{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T20:18:17Z","timestamp":1772914697050,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030204877","type":"print"},{"value":"9783030204884","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:00:00Z","timestamp":1559779200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-20488-4_2","type":"book-chapter","created":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T02:02:49Z","timestamp":1559700169000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Cyber Resilient Behavior: Integrating Human Behavioral Models and Resilience Engineering Capabilities into Cyber Security"],"prefix":"10.1007","author":[{"given":"Rick","family":"van der Kleij","sequence":"first","affiliation":[]},{"given":"Rutger","family":"Leukfeldt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"2_CR1","unstructured":"Ponemon Institute: Cost of cybercrime study (2017). \n                    https:\/\/www.accenture.com\/t20171006T095146Z__w__\/us-en\/_acnmedia\/PDF-62\/Accenture-2017CostCybercrime-US-FINAL.pdf#zoom=50"},{"key":"2_CR2","unstructured":"Ponemon Institute: 2016 Cost of Cyber Crime Study & the Risk of Business Innovation (2016). \n                    https:\/\/www.ponemon.org\/local\/upload\/file\/2016%20HPE%20CCC%20GLOBAL%20REPORT%20FINAL%203.pdf"},{"key":"2_CR3","unstructured":"Accenture: Gaining ground on the cyber attacker. State of Cyber Resilience (2018). \n                    https:\/\/www.accenture.com\/t20180416T134038Z__w__\/us-en\/_acnmedia\/PDF-76\/Accenture-2018-state-of-cyber-resilience.pdf#zoom=50"},{"issue":"2","key":"2_CR4","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10669-015-9540-y","volume":"35","author":"D DiMase","year":"2015","unstructured":"DiMase, D., Collier, Z.A., Heffner, K., Linkov, I.: Systems engineering framework for cyber physical security and resilience. Environ. Syst. Decis. 35(2), 291\u2013300 (2015)","journal-title":"Environ. Syst. Decis."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.ress.2015.03.018","volume":"141","author":"DD Woods","year":"2015","unstructured":"Woods, D.D.: Four concepts for resilience and the implications for the future of resilience engineering. Reliab. Eng. Syst. Saf. 141, 5\u20139 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.ijcip.2017.05.002","volume":"18","author":"C Brown","year":"2017","unstructured":"Brown, C., Seville, E., Vargo, E.: Measuring the organizational resilience of critical infrastructure providers: a New Zealand case study. Int. J. Crit. Infrastruct. Prot. 18, 37\u201349 (2017)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"2","key":"2_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1177\/1555343415575152","volume":"9","author":"KM Parsons","year":"2015","unstructured":"Parsons, K.M., Young, E., Butaviciu, M.A., Mc Cormac, A., Pattinson, M.R., Jerram, C.: The influence of organizational information security culture on information security decision making. J. Cogn. Eng. Decis. Mak. 9(2), 117\u2013129 (2015)","journal-title":"J. Cogn. Eng. Decis. Mak."},{"key":"2_CR8","unstructured":"Bowen, P., Hash, J., Wilson, M.: Information Security Handbook: A Guide for Managers-Recommendations of the National Institute of Standards and Technology (2012)"},{"key":"2_CR9","first-page":"36","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36\u201345 (2018)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"2_CR10","first-page":"407","volume":"23","author":"C Yoon","year":"2012","unstructured":"Yoon, C., Hwang, J.W., Kim, R.: Exploring factors that influence students\u2019 behaviours in information security. J. Inf. Syst. Educ. 23(4), 407 (2012)","journal-title":"J. Inf. Syst. Educ."},{"issue":"8","key":"2_CR11","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1089\/cyber.2014.0008","volume":"17","author":"ER Leukfeldt","year":"2014","unstructured":"Leukfeldt, E.R.: Phishing for suitable targets in the Netherlands: routine activity theory and phishing victimization. Cyberpsychol. Behav. Soc. Netw. 17(8), 551\u2013555 (2014)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10611-016-9662-2","volume":"67","author":"ER Leukfeldt","year":"2017","unstructured":"Leukfeldt, E.R., Kleemans, E.R., Stol, W.P.: A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists. Crime Law Soc. Change 67(1), 21\u201337 (2017)","journal-title":"Crime Law Soc. Change"},{"key":"2_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-60585-2_23","volume-title":"Advances in Human Factors in Cybersecurity","author":"H Young","year":"2018","unstructured":"Young, H., van Vliet, T., van de Ven, J., Jol, S., Broekman, C.: Understanding human factors in cyber security as a dynamic system. In: International Conference on Applied Human Factors and Ergonomics, pp. 244\u2013254. Springer, Cham (2018)."},{"key":"2_CR14","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Roles of information security awareness and perceived fairness in information security policy compliance. In: Proceedings of the AMCIS, pp. 419\u2013430 (2009)"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.cose.2006.10.009","volume":"26","author":"RC Dodge","year":"2007","unstructured":"Dodge, R.C., Carver, C., Ferguson, A.J.: Phishing for user security awareness. Comput Secur. 