<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JOBS</journal-id>
      <journal-title-group>
        <journal-title>Journal on Baltic Security</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2382-9230</issn>
      <issn pub-type="ppub">2382-9222</issn>
      <publisher>
        <publisher-name>BDC</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JOBS-11-2-JOBS-2025-003</article-id>
      <article-id pub-id-type="doi">10.57767/jobs_2026_003</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Situational Awareness for Proactive Rerouting: Enhancing Resilience in Submarine Communication Cables</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-8968-9793</contrib-id>
          <name>
            <surname>Liwång</surname>
            <given-names>Hans</given-names>
          </name>
          <email xlink:href="mailto:hans.liwang@fhs.se">hans.liwang@fhs.se</email>
          <xref ref-type="aff" rid="j_JOBS_aff_000"/>
          <xref ref-type="corresp" rid="cor1">∗</xref>
        </contrib>
        <aff id="j_JOBS_aff_000">Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden and Department of Engineering Mechanics, KTH Royal Institute of Technology, Stockholm, Sweden</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-3996-9279</contrib-id>
          <name>
            <surname>Frisk</surname>
            <given-names>Thomas</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_001"/>
        </contrib>
        <aff id="j_JOBS_aff_001">Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden.</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0009-0001-4081-6376</contrib-id>
          <name>
            <surname>Kindgren</surname>
            <given-names>Jonas</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_002"/>
        </contrib>
        <aff id="j_JOBS_aff_002">, Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden and Department of Mathematics and Natural Sciences, Blekinge Institute of Technology, Karlskrona, Sweden. Johan Sigholm, Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden.</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4376-9800</contrib-id>
          <name>
            <surname>Sigholm</surname>
            <given-names>Johan</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_003"/>
        </contrib>
        <aff id="j_JOBS_aff_003">Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden.</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-5904-3900</contrib-id>
          <name>
            <surname>Boschetti</surname>
            <given-names>Nicolò</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_004"/>
        </contrib>
        <aff id="j_JOBS_aff_004">Sibley School of Mechanical and Aerospace Engineering, Cornell University, Ithaca, NY, USA.</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-7051-3256</contrib-id>
          <name>
            <surname>Frånberg</surname>
            <given-names>Oskar</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_005"/>
        </contrib>
        <aff id="j_JOBS_aff_005">Department of Mathematics and Natural Sciences, Blekinge Institute of Technology, Karlskrona, Sweden.</aff>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6463-7719</contrib-id>
          <name>
            <surname>Falco</surname>
            <given-names>Gregory</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_006"/>
        </contrib>
        <aff id="j_JOBS_aff_006">Sibley School of Mechanical and Aerospace Engineering, Cornell University, Ithaca, NY, USA.</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume content-type="ahead-of-print">0</volume>
      <issue>0</issue>
      <fpage>1</fpage>
      <lpage>27</lpage>
      <pub-date pub-type="epub">
        <day>03</day>
        <month>03</month>
        <year>2026</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>08</day>
          <month>08</month>
          <year>2025</year>
        </date>
        <date date-type="accepted">
          <day>28</day>
          <month>10</month>
          <year>2025</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Open Access. ©</copyright-statement>
        <copyright-year>2026</copyright-year>
        <copyright-holder>Liwång et al.</copyright-holder>
        <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>Suspected sabotage to submarine communication cables (SCCs) across the world has raised questions about the resilience of these systems. Data communication networks typically use a network approach, which spreads the networks’ capacity across diverse routes to provide redundancy. This study takes a risk mitigation and resilience perspective by investigating the information needed to support proactive rerouting decision-making. This study reveals that appropriate situational awareness is dependent on specific, real-time information about hazards and threats to the cable in question. For an operator of an SCC, such a contribution is not possible without being interpreted as an integral stakeholder in defence.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>Submarine Data Communication</kwd>
        <kwd>Situational Awareness</kwd>
        <kwd>Hazards and Threats</kwd>
        <kwd>Cybersecurity</kwd>
        <kwd>Systems Science for Defence and Security</kwd>
        <kwd>Distributed Acoustic Sensing</kwd>
        <kwd>Decision-Making</kwd>
      </kwd-group>
    </article-meta>
  </front>
<body>

<p><title>Introduction</title></p>

<p>The defence challenges at sea have changed because of new technology 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_057">Wills, 2020</xref>); 
  this change includes an increase in the number of submarine communication cables (SCCs). 
  Recent events in the Baltic Sea and around Taiwan where damage, and suspected sabotage, 
  raised questions about the resilience of these systems 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_036">Milmo, 2025</xref>). 
  A single modern SCC can carry data upwards of a petabit per second and these cables carry almost 
  all intercontinental internet traffic. There are also many other cables for power transmission and traditional telephony. 
  These cables – often lying openly on the seabed of our oceans – not only are potentially susceptible to damage but 
  also manipulation of the optical fibres used to transmit data or cyberattacks targeting the network infrastructure, 
  which could compromise the integrity and confidentiality of communications relying on the SCCs 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_006">Boschetti and Falco, 2025</xref>).
</p>
<p>
  Data communication networks typically use a network approach, which spreads the network’s 
  capacity over multiple routes to provide redundancy 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_024">Jain et al., 2022</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_055">US GAO, 2022</xref>). 
  In the event of a single SCC failure, the network traffic is rerouted over other cables 
  while the service is restored to the damaged infrastructure 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_016">Gordon and Jones, 2022</xref>). 
  Therefore, single failures of SCCs have low or very limited consequences for data communications. 
  While straightforward, this approach is not always sufficient for critical communications, 
  which cannot afford new security risks induced by insecure routes or (rare but possible) disconnections. 
  Moreover, modern mesh networks are susceptible to cascading failures because of disruptive malware propagation. 
  A large part of society can be affected in scenarios where critical infrastructure and critical communications 
  rely on a single SCC or if mainstream management software is compromised 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_006">Boschetti and Falco, 2025</xref>).
</p>
<p>
  Managing submarine cables is an inherently multiagency, regulatory, and often international issue 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_009">Bueger and Liebetrau, 2021</xref>), 
  where several different state and commercial value perspectives overlap 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_056">Wetter and Wüthrich, 2015</xref>). 
  This multiagency, regulatory, and international issue presents a challenge to operations, 
  and the response is being studied in parallel domains 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_007">Boschetti et al., 2025</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_047">Sigholm, 2016</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_055">US GAO, 2022</xref>). 
  Organisations such as the International Cable Protection Committee (ICPC) and the International Telecommunication Union (ITU) 
  offer guidelines and recommended practices for cable protection. 
  However, there are possible practical gaps in coordinated threat response if practice is not adapted to the 
  complex combination of threats, hazards and actors of today.
</p>
<p>
  The important functions of society must be resilient 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_044">Roepke and Thankey, 2019</xref>). 
  Therefore, irrespective of whether there is an antagonistic attack behind the disturbance 
  to an SCC or not, there is a need to mitigate the effects of disturbances by introducing 
  new data communication alternatives and a balanced and proactive logic for rerouting data. 
  No single actor can provide the information needed for situational awareness in such decision-making. 
  The information needed is potentially spread over both military and civilian actors as well as over 
  both public and private actors. Therefore, to support the development of a more balanced and 
  proactive logic for rerouting data, this study investigates the possible information contributions 
  that can be provided by different stakeholders of the maritime domain.
</p>
<p>
  The main rerouting alternative considered in this study is an extended and controlled rerouting of 
  data through space or other alternatives that are independent of seabed hazards and threats. 
  However, such an alternative possibly comes with other costs, risks, and threats, 
  including a likely reduction in transmission capacity. 
  Although recent advances in free-space optical communication have allowed for data links between 
  Earth and satellites in orbit, as well as between satellites themselves, the overall capacity of 
  submarine cables cannot be matched by satellite-based solutions 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_006">Boschetti and Falco, 2025</xref>). 
  The threat of jamming, eavesdropping, cyberattacks, and physical sabotage of space communications systems 
  is also a factor that must be considered. A balanced combination of conceptually different solutions, 
  such as SCCs and space-based solutions, may highlight the strengths and mitigate weaknesses of specific solutions.
</p>
<p>
  The focus of this study is on a specific SCC (here denoted SCC0) the operator of SCC0 – 
  typically a commercial and civilian organisation. This study considers the information the operator 
  could utilise about hazards, threats and disturbances to SCC0 and about the consequences of rerouting the data. 
  From this perspective, challenges such as the availability of suitable information and the ability to 
  share information between commercial and public organisations and between civilian and military organisations exist.
</p>
<p>
  This study is performed from an applied utilitarian perspective, i.e., it aims both to identify current 
  stakeholder possibilities and to propose concepts for creating capability for suitable situational awareness 
  for decision support, where value is defined by contributions to risk mitigation and resilience. 
  Risk mitigation and resilience are further defined in a following section ‘Foundational Concepts: 
  Risk Mitigation, Resilience, and Situational Awareness’ below. This study is normative and conceptual 
  and uses various literature sources and theoretical approaches. It analyses the proposed development 
  from a sociotechnical perspective and in terms of interlinked relevance and rigor assessments.
</p>


<p><title>Theoretical Framework and Research Approach</title></p>
<p>
To support the qualitative assessments and develop concepts for resilient situational awareness this 
study combines theoretical concepts for capability development, risk mitigation, and resilience. 
This section first describes these theoretical concepts and then how they are combined in the research approach.
</p>

<p><title>A Capability Perspective</title></p>
<p>Support for the development of solutions that bridge civilian and military sectors and interests is lacking 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_001">Adlakha-Hutcheon et al., 2018</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_029">Liwång, 2022</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_039">NATO STO, 2021</xref>). 
  There is also limited support for developing system designs that combine and span findings from areas such as engineering, 
  management, and social sciences into a consistent approach 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_058">Winter, 2008</xref>). 
  Therefore, a ‘capability’ perspective is used here to put focus on top-level system design and 
  how a set of organisations arranges resources to meet common goals 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_017">Grabis, Zdravkovic, and Stirna, 2018</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_030">Liwång et al., 2023</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_059">Yue and Henshaw, 2009</xref>). 
</p>
<p>
  The capability concept determines aspects such as what type of technology is needed, 
  how it is expected to interact with personnel, and what competence is needed. 
  This refers to creating a conceptual design that connects development at several different societal levels and types of actors, 
  i.e., an important but challenging link between policy and technology development 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_029">Liwång, 2022</xref>). 
  With the capability perspective the assessment in this study focuses on solutions 
  for situational awareness with extensive interactions between social and technical components, 
  where important system characteristics and capabilities are emergent properties of the system. 
</p>


<p><title>Risk Mitigation, Resilience, and Situational Awareness</title></p>
<p>
In this study, we define risk mitigation as the means to reduce any or all the following risk components: 
likelihood, consequence, and uncertainty 
(see <xref ref-type="bibr" rid="j_jobs-2026-003_ref_003">Aven, 2009</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_004">Bakx and Nyce, 2015</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_028">Liwång, 2017</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_031">Liwång, Ericson, and Bang, 2014</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_038">NATO NSO, 2024</xref>). 
Resilience, as defined here, is the ability to protect the core goals of a system against changes and events outside the system. 
It is detailed here in terms of the five processes of anticipation, monitoring, response, recovery, 
and learning according to Lundberg and Johansson (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">2015</xref>):
</p>

