<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="review-article" dtd-version="2.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2024.1373245</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Review</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Reintegration of cyber veterans: challenges and strategies for post-war transition</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes"><name><surname>Virtanen</surname> <given-names>Toni</given-names></name><xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2634768/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Lassfolk</surname> <given-names>Christina</given-names></name><xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Davydiuk</surname> <given-names>Andrii</given-names></name><xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Noorma</surname> <given-names>Mart</given-names></name><xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/resources/"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Finnish Defence Research Agency</institution>, <addr-line>Riihim&#x00E4;ki</addr-line>, <country>Finland</country></aff>
<aff id="aff2"><sup>2</sup><institution>NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)</institution>, <addr-line>Tallinn</addr-line>, <country>Estonia</country></aff>
<aff id="aff3"><sup>3</sup><institution>State Special Communications Service of Ukraine (SSSCIP)</institution>, <addr-line>Kyiv</addr-line>, <country>Ukraine</country></aff>
<aff id="aff4"><sup>4</sup><institution>Pukhov Institute for Modelling in Energy Engineering, National Academy of Sciences of Ukraine (NAN Ukraine)</institution>, <addr-line>Kyiv</addr-line>, <country>Ukraine</country></aff>
<aff id="aff5"><sup>5</sup><institution>Tartu Observatory, Faculty of Science and Technology, University of Tartu</institution>, <addr-line>Tartu, Tartu County</addr-line>, <country>Estonia</country></aff>
<author-notes>
<fn fn-type="edited-by" id="fn0001">
<p>Edited by: G&#x00FC;lseren Keskin, Ege University, T&#x00FC;rkiye</p>
</fn>
<fn fn-type="edited-by" id="fn0002">
<p>Reviewed by: Humaira Naz, University of the Punjab, Pakistan</p>
<p>Tu&#x011F;ba Kocada&#x011F; &#x00DC;nver, Gaziosmanpa&#x015F;a University, T&#x00FC;rkiye</p>
</fn>
<corresp id="c001">&#x002A;Correspondence: Toni Virtanen, <email>toni.virtanen@mil.fi</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>12</day>
<month>04</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>15</volume>
<elocation-id>1373245</elocation-id>
<history>
<date date-type="received">
<day>19</day>
<month>01</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>28</day>
<month>03</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2024 Virtanen, Lassfolk, Davydiuk and Noorma.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Virtanen, Lassfolk, Davydiuk and Noorma</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Battles in the cyber domain often lack visibility compared to the physical domain, which can lead to insufficient appreciation of its actors&#x2019; achievements by the general public and society. Nonetheless, it has become a crucial area of modern warfare in which cyber professionals defend the nation&#x2019;s critical infrastructure, support other military operations and achieve military objectives that could not be attained in other domains. Although cyber combatants might not have as high a risk of injury or death as those on the front lines, they still can face traumatic events and suffer from the same types of issues after the war as any other veteran. Earlier studies on war veterans have shown they have elevated risks of mental health issues, substance use, social problems and financial difficulties which might push some individuals towards a path of crime. The cyber domain is also not limited by time or place, which has given rise to cyber volunteerism in which skilled individuals around the globe decide to assist their own country or friendly nations. This publication aims to identify the challenges cyber veterans might face when transitioning back to civilian life and develop appropriate strategies to facilitate their reintegration. It also raises the awareness of the hundreds of thousands of volunteers who can develop similar problems after the war. Without proper awareness, support and dialogue, some of these individuals can also drift towards harmful social implications such as cybercrime.</p>
</abstract>
<kwd-group>
<kwd>cyberpsychology</kwd>
<kwd>veteran adjustment difficulty</kwd>
<kwd>mental health</kwd>
<kwd>cyber veteran</kwd>
<kwd>volunteer fighters</kwd>
<kwd>post-war (re)integration</kwd>
</kwd-group>
<counts>
<fig-count count="0"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="75"/>
<page-count count="8"/>
<word-count count="7412"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Health Psychology</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<title>Introduction</title>
<p>Along with the development of new technologies, military activities have shifted into new environments, creating a hybrid format of warfare in multi-domain operations. In the 21st century, cyberspace has become a new battleground (<xref ref-type="bibr" rid="ref38">Kremer and M&#x00FC;ller, 2013</xref>; <xref ref-type="bibr" rid="ref42">Lonergan and Lonergan, 2023</xref>), where cyber domain is recognized as a separate domain for conducting military operations (<xref ref-type="bibr" rid="ref47">NATO, 2016</xref>; <xref ref-type="bibr" rid="ref45">Ministry of Defence, 2023</xref>). The significance of the cyber domain cannot be overstated as its impact can occur at the operational, tactical and strategic levels. During wartime, both military and civilian experts from defense agencies conduct cyber operations aimed at achieving military objectives. The effects of cyber operations could even surpass the results of actions on the battlefield, making the cyber domain a significant component in confrontations (<xref ref-type="bibr" rid="ref39">Lee et al., 2016</xref>).</p>
<p>Measures in the cyber domain are also aimed at supporting information warfare and acting as a force multiplier for air, maritime, space and land operations (<xref ref-type="bibr" rid="ref70">US FM 3-0 Operations, 2022</xref>). Given this, participants in cyber operations and cybersecurity experts are full-fledged contributors in combat operations and must be reintegrated into civilian life post-war like other veterans (<xref ref-type="bibr" rid="ref19">D&#x2019;Urso, 2015</xref>). Simultaneously, the high level of secrecy surrounding their activities and the lack of visibility of their achievements in the information space can elicit ambiguous attitudes toward their work among the civilian population and military personnel on the front line. At first glance, the risks of injury or death appear to be greater for soldiers on the battlefield, leading a significant portion of society to undervalue the efforts of cyber veterans compared to other veterans. However, many cybersecurity experts need to be positioned near the critical infrastructure they are defending which, despite international humanitarian law, can still be one of the main targets of enemy long-range strikes. Giving support to other combat operations might also require closer proximity to the front line exposing the cyber professionals to similar risks as other combatants on the battlefield.</p>
<p>Even without the hostilities of war, work-related stress can be high in cybersecurity professions (<xref ref-type="bibr" rid="ref51">Nobles, 2022</xref>; <xref ref-type="bibr" rid="ref63">Singh et al., 2023</xref>). When this is combined with the additional concerns of personal health and safety, atypical working conditions, high stakes in operations and possible exposure to traumatic events, they will endure considerable strain in their tasks. For their work, they might need to spend a considerable amount of time in the adversary&#x2019;s networks, immersing themselves in hostile information environments and propaganda for bits of valuable intelligence. The emotional distancing from this will also require considerable stress endurance. From this, it can be concluded that during and after the war, appropriate psychosocial support and reintegration assistance for cyber veterans is needed. The terms reintegration, transition, readjustment and community integration are commonly used to describe the process of exiting the military and returning to the civilian world (<xref ref-type="bibr" rid="ref26">Elnitsky and Blevins, 2017</xref>). In this paper, we will not make a distinction between the nuances of these terms and use them all to refer to the transitioning process of an active cyber combatant role to a civilian non-combatant role.</p>
<p>A separate challenge may arise from the distinction between enlisted or mobilized cyber combatants in the military, paramilitary cyber professionals and civilian cyber volunteers; whether the individuals not part of the country&#x2019;s official armed forces can be called cyber veterans after a war. Nations can always prohibit paramilitary organizations outside the government or incorporate them under military command during a crisis when its members are considered part of the military forces. However, unlike military or paramilitary personnel under military command, individual cyber volunteers are much more difficult to identify and their personal contributions hard to evaluate. Without an official veteran status, they will probably fall through any psychosocial support programmes that might be provided. This question significantly deepens the problem of the reintegration of cyber warriors as there may be foreign cyber fighters, hacktivists, vigilantes, even minors and others that can be anywhere around the globe, where their actions would probably be considered as criminal activity by the regional authorities.</p>
<p>In this publication we review current literature on what type of reintegration challenges veterans face and consider wheter similar and novel types of challenges are expected for cyber veterans. In addition we explore some veteran support programmes and evaluate their fit for cyber veterans. The aim of this publication is threefold. First, to raise awareness of the global nature of cyber volunteers in modern conflicts and the potential social implications of these unseen cyber combatants. Second, to identify the challenges of reintegrating cyber veterans and third to explore appropriate strategies for the government to facilitate their return to civilian life.</p>
</sec>
<sec sec-type="methods" id="sec2">
<title>Methods</title>