26(1), 73\u201380 (2007)","journal-title":"Comput Secur."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Talib, S., Clarke, N.L., Furnell, S.M.: An analysis of information security awareness within home and work environments. In: Proceedings of the International Conference on Availability, Reliability, and Security, pp. 196\u2013203 (2010)","DOI":"10.1109\/ARES.2010.27"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Crossler, R.E., B\u00e9langer, F., Ormond, D.: The quest for complete security: an empirical analysis of users\u2019 multi-layered protection from security threats. Inf. Syst. Front. 1\u201315 (2017)","DOI":"10.1007\/s10796-017-9755-1"},{"issue":"2","key":"2_CR18","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A Veiga Da","year":"2010","unstructured":"Da Veiga, A., Eloff, J.H.: A framework and assessment instrument for information security culture. Comput. Secur. 29(2), 196\u2013207 (2010)","journal-title":"Comput. Secur."},{"issue":"2","key":"2_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"JM Stanton","year":"2005","unstructured":"Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124\u2013133 (2005)","journal-title":"Comput. Secur."},{"issue":"9","key":"2_CR20","first-page":"87","volume":"93","author":"JA Winnefeld Jr","year":"2015","unstructured":"Winnefeld Jr., J.A., Kirchhoff, C., Upton, D.M.: Cybersecurity\u2019s human factor: lessons from the Pentagon. Harv. Bus. Rev. 93(9), 87\u201395 (2015)","journal-title":"Harv. Bus. Rev."},{"issue":"1","key":"2_CR21","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/1477-7525-9-8","volume":"9","author":"G Windle","year":"2011","unstructured":"Windle, G., Bennett, K.M., Noyes, J.: A methodological review of resilience measurement scales. Health Qual. Life Outcomes 9(1), 8 (2011)","journal-title":"Health Qual. Life Outcomes"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s10669-014-9488-3","volume":"34","author":"I Linkov","year":"2014","unstructured":"Linkov, I., Anklam, E., Collier, Z.A., DiMase, D., Renn, O.: Risk-based standards: integrating top\u2013down and bottom\u2013up approaches. Environ. Syst. Decis. 34(1), 134\u2013137 (2014)","journal-title":"Environ. Syst. Decis."},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"1749","DOI":"10.1111\/j.1539-6924.2008.01142.x","volume":"28","author":"LA Cox Jr","year":"2008","unstructured":"Cox Jr., L.A.: Some limitations of \u2018\u2018risk=threat x vulnerability x consequence\u2019\u2019 for risk analysis of terrorist attacks. Risk Anal. 28, 1749\u20131761 (2008)","journal-title":"Risk Anal."},{"key":"2_CR24","first-page":"18","volume":"228","author":"DE Frick","year":"2012","unstructured":"Frick, D.E.: The fallacy of quantifying risk. Def. AT&L 228, 18\u201321 (2012)","journal-title":"Def. AT&L"},{"issue":"2\/3","key":"2_CR25","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1108\/17504971311328071","volume":"7","author":"J Matzenberger","year":"2013","unstructured":"Matzenberger, J.: A novel approach to exploring the concept of resilience and principal drivers in a learning environment. Multicultural Educ. Technol. J. 7(2\/3), 192\u2013206 (2013)","journal-title":"Multicultural Educ. Technol. J."},{"issue":"4","key":"2_CR26","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1016\/j.gloenvcha.2008.07.013","volume":"18","author":"SL Cutter","year":"2008","unstructured":"Cutter, S.L., et al.: A place-based model for understanding community resilience to natural disasters. Glob. Environ. Change 18(4), 598\u2013606 (2008)","journal-title":"Glob. Environ. Change"},{"key":"2_CR27","volume-title":"Resilience Engineering in Practice. A Guidebook","author":"E Hollnagel","year":"2011","unstructured":"Hollnagel, E.: RAG \u2013 the resilience analysis grid. In: Hollnagel, E., Pari\u00e8s, J., Woods, D.D., Wreathall, J. (eds.) Resilience Engineering in Practice. A Guidebook. Ashgate, Farnham (2011)"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ress.2015.03.019","volume":"141","author":"D Beek Van der","year":"2015","unstructured":"Van der Beek, D., Schraagen, J.M.: ADAPTER: analysing and developing adaptability and performance in teams to enhance resilience. Reliab. Eng. Syst. Saf. 141, 33\u201344 (2015)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"2_CR29","first-page":"155","volume-title":"Resilience Engineering","author":"N McDonald","year":"2006","unstructured":"McDonald, N.: Organisational resilience and industrial risk. In: Hollnagel, E., Woods, D.D., Leveson, (eds.) Resilience Engineering, pp. 155\u2013180. CRC Press, Boca Raton (2006)"},{"key":"2_CR30","unstructured":"Hollnagel, E.: Introduction to the Resilience Analysis Grid (RAG) (2015). \n                    http:\/\/erikhollnagel.com\/onewebmedia\/RAG%20Outline%20V2.pdf"},{"key":"2_CR31","unstructured":"Parsons, D.: National Organisational Resilience Framework Workshop: The Outcomes. National Organisational Resilience Framework Workshop (2007). \n                    http:\/\/www.tisn.gov.au\/Documents\/FINAL1Workshop.pdf\n                    \n                  . Accessed 22 Nov 2012"},{"issue":"2","key":"2_CR32","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1061\/(ASCE)1527-6988(2008)9:2(81)","volume":"9","author":"S McManus","year":"2008","unstructured":"McManus, S., Seville, E., Vargo, J., Brunsdon, D.: Facilitated process for improving organizational resilience. Nat. Hazards Rev. 9(2), 81\u201390 (2008)","journal-title":"Nat. Hazards Rev."