  <list list-type="bullet">
      <list-item>
        <p>Anticipation represents being able to consider, before the fact, that a situation might occur and to act based on this prediction.</p>
      </list-item>
      <list-item>
        <p>Monitoring represents the ability to detect, make sense of, and act based on the discovery of an event’s onset.</p>
      </list-item>
      <list-item>
        <p>Response represents the ability to act during an unfolding event.</p>
      </list-item>
      <list-item>
        <p>Recovery represents the ability to address restoration after disruptions, ideally rebuilding with improved capabilities and reduced vulnerability.</p>
      </list-item>
      <list-item>
        <p>Learning represents the ability to adjust the system in the aftermath of an event, learning from both positive and negative outcomes.</p>
      </list-item>
  </list>



<p>The reliability of a system has strong connections to risk mitigation and resilience and is referred to here as a 
  function of redundancy and diversity. Redundancy is a physical feature of the infrastructure that provides alternative 
  routes through the system, and diversity is the insensitivity to common-cause failures within the system 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_002">Andrews and Moss, 2002</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_037">Möller and Hansson, 2008</xref>). 
  The work with risk mitigation and resilience must be active and integrated into management, 
  planning, and decision-making, where risk is accepted if benefits outweigh potential losses 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_031">Liwång, Ericson, and Bang, 2014</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_038">NATO NSO, 2024</xref>). 
</p>

<p>Risk mitigation and resilience are dependent concepts; risk mitigation is an integral part of resilience 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>). 
  Therefore, the two concepts are combined here to define the following three situational awareness 
  nformation-gathering capabilities (SA1–SA3), developed from the concepts of risk mitigation and resilience described above:
</p>
<ul>  •	SA1: Information for anticipation: Information from incidents and near misses that can be translated 
  into risk models related to possible future hazards and threats.
</ul>
<ul>  •	SA2: Monitoring to provide information for response to reduce likelihood and consequence: 
  Information about activities and events related to SCC0 that indicate its status and any hazards or threats, 
  enabling proactive or reactive measures to reduce likelihood or consequences and to support recovery.
</ul>
<ul>  •	SA3: Monitoring to provide information for learning and for reducing uncertainties: Information about 
  activities and events that make it possible to explain occurrences and attribute antagonistic actions.
</ul>
<p>  Suitable situational awareness is understood here as a capability that provides for SA1–SA3,
   where SA2 ideally supports both proactive response and reactive response and recovery. 
</p>

<p><title>Research Approach</title></p>
<p>To generate new knowledge about the problem domain both rigour and relevance must be assured throughout the process 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_011">Dansarie, Andersson, and Silfverskiöld, 2025</xref>). 
  Therefore, inspired by Hevner (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_021">Hevner, 2007</xref>), 
  this study includes relevance through initiating the process by defining the application domain. 
  To ensure rigor there must also be a thoroughly referenced knowledge base of scientific foundations, 
  i.e., the selection and application of appropriate theories and methods for constructing 
  and evaluating the proposed solution 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_022">Hevner et al., 2004</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_021">Hevner, 2007</xref>). 
  The qualitative assessment provided by such a combination of relevance and rigor is 
  suitable for developing an understanding of complex sociotechnical systems 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_035">Mauri and Antonovsky, 2021</xref>).
</p>
<p>  To ensure both relevance and rigor this study is divided into three steps. The first step describes 
  the characteristics of the possible stakeholder situational awareness contributions, presented as layers 
  of possible information. This first step represents the relevance and the application domain and introduces 
  contextual knowledge into the assessments. The second step qualitatively evaluates the possible situational 
  awareness capability contribution from each layer using the three information-gathering capabilities (SA1-SA3) 
  defined above. Therefore, step two represents rigor ensuring scientific foundations in the evaluation of the 
  different contributions to situational awareness. Steps one and two are both reported in the subsection 
  <italic>‘Steps 1 and 2: Information Layers and Their Possible Contributions to Situational Awareness’</italic>.
</p>
<p>  The subsection <italic>‘Step 3: Evaluation of the Situational Awareness Created and the 
  Possibility of Increasing Risk Mitigation and Resilience’</italic> iterates between the relevance and 
  rigor contributions and thereby examines and evaluates the findings from a system perspective, especially 
  in terms of sociotechnical integration and governance aspects.
</p>

<p><title>Results</title></p>

<title>Steps 1 and 2: Information Layers and Their Possible Contributions to Situational Awareness</title>
<p>This section describes the characteristics of the possible stakeholder contributions, introduces contextual knowledge, 
  and evaluates the possible contribution from each layer using the three information-gathering capabilities (SA1–SA3) 
  as defined above.
</p>
<p>
Figure 1 shows the layers of society that could provide information about technical status, threats, and risk. 
Each of these layers contains components in terms of organisations, processes, rules, and technology, 
and the characteristics of each layer are a product of these system components.
</p>

 <graphic orientation="landscape" position="float" xlink:href="figure1.png"/>
<p><italic>Figure 1. A flowchart illustrating the conceptual architecture for information about the technical status, 
  hazards, threats, and threat level with which different layers could contribute.
</italic></p>

<p>Below is a description and assessment of the possible contribution to situational awareness from each layer, 
  starting from SCC0 (the SCC in focus) and working outwards. The assessment results are summarised in Table 1.
</p>


<p><title>SCC0 Technical Status Information</title></p>
<p>This is a fully automated technical layer containing information about the technical status of the SCC0, 
  typically indicating whether the connection is ‘operational’ or ‘down’. Modern digital systems include continuous 
  functions for checking transmission functionality and pinpointing the location of any disturbance.
</p>
<p>
  Precise, immediate information about infrastructure status is central to acting on malfunctions 
  and initiating further investigations. Often, at sea, distant or external resources are needed for both 
  investigation and repair. Therefore, precise status information saves time and resources in coordinating the 
  next steps. Information from the SCC0 technical status layer cannot be replaced by other external information.
</p>
<p><title>  SCC0 Hazard and Threat Information</title>
</p>
<p>
  Monitoring and detecting undersea cable hazards and threats is an active field of research. 
  This layer collects and processes sensor data operated by the SCC0 itself. Hazards exist in the physical 
  domain but can also target the information carried by the cable.
</p>
<p>
  In SCC0 monitoring, the optical fibres built into the cable are used as sensors that can monitor 
  infrastructure changes, errors, or nearby activity, including techniques such as fibre optic cables (FOC) 
  distributed temperature sensing (DTS) and FOC distributed acoustic sensing (DAS) 
  (see <xref ref-type="bibr" rid="j_jobs-2026-003_ref_012">Duckworth et al., 2013</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_019">Gutscher et al., 2019</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_018">Gutscher et al., 2023</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_023">Howe et al., 2022</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_041">OX2, 2025</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_050">Taweesintananon et al., 2021</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_052">Thodi et al., 2014</xref>).
</p>
<p>
  Cables are often partially buried in the seabed for risk mitigation 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_040">Olsson, Franberg, and Kulesza, 2022</xref>). 
  Therefore, by using DTS and data about the surrounding environment for calculating cable burial depth, 
  operators can identify potential issues early, minimise damage, and reduce the need for frequent physical surveys 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_023">Howe et al., 2022</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_052">Thodi et al., 2014</xref>).
</p>
<p>
  DAS technology transforms an optical fibre into a long, densely sampled acoustic/seismic sensor array. 
  It can detect and classify multiple threats, such as digging and tunnelling, footsteps, and gunshots, 
  with high location accuracy over considerable distances. Previous research and testing have demonstrated 
  successful applications in a variety of environments, with coverages up to 50 km and virtual sensor 
  separations as small as one metre 
  (see <xref ref-type="bibr" rid="j_jobs-2026-003_ref_012">Duckworth et al., 2013</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_023">Howe et al., 2022</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_041">OX2, 2025</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_051">Tejedor et al., 2017</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_052">Thodi et al., 2014</xref>). 
  Such information can enable proactive actions to prevent cable damage.
</p>
<p>
  Interference with the optical cable can also be detected via optical time domain reflectometers (OTDRs), 
  which can identify and characterise the type of tampering that occurs 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_005">Bhatta et al., 2019</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2026-003_ref_051">Tejedor et al., 2017</xref>). 
  As activities close to or on the cable are rare, signals detected from these built-in sensing functions 
  (i.e., DTS, DAS and OTDRs) typically warrant prompt mitigation.
</p>
<p>
  The confidentiality and integrity of the data transmitted via SCCs could also be compromised through physical 
  tampering of the optical fibres or seabed amplifiers. Such an attack is technically possible 
  but highly complex and requires a high level of sophistication due to the challenging environmental 
  conditions on the seabed 
  (<xref ref-type="bibr" rid="j_jobs-2026-003_ref_006">Boschetti and Falco, 2025</xref>). 
  However, such an attack could have severe consequences because it may not trigger any alarms if the cable is without protection.
</p>
<p>
  Continuous data from DTS and DAS on activity on or near a cable also would provide 
  information on both the baseline activity and near misses, information that is not currently registered. 
  This information provides context for more severe incidents and thereby contributes 
  to more developed anticipation and learning.
</p>
<p><title>Maritime Hazard and Threat Information</title></p>
<p>
This layer collects vessel traffic data from sources such as automatic identification system (AIS) 
transceivers and shore-based radars. Space-based systems can also provide better coverage than 
can assets on the ground. This information is continuously monitored and assessed through manual 
and automatic anomaly detection 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_043">Relling et al., 2022</xref>).
</p>
<p>
Information about vessel traffic and ship behavioural anomalies is important for understanding the 
likelihood of hazards such as fishing accidents or anchor dragging. 
However, most shipping anomalies do not affect seabed cables. Therefore, 
specific real-time subsea data are needed to identify which surface vessels present hazards or threats to seabed infrastructure.
</p>
<p>
<title>Independent Infrastructure Hazard and Threat Information (Surveillance and Inspection with Ships or Underwater Vehicles)
</title></p>
<p>
One approach is to use dedicated autonomous underwater vehicles to patrol cables 
and relay footage for analysis. These systems are used for in situ pipeline and cable inspection 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_013">Evans et al., 2003</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_020">Hamilton and Evans, 2005</xref>). 
However, low underwater operation speeds (approximately 10 knots), short sensor and communication ranges (1–100 m), 
and limited bandwidths 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_049">Tärnholm and Liwång, 2022b</xref>) make immediate response challenging. 
Thus, even with multiple vehicles patrolling every cable, the response time is too long for 
detecting or mitigating ongoing incidents. 
</p>
<p>
Regular external inspections or surveillance can identify deteriorating environmental 
conditions or sabotage preparations that are useful for anticipating future incidents. 
However, such implementation is resource intensive.
</p>
<p><title>Military Threat Information</title>
  </p>
<p>
In this layer, military organisations collect data from sensors and assets, often from vessels 
(including autonomous ones), and make qualitative threat-level assessments. 
Routine surveillance of the seabed and underwater infrastructure helps establish a 
baseline and detect changes over time, reducing uncertainty about threats and antagonistic events. 
The use of military assets in creating situational awareness results in a variety of capabilities 
that civilian actors do not possess, as the use of the military is shaped to handle other types 
of conflict and adversaries. The use of military assets is, however, not uncomplicated in times of 
peace because of contributing nations’ legal frameworks as well as international agreements 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_048">Tärnholm and Liwång, 2022a</xref>). 
Potential capabilities could be surface ships with flying assets with long-range sensors such as radars and 
signal intelligence but also submarines and the ability to act with enough force to handle a 
confirmed threat to a SCC. Another important aspect is the possible deterrent effect military 
assets have on potential threat actors 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_053">Till, 2009</xref>).
</p>
<p>
Detailed and high-quality routine surveillance of the seabed and underwater infrastructure is 
important for establishing a baseline description of activity and detecting changes over time. 
Such information is important for the development of the ability to foresee and predict 
future events and to identify previously unexampled events important for anticipating events 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>) 
and therefore reduces the uncertainty about threats and antagonistic events.
</p>
<p>
<title>Cyber Threat Information</title>
</p>
<p>
In this layer, an organisation – often a nonmilitary government agency – collects information about cyber 
incidents and makes manual qualitative assessments of the cyber threat level. Several SCC management 
vulnerabilities are related to cyber threats, including supply chain compromise, where the limited market of SCC 
software providers poses a particular risk. Infiltration at any point – from software creation to update distribution – 
can compromise entire networks and thus affect wide ranges of users within the government and private sectors 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_045">Sherman, 2021</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_055">US GAO, 2022</xref>). 
Moreover, weak encryption and poor key management practices can further jeopardise the cybersecurity of SCCs 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_015">Furdek et al., 2021</xref>). 
Understanding these threats helps anticipate future incidents, learn from events in other sectors 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>), 
and therefore reduce uncertainty about the future.
</p>
<p>
<title>Hazard and Threat Information About Alternative Infrastructure</title>
</p>
<p>
This layer evaluates threats and risks to terrestrial and space-based infrastructure, 
which is crucial for rerouting decisions. Information about hazards in space is of particular 
interest because space-based communications are independent of seabed threats. 
Ongoing development of low-Earth orbit (LEO) satellite communications technology, increased spectrum use, 
and optimised antennas with more advanced beamforming and digital processing technologies, 
will allow LEO constellations to provide significantly higher throughput rates in the coming years 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_008">Brodkin, 2024</xref>). 
When also considering the potential to leverage multiple satellites in parallel to transmit 
and receive data and recent developments in free-space optical communication – 
using laser light to transmit data within an optical fibre – satellite communication is gradually 
becoming a realistic option for providing redundancy for terrestrial communication infrastructures 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_042">Potter, 2024</xref>). 
</p>
<p>
However, space-based infrastructure has its own systemic vulnerabilities. 
Examples of naturally occurring phenomena that can hamper communication with or between satellites 
include adverse weather conditions in the atmosphere (e.g., fog and sandstorms) and space 
(e.g., solar flares and electromagnetic radiation) 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_010">Buzulukova and Tsurutani, 2022</xref>). 
In the future, a proliferated LEO environment or a so-called Kessler syndrome scenario 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_026">Kessler et al., 2010</xref>) 
caused by a growth in space debris could have detrimental effects on space operations in certain orbits 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_034">Luu and Hastings, 2022</xref>). 
Moreover, several cyber threats exist in relation to space data communications 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_014">Falco et al., 2024</xref>).
</p>
<p>
Of particular interest is the knowledge about alternatives that are independent of the weaknesses of SCC0, i.e., 
alternatives that offer increased diversity in the system. Space-based systems are an example of an alternative that 
contributes substantial diversity to the system.
</p>
<p>
<title>Assessment of Societal Needs and Sensitivity to Disturbances</title> 
</p>
<p>
Societal needs reflect decisions about priorities, possible restrictions on civilian data transmission, etc. 
Effects on end-users from infrastructure failures are typically not linear with respect to damage to 
the infrastructure or to the amount of protection implemented 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_025">Johansson, Jonason Bjärenstam, and Axelsdóttir, 2018</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_046">Shield et al., 2021</xref>; 
<xref ref-type="bibr" rid="j_jobs-2026-003_ref_054">UNDP and UNDRR, 2022</xref>). 
Typically, SCC failures have limited, short-term consequences for data communications but may 
cause restoration costs and uncertainty about reliability and governance. Proactive rerouting is critical 
primarily in specific situations or for certain high-priority data. Without information about such specific 
situations, suitable rerouting decisions cannot be made.
</p>
<p>
The SCC incident often creates substantial uncertainties about cause, reliability, and governance 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_047">Liebetrau and Bueger, 2024</xref>). 
Importantly, there is a low level of secondary consequences of an incident, i.e., there is a low 
likelihood for cascading or escalating effects in the infrastructure and very limited environmental effects, etc. 
If there is a specific sensitivity to failure at a specific time and/or specific place, 
such information is important to protect. Therefore, proactive rerouting decisions are important 
only for specific conditions and for a limited amount of data of specific societal importance. 
Without information about such conditions, suitable rerouting decisions cannot be made.
</p>
<p>
<italic>Table 1. Summary of the possible contributions of information that can be provided by 
  different stakeholders in the maritime domain. Author created.
</italic></p>