<p>The intent of this study was not to conduct a systematic review as already preliminary searches indicated that research about cyber veterans, within the scope the authors had defined it, had not surfaced as a subject of robust academic research. This paper rather constitutes an explorative study of a potential new phenomenon. Providing an excursion and extrapolation from existing fields such as veteran studies and cyber warfare towards a related topic of cyber veterans.</p>
<p>The review proceeded roughly in two phases. Phase one focused on the regular veteran issues, reintegration challenges and transition support programmes from active service to civilian life providing the initial framework for the phenomenon. The second phase focused on the special characteristics of cyber warfare and the stressors cyber combatants face in their line of duty. Google Scholar served as search engine in a semi-systematic manner. Search terms were such as cyber, definition, package, reintegration, transition, veteran, warrior in various combinations. In overall, reachable, relevant articles in non-predatory publications with reasonable impact served as raw material for the present article. Several literature searches were conducted during the course of this study by each of the authors independently. These literature searches were periodically discussed during online meetings for their relevance and quality. The academic literature review was complemented with relevant legal and military doctrine documents and regular Google searches to deliver material for some illustrative case examples.</p>
<sec id="sec3">
<title>Definition of a cyber veteran</title>
<p>According to the <xref ref-type="bibr" rid="ref53">Oxford English Dictionary (2023)</xref>, a veteran is a person who has had long experience in a particular field. However, many people associate the term with war veterans. A loose definition would therefore be everyone who serves in the military and survives will become a veteran (<xref ref-type="bibr" rid="ref36">Kleykamp et al., 2021</xref>). Another way to define a veteran is when military personnel return from war and are discharged from military service they are assigned the label of veteran (<xref ref-type="bibr" rid="ref12">Brown, 2011</xref>). However, nations differ in their requirements for achieving veteran status. This status is often further divided into war veterans, disabled veterans or overseas operations veterans, as their benefits may vary (<xref ref-type="bibr" rid="ref1">38 USC, 2011</xref>; <xref ref-type="bibr" rid="ref69">UK Public General Acts, 2021</xref>; <xref ref-type="bibr" rid="ref68">UK Public General Act c48, 2023</xref>). In this paper, we define the term cyber veterans as individuals who have actively participated in the development, implementation and execution of national cyber capabilities to protect and secure the digital infrastructure and information assets during a time of war. This definition deliberately does not take a stand on the legislation and requirements of whether a person would receive a veteran status by their native country as this research is intended to address the potential issues on reintegration of cyber combatants after the conflict.</p>
</sec>
<sec id="sec4">
<title>The special case of cyber volunteers</title>
<p>Our definition of cyber veterans does not exclude non-military personnel participants in the war such as cyber volunteers although to avoid ambiguity, cyber volunteers are not to be mixed with military volunteers who enlist for service freely and are then part of the military. These cyber volunteers are skilled individuals who have decided to assist their own country or friendly nations (<xref ref-type="bibr" rid="ref52">Ottis, 2010</xref>). A topical example comes in the wake of the 24 Feb 2022 escalation of the Russo-Ukrainian war as Russia attacked Ukraine. Ordinary citizens from Ukraine and other countries have become cyber volunteers. Although this type of co-production of cyber security is not new (<xref ref-type="bibr" rid="ref14">Chang et al., 2018</xref>), this cyber vigilantism phenomenon is on a scope and scale not seen before (<xref ref-type="bibr" rid="ref64">Soesanto, 2022</xref>). Their voluntary assistance involves supporting the state sector in cybersecurity, including providing computational resources, technical and software support and consultancy. Some individuals have also attempted to attack the resources of the enemy, prompting the Ukrainian government to respond with legal clarifications regarding such actions. The government continues to coordinate support from cyber volunteers to avoid any violations of Ukrainian and international legislation. However, as these individuals are collaborating by their own volition and ways, there is always a risk of exaggerated actions conducted by overzealous cyber volunteers. Currently, a significant portion of cyber volunteers has found the opportunity to officially collaborate with the government and this trend is growing. Ukraine is considering the formation of a cyber reservist unit in the armed forces as an additional resource in the event of massive aggression in the cyber domain (<xref ref-type="bibr" rid="ref66">Tkachuk, 2023</xref>).</p>
<p>Cyber volunteers can also create an increased element of uncertainty in the post-war period. Well-prepared and cohesive teams of cyber professionals not controlled by the government could pose a significant threat to national security as their actions could provoke further escalation of the conflict. Additionally, risks can be caused by individual specialists which could arise from financial motives or disagreements with government decisions. After the war, dissatisfaction may emerge if the cyber volunteers feel their contributions are not recognized and their previous roles are diminished. Thus, to foster constructive dialogue between the government and cyber volunteers and to minimize the risks posed by them, it is essential to focus on social policies that recognize their significance, acknowledge specific individuals for their significant contributions to cyber defense, involve them in conferences and participate in the development and discussion of regulatory documents for the advancement of cybersecurity. It is also important to raise awareness among citizens about their contributions and to foster trust in cyber volunteers in society.</p>
</sec>
<sec id="sec5">
<title>General stressors in the cybersecurity profession</title>
<p>Working in the field of cyber security has been compared to working in a warlike environment (<xref ref-type="bibr" rid="ref11">Brody, 2015</xref>; <xref ref-type="bibr" rid="ref63">Singh et al., 2023</xref>). Cyberspace is contested at all times. Malign actors seek to degrade critical infrastructure, interfere with government services, extract intelligence, steal intellectual property and impede military activities (<xref ref-type="bibr" rid="ref48">NATO, 2022</xref>). Cybersecurity professionals need to adapt to the fluctuating and rapidly evolving occupational requirements in an adversarial landscape. They provide a mission-critical service for ensuring operational security of armed forces and ensuring business continuity of private companies and government services (<xref ref-type="bibr" rid="ref56">Paul and Dykstra, 2017</xref>). Offensive cyber operations can involve another set of demands where performance is highly dependent on speed and precision, not unlike the demands of fighter pilots or surgeons. Offensive cyber operators require a specialized set of skills and breadth of expertise from network fundamentals to adversarial thinking to strive in a high-risk high-reward environment (<xref ref-type="bibr" rid="ref24">Dykstra and Paul, 2018</xref>).</p>
<p>Recent studies have indicated that work-related stress is high in the cybersecurity profession (<xref ref-type="bibr" rid="ref51">Nobles, 2022</xref>; <xref ref-type="bibr" rid="ref63">Singh et al., 2023</xref>). According to a 2021 CIISec State of Profession report, over half of cybersecurity professionals report having stress-related sleeping issues (<xref ref-type="bibr" rid="ref75">Wilson, 2022</xref>). The VMware Global Incident Response Threat Report from 2022 confirms that this trend has not changed and 51% of cyber security professionals self-report having symptoms related to burnout and of that group, 65% have considered leaving the cybersecurity profession altogether (<xref ref-type="bibr" rid="ref71">VMware, 2022</xref>). Some of these results can be explained by the global shortage of cybersecurity (<xref ref-type="bibr" rid="ref16">CISA, 2020</xref>; <xref ref-type="bibr" rid="ref28">De Zan and Di Franco, 2020</xref>; <xref ref-type="bibr" rid="ref18">Coutinho et al., 2023</xref>). However, it seems that the working culture in cybersecurity tends to glorify working long hours as almost half of the CIISec report responders report working over 41&#x2009;h a week and some even working up to 90&#x2009;h a week (<xref ref-type="bibr" rid="ref75">Wilson, 2022</xref>).</p>
</sec>
<sec id="sec6">
<title>Psychosocial issues related to potentially traumatic experiences</title>
<p>According to a recent meta-analysis of military personnel engaged in wars and conflicts between 1945 and 2022, 24% develop depression, 16% have anxiety-related issues and 21% suffer from Post-Traumatic Stress Disorder (PTSD) (<xref ref-type="bibr" rid="ref41">Lim et al., 2022</xref>). Those who do not report experiencing such problems (25%) still sense difficulty in many essential areas of life such as difficulties in social and societal behavior, relationships, taking care of themselves, getting a job and feeling belonging, with injuries and suicidal thoughts (<xref ref-type="bibr" rid="ref26">Elnitsky and Blevins, 2017</xref>). Potentially traumatic events often involve acute, high-strain situations which are not uncommon in combat situations or in a time of war. Encountering a direct attack or being in a combat situation has been associated with a significantly higher risk of PTSD and other psychological problems later in life (<xref ref-type="bibr" rid="ref32">Hoge et al., 2004</xref>). PTSD can include symptoms such as hypervigilance, hyperarousal, intrusive images or thoughts, emotional numbing, difficulty trusting others, irritability or outburst of anger, heightened sense of vulnerability and trauma-related nightmares induced insomnia (<xref ref-type="bibr" rid="ref74">WHO, 2021</xref>; <xref ref-type="bibr" rid="ref4">APA, 2022</xref>). These symptoms can become crippling to the individual leading to withdrawal from social interactions and avoidance of everyday activities which could trigger symptoms and emotional distress.</p>