},{"issue":"1","key":"2_CR33","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1061\/(ASCE)NH.1527-6996.0000075","volume":"14","author":"AV Lee","year":"2013","unstructured":"Lee, A.V., Vargo, J., Seville, E.: Developing a tool to measure and compare organizations\u2019 resilience. Nat. Hazards Rev. 14(1), 29\u201341 (2013)","journal-title":"Nat. Hazards Rev."},{"key":"2_CR34","first-page":"145","volume-title":"Resilience in Practice","author":"P Ferreira","year":"2011","unstructured":"Ferreira, P., Clarke, T., Wilson, J.R., et al.: Resilience in rail engineering work. In: Hollnagel, E., Paries, J., Woods, D.D., Wreathall, J. (eds.) Resilience in Practice, pp. 145\u2013156. Ashgate, Aldershot (2011)"},{"key":"2_CR35","unstructured":"NIST: Framework for Improving Critical Infrastructure Cybersecurity, v 1.1, April 2018. \n                    https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.04162018.pdf"},{"key":"2_CR36","doi-asserted-by":"publisher","first-page":"32","DOI":"10.2307\/1251955","volume":"55","author":"DJ MacInnis","year":"1991","unstructured":"MacInnis, D.J., Moorman, C., Jaworski, B.J.: Enhancing and measuring consumers\u2019 motivation, opportunity, and ability to process brand information from ads. J. Mark. 55, 32\u201353 (1991)","journal-title":"J. Mark."},{"issue":"1","key":"2_CR37","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/1748-5908-6-42","volume":"6","author":"S Michie","year":"2011","unstructured":"Michie, S., Van Stralen, M.M., West, R.: The behaviour change wheel: a new method for characterising and designing behaviour change interventions. Implement. Sci. 6(1), 42 (2011)","journal-title":"Implement. Sci."},{"key":"2_CR38","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014)","journal-title":"Comput. Secur."},{"key":"2_CR39","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40\u201351 (2017)","journal-title":"Comput. Secur."},{"key":"2_CR40","first-page":"27","volume":"4","author":"JD Brown","year":"2000","unstructured":"Brown, J.D.: What issues affect likert- scale questionnaire formats? JALT Test. Eval. SIG 4, 27\u201330 (2000)","journal-title":"JALT Test. Eval. SIG"},{"issue":"11","key":"2_CR41","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/BF00383696","volume":"10","author":"DM Randall","year":"1991","unstructured":"Randall, D.M., Fernandes, M.F.: The social desirability response bias in ethics research. J. Bus. Ethics 10(11), 805\u2013817 (1991)","journal-title":"J. Bus. Ethics"},{"key":"2_CR42","doi-asserted-by":"publisher","DOI":"10.4135\/9781412986038","volume-title":"Summated Rating Scale Construction","author":"Paul Spector","year":"1992","unstructured":"Spector, P.E.: Summated Rating Scale Construction: An Introduction, no. 82. Sage, \u200eThousand Oaks (1992)"},{"key":"2_CR43","unstructured":"Chen, Y.H., Rendina-Gobioff, G., Dedrick, R.F.: Detecting Effects of Positively and Negatively Worded Items on a Self-Concept Scale for Third and Sixth Grade Elementary Students (2007). Online Submission"},{"issue":"3","key":"2_CR44","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF02310555","volume":"16","author":"LJ Cronbach","year":"1951","unstructured":"Cronbach, L.J.: Coefficient alpha and the internal structure of tests. Psychometrika 16(3), 297\u2013334 (1951)","journal-title":"Psychometrika"},{"issue":"4","key":"2_CR45","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10669-013-9485-y","volume":"33","author":"I Linkov","year":"2013","unstructured":"Linkov, I., Eisenberg, D.A., Plourde, K., Seager, T.P., Allen, J., Kott, A.: Resilience metrics for cyber systems. Environ. Syst. Decis. 33(4), 471\u2013476 (2013)","journal-title":"Environ. Syst. Decis."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Human Factors in Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20488-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T02:04:47Z","timestamp":1559700287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20488-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,6]]},"ISBN":["9783030204877","9783030204884"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20488-4_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,6]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AHFE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Human Factors and Ergonomics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington D.C., DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ahfe2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ahfe2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}