<table-wrap id="Table1">
  <caption>
   <title>Table 1</title>
   <p></p>
  </caption>
<table frame="box" rules="all" cellpadding="5">
  
  <tbody>
  <tr>
   <th>Layer</th>
   <th>Contribution</th>
  </tr>

  <tr>
    <td>SCC0 technical status information</td>
    <td>Unique and specific contribution to response to reduce consequences (reactive SA2).</td>
  </tr>
  
  <tr>
   <td>SCC0 hazard and threat information</td>
   <td>Specific and resource-efficient contribution to reduce likelihood and consequence (proactive and reactive SA2). 
    Also contributes to learning and anticipation by giving information about the baseline activity and near misses (SA1 and SA3).</td>
  </tr>

  <tr>
      <td>Maritime hazard and threat information</td>
      <td>If combined with specific real-time underwater information: Contribution to anticipation (SA1), to learning and for reducing uncertainties (SA3), and to reduce likelihood and consequence (proactive and reactive SA2).</td>
  </tr>
  
  <tr>
    <td>Independent infrastructure hazard and threat information (inspection)</td>
    <td>Specific contribution to anticipation (SA1), but not feasible for real-time monitoring.</td>
  </tr>

  <tr>
    <td>Military threat information</td>
    <td>General contribution to anticipation (SA1), to learning and for reducing uncertainties (SA3).</td>
  </tr>

  <tr>
   <td>Cyber threat information</td>
   <td>General contribution to anticipation (SA1), to learning and for reducing uncertainties (SA3).</td>
  </tr>

  <tr>
    <td>Hazard and threat information about alternative infrastructure</td>
    <td>Central for balanced decision-making in response to reduce likelihood and consequence.</td>
  </tr>
  
  <tr>
    <td>Assessment of societal needs and sensitivity to disturbances</td>	
    <td>Complex and context dependent, but crucial for balanced decision-making response to reduce likelihood and consequence.</td>
  </tr>
 </tbody> 
</table>
</table-wrap>


<p><title>Step 3: Evaluation of the Situational Awareness Created and the Possibility of Increasing Risk Mitigation and Resilience</title></p>
<p>
An adequate capability must cover all three situational awareness components (SA1–SA3) 
in both the physical and cyber domains. Steps 1 and 2 above show that no single actor or 
layer of society can provide the information needed to create situational awareness.
 It is the combination of specific information about activities connected to SCC0 with general hazard and 
 threat information, which creates value in terms of risk mitigation and resilience, provided that the 
 information is actionable and suitable for decision-making.
</p>
<p>
Space-based alternatives offer diversity. However, overuse of alternative infrastructure decreases data 
communication quality 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_024">Jain et al., 2022</xref>) and space 
alternatives introduce capacity losses and sensitivity to new hazards and threats, 
possibly overshadowing the benefits of rerouting. Hence, rerouting decisions leveraging space-based 
infrastructure must be balanced, timely, and well informed by specific societal needs, ensuring 
reliable service for prioritised traffic.
</p>
<p>
Table 2 presents a summary of the prioritised contributions to each situational awareness component (SA1-SA3), 
and the findings are further elaborated in the text below.
</p>
<p>
<italic>Table 2. Summary of the prioritised contributions to each situational awareness component (SA1-SA3). 
  Author created.</italic>
</p>

<table-wrap id="Table2">
  <caption>
   <title>Table 2</title>
   <p></p>
  </caption>
<table frame="box" rules="all" cellpadding="5">  
  <tbody>
  <tr>
    <th>Situational awareness component</th>
    <th>Information, in order of contribution</th>
  </tr>

  <tr>
    <td rowspan="4">SA1: Information for anticipation</td>  
    <td>1. SCC0 hazard and threat information</td>
  </tr>  
  <tr>  
    <td>2. Maritime hazard and threat information</td>
  </tr>
  <tr>  
    <td>3. Military threat information</td>
  </tr>
  <tr>
    <td>4. Cyber threat information</td>
  </tr>

  <tr>
    <td rowspan="3">Reactive SA2: Monitoring to provide information for reactive response</td>
    <td>1. SCC0 technical status information</td>
  </tr>
  <tr>  
    <td>2. SCC0 hazard and threat information</td>
  </tr>
  <tr>  
    <td>3. Maritime hazard and threat information</td>
  </tr>

  <tr>
    <td rowspan="2">Proactive SA2: Monitoring to provide information for proactive response</td>
    <td>1. SCC0 hazard and threat information</td>
</tr>
<tr> 
    <td>2. Maritime hazard and threat information</td>
  </tr>

  <tr>
    <td rowspan="4">SA3: Monitoring to provide information for learning and for reducing uncertainties</td>
    <td>1. SCC0 hazard and threat information</td>
  </tr>
  <tr>  
    <td>2. Maritime hazard and threat information</td>
  </tr>
  <tr>  
    <td>3. Military threat information</td>
  </tr>
  <tr>  
    <td>4. Cyber threat information</td>
  </tr>

  <tr>
    <td rowspan="2">Other information needed to support decision-making</td>
    <td>1. Hazard and threat information about alternative infrastructure</td>
  </tr>
  <tr>  
    <td>2. Assessment of societal needs and sensitivity to disturbances</td>
  </tr>
  </tbody>
</table>
</table-wrap>