<p>From meta-analytic studies, demographic risk factors for the development of PTSD are the severity of the traumatic event, lack of social support, adverse childhood experiences and later life stress (<xref ref-type="bibr" rid="ref10">Brewin et al., 2000</xref>). A perceived threat to life, dissociative experiences and intensity of negative emotions during the traumatic event were also found to be additional risk factors for developing PTSD (<xref ref-type="bibr" rid="ref54">Ozer et al., 2003</xref>). Cognitive vulnerabilities such as negative attributional style, rumination, looming cognitive style and anxiety sensitivity have also been suggested to explain some individual differences for the sensitivity in developing PTSD (<xref ref-type="bibr" rid="ref27">Elwood et al., 2009</xref>).</p>
<p>Research on veterans from peacekeeping operations has indicated that 2 to 8% of them suffer from some degree of posttraumatic stress symptoms (PTSD) in 3&#x2009;years of post-deployment (<xref ref-type="bibr" rid="ref57">Pearn, 2000</xref>). Previous assumptions were that the time immediately following deployment is the hardest time for veterans. However, there are indications that problems increase with time (<xref ref-type="bibr" rid="ref72">Vogt et al., 2022</xref>). For most, potential psychological symptoms will rise a year after their deployment (<xref ref-type="bibr" rid="ref34">Kaikkonen and Laukkala, 2016</xref>). However, for some, the symptoms have a later onset where they might present even years later after the crisis management deployment (<xref ref-type="bibr" rid="ref8">Bonanno, 2004</xref>; <xref ref-type="bibr" rid="ref29">Gray et al., 2004</xref>). Overall, military personnel seem to present PTSD symptoms later compared to civilians experiencing traumatic events (<xref ref-type="bibr" rid="ref3">Andrews et al., 2007</xref>).</p>
</sec>
<sec id="sec7">
<title>Challenges in adjusting to civilian life after a war</title>
<p>The process for military personnel returning home to civilian life from deployment and life immediately after deployment can be highly stressful. Difficulties related to this transition are common and more than half of veterans suffer from some kind of psychological symptoms (<xref ref-type="bibr" rid="ref62">Romaniuk et al., 2020</xref>). This transition often entails exchanging social networks by leaving one group of relationships and being required to establish and develop relationships with another group (<xref ref-type="bibr" rid="ref33">Hopewell and Horton, 2012</xref>). Exclusive interaction with only the previous military community may prove counterproductive to reintegration (<xref ref-type="bibr" rid="ref31">Herman and Yarwood, 2014</xref>). It has also been noted that the stronger the military identity the veteran holds, the more difficult the transition to civilian life tends to be (<xref ref-type="bibr" rid="ref2">Adeoti et al., 2022</xref>; <xref ref-type="bibr" rid="ref6">Ben-Shalom et al., 2023</xref>).</p>
<p>While some symptomatic behaviors such as being hypervigilant could even be considered to be adaptive in the battlefield, they can be very maladaptive for typical civilian life (<xref ref-type="bibr" rid="ref30">Grupe et al., 2016</xref>). Survivors of a traumatic event might also feel responsible for the death or injury of others, even if they had no real influence in that situation (<xref ref-type="bibr" rid="ref65">Tangney, 2002</xref>; <xref ref-type="bibr" rid="ref46">Murray et al., 2021</xref>). Feelings of guilt have been linked to substance abuse, PTSD and depression symptoms for war veterans (<xref ref-type="bibr" rid="ref20">Davis et al., 2023</xref>).</p>
<p>Post-deployment adjustment difficulties also tend to co-occur or lead to other life problems such as relationship problems or financial difficulties. It is known that mental health issues can lead to adjustment difficulties such as social problems, unemployment and financial problems which can even further be bolstered by co-occurring substance abuse (<xref ref-type="bibr" rid="ref62">Romaniuk et al., 2020</xref>). On the other hand, veterans&#x2019; skills and experience might not be suitable for civilian professions causing financial difficulties, increasing life stress, and leading to adjustment difficulties while sensitizing the individuals towards mental health issues (<xref ref-type="bibr" rid="ref25">Elbogen et al., 2012</xref>). Senior officers can expect to land a senior position in the civilian job market right away. However, while technical skills such as computing may transfer easily, non-technical skills like communication may need adaptation and acclimatization to the civilian corporate culture. The business world can also be afraid of potential mental problems, inflexibility, inadaptability, regimented individuals and awkward reactions to stressful situations which can make veterans feel stigmatized (<xref ref-type="bibr" rid="ref21">Davis and Minnis, 2017</xref>; <xref ref-type="bibr" rid="ref61">Quirke et al., 2021</xref>). Relationship dysfunction is also a common challenge faced by individuals with PTSD. This dysfunction can present in a variety of ways from emotional numbing to domestic violence (<xref ref-type="bibr" rid="ref73">Walker, 2020</xref>). Regardless of diagnosis, financial well-being has been linked to post-deployment adjustment where veterans having the means to cover basic needs were less likely to have issues with post-deployment adjustment such as criminal arrests, homelessness, substance abuse, aggression or suicidal behavior (<xref ref-type="bibr" rid="ref25">Elbogen et al., 2012</xref>). Another protecting factor has been linked to gratitude. Being the recipient of thankfulness, recognition and obtaining personal benefits from the society may have salutary effects on everyday functioning of war veterans. Dispositional gratitude predicted greater daily positive affect, percentage of pleasant days over the assessment period, daily intrinsically motivating activity, and daily self-esteem over and above effects attributable to PTSD severity and dispositional negative and positive affect in the PTSD group but not the non-PTSD group (<xref ref-type="bibr" rid="ref35">Kashdan et al., 2006</xref>).</p>
</sec>
<sec id="sec8">
<title>Challenges related to cyber veteran integration</title>
<p>With their unique skillset and experience, cyber veterans will probably be sought after workforce, where their experiences can help to better understand malicious actors&#x2019; tactics, techniques and processes, improving organization&#x2019;s ability to defend themselves from cybercrime. Cyber volunteers from various backgrounds can even alleviate the global shortage of cybersecurity professionals (<xref ref-type="bibr" rid="ref16">CISA, 2020</xref>; <xref ref-type="bibr" rid="ref28">De Zan and Di Franco, 2020</xref>; <xref ref-type="bibr" rid="ref18">Coutinho et al., 2023</xref>). However, these skills and knowhow can be used to do harm as well as to do good. The path of cybercrime can simply look attractive because it promises more immediate financial benefits. Especially if the cyber veterans lack social support while they suffer from debilitating mental health issues making it difficult for them to find or keep work. Some might see cybercrime as their only option just to make ends meet or acquire the financial security necessary to concentrate on overcoming their issues.</p>
<p>Challenge, curiosity and status are often linked to hacker motivations (<xref ref-type="bibr" rid="ref15">Chng et al., 2022</xref>). By the Social Learning Theory, crime can be a behavior that is learned just like any other behavior (<xref ref-type="bibr" rid="ref5">Bandura and Walters, 1977</xref>). If the cyber veterans were accustomed to breaking into systems during the war, this type of activity, accepted in the time of war, has become a deeply learned behavior where the hacker mentality could even be part of their identity. If these skilled individuals are not directed towards beneficial activities such as red teaming, penetration testing or bug bounty programmes, some might traverse to the black hat activities just to find challenges for their highly tuned skills.</p>
<p>The most sinister outlook for cyber veterans can even lead to radicalization. PTSD-related symptoms such as emotional numbness, feelings of vulnerability and alienation can lead to reduced empathy and indifference to others (<xref ref-type="bibr" rid="ref49">Nietlisbach and Maercker, 2009a</xref>,<xref ref-type="bibr" rid="ref50">b</xref>). Other PTSD symptoms such as a tendency to withdraw social contact, irritability and outbursts of anger can ostracize and marginalize them from society even further (<xref ref-type="bibr" rid="ref49">Nietlisbach and Maercker, 2009a</xref>,<xref ref-type="bibr" rid="ref50">b</xref>). There is evidence that historical trauma can sensitize to conspiracy beliefs (<xref ref-type="bibr" rid="ref7">Bilewicz, 2022</xref>). Research has shown that radicalization is driven by multiple causes. Wide-ranging grievances in everyday life can push individuals towards a more absolute way of thinking, while narrower political or religious pull factors attract certain types of ideology (<xref ref-type="bibr" rid="ref9">Borum, 2011</xref>). These factors might start a vicious cycle where some cyber veteran individuals feel that society does not appreciate their war effort as much as other&#x2019;s who fought with a rifle instead of a keyboard. These embittered individuals might drift towards extreme ideological groups where they could find a sense of community and comradeship. <xref ref-type="bibr" rid="ref22">Doosje et al. (2016)</xref> has depicted the path to radicalization in three stages. Phase 1 is characterized by a sensitivity to a radical ideology. In Phase 2, the individual becomes a member of a radical group. Finally, in Phase 3, this person is ready to act on behalf of the group&#x2019;s ideology. The threshold for the final Phase 3 could be lowered in the cyber domain as it is easier to mentally distance oneself from the possible victims (<xref ref-type="bibr" rid="ref40">Leukfeldt and Yar, 2016</xref>).</p>
</sec>
<sec id="sec9">
<title>Supporting the transition of cyber veterans to civilian life</title>
