate Change, Butterfly Flight"],"language_tesim":["English"],"description_tesim":["Data and code for analysis of thermal constraints on flight for butterflies"],"license_tesim":["http://creativecommons.org/licenses/by-nc/4.0/"],"date_created_tesim":["2024-6"],"thumbnail_path_ss":"/downloads/ks65hd76w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ks65hd76w","vm40xt15r","5d86p173t","wh246t72x","2801ph743"],"file_set_ids_ssim":["ks65hd76w","vm40xt15r","5d86p173t","wh246t72x","2801ph743"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"GOFF MS THESIS DATA AND CODE CHAPTER 1","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["mattersf@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["w66345355"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1809013805840072704,"timestamp":"2024-09-01T17:00:04.654Z","score":0.00049999997},{"system_create_dtsi":"2021-07-23T19:51:37Z","system_modified_dtsi":"2021-07-23T19:52:05Z","has_model_ssim":["Dataset"],"id":"r207tq965","accessControl_ssim":["5d6c11a2-c3d5-4a7f-8a80-b27013749155"],"hasRelatedMediaFragment_ssim":["7p88ch90q"],"hasRelatedImage_ssim":["7p88ch90q"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["Theme Coded Literature Review - Does China's One-China Policy Shape China's Foreign Policy?"],"date_uploaded_dtsi":"2021-07-23T19:51:36Z","date_modified_dtsi":"2021-07-23T19:51:36Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/gv4j-bj69"],"geo_subject_tesim":["China","World","Global"],"time_period_tesim":["Cold War","20th Century","21st Century","Ancient China","Modern China"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Interdisciplinary Studies, Educational Studies"],"required_software_tesim":["MS Excel or Google Sheets"],"note_tesim":["For those interested, a version of the work associated with this data set is being submitted to peer-reviewed journals. An earlier draft may be found here: https://scholar.uc.edu/show/cj82k8757"],"creator_tesim":["Turner, Grant"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Soft power","Hard power","One China","Sharp power","China","Strategy","Foreign Policy","One-China"],"language_tesim":["English"],"description_tesim":["Theme Coded Literature Review - Does China's One-China Policy Shape China's Foreign Policy?"],"license_tesim":["http://www.opendatacommons.org/licenses/by/1.0/"],"date_created_tesim":["2019"],"related_url_tesim":["https://scholar.uc.edu/show/cj82k8757"],"thumbnail_path_ss":"/downloads/7p88ch90q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["7p88ch90q"],"member_of_collections_ssim":["International Relations - China"],"member_of_collection_ids_ssim":["vx021g49h"],"file_set_ids_ssim":["7p88ch90q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"THEME CODED LITERATURE REVIEW DOES CHINAS ONECHINA POLICY SHAPE CHINAS FOREIGN POLICY","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__ancestors_ssim":["vx021g49h"],"nesting_collection__parent_ids_ssim":["vx021g49h"],"nesting_collection__pathnames_ssim":["vx021g49h/r207tq965"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1706106487448797184,"timestamp":"2021-07-23T19:52:18.134Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Dataset","hits":3,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Goff, Jennifer","hits":1,"label":"Goff, Jennifer"},{"value":"Ivanov, Ivan Dinev","hits":1,"label":"Ivanov, Ivan Dinev"},{"value":"Kovac, Igor","hits":1,"label":"Kovac, Igor"},{"value":"Matter, Stephen F.","hits":1,"label":"Matter, Stephen F."},{"value":"Millard, Matthew","hits":1,"label":"Millard, Matthew"},{"value":"Turner, Grant","hits":1,"label":"Turner, Grant"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"China","hits":1,"label":"China"},{"value":"Ecology, Climate Change, Butterfly Flight","hits":1,"label":"Ecology, Climate Change, Butterfly Flight"},{"value":"Foreign Policy","hits":1,"label":"Foreign Policy"},{"value":"Hard power","hits":1,"label":"Hard power"},{"value":"One China","hits":1,"label":"One China"},{"value":"One-China","hits":1,"label":"One-China"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":2,"label":"Arts and Sciences"},{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":1,"label":"Biological Sciences"},{"value":"Interdisciplinary Studies, Educational Studies","hits":1,"label":"Interdisciplinary Studies, Educational Studies"},{"value":"School of Public and International Affairs","hits":1,"label":"School of Public and International Affairs"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":3,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":3,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2019","hits":1,"label":"2019"},{"value":"2024-6","hits":1,"label":"2024-6"},{"value":"2025-04-18","hits":1,"label":"2025-04-18"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"vx021g49h","hits":1,"label":"vx021g49h"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":3,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":3,"first_page?":true,"last_page?":true}}}