<p>
To create <italic>situational awareness for anticipation (SA1)</italic>, 
the operator of SCC0 needs general cyber threat information and military-domain intelligence on 
hazards and threats to the infrastructure in question. As infrastructure hazards often change slowly 
but threat uncertainties can shift rapidly, anticipation must emphasise both physical and cyber threats, 
and operators must actively seek new information 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_032">Liwång, Sörenson, and Österman, 2015</xref>). However, 
anticipation is not merely about implementing adjustments but also about an organisational culture that 
acknowledges limited information 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>). 
Therefore, anticipation is dependent on the ability to look beyond the latest incidents and understand 
that the introduction of a new threat does not necessarily reduce the risk related to old risks and hazards.
</p>
<p>
To create <italic>situational awareness for response to reduce likelihood and consequence (SA2)</italic>, 
the operator needs specific and real-time information about the hazards and threats towards SCC0, 
preferably coupled with more general information about surface vessel traffic data in the vicinity of SCC0. 
Only then can proactive steps be taken to stop or limit an incident, warn end-users of imminent consequences, 
and prepare for rerouting to maximise the capacity and security of the new connection. Table 2 highlights that 
information suitable for active real-time physical response is limited. Therefore, physical protection needs to 
be implemented beforehand to provide for protection in case of accident or sabotage.
</p>
<p>
Central to the usefulness of monitoring is the ability to ‘interpret the signs of an upcoming problem’ 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>, p.26). 
Therefore, relevant and context-specific anomaly detection is central. Research on anomaly detection for 
ship traffic has been conducted 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_043">Relling et al., 2022</xref>), 
but additional classification of underwater events is needed to identify imminent hazards and threats to SCCs more precisely.
</p>
<p>
To successfully act on a problem and to coordinate resources, there need to be suitable response modes 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>). 
Moreover, any responses – such as rerouting – must also account for at least general information on 
societal needs and potential vulnerabilities. This requires the protection of sensitive information, 
as it includes details on military, public, and commercial aspects, as well as information about societal needs.
</p>
<p>
Multiple simultaneous infrastructure failures are a possible consequence of attacks carried out by 
threat actors with the intent of generating large-scale effects. This highlights the need for situational 
awareness that can detect synchronised or cascading incidents and ensure that decision-making is informed.
</p>
<p>
To create <italic>situational awareness for learning and to reduce uncertainties (SA3)</italic>, 
the SCC operator must learn from its own incidents but, perhaps more importantly, be a part of a general 
societal process for learning, where stakeholders share information and their assessments. 
Learning is central to resilience 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_033">Lundberg and Johansson, 2015</xref>) 
and is primarily a social aspect of the sociotechnical system. Such learning must address 
all the social aspects of the system, including governance and legal aspects. These aspects cannot therefore be 
assumed to be constant. An essential first step in implementing more efficient coordination among stakeholders 
could involve establishing information sharing and analysis focused on SCCs that bridges public and commercial actors. 
This public-private cooperation model could play a crucial role in fostering coordination among 
stakeholders in the domain of situational awareness. Such coordination and learning are also important 
for informing cable risk management to decide to what extent new cables should be buried and monitored 
for ensuring sufficient protection 
(<xref ref-type="bibr" rid="j_jobs-2026-003_ref_040">Olsson, Franberg, and Kulesza, 2022</xref>).
</p>
<p>
As discussed in this study, effective situational awareness and consequent decision-making for 
SCCs rely not only on the proper integration of monitoring tools but also on coordination across the various 
actors of the network. The value of the information gathered about hazards and threats to a SCC may be 
greater for society than it is for the operator of the SCC. Also, significant heterogeneity often exists 
in how threats and failures are interpreted and addressed among different companies, as well as between 
the private sector and military stakeholders. These discrepancies can lead to delays and inefficiencies 
in the security of submarine communications and may be mitigated by bringing together diverse stakeholders 
to create a more shared risk understanding.
</p>
<p>
A well-balanced and implemented approach to SCC security increases the costs and risks of sabotage 
and decreases the impact of both accidents and sabotage. Additionally, appearing well protected is a 
deterrent and thus a protection in itself (Liwång, Sörenson, and Österman, 2015). However, across all 
areas identified, it is clear from this study that the resulting approach to SCC security is dependent 
on information about the weaknesses of the data communication system, as it is primarily the system 
functionality that needs to be protected, not the cable itself. For a commercial, nonstate operator of an 
SCC, contributing during crises or large-scale disturbances requires being recognised as a fully integrated defence 
stakeholder, e.g. having stronger links to relevant Navies and Coast Guards, with access to the information and 
threat intelligence necessary in this capacity. This affects how the SCC operator anticipates and learns as a defence actor, 
where the operator’s actions will have both civilian and military implications, and depends on the ability to 
integrate various types of risk intelligence to balance risks.
</p>

<p><title>Discussion: Conditions for Balanced Rerouting</title></p>
<p>
The conditions and need for rerouting of data communications vary by region, location, nation, and time. 
This constitutes both a technical and a social challenge. Rerouting is a core function of the data communication infrastructure. 
Therefore, critical maritime infrastructure protection is not focused primarily on the physical 
protection of the data communication system components. For society the focus should be on ensuring connectivity 
by redundancy, diversity, and decision-making that use the system’s strengths. The more situational awareness is 
shared, the more decision-making can support resilience.
</p>
<p>
Space-based systems are not the only alternative to SCCs; aboveground microwave solutions could also provide an 
option that is independent of seabed hazards and threats. However, microwave solutions have range limitations as 
well as capacity challenges, and they introduce new weaknesses into the communication system.
</p>
<p>
If suitable possibilities for monitoring threats and risks to submarine communications infrastructure are 
implemented, they not only support governance and legal development but also strengthen the emergency functionality 
crucial for crisis management and military defence alike. For example, a more developed cross-disciplinary design 
and decision-making process would make it easier to implement prioritised crisis and military functionality directly 
fused into the infrastructure, e.g., implement military solutions for space-based back-up communication directly 
into the network instead of being stand-alone solutions. This, in turn, would increase the possibilities for 
alternatives in the event of a larger disturbance.
</p>
<p>
The investigations of this study open avenues for further development in technology, governance, and legal 
implications, as well as in how these aspects interact. However, for such a development, strategic aspects 
and the notion of sovereignty need to be further addressed by involved states. The interaction between technology, 
governance, and legal aspects is especially challenging given the international and global characteristics of 
data communications compared with the national characteristics of defence and law.
</p>
<p>
There are also questions about the quality, fidelity, and feedback of the situational awareness discussed, 
as well as in relation to trust. For example, if the best information about threats and the critical need for 
continuous data communications exist in the military realm, while the capacity for long-distance data communications 
lies in the civilian and commercial realms, how should this complex interdependency between military and commercial 
organisations be arranged?
</p>
<p>
This study provides an understanding of possible contributions to SCC situational awareness and the appropriateness 
of their respective application to the operation of SCCs. The value of such situational awareness is supported by 
research in several different and independent fields. This normative and conceptual study generates new knowledge 
about the problem domain by outlining how the concept of situational awareness could be created and by prioritising 
different contributions. More applied work is needed to develop the specific processes, technology, 
and competencies that could contribute to more effective interactions between stakeholders in 
modern society’s data communication systems.
</p>

<p><title>Conclusion</title>
</p>  
<p>This study takes a risk mitigation and resilience perspective by investigating the information needed to 
support decision-making. Appropriate situational awareness is dependent on general information about hazards 
and threats to feed into more continuous and long-term processes for anticipation and learning. However, 
decision-making is also dependent on specific information about hazards and threats targeting the cable in question.
</p>
<p>
A well-balanced and implemented approach to SCC security increases the costs and risks of sabotage and 
decreases the effects on society for both accidents and intentional attacks. However, across all areas identified, 
it is clear from this study that the resulting approach to SCC security is dependent on information about the 
weaknesses of the data communication system because it is primarily the system’s functionality that needs to be 
protected, not the cable’s functionality. Additionally, for a commercial nonstate operator of an SCC, 
such contributions to the system’s capability during crises or large-scale disturbances are not possible 
without being seen as an integral stakeholder of defence, and receiving the information needed to act in such a capacity.
</p>
<p>
Furthermore, this study highlights the importance of actively bridging civilian, commercial, and 
military interests through a shared operational framework. Such collaboration supports a holistic approach 
to hazard and threat identification, ensuring that physical and cyber vulnerabilities are addressed in tandem. 
By aligning technical capabilities with governance structures, stakeholders can more effectively anticipate 
emerging risks, enhance response measures, and ensure system-wide resilience.
</p>
<p>
While this study offers a conceptual and normative framework for improving submarine cable resilience, 
it does not provide empirical validation or detailed cost-benefit analyses. However, from the perspective 
of applied development, the conceptual capability perspective is often lacking, and resources and focus are 
placed on solutions with limited contributions to the capability needed.
</p>

<p><bold>Acknowledgements:</bold> We gratefully acknowledge the support from the NATO Science for Peace and Security (SPS) 
  Programme to the Hybrid Space/Submarine Architecture Ensuring Infosec of Telecommunications (HEIST) research project. 
  We also would like to thank participants at the HEIST 2024 workshop at Cornell University and the 2025 workshop at 
  Blekinge Institute of Technology for fruitful discussions.
</p>
<p>
<bold>AI Statement:</bold> The Author(s) did not use Generative AI and/or AI-assisted technologies during the 
preparation of this work.
</p>

</body>


<back>
  <ref-list id="j_jobs-2026-003">
  <title>Works Cited</title>
  <!-- references ended up one level too right.  -->
      <ref id="j_jobs-2026-003_ref_001">
        <mixed-citation publication-type="book">
        <bold>
            <surname>Adlakha-Hutcheon</surname>, <given-names>Gitanjali</given-names>, 
            <surname>Bin Hassan</surname>, <given-names>Firoz</given-names>, 
            <surname>Bown</surname>, <given-names>Kevin</given-names>, 
            <surname>Kivelin</surname>, <given-names>J.</given-names>, 
            <surname>Lindberg</surname>, <given-names>Anna</given-names>, 
            <surname>Maltby</surname>, <given-names>James F.J.</given-names>, 
            <surname>Molder</surname>, <given-names>Cristian</given-names>, 
            <surname>Peters</surname>, <given-names>C.E.</given-names>, 
            <surname>Rizzo</surname>, <given-names>Gabriele</given-names>, 
            <surname>Roemer</surname>, <given-names>Silke</given-names>, 
            <surname>Temiz</surname>, <given-names>A.</given-names>, 
            <surname>Tocher</surname>, <given-names>M.</given-names>. 
            (<year>2018</year>)
          </bold> 
          <italic><source>A mid-way point on Futures Assessed alongside socio-Technical Evolutions (FATE) (DRDC-RDDC-2018-R211)</source></italic>. 
          <publisher-loc>Ottawa</publisher-loc>: <publisher-name>Defence Research and Development Canada</publisher-name>, [online] 
          <ext-link xlink:href="https://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-2-211-2018-eng.pdf">https://publications.gc.ca/collections/collection_2019/rddc-drdc/D68-2-211-2018-eng.pdf</ext-link>
      </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_002">
        <mixed-citation publication-type="book">
          <bold>
            <surname>Andrews</surname>, <given-names>John D.</given-names>, 
            and 
            <surname>Moss</surname>, <given-names>T.Robert</given-names>. 
            (<year>2002</year> )
          </bold> ‘Common cause failures’, in Andrews and Moss (eds.) 
          <italic><source>Reliability and risk assessment. 2nd edn</source></italic>. 
          <publisher-loc>London</publisher-loc>: <publisher-name>Professional Engineering Publishing Limited</publisher-name>, 
          pp. <fpage>267</fpage>–<lpage>285</lpage>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_003">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Aven</surname>, <given-names>Terje</given-names>. 
            (<year>2009</year>)
          </bold> 
          <article-title>Identification of safety and security critical systems and activities</article-title>, 
          <italic><source>Reliability Engineering and System Safety</source></italic>, 
          <volume>94</volume>(<issue>2</issue>), pp.<fpage>404</fpage>–<lpage>411</lpage>. 
          DOI:<ext-link xlink:href="https://doi.org/10.1016/j.ress.2008.04.001">https://doi.org/10.1016/j.ress.2008.04.001</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_004">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Bakx</surname>, <given-names>G.C.H.</given-names>, and 
            <surname>Nyce</surname>, <given-names>J.M.</given-names>. 
            (<year>2015</year>)
          </bold> 
          ‘<article-title>Risk and safety in large-scale socio-technological (military) systems: a literature review</article-title>’, 
          <italic><source>Journal of Risk Research</source></italic>, 
          <volume>20</volume>(<issue>4</issue>), 
          pp. <fpage>463</fpage>–<lpage>481</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/13669877.2015.1071867">https://doi.org/10.1080/13669877.2015.1071867</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_005">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Bhatta</surname>, <given-names>Hari Datta</given-names>, 
            <surname>Costa</surname>, <given-names>Luis</given-names>, 
            <surname>Garcia-Ruiz</surname>, <given-names>Andres</given-names>, 
            <surname>Fernandez-Ruiz</surname>, <given-names>Maria R.</given-names>, 
            <surname>Martins</surname>, <given-names>Hugo F.</given-names>, 
            <surname>Tur</surname>, <given-names>Moshe</given-names>, and 
            <surname>Gonzalez-Herraez</surname>, <given-names>Miguel</given-names>. 
            (<year>2019</year>)
          </bold> 
          ‘<article-title>Dynamic measurements of 1000 microstrains using chirped-pulse phase-sensitive optical time-domain reflectometry</article-title>’, 
          <italic><source>Journal of Lightwave Technology</source></italic>, 
          <volume>37</volume>
          (<issue>18</issue>), 
          pp. <fpage>4888</fpage>–
          <lpage>4895</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1109/JLT.2019.2928621">https://doi.org/10.1109/JLT.2019.2928621</ext-link>.
        </mixed-citation>
      </ref>