<p>Similar support programmes that have proven effective for veterans overall should also be beneficial for cyber veterans. Veteran support programmes should provide timely and appropriate support, start as soon as possible, be affordable and sustainable and have an approach that borrows and adapts from existing structures (<xref ref-type="bibr" rid="ref13">NATO STO TR-HFM-263, 2021</xref>). In addition, preventive programmes such as Psychological First Aid could also mitigate further problems later on (<xref ref-type="bibr" rid="ref60">Prykhodko et al., 2021</xref>). These veteran support programmes should at least include some interactive programmes, retreats or professional services that help those veterans with PTSD and other mental trauma (<xref ref-type="bibr" rid="ref57">Pearn, 2000</xref>). Many of the support programmes also include assistance in finding education or employment to achieve financial security and facilitate social support for the veterans (<xref ref-type="bibr" rid="ref37">Kranke et al., 2019</xref>; <xref ref-type="bibr" rid="ref13">NATO STO TR-HFM-263, 2021</xref>; <xref ref-type="bibr" rid="ref2">Adeoti et al., 2022</xref>). Often these programmes include activities that extend to include the veteran&#x2019;s family members and they can help in reconnecting and healing broken internal connections in the families (<xref ref-type="bibr" rid="ref67">Tsybko, 2023</xref>). Younger veterans, would also benefit from support that offers interactive re-socialization and re-cultivation aid organized in educational institutions in connection with their studies (<xref ref-type="bibr" rid="ref58">Pedersen and Wieser, 2021</xref>). Interventions witch focus on strengthening personal resilience and available support before and after exit seem to protect against stress and depression and enable psychosocial functioning (<xref ref-type="bibr" rid="ref59">Pietrzak et al., 2010</xref>).</p>
<p>To identify those most in need of support and optimally focus the limited resources, pre- and post-departure screening methods in the form of short but efficient survey batteries are recommended (<xref ref-type="bibr" rid="ref62">Romaniuk et al., 2020</xref>; <xref ref-type="bibr" rid="ref43">Markowitz et al., 2023</xref>). Although, not sufficient predictors on their own, background information and life situations might also provide some insight on who is in direst need of support. For example, research has indicated that overall financial well-being (<xref ref-type="bibr" rid="ref25">Elbogen et al., 2012</xref>), higher education, rank, age and previous exposure to adversity can protect a person against excessive negative consequences of their transition (<xref ref-type="bibr" rid="ref2">Adeoti et al., 2022</xref>; <xref ref-type="bibr" rid="ref43">Markowitz et al., 2023</xref>). Another preventive measure comes from voluntary or anticipated exit (<xref ref-type="bibr" rid="ref2">Adeoti et al., 2022</xref>). In addition, the more in advance and concrete the planning for the next phase in life is, the better the chances for a successful transition (<xref ref-type="bibr" rid="ref36">Kleykamp et al., 2021</xref>). Many veterans do not find satisfactory employment after service due to lack of a long-term plan (<xref ref-type="bibr" rid="ref37">Kranke et al., 2019</xref>; <xref ref-type="bibr" rid="ref44">Merritt, 2020</xref>; <xref ref-type="bibr" rid="ref2">Adeoti et al., 2022</xref>). Thus, it is important that career planning support starts when soldiers enter service and that it helps them stay up-to-date on how military and civilian careers intertwine (<xref ref-type="bibr" rid="ref44">Merritt, 2020</xref>).</p>
<p>Social support, defined as the perceived or tangible availability of social resources at one&#x2019;s disposal, is among the key factors for successful reintegration (<xref ref-type="bibr" rid="ref17">Cohen et al., 2001</xref>). Peer support groups have been shown to improve veteran&#x2019;s reintegration and have beneficial mental health effects. Peer support groups often benefit from having members at various stages of their recovery, giving hope to those in their early stages and a feeling of accomplishment to those further on (<xref ref-type="bibr" rid="ref23">Drebing et al., 2018</xref>). Special attention is required in assembling peer support groups for cyber veterans as the cyber domain and their experiences might be too technical for other war veterans to relate to.</p>
<p>Cyber veterans might have the skills and expertise to be a sought-after workforce. Their transitioning out of military service could also be expected to involve fewer challenges as their identities and professional profiles should be more aligned with civilian ones (<xref ref-type="bibr" rid="ref21">Davis and Minnis, 2017</xref>). Veterans often report having a feeling of differentness where they feel separate from the civilians due to the perception that civilians do not understand veterans and what they have gone through, which is seen as a root cause for reintegration difficulties (<xref ref-type="bibr" rid="ref37">Kranke et al., 2019</xref>). Clinging to veteran identity can also hinder reintegration (<xref ref-type="bibr" rid="ref2">Adeoti et al., 2022</xref>; <xref ref-type="bibr" rid="ref6">Ben-Shalom et al., 2023</xref>). Some individuals might therefore benefit from navigational support, aiding them in finding a route from their old identity to a new one (<xref ref-type="bibr" rid="ref31">Herman and Yarwood, 2014</xref>). Veterans need to be encouraged to find new reference groups (<xref ref-type="bibr" rid="ref6">Ben-Shalom et al., 2023</xref>) and focus on the many things they have in common with civilians (<xref ref-type="bibr" rid="ref37">Kranke et al., 2019</xref>). While this process might appear easier for cyber veterans, as civilians working in cyber security should provide a relatable reference group for them, it is still crucial to provide enough navigational guidance for them, to nudge them towards more constructive reference groups. Some individuals might migrate towards undesirable reference groups such as hacktivists or even cyber-criminal groups.</p>
<p>Cyber volunteers will most likely not receive any legitimate veteran status which would make them eligible for state benefits and support programmes. It is, however, important to recognize that these individuals might also have similar difficulties in adapting back to their ordinary lives. In addition, the participating voluntary groups should acknowledge that they are responsible for their participants even after the conflict is over. These groups could seek discussions with Non-Governmental Organizations (NGOs) and professional practitioners who are already working with war victims and veterans for assistance. As an example, one framework could be taken from the National Psychological Association of Ukraine (NPA) for civilian wartime hotline support that currently works across 21 countries (<xref ref-type="bibr" rid="ref55">Palii et al., 2023</xref>). While most of the volunteers are required to remain anonymous for their own safety, secure online peer support groups and information-sharing platforms could be developed. These could provide general information about education and working opportunities in cyber security, where to find professional help and act as a peer support forum, where former cyber volunteers could discuss and share their thoughts and feelings anonymously.</p>
</sec>
</sec>
<sec sec-type="discussion" id="sec10">
<title>Discussion</title>
<p>This paper raised awareness of the social implications of cyber volunteers during and after conflicts, discussed what difficulties cyber veterans might face in their reintegration and explored the types of support programmes that should be developed to benefit their transition. As the cyber domain lacks similar visibility to the physical domain, it requires more effort from the media and societies to recognize the contribution of the cyber professionals, with and without uniform, as recognition and thankfulness have been shown to have salutary effects on the everyday functioning of veterans (<xref ref-type="bibr" rid="ref35">Kashdan et al., 2006</xref>).</p>
<p>Especially for a mobilized army, most of the combatants will return to their civilian occupations after the war, while some might remain in the military. This transition requires adjusting and exchange of social groups (<xref ref-type="bibr" rid="ref33">Hopewell and Horton, 2012</xref>). This process can lead to feelings of differentness, where veterans perceive their experiences in the war are not well understood by the civilians (<xref ref-type="bibr" rid="ref37">Kranke et al., 2019</xref>). These feelings can be alleviated by peer support groups (<xref ref-type="bibr" rid="ref23">Drebing et al., 2018</xref>). However, cyber veterans might be at a disadvantage as the cyber domain can be so technical that other war veterans might have difficulties relating to their experiences, while cyber volunteers are forced to remain anonymous for their own safety.</p>
<p>Reintegration difficulties tend also to co-occur or lead to other life problems such as relationship problems, financial difficulties, mental health issues and substance abuse. Financial well-being has been recognized as one of the key protecting factors for reintegration (<xref ref-type="bibr" rid="ref25">Elbogen et al., 2012</xref>). With their unique skills and experience, cyber veterans will probably be a sought-after workforce. However, these skills and know-how can be used to do harm and to do good. The path of cybercrime can simply look attractive because it promises more immediate financial benefits. Especially in the global army of cyber volunteers, who already might have become accustomed to breaking the law in their native country for a cause they believe in, some individuals may drift towards criminal activity as implied by the Social Learning Theory (<xref ref-type="bibr" rid="ref5">Bandura and Walters, 1977</xref>). To prevent this type of chain of events, more public discussion and dialogue with the cyber volunteers is needed. Many of them will be obliged to remain anonymous for their own safety and possible legal consequences by the regional authorities of their native country.</p>
<p>The notable limitation of this study is the lack of systematic review process. Applying a more rigid review methodology, would have created a better stepping stone for further research. Several important aspects of veteran integration, such as gender issues were also omitted to keep the text somewhat clear and concise. Future research directions for exploring this novel phenomenon would be to approach military and paramilitary cyber professionals to better understand what difficulties they have had or are expecting to face with their transition to civilian life.</p>
</sec>
<sec sec-type="author-contributions" id="sec11">
<title>Author contributions</title>
<p>TV: Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. CL: Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. AD: Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. MN: Conceptualization, Supervision, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing.</p>
</sec>
</body>
<back>
<sec sec-type="funding-information" id="sec12">
<title>Funding</title>
<p>The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This research was funded by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) provided the open access publication fee for this article.</p>
</sec>