      <ref id="j_jobs-2026-003_ref_006">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Boschetti</surname>, <given-names>Nicolò</given-names> and 
            <surname>Falco</surname>, <given-names>Gregory</given-names>. 
            (<year>2025</year>)
          </bold> 
          ‘<article-title>Underwater cyber warfare: submarine communications cables architecture and cybersecurity analysis</article-title>’, 
          <italic><source>Proceedings of the 58th Hawaii International Conference on System Sciences</source></italic>, 
          <date><day>7</day><month>January</month></date>. 
          DOI: <ext-link xlink:href="https://doi.org/10.24251/HICSS.2025.233">https://doi.org/10.24251/HICSS.2025.233</ext-link>.
        </mixed-citation>
      </ref>
  

      <ref id="j_jobs-2026-003_ref_007">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Boschetti</surname>, <given-names>Nicolò</given-names>, 
            <surname>Koyyada</surname>, <given-names>Anurag</given-names>, 
            <surname>Downs</surname>, <given-names>Barrett</given-names>, 
            <surname>Rosenthal</surname>, <given-names>William</given-names>, 
            <surname>Gordon</surname>, <given-names>Nathaniel</given-names>, 
            <surname>Liwång</surname>, <given-names>Hans</given-names>, 
            <surname>Marder</surname>, <given-names>Alexander</given-names>, 
            <surname>Sigholm</surname>, <given-names>Johan</given-names>, 
            <surname>Frånberg</surname>, <given-names>Oskar</given-names>, 
            <surname>Kindgren</surname>, <given-names>Jonas</given-names>, 
            <surname>Frisk</surname>, <given-names>Thomas</given-names>, 
            <surname>Magnússon</surname>, <given-names>Bjarni Már</given-names>, 
            <surname>Cavelty</surname>, <given-names>Myriam Dunn</given-names>, 
            <surname>Johnson</surname>, <given-names>Henric</given-names>, and 
            <surname>Falco</surname>, <given-names>Gregory</given-names>. 
            (<year>2025</year>)
          </bold> 
          ‘<article-title>Hybrid space and submarine architecture to ensure information security of telecommunications (HEIST)</article-title>’, 
          <italic><source>IEEE Access</source></italic>, 
          DOI: <ext-link xlink:href="https://doi.org/10.1109/ACCESS.2025.3631359">https://doi.org/10.1109/ACCESS.2025.3631359</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_008">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Brodkin</surname>, <given-names>John</given-names>. 
            (<year>2024</year>)
          </bold> 
          ‘<article-title>SpaceX tells FCC it has a plan to make Starlink about 10 times faster</article-title>’, 
          <italic><source>Ars Technica</source></italic>, [online] 
          15 October. 
          Available at: <ext-link xlink:href="https://arstechnica.com/tech-policy/2024/10/spacex-claims-starlink-can-offer-gigabit-speeds-if-fcc-approves-new-plan/">https://arstechnica.com/tech-policy/2024/10/spacex-claims-starlink-can-offer-gigabit-speeds-if-fcc-approves-new-plan/</ext-link> 
          (Accessed: 28 Jan 2025). 
        </mixed-citation>
    </ref>


      <ref id="j_jobs-2026-003_ref_009">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Bueger</surname>, <given-names>Christian</given-names> and 
            <surname>Liebetrau</surname>, <given-names>Tobias</given-names>. 
            (<year>2021</year>)
          </bold> 
          ‘<article-title>Protecting hidden infrastructure: the security politics of the global submarine data cable network</article-title>’, 
          <italic><source>Contemporary Security Policy</source></italic>, 
          <volume>42</volume>
          (<issue>3</issue>), 
          pp. <fpage>391</fpage>-<lpage>413</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/13523260.2021.1907129">https://doi.org/10.1080/13523260.2021.1907129</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_010">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Buzulukova</surname>, <given-names>Natalia</given-names> and 
            <surname>Tsurutani</surname>, <given-names>Bruce</given-names>. 
          (<year>2022</year>)
          </bold> 
          ‘<article-title>Space weather: from solar origins to risks and hazards evolving in time</article-title>’, 
          <italic><source>Frontiers in Astronomy and Space Sciences</source></italic>, 
          <volume>9</volume>. 
          DOI: 
          <ext-link xlink:href="https://doi.org/10.3389/fspas.2022.1017103">https://doi.org/10.3389/fspas.2022.1017103</ext-link>.   
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_011">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Dansarie</surname>, <given-names>Marcus</given-names>, 
            <surname>Andersson</surname>, <given-names>Ken Erik</given-names>, and 
            <surname>Silfverskiöld</surname>, <given-names>Stefan</given-names>. 
          (<year>2025</year>)
          </bold> 
          ‘<article-title>Crowd assessment of the military utility of future technologies</article-title>’, 
          <italic><source>Scandinavian Journal of Military Studies</source></italic>, 
          <volume>8</volume>(<issue>1</issue>), 
          pp. <fpage>200</fpage>-<lpage>219</lpage>. 
          DOI: 
          <ext-link xlink:href="https://doi.org/10.31374/sjms.339">https://doi.org/10.31374/sjms.339</ext-link>.  
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_012">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Duckworth</surname>, <given-names>Gregory</given-names>, 
            <surname>Owen</surname>, <given-names>Archibald</given-names>, 
            <surname>Worsley</surname>, <given-names>Jerry</given-names>, and 
            <surname>Stephenson</surname>, <given-names>Henry</given-names>. 
            (<year>2013</year>)
          </bold> 
          ‘<article-title>OptaSense distributed acoustic and seismic sensing performance for multi-threat, 
            multi-environment border monitoring</article-title>’, 
          <italic><source>2013 European Intelligence and Security Informatics Conference</source></italic>, 
          pp. <fpage>273</fpage>-<lpage>276</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1109/EISIC.2013.70">https://doi.org/10.1109/EISIC.2013.70</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_013">
        <mixed-citation publication-type="journal">
        <bold>
          <surname>Evans</surname>, <given-names>Jonathan</given-names>, 
          <surname>Petillot</surname>, <given-names>Yvan</given-names>, 
          <surname>Redmond</surname>, <given-names>Paul</given-names>, 
          <surname>Wilson</surname>, <given-names>Mark</given-names>, 
          and <surname>Lane</surname>, <given-names>David</given-names>. 
          (<year>2003</year>)
        </bold>
        ‘<article-title>AUTOTRACKER: AUV embedded control architecture for autonomous pipeline and cable tracking</article-title>’, 
        <italic><source>Oceans Conference Record</source></italic>, 
        vol. <volume>5</volume>, 
        pp. <fpage>2651</fpage>-<lpage>2658</lpage>.
        </mixed-citation>
      </ref>
      

      <ref id="j_jobs-2026-003_ref_014">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Falco</surname>, <given-names>Gregory</given-names>, 
            <surname>Boschetti</surname>, <given-names>Nicolò</given-names>, 
            <surname>Viswanathan</surname>, <given-names>Arun</given-names>, 
            <surname>Bailey</surname>, <given-names>Brian</given-names>, 
            <surname>Maple</surname>, <given-names>Carsten</given-names>, 
            <surname>Kurt</surname>, <given-names>Gunes Karabulut</given-names>, 
            <surname>Willbold</surname>, <given-names>Johannes</given-names>, 
            <surname>Slay</surname>, <given-names>Jill</given-names>, 
            <surname>Birrane</surname>, <given-names>Edward</given-names>, 
            <surname>Logsdon</surname>, <given-names>David</given-names>, 
            <surname>Bennett</surname>, <given-names>Shane</given-names>, 
            <surname>Ferguson</surname>, <given-names>William</given-names>, 
            <surname>Curbo</surname>, <given-names>James</given-names>, 
            <surname>Oakley</surname>, <given-names>Jacob</given-names>,
            <surname>Schloegel</surname>, <given-names>Moritz</given-names>, 
            <surname>Hagen</surname>, <given-names>Stefan</given-names>, 
            <surname>Sigholm</surname>, <given-names>Johan</given-names>, 
            <surname>Mehlman</surname>, <given-names>Cameron</given-names>, 
            <surname>Thummala</surname>, <given-names>Rajiv</given-names>,
            <surname>Calabrese</surname>, <given-names>Matteo</given-names>,
            <surname>Shah</surname>, <given-names>Yogita</given-names>,
            <surname>Le</surname>, <given-names>Anh Tuan</given-names>,
            <surname>Tan</surname>, <given-names>Kymie</given-names>,
            <surname>Miller</surname>, <given-names>Erin</given-names>,
            <surname>Epiphaniou</surname>, <given-names>Gregory</given-names>,
            <surname>Atmaca</surname>, <given-names>Ugur Ilker</given-names>,
            <surname>Henry</surname>, <given-names>Wayne C.</given-names>,
            <surname>Gür</surname>,<given-names>Gürkan</given-names>,
            <surname>Segate</surname>, <given-names>Riccardo Vecellio</given-names>,
            and <surname>Yahia</surname>, <given-names>Olfa Ben</given-names>. 
            (<year>2024</year>)
          </bold> 
          ‘<article-title>Minimum requirements for space system cybersecurity – ensuring cyber access to space</article-title>’, 
          <italic><source>2024 IEEE 10th International Conference on Space Mission Challenges for Information Technology (SMC-IT)</source></italic>, 
          pp. <fpage>78</fpage>-<lpage>88</lpage>.
          DOI: <ext-link xlink:href="https://doi.org/10.1109/SMC-IT61443.2024.00016">https://doi.org/10.1109/SMC-IT61443.2024.00016</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_015">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Furdek</surname>, <given-names>Marija</given-names>, 
            <surname>Natalino</surname>, <given-names>Carlos</given-names>, 
            <surname>Di Giglio</surname>, <given-names>Andrea</given-names>, and 
            <surname>Schiano</surname>, <given-names>Marco</given-names>. 
            (<year>2021</year>)
          </bold> 
          ‘<article-title>Optical network security management: requirements, architecture, 
            and efficient machine learning models for detection of evolving threats</article-title>’, 
          <italic><source>Journal of Optical Communications and Networking</source></italic>, 
          <volume>13</volume>(<issue>2</issue>), p. A144. 
          DOI: <ext-link xlink:href="https://doi.org/10.1364/JOCN.402884">https://doi.org/10.1364/JOCN.402884</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_016">
        <mixed-citation publication-type="book">
          <bold>
            <surname>Gordon</surname>, <given-names>Lori W.</given-names> and 
            <surname>Jones</surname>, <given-names>Karen L.</given-names>. 
            (<year>2022</year>)
          </bold> 
          <italic><source>Global communications infrastructure: undersea and beyond</source></italic>. 
          <publisher-loc>Chantilly, Viriginia</publisher-loc>: <publisher-name>The Aerospace Corporation</publisher-name>, [online] 
          Available at: <ext-link xlink:href="https://csps.aerospace.org/sites/default/files/2022-02/Gordon-Jones_UnderseaCables_20220201.pdf">https://csps.aerospace.org/sites/default/files/2022-02/Gordon-Jones_UnderseaCables_20220201.pdf</ext-link>    
          (Accessed: 2 Jan 2025).
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_017">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Grabis</surname>, <given-names>Jānis</given-names>, 
            <surname>Zdravkovic</surname>, <given-names>Jelena</given-names>, and 
            <surname>Stirna</surname>, <given-names>Janis</given-names>. 
            (<year>2018</year>)
          </bold> 
          ‘<article-title>Overview of capability-driven development methodology</article-title>’, 
          in <surname>Sandkuhl</surname> and Stirna (eds) 
          <italic><source>Capability management in digital enterprises</source></italic>. 
          <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>, 
          pp. <fpage>59</fpage>-<lpage>84</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1007/978-3-319-90424-5_4">https://doi.org/10.1007/978-3-319-90424-5_4</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_018">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Gutscher</surname>, <given-names>Marc-André</given-names>, 
            <surname>Quetel</surname>, <given-names>Lionel</given-names>, 
            <surname>Murphy</surname>, <given-names>Shane</given-names>, 
            <surname>Riccobene</surname>, <given-names>Giorgio</given-names>, 
            <surname>Royer</surname>, <given-names>Jean-Yves</given-names>, 
            <surname>Barreca</surname>, <given-names>Giovanni</given-names>, 
            <surname>Aurnia</surname>, <given-names>Salvatore</given-names>, 
            <surname>Klingelhoefer</surname>, <given-names>Frauke</given-names>, 
            <surname>Cappelli</surname>, <given-names>Giuseppe</given-names>, 
            <surname>Urlaub</surname>, <given-names>Morelia</given-names>, 
            <surname>Krastel</surname>, <given-names>Sebastian</given-names>, 
            <surname>Gross</surname>, <given-names>Felix</given-names>, and 
            <surname>Kopp</surname>, <given-names>Heidrun</given-names>. 
            (<year>2023</year>)
          </bold> 
          ‘<article-title>Detecting strain with a fiber optic cable on the seafloor offshore Mount Etna, Southern Italy</article-title>’, 
          <italic><source>Earth and Planetary Science Letters</source></italic>, 
          <volume>616</volume>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1016/j.epsl.2023.118230">https://doi.org/10.1016/j.epsl.2023.118230</ext-link> .
        </mixed-citation>
      </ref>


    <ref id="j_jobs-2026-003_ref_019">
      <mixed-citation publication-type="journal">
        <bold>
          <surname>Gutscher</surname>, <given-names>Marc-André</given-names>, 
          <surname>Royer</surname>, <given-names>Jean-Yves</given-names>, 
          <surname>Graindorge</surname>, <given-names>David</given-names>, 
          <surname>Murphy</surname>, <given-names>Shane</given-names>, 
          <surname>Klingelhoefer</surname>, <given-names>Frauke</given-names>, 
          <surname>Aiken</surname>, <given-names>Chastity</given-names>, 
          <surname>Cattaneo</surname>, <given-names>Antonio</given-names>, 
          <surname>Barreca</surname>, <given-names>Giovanni</given-names>, 
          <surname>Quetel</surname>, <given-names>Lionel</given-names>, 
          <surname>Riccobene</surname>, <given-names>Giorgio</given-names>, 
          <surname>Petersen</surname>, <given-names>Florian</given-names>, 
          <surname>Urlaub</surname>, <given-names>Morelia</given-names>, 
          <surname>Krastel</surname>, <given-names>Sebastian</given-names>, 
          <surname>Gross</surname>, <given-names>Felix</given-names>, 
          <surname>Kopp</surname>, <given-names>Heidrun</given-names>, 
          <surname>Margheriti</surname>, <given-names>Lucia</given-names>, 
          and <surname>Beranzoli</surname>, <given-names>Laura</given-names>. 
          (<year>2019</year>)
        </bold> 
        ‘<article-title>Fiber optic monitoring of active faults at the seafloor: I the FOCUS project</article-title>’, 
        <italic><source>Photoniques</source></italic>, 
        pp. <fpage>32</fpage>-<lpage>37</lpage>. 
        DOI: <ext-link xlink:href="https://doi.org/10.1051/photon/2019S432">https://doi.org/10.1051/photon/2019S432</ext-link>.
      </mixed-citation>
    </ref>


      <ref id="j_jobs-2026-003_ref_020">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Hamilton</surname>, <given-names>Kelvin</given-names> and 
            <surname>Evans</surname>, <given-names>Jonathan</given-names>. 
            (<year>2005</year>)
          </bold> 
          ‘<article-title>Subsea pilotless inspection using an autonomous underwater vehicle (SPINAV): concepts and results</article-title>’, 
          <italic><source>Europe Oceans 2005</source></italic>, 
          vol. <volume>2</volume>, 
          pp. <fpage>775</fpage>-<lpage>781</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1109/OCEANSE.2005.1513154">https://doi.org/10.1109/OCEANSE.2005.1513154</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_021">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Hevner</surname>, <given-names>Alan R.</given-names>. 
            (<year>2007</year>)
          </bold> 
          ‘<article-title>A three cycle view of design science research</article-title>’, 
          <italic><source>Scandinavian Journal of Information Systems</source></italic>, 
          vol. <volume>19</volume>, no. <issue>2</issue>, pp. <fpage>87</fpage>-<lpage>92</lpage>.
          Available at: <ext-link xlink:href="https://aisel.aisnet.org/sjis/vol19/iss2/4">https://aisel.aisnet.org/sjis/vol19/iss2/4</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_022">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Hevner</surname>, <given-names>Alan R.</given-names>, 
            <surname>March</surname>, <given-names>Salvatore T.</given-names>, 
            <surname>Park</surname>, <given-names>Jinsoo</given-names>, and 
            <surname>Ram</surname>, <given-names>Sudha</given-names>. 
            (<year>2004</year>)
          </bold> 
          ‘<article-title>Design science in information systems research</article-title>’, 
          <italic><source>MIS Quarterly</source></italic>, 
          vol. <volume>28</volume>, 
          no. <issue>1</issue>, 
          pp. <fpage>75</fpage>-<lpage>105</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.2307/25148625">https://doi.org/10.2307/25148625</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_023">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Howe</surname>, <given-names>Bruce M.</given-names>, 
            <surname>Angove</surname>, <given-names>Michael</given-names>, 
            <surname>Aucan</surname>, <given-names>Jérome</given-names>, 
            <surname>Barnes</surname>, <given-names>Christopher R.</given-names>, 
            <surname>Barros</surname>, <given-names>José S.</given-names>, 
            <surname>Bayliff</surname>, <given-names>Nigel</given-names>, 
            <surname>Becker</surname>, <given-names>Nathan C.</given-names>, 
            <surname>Carrilho</surname>, <given-names>Fernando</given-names>, 
            <surname>Fouch</surname>, <given-names>Matthew J.</given-names>, 
            <surname>Fry</surname>, <given-names>Bill</given-names>, 
            <surname>Jamelot</surname>, <given-names>Anthony</given-names>, 
            <surname>Janiszewski</surname>, <given-names>Helen</given-names>, 
            <surname>Kong</surname>, <given-names>Laura S.L.</given-names>, 
            <surname>Lentz</surname>, <given-names>Stephen.</given-names>, 
            <surname>Luther</surname>, <given-names>Douglas S.</given-names>, 
            <surname>Marinaro</surname>, <given-names>Giuditta</given-names>, 
            <surname>Matias</surname>, <given-names>Luís Manuel</given-names>, 
            <surname>Rowe</surname>, <given-names>Charlotte A.</given-names>, 
            <surname>Sakya</surname>, <given-names>Andi E.</given-names>, 
            <surname>Rowe </surname>, <given-names>Charlotte A.</given-names>, 
            <surname>Salaree</surname>, <given-names>Amir</given-names>, 
            <surname>Thiele</surname>, <given-names>Torsten</given-names>, 
            <surname>Tilmann</surname>, <given-names>Frederik J.</given-names>, 
            <surname>von Hillebrandt-Andrade</surname>, <given-names>Christa</given-names>, 
            <surname>Wallace</surname>, <given-names>Laura</given-names>, and 
            <surname>Weinstein</surname>, <given-names>Stuart</given-names>,
            and <surname>Wilcock</surname>, <given-names>William</given-names>. 
           (<year>2022</year>)
          </bold>
          ‘<article-title>SMART subsea cables for observing the earth and ocean, mitigating environmental hazards, 
            and supporting the blue economy</article-title>’, 
          <italic><source>Frontiers in Earth Science</source></italic>, 
          vol. <volume>9</volume>. DOI: <ext-link xlink:href="https://doi.org/10.3389/feart.2021.775544">https://doi.org/10.3389/feart.2021.775544</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_024">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Jain</surname>, <given-names>Akshath</given-names>, 
            <surname>Patra</surname>, <given-names>Deepayan</given-names>, 
            <surname>Xu</surname>, <given-names>Peijing</given-names>, 
            <surname>Sherry</surname>, <given-names>Justine</given-names>, 
            and <surname>Gill</surname>, <given-names>Phillipa</given-names>. 
            (<year>2022</year>)
          </bold> 
          ‘<article-title>The Ukrainian internet under attack</article-title>’, 
          <italic><source>Proceedings of the 22nd ACM Internet Measurement Conference</source></italic>, 
          pp. <fpage>166</fpage>-<lpage>178</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1145/3517745.3561449">https://doi.org/10.1145/3517745.3561449</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_025">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Johansson</surname>, <given-names>J.</given-names>, 
            <surname>Jonason Bjärenstam</surname>, <given-names>R.</given-names>, and 
            <surname>Axelsdóttir</surname>, <given-names>E.</given-names>. 
            (<year>2018</year>)
          </bold> 
          ‘<article-title>Contrasting critical infrastructure resilience from Swedish infrastructure failure data</article-title>’, 
          in <italic><source>Proceedings of the 28th International European Safety and Reliability Conference, ESREL 2018</source></italic>. 
          <publisher-loc>Boca Raton</publisher-loc>, 
          <publisher-name>CRC Press</publisher-name>, 
          pp. <fpage>1287</fpage>-<lpage>1296</lpage>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_026">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Kessler</surname>, <given-names>Donald J.</given-names>, 
            <surname>Johnson</surname>, <given-names>Nicholas L.</given-names>, 
            <surname>Liou</surname>, <given-names>J.C.</given-names>, 
            and <surname>Matney</surname>, <given-names>Mark</given-names>. 
            (<year>2010</year>)
          </bold> 
          ‘<article-title>The Kessler syndrome: implications to future space operations</article-title>’, 
          <italic><source>Advances in the Astronautical Sciences</source></italic>, 
          <volume>137</volume>(<issue>8</issue>).
        </mixed-citation>
      </ref>
      <!--The Kessler Syndrome:  Implications to Future Space Operations".  Presented at the 33rd Annual AAS Guidance and Control Conference, Paper AAS 10-016, Breckenridge, CO, February 6-10, 2010.  Co-authors: Nicholas L. Johnson, J.-C. Liou, Mark Matney.  To be published in Volume 137 of Advances in the Astronautical Sciences, pp 47-61.-->