<sec sec-type="COI-statement" id="sec13">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="sec100" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll1">38 USC</collab></person-group>, (<year>2011</year>). United States Code, Title 38, Chapter 1, Sec. 101 - Veteran's Benefits. Available at: <ext-link xlink:href="https://www.govinfo.gov/content/pkg/USCODE-2011-title38/html/USCODE-2011-title38-partI-chap1-sec101.htm" ext-link-type="uri">https://www.govinfo.gov/content/pkg/USCODE-2011-title38/html/USCODE-2011-title38-partI-chap1-sec101.htm</ext-link> (Accessed December 2, 2023).</citation></ref>
<ref id="ref2"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adeoti</surname> <given-names>A.</given-names></name> <name><surname>Sarpong</surname> <given-names>D.</given-names></name> <name><surname>Mordi</surname> <given-names>C.</given-names></name></person-group> (<year>2022</year>). <article-title>Crossing the Rubicon: exploring migrants&#x2019; transition out of military service into civilian work</article-title>. <source>Int. J. Hum. Resour. Manag.</source>, <fpage>1</fpage>&#x2013;<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09585192.2022.2142063</pub-id></citation></ref>
<ref id="ref3"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Andrews</surname> <given-names>B.</given-names></name> <name><surname>Brewin</surname> <given-names>C. R.</given-names></name> <name><surname>Philpott</surname> <given-names>R.</given-names></name> <name><surname>Stewart</surname> <given-names>L.</given-names></name></person-group> (<year>2007</year>). <article-title>Delayed-onset posttraumatic stress disorder: a systematic review of the evidence</article-title>. <source>Am. J. Psychiatry</source> <volume>164</volume>, <fpage>1319</fpage>&#x2013;<lpage>1326</lpage>. doi: <pub-id pub-id-type="doi">10.1176/appi.ajp.2007.06091491</pub-id>, PMID: <pub-id pub-id-type="pmid">17728415</pub-id></citation></ref>
<ref id="ref4"><citation citation-type="book"><person-group person-group-type="author"><collab id="coll2">APA</collab></person-group> (<year>2022</year>). <source>Diagnostic and statistical manual of mental disorders, fifth edition, text revision (DSM-5-TR)</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>American Psychiatric Association</publisher-name>.</citation></ref>
<ref id="ref5"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Bandura</surname> <given-names>A.</given-names></name> <name><surname>Walters</surname> <given-names>R. H.</given-names></name></person-group> (<year>1977</year>). <source>Social learning theory</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Englewood Cliffs Prentice Hall</publisher-name>.</citation></ref>
<ref id="ref6"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ben-Shalom</surname> <given-names>U.</given-names></name> <name><surname>Rickover</surname> <given-names>I.</given-names></name> <name><surname>Reizer</surname> <given-names>A.</given-names></name> <name><surname>Connelly</surname> <given-names>V.</given-names></name></person-group> (<year>2023</year>). <article-title>Emergent veteran identity: toward a new theory of veteran identity in Israeli society</article-title>. <source>Armed Forces Soc.</source>:<fpage>0095327X2311530</fpage>. doi: <pub-id pub-id-type="doi">10.1177/0095327X231153043</pub-id></citation></ref>
<ref id="ref7"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bilewicz</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>Conspiracy beliefs as an adaptation to historical trauma</article-title>. <source>Curr. Opin. Psychol.</source> <volume>47</volume>:<fpage>101359</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.copsyc.2022.101359</pub-id>, PMID: <pub-id pub-id-type="pmid">35751976</pub-id></citation></ref>
<ref id="ref8"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Bonanno</surname> <given-names>G. A.</given-names></name></person-group> (<year>2004</year>). <article-title>Loss, trauma, and human resilience: have we underestimated the human capacity to thrive after extremely aversive events?</article-title> <source>Am Psychol.</source> <volume>59</volume>, <fpage>20</fpage>&#x2013;<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0003-066X.59.1.20</pub-id></citation></ref>
<ref id="ref9"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Borum</surname> <given-names>R.</given-names></name></person-group> (<year>2011</year>). <article-title>Radicalization into violent extremism II: a review of conceptual models and empirical research</article-title>. <source>J Strateg Secur</source> <volume>4</volume>, <fpage>37</fpage>&#x2013;<lpage>62</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.4.4.2</pub-id></citation></ref>
<ref id="ref10"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brewin</surname> <given-names>C. R.</given-names></name> <name><surname>Andrews</surname> <given-names>B.</given-names></name> <name><surname>Valentine</surname> <given-names>J. D.</given-names></name></person-group> (<year>2000</year>). <article-title>Meta-analysis of risk factors for posttraumatic stress disorder in trauma-exposed adults</article-title>. <source>J. Consult. Clin. Psychol.</source> <volume>68</volume>, <fpage>748</fpage>&#x2013;<lpage>766</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0022-006X.68.5.748</pub-id>, PMID: <pub-id pub-id-type="pmid">11068961</pub-id></citation></ref>
<ref id="ref11"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Brody</surname> <given-names>B. A.</given-names></name></person-group>, (<year>2015</year>). Cybersecurity akin to being in a war zone&#x2014;you have to be &#x201C;left of boom&#x201D; to survive. Available at: <ext-link xlink:href="https://philipcao.com/2015/06/28/cybersecurity-akin-to-being-in-a-war-zone-you-have-to-be-left-of-boom-to-survive/" ext-link-type="uri">https://philipcao.com/2015/06/28/cybersecurity-akin-to-being-in-a-war-zone-you-have-to-be-left-of-boom-to-survive/</ext-link></citation></ref>
<ref id="ref12"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brown</surname> <given-names>W. B.</given-names></name></person-group> (<year>2011</year>). <article-title>From war zones to jail: veteran reintegration problems</article-title>. <source>Justice Policy J.</source> <volume>8</volume>, <fpage>1</fpage>&#x2013;<lpage>48</lpage>.</citation></ref>
<ref id="ref14"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chang</surname> <given-names>L. Y.</given-names></name> <name><surname>Zhong</surname> <given-names>L. Y.</given-names></name> <name><surname>Grabosky</surname> <given-names>P. N.</given-names></name></person-group> (<year>2018</year>). <article-title>Citizen co-production of cyber security: self-help, vigilantes, and cybercrime</article-title>. <source>Regul Gov</source> <volume>12</volume>, <fpage>101</fpage>&#x2013;<lpage>114</lpage>. doi: <pub-id pub-id-type="doi">10.1111/rego.12125</pub-id></citation></ref>
<ref id="ref15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chng</surname> <given-names>S.</given-names></name> <name><surname>Lu</surname> <given-names>H. Y.</given-names></name> <name><surname>Kumar</surname> <given-names>A.</given-names></name> <name><surname>Yau</surname> <given-names>D.</given-names></name></person-group> (<year>2022</year>). <article-title>Hacker types, motivations and strategies: a comprehensive framework</article-title>. <source>Comput. Human Behav. Rep.</source> <volume>5</volume>:<fpage>100167</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chbr.2022.100167</pub-id></citation></ref>
<ref id="ref16"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll3">CISA</collab></person-group>. (<year>2020</year>). <source>Supporting the Growth and Sustainment of the Nation's Cybersecurity Workforce: Building the Foundation for a More Secure American Future</source>. <publisher-name>Infrastructure Security Agency (CISA)</publisher-name>.</citation></ref>
<ref id="ref17"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cohen</surname> <given-names>S.</given-names></name> <name><surname>Gottlieb</surname> <given-names>B. H.</given-names></name> <name><surname>Underwood</surname> <given-names>L. G.</given-names></name></person-group> (<year>2001</year>). <article-title>Social relationships and health: challenges for measurement and intervention</article-title>. <source>Adv. Mind Body Med.</source> <volume>17</volume>, <fpage>129</fpage>&#x2013;<lpage>141</lpage>. PMID: <pub-id pub-id-type="pmid">11335207</pub-id></citation></ref>
<ref id="ref18"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Coutinho</surname> <given-names>S.</given-names></name> <name><surname>Bollen</surname> <given-names>A.</given-names></name> <name><surname>Weil</surname> <given-names>C.</given-names></name> <name><surname>Sheerin</surname> <given-names>C.</given-names></name> <name><surname>Silvera</surname> <given-names>D.</given-names></name> <name><surname>Donaldson</surname> <given-names>S.</given-names></name> <etal/></person-group>., (<year>2023</year>). <source>Cyber security skills in the UK labour market 2023</source>.</citation></ref>
<ref id="ref19"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>D&#x2019;Urso</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>The cyber combatant: a new status for a new warrior</article-title>. <source>Philosophy Technol.</source> <volume>28</volume>, <fpage>475</fpage>&#x2013;<lpage>478</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s13347-015-0196-9</pub-id></citation></ref>
<ref id="ref20"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Davis</surname> <given-names>J. P.</given-names></name> <name><surname>Canning</surname> <given-names>L.</given-names></name> <name><surname>Saba</surname> <given-names>S. K.</given-names></name> <name><surname>Bravo</surname> <given-names>A. J.</given-names></name> <name><surname>Amone-P'Olak</surname> <given-names>K.</given-names></name> <name><surname>Sedano</surname> <given-names>A.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>Associations between trauma-related guilt, symptoms of posttraumatic stress disorder, and problematic alcohol use</article-title>. <source>Psychiatry Res.</source> <volume>326</volume>:<fpage>115350</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.psychres.2023.115350</pub-id>, PMID: <pub-id pub-id-type="pmid">37487463</pub-id></citation></ref>
<ref id="ref21"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Davis</surname> <given-names>V. E.</given-names></name> <name><surname>Minnis</surname> <given-names>S. E.</given-names></name></person-group> (<year>2017</year>). <article-title>Military veterans&#x2019; transferrable skills: an HRD practitioner dilemma</article-title>. <source>Adv. Dev. Hum. Resour.</source> <volume>19</volume>, <fpage>6</fpage>&#x2013;<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1523422316682961</pub-id></citation></ref>