      <ref id="j_jobs-2026-003_ref_027">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Liebetrau</surname>, <given-names>Tobias</given-names>, 
            and <surname>Bueger</surname>, <given-names>Christian</given-names>. 
            (<year>2024</year>)
          </bold> 
          ‘<article-title>Advancing coordination in critical maritime infrastructure protection: lessons from maritime piracy 
            and cybersecurity</article-title>’, 
          <italic><source>International Journal of Critical Infrastructure Protection</source></italic>, 
          <volume>46</volume>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1016/j.ijcip.2024.100683">https://doi.org/10.1016/j.ijcip.2024.100683</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_028">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Liwång</surname>, <given-names>Hans</given-names>. 
            (<year>2017</year>)
          </bold> 
          ‘<article-title>Risk communication within military decision-making: pedagogic considerations</article-title>’, 
          <italic><source>Defense &#38; Security Analysis</source></italic>, 
          <volume>33</volume>
          (<issue>1</issue>), 
          pp. <fpage>30</fpage>-<lpage>44</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/14751798.2016.1269389">https://doi.org/10.1080/14751798.2016.1269389</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_029">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Liwång</surname>, <given-names>Hans</given-names>. 
            (<year>2022</year>)
          </bold> 
          ‘<article-title>Defense development: the role of co-creation in filling the gap between policy-makers and technology development</article-title>’, 
          <italic><source>Technology in Society</source></italic>, 
          <volume>68</volume>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1016/j.techsoc.2022.101913">https://doi.org/10.1016/j.techsoc.2022.101913</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_030">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Liwång</surname>, <given-names>Hans</given-names>, 
            <surname>Andersson</surname>, <given-names>Kent E.</given-names>, 
            <surname>Bang</surname>, <given-names>Martin</given-names>, 
            <surname>Malmio</surname>, <given-names>Irja</given-names>, 
            and <surname>Tärnholm</surname>, <given-names>Therese</given-names>. 
            (<year>2023</year>)
          </bold> 
          ‘<article-title>How can systemic perspectives on defence capability development be strengthened?</article-title>’, 
          <italic><source>Defence Studies</source></italic>, 
          <volume>23</volume>(<issue>3</issue>), 
          pp. <fpage>399</fpage>-<lpage>420</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/14702436.2023.2239722">https://doi.org/10.1080/14702436.2023.2239722</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_031">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Liwång</surname>, <given-names>Hans</given-names>, 
            <surname>Ericson</surname>, <given-names>Marika</given-names>, 
            and <surname>Bang</surname>, <given-names>Martin</given-names>. 
            (<year>2014</year>)
          </bold> 
          ‘<article-title>An examination of the implementation of risk based approaches in military operations</article-title>’, 
          <italic><source>Journal of Military Studies</source></italic>, 
          <volume>5</volume>(<issue>2</issue>), 
          pp. <fpage>38</fpage>-<lpage>64</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1515/jms-2016-0189">https://doi.org/10.1515/jms-2016-0189</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_032">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Liwång</surname>, <given-names>Hans</given-names>, 
            <surname>Sörenson</surname>, <given-names>Karin</given-names>, 
            and <surname>Österman</surname>, <given-names>Carina</given-names>. 
            (<year>2015</year>)
          </bold> 
          ‘<article-title>Ship security challenges in high-risk areas: manageable or insurmountable?</article-title>’, 
          <italic><source>WMU Journal of Maritime Affairs</source></italic>, 
          <volume>14</volume>(<issue>2</issue>), 
          pp. <fpage>201</fpage>-<lpage>217</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1007/s13437-014-0066-9">https://doi.org/10.1007/s13437-014-0066-9</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_033">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Lundberg</surname>, <given-names>Jonas</given-names> and 
            <surname>Johansson</surname>, <given-names>Björn J.E.</given-names>. 
            (<year>2015</year>)
          </bold> 
          ‘<article-title>Systemic resilience model</article-title>’, 
          <italic><source>Reliability Engineering and System Safety</source></italic>, 
          <volume>141</volume>, 
          pp. <fpage>22</fpage>-<lpage>32</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1016/j.ress.2015.03.013">https://doi.org/10.1016/j.ress.2015.03.013</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_034">
        <mixed-citation publication-type="journal">
          <bold>
          <surname>Luu</surname>, <given-names>Michael A.</given-names> and 
          <surname>Hastings</surname>, <given-names>Daniel E.</given-names>. 
          (<year>2022</year>)
          </bold> 
        ‘<article-title>On-orbit servicing system architectures for proliferated low-Earth-orbit constellations</article-title>’, 
        <italic><source>Journal of Spacecraft and Rockets</source></italic>, 
        <volume>59</volume>(<issue>6</issue>), 
        pp. <fpage>1946</fpage>-<lpage>1965</lpage>. 
        DOI: <ext-link xlink:href="https://doi.org/10.2514/1.A35393">https://doi.org/10.2514/1.A35393</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_035">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Mauri</surname> , <given-names>Christian</given-names> and 
            <surname>Antonovsky</surname> , <given-names>Ari</given-names>. 
            (<year>2021</year>)
          </bold> 
          ‘<article-title>Using mixed methods to strengthen connections between human factors and complex socio-technical system</article-title>’, 
          in <italic><source>Proceedings of the 21st Congress of the International Ergonomics Association</source></italic>. 
          <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>, 
          pp. <fpage>737</fpage>-<lpage>746</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1007/978-3-030-74602-5_100">https://doi.org/10.1007/978-3-030-74602-5_100</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_036">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Milmo</surname>, <given-names>Dan</given-names>. 
            (<year>2025</year>)
          </bold>
          ‘<article-title>Risk of undersea cable attacks backed by Russia and China likely to rise, report warns</article-title>’, 
          <italic><source>The Guardian</source></italic>, [online] Available at: 
          <ext-link xlink:href="https://www.theguardian.com/technology/2025/jul/17/risk-undersea-cable-attacks-backed-russia-china-likely-rise-report-warns (Accessed: 4 Nov 2025)">
          https://www.theguardian.com/technology/2025/jul/17/risk-undersea-cable-attacks-backed-russia-china-likely-rise-report-warns
          </ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_037">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Möller</surname>, <given-names>Niklas</given-names> and 
            <surname>Hansson</surname>, <given-names>Sven Ove</given-names>. 
            (<year>2008</year>)
          </bold> 
          ‘<article-title>Principles of engineering safety: risk and uncertainty reduction</article-title>’, 
          <italic><source>Reliability Engineering and System Safety</source></italic>, 
          <volume>93</volume>(<issue>6</issue>), 
          pp. <fpage>798</fpage>-<lpage>805</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1016/j.ress.2007.03.031">https://doi.org/10.1016/j.ress.2007.03.031</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_038">
        <mixed-citation publication-type="journal">
          <bold>
            <given-names>NATO NSO</given-names>. 
            (<year>2024</year>)
          </bold> 
          <italic><source>NATO standard AJP-3.14 allied joint doctrine for force protection (Edition B, v1).</source></italic> 
          <publisher-loc>Brussels</publisher-loc>: 
          <publisher-name>NATO Standardization Office</publisher-name>, [online] Available at: 
          <ext-link xlink:href="https://assets.publishing.service.gov.uk/media/672c8d4f62831268b0b1a2be/AJP_3_14_Force_Protection_EdB_V1-O.pdf">
          https://assets.publishing.service.gov.uk/media/672c8d4f62831268b0b1a2be/AJP_3_14_Force_Protection_EdB_V1-O.pdf
          </ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_039">
        <mixed-citation publication-type="journal">
          <bold>
            <given-names>NATO STO</given-names>. 
            (<year>2021</year>)
          </bold> 
          <italic><source>Futures Assessed alongside socio-Technical Evolutions (FATE): 
            final report of the SAS-123 Research Task Group. </source></italic>
          <publisher-loc>Brussels</publisher-loc>: 
          <publisher-name>NATO Science and Technology Organization</publisher-name>, [online] 
          Available at: <ext-link xlink:href="https://apps.dtic.mil/sti/pdfs/AD1148020.pdf">
          https://apps.dtic.mil/sti/pdfs/AD1148020.pdf
          </ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_040">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Olsson</surname>, <given-names>Andreas.</given-names>, 
            <surname>Franberg</surname>, <given-names>Oskar</given-names>, 
            and <surname>Kulesza</surname>, <given-names>Wlodek J.</given-names>. 
            (<year>2022</year>)
          </bold> 
          ‘<article-title>A new method for as-built burial risk assessment for subsea cables</article-title>’, 
          <italic><source>2022 2nd International Conference on Energy Transition in the Mediterranean Area (SyNERGY MED)</source></italic>, 
          pp. <fpage>1</fpage>-<lpage>6</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1109/SyNERGYMED55767.2022.9941457">https://doi.org/10.1109/SyNERGYMED55767.2022.9941457</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_041">
        <mixed-citation publication-type="journal">
        <bold>
          <given-names>OX2</given-names>. 
          (<year>2025</year>)
        </bold> 
        <italic><source>Situational awareness at sea: a security concept for offshore wind and critical infrastructure</source></italic>. 
        <publisher-loc>Stockholm</publisher-loc>: 
        <publisher-name>OX2</publisher-name>, [online] 
        Available at: 
        <ext-link xlink:href="https://www.ox2.com/files/Sweden_documents/Summary_OX2_security_concept.pdf">
          https://www.ox2.com/files/Sweden_documents/Summary_OX2_security_concept.pdf
        </ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_042">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Potter</surname>, <given-names>Ned</given-names>. 
            (<year>2024</year>)
          </bold> 
          <italic><source>NATO’s emergency plan for an orbital backup internet</source></italic>, 
          <italic><source>IEEE Spectrum</source></italic>, [online] December. 
          Available at: 
          <ext-link xlink:href="https://spectrum.ieee.org/undersea-internet-cables-nato">
            https://spectrum.ieee.org/undersea-internet-cables-nato
          </ext-link> (Accessed: 28 Jan 2025). 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_043">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Relling</surname>, <given-names>Tore</given-names>, 
            <surname>Lützhöft</surname>, <given-names>Margareta</given-names>, 
            <surname>Ostnes</surname>, <given-names>Runar</given-names>, 
            and <surname>Hildre</surname>, <given-names>Hans Petter</given-names>. 
            (<year>2022</year>) 
          </bold>
          ‘<article-title>The contribution of vessel traffic services to safe coexistence between automated and conventional vessels</article-title>’, 
          <italic><source>Maritime Policy and Management</source></italic>, 
          <volume>49</volume>(<issue>7</issue>), 
          pp. <fpage>990</fpage>-<lpage>1009</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/03088839.2021.1937739">https://doi.org/10.1080/03088839.2021.1937739</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_044">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Roepke</surname>, <given-names>W.-D.</given-names> and 