<ref id="ref28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>De Zan</surname> <given-names>T.</given-names></name> <name><surname>Di Franco</surname> <given-names>F.</given-names></name></person-group> (<year>2020</year>). <article-title>Cybersecurity Skills Development in the EU</article-title>, <source>European Union Agency for Cybersecurity (ENISA)</source>. doi: <pub-id pub-id-type="doi">10.2824/525144</pub-id></citation></ref>
<ref id="ref22"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Doosje</surname> <given-names>B.</given-names></name> <name><surname>Moghaddam</surname> <given-names>F. M.</given-names></name> <name><surname>Kruglanski</surname> <given-names>A. W.</given-names></name> <name><surname>de Wolf</surname> <given-names>A.</given-names></name> <name><surname>Mann</surname> <given-names>L.</given-names></name> <name><surname>Feddes</surname> <given-names>A. R.</given-names></name></person-group> (<year>2016</year>). <article-title>Terrorism, radicalization and de-radicalization</article-title>. <source>Curr. Opin. Psychol.</source> <volume>11</volume>, <fpage>79</fpage>&#x2013;<lpage>84</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.copsyc.2016.06.008</pub-id></citation></ref>
<ref id="ref23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Drebing</surname> <given-names>C. E.</given-names></name> <name><surname>Reilly</surname> <given-names>E.</given-names></name> <name><surname>Henze</surname> <given-names>K. T.</given-names></name> <name><surname>Kelly</surname> <given-names>M.</given-names></name> <name><surname>Russo</surname> <given-names>A.</given-names></name> <name><surname>Smolinsky</surname> <given-names>J.</given-names></name> <etal/></person-group>. (<year>2018</year>). <article-title>Using peer support groups to enhance community integration of veterans in transition</article-title>. <source>Psychol. Serv.</source> <volume>15</volume>, <fpage>135</fpage>&#x2013;<lpage>145</lpage>. doi: <pub-id pub-id-type="doi">10.1037/ser0000178</pub-id>, PMID: <pub-id pub-id-type="pmid">29723015</pub-id></citation></ref>
<ref id="ref24"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Dykstra</surname> <given-names>J.</given-names></name> <name><surname>Paul</surname> <given-names>C. L.</given-names></name></person-group>, (<year>2018</year>). <source>Cyber operations stress survey (COSS): studying fatigue, frustration, and cognitive workload in cybersecurity operations</source>. <publisher-loc>Baltimore, Md, USA</publisher-loc>: <publisher-name>Proceedings at the 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET &#x2018;18)</publisher-name>.</citation></ref>
<ref id="ref25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Elbogen</surname> <given-names>E. B.</given-names></name> <name><surname>Johnson</surname> <given-names>S. C.</given-names></name> <name><surname>Wagner</surname> <given-names>H. R.</given-names></name> <name><surname>Newton</surname> <given-names>V. M.</given-names></name> <name><surname>Beckham</surname> <given-names>J. C.</given-names></name></person-group> (<year>2012</year>). <article-title>Financial well-being and postdeployment adjustment among Iraq and Afghanistan war veterans</article-title>. <source>Mil. Med.</source> <volume>177</volume>, <fpage>669</fpage>&#x2013;<lpage>675</lpage>. doi: <pub-id pub-id-type="doi">10.7205/MILMED-D-11-00388</pub-id>, PMID: <pub-id pub-id-type="pmid">22730842</pub-id></citation></ref>
<ref id="ref26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Elnitsky</surname> <given-names>M. P.</given-names></name> <name><surname>Blevins</surname> <given-names>C. L.</given-names></name></person-group> (<year>2017</year>). <article-title>Military service member and veteran reintegration: a conceptual analysis, unified definition, and key domains</article-title>. <source>Front. Psychol.</source> <volume>8</volume>:<fpage>369</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2017.00369</pub-id></citation></ref>
<ref id="ref27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Elwood</surname> <given-names>L. S.</given-names></name> <name><surname>Hahn</surname> <given-names>K. S.</given-names></name> <name><surname>Olatunji</surname> <given-names>B. O.</given-names></name> <name><surname>Williams</surname> <given-names>N. L.</given-names></name></person-group> (<year>2009</year>). <article-title>Cognitive vulnerabilities to the development of PTSD: a review of four vulnerabilities and the proposal of an integrative vulnerability model</article-title>. <source>Clin. Psychol. Rev.</source> <volume>29</volume>, <fpage>87</fpage>&#x2013;<lpage>100</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cpr.2008.10.002</pub-id>, PMID: <pub-id pub-id-type="pmid">19008028</pub-id></citation></ref>
<ref id="ref29"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gray</surname> <given-names>M. J.</given-names></name> <name><surname>Bolton</surname> <given-names>E. E.</given-names></name> <name><surname>Litz</surname> <given-names>B. T.</given-names></name></person-group> (<year>2004</year>). <article-title>A longitudinal analysis of PTSD symptom course: delayed-onset PTSD in Somalia peacekeepers</article-title>. <source>J. Consult. Clin. Psychol.</source> <volume>72</volume>, <fpage>909</fpage>&#x2013;<lpage>913</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0022-006X.72.5.909</pub-id>, PMID: <pub-id pub-id-type="pmid">15482050</pub-id></citation></ref>
<ref id="ref30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Grupe</surname> <given-names>D. W.</given-names></name> <name><surname>Wielgosz</surname> <given-names>J.</given-names></name> <name><surname>Davidson</surname> <given-names>R. J.</given-names></name> <name><surname>Nitschke</surname> <given-names>J. B.</given-names></name></person-group> (<year>2016</year>). <article-title>Neurobiological correlates of distinct post-traumatic stress disorder symptom profiles during threat anticipation in combat veterans</article-title>. <source>Psychol. Med.</source> <volume>46</volume>, <fpage>1885</fpage>&#x2013;<lpage>1895</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0033291716000374</pub-id>, PMID: <pub-id pub-id-type="pmid">26979659</pub-id></citation></ref>
<ref id="ref31"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Herman</surname> <given-names>A.</given-names></name> <name><surname>Yarwood</surname> <given-names>R.</given-names></name></person-group> (<year>2014</year>). <article-title>From services to civilian: the geographies of veterans&#x2019; post-military lives</article-title>. <source>Geoforum</source> <volume>53</volume>, <fpage>41</fpage>&#x2013;<lpage>50</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.geoforum.2014.02.001</pub-id></citation></ref>
<ref id="ref32"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hoge</surname> <given-names>C. W.</given-names></name> <name><surname>Castro</surname> <given-names>C. A.</given-names></name> <name><surname>Messer</surname> <given-names>S. C.</given-names></name> <name><surname>McGurk</surname> <given-names>D.</given-names></name> <name><surname>Cotting</surname> <given-names>D. I.</given-names></name> <name><surname>Koffman</surname> <given-names>R. L.</given-names></name></person-group> (<year>2004</year>). <article-title>Combat duty in Iraq and Afghanistan, mental health problems, and barriers to care</article-title>. <source>N. Engl. J. Med.</source> <volume>351</volume>, <fpage>13</fpage>&#x2013;<lpage>22</lpage>. doi: <pub-id pub-id-type="doi">10.1056/NEJMoa040603</pub-id>, PMID: <pub-id pub-id-type="pmid">15229303</pub-id></citation></ref>
<ref id="ref33"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Hopewell</surname> <given-names>C. A.</given-names></name> <name><surname>Horton</surname> <given-names>D.</given-names></name></person-group> (<year>2012</year>). &#x201C;<article-title>The effects of repeated deployments on warriors and families</article-title>&#x201D; in <source>When the warrior returns</source>. eds. <person-group person-group-type="editor"><name><surname>Ainspan</surname> <given-names>N. D.</given-names></name> <name><surname>Penk</surname> <given-names>W. E.</given-names></name></person-group> (<publisher-loc>Annapolis</publisher-loc>: <publisher-name>Naval Institute Press</publisher-name>), <fpage>65</fpage>&#x2013;<lpage>78</lpage>.</citation></ref>
<ref id="ref34"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kaikkonen</surname> <given-names>N. M.</given-names></name> <name><surname>Laukkala</surname> <given-names>T.</given-names></name></person-group> (<year>2016</year>). <article-title>International military operations and mental health&#x2013;a review</article-title>. <source>Nord. J. Psychiatry</source> <volume>70</volume>, <fpage>10</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.3109/08039488.2015.1048718</pub-id></citation></ref>
<ref id="ref35"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kashdan</surname> <given-names>T. B.</given-names></name> <name><surname>Uswatte</surname> <given-names>G.</given-names></name> <name><surname>Julian</surname> <given-names>T.</given-names></name></person-group> (<year>2006</year>). <article-title>Gratitude and hedonic and eudaimonic well-being in Vietnam war veterans</article-title>. <source>Behav. Res. Ther.</source> <volume>44</volume>, <fpage>177</fpage>&#x2013;<lpage>199</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.brat.2005.01.005</pub-id>, PMID: <pub-id pub-id-type="pmid">16389060</pub-id></citation></ref>
<ref id="ref36"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kleykamp</surname> <given-names>M.</given-names></name> <name><surname>Montgomery</surname> <given-names>S.</given-names></name> <name><surname>Pang</surname> <given-names>A.</given-names></name> <name><surname>Schrader</surname> <given-names>K.</given-names></name></person-group> (<year>2021</year>). <article-title>Military identity and planning for the transition out of the military</article-title>. <source>Mil. Psychol.</source> <volume>33</volume>, <fpage>372</fpage>&#x2013;<lpage>391</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08995605.2021.1962176</pub-id>, PMID: <pub-id pub-id-type="pmid">38536371</pub-id></citation></ref>
<ref id="ref37"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kranke</surname> <given-names>D.</given-names></name> <name><surname>Floersch</surname> <given-names>J.</given-names></name> <name><surname>Dobalian</surname> <given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Identifying aspects of sameness to promote veteran reintegration with civilians: evidence and implications for military social work</article-title>. <source>Health Soc. Work</source> <volume>44</volume>, <fpage>61</fpage>&#x2013;<lpage>64</lpage>. doi: <pub-id pub-id-type="doi">10.1093/hsw/hly036</pub-id>, PMID: <pub-id pub-id-type="pmid">30551212</pub-id></citation></ref>
<ref id="ref38"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Kremer</surname> <given-names>J.-F.</given-names></name> <name><surname>M&#x00FC;ller</surname> <given-names>B.</given-names></name></person-group> (<year>2013</year>). <source>Cyberspace and international relations: Theory, prospects and challenges</source>. <publisher-loc>Heidelberg New York Dordrecht London</publisher-loc>: <publisher-name>Springer</publisher-name>.</citation></ref>
<ref id="ref39"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>R. M.</given-names></name> <name><surname>Assante</surname> <given-names>M. J.</given-names></name> <name><surname>Conway</surname> <given-names>T.</given-names></name></person-group>, (<year>2016</year>). <source>Analysis of the cyber attack on the Ukrainian power grid</source>. Defence Use Case, <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Electricity Information Sharing and Analysis Center (EISAC)</publisher-name>. <ext-link xlink:href="https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2016/03/Documents_E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf" ext-link-type="uri">https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2016/03/Documents_E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf</ext-link></citation></ref>
<ref id="ref40"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Leukfeldt</surname> <given-names>E. R.</given-names></name> <name><surname>Yar</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>Applying routine activity theory to cybercrime: a theoretical and empirical analysis</article-title>. <source>Deviant Behav.</source> <volume>37</volume>, <fpage>263</fpage>&#x2013;<lpage>280</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01639625.2015.1012409</pub-id></citation></ref>
<ref id="ref41"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lim</surname> <given-names>I. C. Z. Y.</given-names></name> <name><surname>Tam</surname> <given-names>W. W. S.</given-names></name> <name><surname>Chudzicka-Czupa&#x0142;a</surname> <given-names>A.</given-names></name> <name><surname>McIntyre</surname> <given-names>R. S.</given-names></name> <name><surname>Teopiz</surname> <given-names>K. M.</given-names></name> <name><surname>Ho</surname> <given-names>R. C.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>Prevalence of depression, anxiety and post-traumatic stress in war-and conflict-afflicted areas: a meta-analysis</article-title>. <source>Front. Psych.</source> <volume>13</volume>:<fpage>978703</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyt.2022.978703</pub-id>, PMID: <pub-id pub-id-type="pmid">36186881</pub-id></citation></ref>
<ref id="ref42"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Lonergan</surname> <given-names>E. D.</given-names></name> <name><surname>Lonergan</surname> <given-names>S. W.</given-names></name></person-group> (<year>2023</year>). &#x201C;<article-title>58C3A theory of cyber escalation</article-title>&#x201D; in <source>Escalation dynamics in cyberspace</source> (<publisher-name>Oxford University Press</publisher-name>)</citation></ref>
<ref id="ref43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Markowitz</surname> <given-names>F. E.</given-names></name> <name><surname>Kintzle</surname> <given-names>S.</given-names></name> <name><surname>Castro</surname> <given-names>C. A.</given-names></name></person-group> (<year>2023</year>). <article-title>Military-to-civilian transition strains and risky behavior among post-9/11 veterans</article-title>. <source>Mil. Psychol.</source> <volume>35</volume>, <fpage>38</fpage>&#x2013;<lpage>49</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08995605.2022.2065177</pub-id>, PMID: <pub-id pub-id-type="pmid">37130561</pub-id></citation></ref>
<ref id="ref44"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Merritt</surname> <given-names>M.</given-names></name></person-group> (<year>2020</year>). <source>Improving veteran transitions to civilian cybersecurity roles</source>, vol. <volume>1500</volume>. <publisher-loc>Bureau Drive Gaithersburg, MD</publisher-loc>: <publisher-name>NIST Special Publication</publisher-name>, <fpage>16</fpage>.</citation></ref>
<ref id="ref45"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll5">Ministry of Defence</collab></person-group>, (<year>2023</year>). Allied Joint Publication 3&#x2013;20 Allied Joint Doctrine Cyberspace Operations. Available at: <ext-link xlink:href="https://assets.publishing.service.gov.uk/media/5f086ec4d3bf7f2bef137675/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf" ext-link-type="uri">https://assets.publishing.service.gov.uk/media/5f086ec4d3bf7f2bef137675/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf</ext-link> (Accessed November 8, 2023).</citation></ref>
<ref id="ref46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murray</surname> <given-names>H.</given-names></name> <name><surname>Pethania</surname> <given-names>Y.</given-names></name> <name><surname>Medin</surname> <given-names>E.</given-names></name></person-group> (<year>2021</year>). <article-title>Survivor guilt: a cognitive approach</article-title>. <source>Cogn. Behav. Ther.</source> <volume>14</volume>:<fpage>e28</fpage>. doi: <pub-id pub-id-type="doi">10.1017/S1754470X21000246</pub-id>, PMID: <pub-id pub-id-type="pmid">34557258</pub-id></citation></ref>
<ref id="ref47"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll6">NATO</collab></person-group>, (<year>2016</year>). Warsaw Summit Press Release. Available at: <ext-link xlink:href="https://www.nato.int/cps/en/natohq/official_texts_133169.htm" ext-link-type="uri">https://www.nato.int/cps/en/natohq/official_texts_133169.htm</ext-link> [Accessed December 2, 2023].</citation></ref>
<ref id="ref48"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll7">NATO</collab></person-group>, (<year>2022</year>). Strategic Concept. [Online] Available at: <ext-link xlink:href="https://www.nato.int/cps/en/natohq/topics_210907.htm" ext-link-type="uri">https://www.nato.int/cps/en/natohq/topics_210907.htm</ext-link> [Accessed December 2, 2023].</citation></ref>
<ref id="ref13"><citation citation-type="book"><person-group person-group-type="author"><collab>NATO STO TR-HFM-263</collab></person-group>, (<year>2021</year>) <article-title>Final report: The Transition of Military Veterans from Active Service to Civilian Life</article-title>, <publisher-loc>France</publisher-loc>: <publisher-name>NATO Science and Technology Organization</publisher-name>.</citation></ref>
<ref id="ref49"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nietlisbach</surname> <given-names>G.</given-names></name> <name><surname>Maercker</surname> <given-names>A.</given-names></name></person-group> (<year>2009a</year>). <article-title>Effects of social exclusion in trauma survivors with posttraumatic stress disorder</article-title>. <source>Psychol. Trauma Theory Res. Pract. Policy</source> <volume>1</volume>, <fpage>323</fpage>&#x2013;<lpage>331</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0017832</pub-id></citation></ref>
<ref id="ref50"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nietlisbach</surname> <given-names>G.</given-names></name> <name><surname>Maercker</surname> <given-names>A.</given-names></name></person-group> (<year>2009b</year>). <article-title>Social cognition and interpersonal impairments in trauma survivors with PTSD</article-title>. <source>J. Aggress. Maltreat. Trauma</source> <volume>18</volume>, <fpage>382</fpage>&#x2013;<lpage>402</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10926770902881489</pub-id></citation></ref>
<ref id="ref51"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nobles</surname> <given-names>C.</given-names></name></person-group> (<year>2022</year>). <article-title>Stress, burnout, and security fatigue in cybersecurity: a human factors problem</article-title>. <source>HOLISTICA J. Bus. Public Adm.</source> <volume>13</volume>, <fpage>49</fpage>&#x2013;<lpage>72</lpage>. doi: <pub-id pub-id-type="doi">10.2478/hjbpa-2022-0003</pub-id></citation></ref>
<ref id="ref52"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Ottis</surname> <given-names>R.</given-names></name></person-group> (<year>2010</year>). <source>From pitch forks to laptops: volunteers in cyber conflicts</source>. In proceedings of the 1st Conference on Cyber Conflict (CyCon), 15, CCDCOE Tallinn, Estonia, <fpage>97</fpage>&#x2013;<lpage>109</lpage>.</citation></ref>
<ref id="ref53"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll8">Oxford English Dictionary</collab></person-group>, (<year>2023</year>). <comment>Available at:</comment> <ext-link xlink:href="https://www.oed.com/search/dictionary/?scope=Entries&#x0026;q=veteran" ext-link-type="uri">https://www.oed.com/search/dictionary/?scope=Entries&#x0026;q=veteran</ext-link> (Accessed December 2, 2023).</citation></ref>
<ref id="ref54"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ozer</surname> <given-names>E. J.</given-names></name> <name><surname>Best</surname> <given-names>S. R.</given-names></name> <name><surname>Lipsey</surname> <given-names>T. L.</given-names></name> <name><surname>Weiss</surname> <given-names>D. S.</given-names></name></person-group> (<year>2003</year>). <article-title>Predictors of posttraumatic stress disorder and symptoms in adults: a meta-analysis</article-title>. <source>Psychol. Bull.</source> <volume>129</volume>, <fpage>52</fpage>&#x2013;<lpage>73</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0033-2909.129.1.52</pub-id></citation></ref>
<ref id="ref55"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Palii</surname> <given-names>V.</given-names></name> <name><surname>Velykodna</surname> <given-names>M.</given-names></name> <name><surname>Pereira</surname> <given-names>M.</given-names></name> <name><surname>McElvaney</surname> <given-names>R.</given-names></name> <name><surname>Bernard</surname> <given-names>S.</given-names></name> <name><surname>Klymchuk</surname> <given-names>V.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>The experience of launching a psychological hotline across 21 countries to support Ukrainians in wartime</article-title>. <source>Ment. Health Soc. Incl.</source> doi: <pub-id pub-id-type="doi">10.1108/MHSI-04-2023-0040</pub-id></citation></ref>
<ref id="ref56"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Paul</surname> <given-names>C. L.</given-names></name> <name><surname>Dykstra</surname> <given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Understanding operator fatigue, frustration, and cognitive workload in tactical cybersecurity operations</article-title>. <source>J. Inf. Warf.</source> <volume>16</volume>, <fpage>1</fpage>&#x2013;<lpage>11</lpage>.</citation></ref>