            <surname>Thankey</surname>, <given-names>H.</given-names>. 
            (<year>2019</year>)
          </bold> 
          ‘<article-title>Resilience: the first line of defence</article-title>’, 
          <italic><source>NATO Review</source></italic>, [online] 
          27 February. Available at: 
          <ext-link xlink:href="https://archives.nato.int/uploads/r/nato-archives-online/1/3/a/13af8a6860ea04ecdd7de970c46efc8ca6305ec5425830eb62acef2313b08ea6/2019-02-27_Resilience-the_first_line_of_defence_ENG.pdf">
            https://archives.nato.int/uploads/r/nato-archives-online/1/3/a/13af8a6860ea04ecdd7de970c46efc8ca6305ec5425830eb62acef2313b08ea6/2019-02-27_Resilience-the_first_line_of_defence_ENG.pdf
          </ext-link> (Accessed: 09 Mar 2026). 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_045">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Sherman</surname> <given-names>Justin</given-names>.
            (<year>2021</year>)
          </bold> 
          <italic><source>Cyber defense across the ocean floor: the geopolitics of submarine cable security</source></italic>. 
          <publisher-loc>Washington, DC</publisher-loc>: 
          <publisher-name>Atlantic Council</publisher-name>, [online] 
          Available at: <ext-link xlink:href="https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/">https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/</ext-link> (Accessed: 2 Jan 2025). 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_046">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Shield</surname>, <given-names>Stephen A.</given-names>, 
            <surname>Quiring</surname>, <given-names>Steven M.</given-names>, 
            <surname>Pino</surname>, <given-names>Jordan V.</given-names>, 
            and <surname>Buckstaff</surname>, <given-names>Ken</given-names>. 
            (<year>2021</year>)
          </bold> 
          ‘<article-title>Major impacts of weather events on the electrical power delivery system in the United States</article-title>’, 
          <italic><source>Energy</source></italic>, 
          <volume>218</volume>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1016/j.energy.2020.119434">https://doi.org/10.1016/j.energy.2020.119434</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_047">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Sigholm</surname>, <given-names>Johan</given-names>. 
            (<year>2016</year>)
          </bold> 
          <italic><source>Secure tactical communications for inter-organizational collaboration: 
          the role of emerging information and communications technology, privacy issues, and cyber threats on the digital battlefield.
          </source></italic> 
          PhD thesis. 
          <publisher-name>University of Skövde</publisher-name>, [online] 
          Available at: <ext-link xlink:href="https://fhs.diva-portal.org/smash/record.jsf?pid=diva2%3A1038714&#38;dswid=8025">https://fhs.diva-portal.org/smash/record.jsf?pid=diva2%3A1038714&#38;dswid=8025</ext-link>.
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_048">
        <mixed-citation publication-type="journal">
          <bold>
          <surname>Tärnholm</surname>, <given-names>Therese</given-names> and 
          <surname>Liwång</surname>, <given-names>Hans</given-names>. 
          (<year>2022</year>a)
        </bold> 
        ‘<article-title>Military autonomous underwater vehicles: an implementation perspective on legal and ethical aspects</article-title>’, 
        <italic><source>Journal of Maritime Research</source></italic>, 
        <volume>19</volume>
        (<issue>3</issue>), 
        pp. <fpage>39</fpage>-<lpage>46</lpage>. 
        Available at: <ext-link xlink:href="https://www.jmr.unican.es/index.php/jmr/article/view/660">https://www.jmr.unican.es/index.php/jmr/article/view/660</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_049">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Tärnholm</surname>, <given-names>Therese</given-names> and 
            <surname>Liwång</surname>, <given-names>Hans</given-names>. 
            (<year>2022</year>b)
          </bold> 
          ‘<article-title>Military organisations and emerging technologies: how do unmanned systems find a role in future navies?</article-title>’, 
          <italic><source>Journal of Military Studies</source></italic>, 
          <volume>11</volume>
          (<issue>1</issue>), 
          pp. <fpage>37</fpage>-<lpage>48</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.2478/jms-2022-0004">https://doi.org/10.2478/jms-2022-0004</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_050">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Taweesintananon</surname>, <given-names>Kittinat</given-names>, 
            <surname>Landrø</surname>, <given-names>Martin</given-names>, 
            <surname>Brenne</surname>, <given-names>Jan Kristoffer</given-names>, 
            and <surname>Haukanes</surname>, <given-names>Aksel</given-names>. 
            (<year>2021</year>)
          </bold> 
          ‘<article-title>Distributed acoustic sensing for near-surface imaging using submarine telecommunication cable: 
            a case study in the Trondheimsfjord, Norway</article-title>’, 
          <italic><source>Geophysics</source></italic>, 
          <volume>86</volume>
          (<issue>5</issue>), 
          pp. <fpage>1</fpage>-<lpage>10</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1190/geo2020-0834.1">https://doi.org/10.1190/geo2020-0834.1</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_051">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Tejedor</surname>, <given-names>Javier</given-names>, 
            <surname>Macias-Guarasa</surname>, <given-names>Javier</given-names>, 
            <surname>Martins</surname>, <given-names>Hugo F.</given-names>, 
            <surname>Pastor-Graells</surname>, <given-names>Juan</given-names>, 
            <surname>Corredera</surname>, <given-names>Pedro</given-names>, 
            and <surname>Martin-Lopez</surname>, <given-names>Sonia</given-names>. 
            (<year>2017</year>)
          </bold> 
          ‘<article-title>Machine learning methods for pipeline surveillance systems based on distributed acoustic sensing: a review</article-title>’, 
          <italic><source>Applied Sciences</source></italic>, 
          <volume>7</volume>
          (<issue>8</issue>), 
          pp. <fpage>1</fpage>-<lpage>10</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.3390/app7080841">https://doi.org/10.3390/app7080841</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_052">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Thodi</surname>, <given-names>P.</given-names>, 
            <surname>Paulin</surname>, <given-names>M.</given-names>, 
            <surname>Forster</surname>, <given-names>L.</given-names>, 
            <surname> Burke</surname>, <given-names>J.</given-names>, 
            and <surname>Lanan</surname>, <given-names>G.</given-names>. 
            (<year>2014</year>)
          </bold> 
          ‘<article-title>Arctic pipeline leak detection using fiber optic cable distributed sensing systems</article-title>’, 
          <italic><source>OTC Arctic Technology Conference</source></italic>, 
          <volume>OTC-24589-MS</volume>. 
         DOI: <ext-link xlink:href="https://doi.org/10.4043/24589-MS">https://doi.org/10.4043/24589-MS</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_053">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Till</surname>, <given-names>Geoffery</given-names>. 
            (<year>2009</year>)
          </bold> 
          <italic><source>Seapower: a guide for the twenty-first century, 2nd edn.</source></italic> 
          <publisher-loc>Abingdon</publisher-loc>: 
          <publisher-name>Routledge</publisher-name>, 
          pp. <fpage>286</fpage>-<lpage>321</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.4324/9780203880487">https://doi.org/10.4324/9780203880487</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_054">
        <mixed-citation publication-type="journal">
          <bold>
            <given-names>UNDP</given-names> and <given-names>UNDRR</given-names>. 
            (<year>2022</year>)
          </bold> 
          <italic><source>Addressing the data gap: analysis of infrastructure damages and service disruption in PDNAs</source></italic>. 
          <publisher-loc>New York</publisher-loc>: 
          <publisher-name>United Nations Development Programme and United Nations Office for Disaster Risk Reduction</publisher-name>, [online]
          Available at: <ext-link xlink:href="https://www.undrr.org/publication/documents-and-publications/addressing-data-gap-analysis-infrastructure-damages-and">https://www.undrr.org/publication/documents-and-publications/addressing-data-gap-analysis-infrastructure-damages-and</ext-link> 
          (Accessed: 14 Oct 2025). 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_055">
        <mixed-citation publication-type="journal">
          <bold>
            <given-names>US GAO</given-names>. 
            (<year>2022</year>)
          </bold> 
          <italic><source>Internet architecture is considered resilient, but federal agencies continue to address risks</source></italic>. 
          <publisher-loc>Washington, D.C.</publisher-loc>: 
          <publisher-name>United States Government Accountability Office, Information Technology and Cybersecurity</publisher-name>, [online] 
          Available at: <ext-link xlink:href="https://www.gao.gov/products/gao-22-104560">https://www.gao.gov/products/gao-22-104560</ext-link> 
          (Accessed: 2 Jan 2025). 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_056">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Wetter</surname>, <given-names>Olive Emil</given-names> and 
            <surname>Wüthrich</surname>, <given-names>Valentino</given-names>. 
            (<year>2015</year>)
          </bold> 
          ‘“<article-title>What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism</article-title>’, 
          <italic><source>Defense and Security Analysis</source></italic>, 
          <volume>31</volume>(<issue>3</issue>), 
          pp. <fpage>185</fpage>-<lpage>198</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/14751798.2015.1056941">https://doi.org/10.1080/14751798.2015.1056941</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_057">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Wills</surname>, <given-names>Steve</given-names>. 
            (<year>2020</year>)
          </bold> 
          ‘“<article-title>These aren’t the SLOC’s you’re looking for”: 
            mirror-imaging battles of the Atlantic won’t solve current Atlantic security needs</article-title>’, 
          <italic><source>Defense and Security Analysis</source></italic>, 
          <volume>36</volume>(<issue>1</issue>), 
          pp. <fpage>30</fpage>-<lpage>41</lpage>. 
          DOI: <ext-link xlink:href="https://doi.org/10.1080/14751798.2020.1712029">https://doi.org/10.1080/14751798.2020.1712029</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_058">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Winter</surname>, <given-names>Robert</given-names>. 
            (<year>2008</year>)
          </bold> 
          ‘<article-title>Design science research in Europe</article-title>’, 
          <italic><source>European Journal of Information Systems</source></italic>, 
          <volume>17</volume>(<issue>5</issue>), 
          pp. <fpage>470</fpage>-<lpage>475</lpage>. 
          Available at: <ext-link xlink:href="https://doi.org/10.1057/ejis.2008.44">https://doi.org/10.1057/ejis.2008.44</ext-link>. 
        </mixed-citation>
      </ref>


      <ref id="j_jobs-2026-003_ref_059">
        <mixed-citation publication-type="journal">
          <bold>
            <surname>Yue</surname>, <given-names>Yi</given-names> and 
            <surname>Henshaw</surname>, <given-names>Michael</given-names>. 
            (<year>2009</year>)
          </bold> 
          ‘<article-title>An holistic view of UK military capability development</article-title>’, 
          <italic><source>Defense and Security Analysis</source></italic>, 
          <volume>25</volume>(<issue>1</issue>), 
          pp. <fpage>53</fpage>-<lpage>67</lpage>. 
          Available at: <ext-link xlink:href="https://doi.org/10.1080/14751790902749900">https://doi.org/10.1080/14751790902749900</ext-link>. 
        </mixed-citation>
      </ref>

    </ref-list>
  </back>
</article>