<ref id="ref57"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pearn</surname> <given-names>J.</given-names></name></person-group> (<year>2000</year>). <article-title>Traumatic stress disorders: a classification with implications for prevention and management</article-title>. <source>Mil. Med.</source> <volume>165</volume>, <fpage>434</fpage>&#x2013;<lpage>440</lpage>. doi: <pub-id pub-id-type="doi">10.1093/milmed/165.6.434</pub-id>, PMID: <pub-id pub-id-type="pmid">10870357</pub-id></citation></ref>
<ref id="ref58"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pedersen</surname> <given-names>C. L.</given-names></name> <name><surname>Wieser</surname> <given-names>C.</given-names></name></person-group> (<year>2021</year>). <article-title>Veteran transition from military to civilian life: towards a sociocultural framework for social support</article-title>. <source>Scand. J. Mil. Stud.</source> <volume>4</volume>, <fpage>158</fpage>&#x2013;<lpage>171</lpage>. doi: <pub-id pub-id-type="doi">10.31374/sjms.97</pub-id></citation></ref>
<ref id="ref59"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pietrzak</surname> <given-names>R. H.</given-names></name> <name><surname>Johnson</surname> <given-names>D. C.</given-names></name> <name><surname>Goldstein</surname> <given-names>M. B.</given-names></name> <name><surname>Malley</surname> <given-names>J. C.</given-names></name> <name><surname>Rivers</surname> <given-names>A. J.</given-names></name> <name><surname>Morgan</surname> <given-names>C. A.</given-names></name> <etal/></person-group>. (<year>2010</year>). <article-title>Psychosocial buffers of traumatic stress, depressive symptoms, and psychosocial difficulties in veterans of operations enduring freedom and Iraqi freedom: the role of resilience, unit support, and postdeployment social support</article-title>. <source>J. Affect. Disord.</source> <volume>120</volume>, <fpage>188</fpage>&#x2013;<lpage>192</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jad.2009.04.015</pub-id>, PMID: <pub-id pub-id-type="pmid">19443043</pub-id></citation></ref>
<ref id="ref60"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Prykhodko</surname> <given-names>I.</given-names></name> <name><surname>Matsehora</surname> <given-names>Y.</given-names></name> <name><surname>Kolesnichenko</surname> <given-names>O.</given-names></name> <name><surname>Stasiuk</surname> <given-names>V.</given-names></name> <name><surname>Bolshakova</surname> <given-names>A.</given-names></name> <name><surname>Bilyk</surname> <given-names>O.</given-names></name></person-group> (<year>2021</year>). <article-title>Psychological first aid for military personnel in combat operations: the Ukrainian model</article-title>. <source>Mil. Behav. Health</source> <volume>9</volume>, <fpage>289</fpage>&#x2013;<lpage>296</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21635781.2020.1864530</pub-id></citation></ref>
<ref id="ref61"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Quirke</surname> <given-names>E.</given-names></name> <name><surname>Klymchuk</surname> <given-names>V.</given-names></name> <name><surname>Suvalo</surname> <given-names>O.</given-names></name> <name><surname>Bakolis</surname> <given-names>I.</given-names></name> <name><surname>Thornicroft</surname> <given-names>G.</given-names></name></person-group> (<year>2021</year>). <article-title>Mental health stigma in Ukraine: cross-sectional survey</article-title>. <source>Glob. Ment. Health</source> <volume>8</volume>:<fpage>e11</fpage>. doi: <pub-id pub-id-type="doi">10.1017/gmh.2021.9</pub-id>, PMID: <pub-id pub-id-type="pmid">34026241</pub-id></citation></ref>
<ref id="ref62"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Romaniuk</surname> <given-names>M.</given-names></name> <name><surname>Fisher</surname> <given-names>G.</given-names></name> <name><surname>Kidd</surname> <given-names>C.</given-names></name> <name><surname>Batterham</surname> <given-names>P. J.</given-names></name></person-group> (<year>2020</year>). <article-title>Assessing psychological adjustment and cultural reintegration after military service: development and psychometric evaluation of the post-separation military-civilian adjustment and reintegration measure (M-CARM)</article-title>. <source>BMC Psychiatry</source> <volume>20</volume>, <fpage>1</fpage>&#x2013;<lpage>17</lpage>. doi: <pub-id pub-id-type="doi">10.1186/s12888-020-02936-y</pub-id></citation></ref>
<ref id="ref63"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Singh</surname> <given-names>T.</given-names></name> <name><surname>Johnston</surname> <given-names>A. C.</given-names></name> <name><surname>D'Arcy</surname> <given-names>J.</given-names></name> <name><surname>Harms</surname> <given-names>P. D.</given-names></name></person-group> (<year>2023</year>). <article-title>Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research</article-title>. <source>Organ. Cybersecur. J. Pract. Process People</source> <volume>3</volume>, <fpage>100</fpage>&#x2013;<lpage>126</lpage>. doi: <pub-id pub-id-type="doi">10.1108/OCJ-06-2022-0012</pub-id></citation></ref>
<ref id="ref64"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Soesanto</surname> <given-names>S.</given-names></name></person-group>, (<year>2022</year>). <source>The IT army of Ukraine: structure, tasking, and eco-system</source>: <publisher-name>Center for Security Studies (CSS)</publisher-name>, <publisher-loc>ETH Z&#x00FC;rich</publisher-loc>.</citation></ref>
<ref id="ref65"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Tangney</surname> <given-names>J. P.</given-names></name></person-group>, (<year>2002</year>). <source>Shame and guilt</source>. <edition>2nd</edition>. <publisher-loc>New York</publisher-loc>: <publisher-name>Guilford Press</publisher-name>.</citation></ref>
<ref id="ref66"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Tkachuk</surname> <given-names>N.</given-names></name></person-group>, (<year>2023</year>). <comment>Available at:</comment> <ext-link xlink:href="https://www.rnbo.gov.ua/en/Diialnist/6705.html" ext-link-type="uri">https://www.rnbo.gov.ua/en/Diialnist/6705.html</ext-link> (Accessed December 20, 2023).</citation></ref>
<ref id="ref67"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Tsybko</surname> <given-names>A.</given-names></name></person-group>, (<year>2023</year>). From Veterans to Children: Prioritizing Mental Health for All in War-weary Ukraine. Available at: <ext-link xlink:href="https://storyteller.iom.int/stories/veterans-children-prioritizing-mental-health-all-war-weary-ukraine" ext-link-type="uri">https://storyteller.iom.int/stories/veterans-children-prioritizing-mental-health-all-war-weary-ukraine</ext-link> (Accessed December 21, 2023).</citation></ref>
<ref id="ref68"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll9">UK Public General Act c48</collab></person-group>, (<year>2023</year>). Veterans Advisory and Pensions Committees. Available at: <ext-link xlink:href="https://www.legislation.gov.uk/ukpga/2023/48/contents/enacted" ext-link-type="uri">https://www.legislation.gov.uk/ukpga/2023/48/contents/enacted</ext-link></citation></ref>
<ref id="ref69"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll10">UK Public General Acts</collab></person-group>, (<year>2021</year>). Overseas Operations (Personnel and Veterans). Available at: <ext-link xlink:href="https://www.legislation.gov.uk/ukpga/2021/23/contents" ext-link-type="uri">https://www.legislation.gov.uk/ukpga/2021/23/contents</ext-link> (Accessed 2December 2, 2023).</citation></ref>
<ref id="ref70"><citation citation-type="book"><person-group person-group-type="author"><collab id="coll11">US FM 3-0 Operations</collab></person-group> (<year>2022</year>). <source>US Field Manual 3&#x2013;0 Operations</source>. <publisher-loc>Fort Belvoir</publisher-loc>: <publisher-name>Department of the Army (US)</publisher-name>.</citation></ref>
<ref id="ref71"><citation citation-type="other"><person-group person-group-type="author"><name><surname>VMware</surname> <given-names>I.</given-names></name></person-group> (<year>2022</year>). <source>Global incident response threat report: weathering the storm</source>. Global Incident Response Threat Report: Weathering the Storm, Technical report of the VMware, Inc., <ext-link xlink:href="https://www.vmware.com/content/microsites/learn/en/1553238_REG.html" ext-link-type="uri">https://www.vmware.com/content/microsites/learn/en/1553238_REG.html</ext-link></citation></ref>
<ref id="ref72"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vogt</surname> <given-names>D.</given-names></name> <name><surname>Borowski</surname> <given-names>S. C.</given-names></name> <name><surname>Godier-McBard</surname> <given-names>L. R.</given-names></name> <name><surname>Fossey</surname> <given-names>M. J.</given-names></name> <name><surname>Copeland</surname> <given-names>L. A.</given-names></name> <name><surname>Perkins</surname> <given-names>D. F.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>Changes in the health and broader well-being of US veterans in the first three years after leaving military service: overall trends and group differences</article-title>. <source>Soc. Sci. Med.</source> <volume>294</volume>:<fpage>114702</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.socscimed.2022.114702</pub-id>, PMID: <pub-id pub-id-type="pmid">35051742</pub-id></citation></ref>
<ref id="ref73"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Walker</surname> <given-names>A.</given-names></name></person-group> (<year>2020</year>). <source>The role of mirror neurons in relational dysfunction in posttraumatic stress disorder</source>. <publisher-loc>Ann Arbor, MI</publisher-loc>: <publisher-name>Pepperdine University</publisher-name>.</citation></ref>
<ref id="ref74"><citation citation-type="book"><person-group person-group-type="author"><collab id="coll12">WHO</collab></person-group> (<year>2021</year>). <source>International statistical classification of diseases and related health problems (ICD-11)</source>. <publisher-loc>Geneva</publisher-loc>: <publisher-name>World Health Organization</publisher-name>.</citation></ref>
<ref id="ref75"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Wilson</surname> <given-names>P.</given-names></name></person-group> (<year>2022</year>). <source>The Security Profession in 2021&#x2013;22</source>. Technical report of the Chartered Institute of Information Security (CIISec), <ext-link xlink:href="https://www.ciisec.org/survey/the-security-profession-in-2021-22/" ext-link-type="uri">https://www.ciisec.org/survey/the-security-profession-in-2021-22/</ext-link></citation></ref>
</ref-list>
</back>
</article>