{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:01:46Z","timestamp":1742986906271,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223502"},{"type":"electronic","value":"9783030223519"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22351-9_22","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:33:30Z","timestamp":1562715210000},"page":"325-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Informing Hybrid System Design in Cyber Security Incident Response"],"prefix":"10.1007","author":[{"given":"Megan","family":"Nyre-Yu","sequence":"first","affiliation":[]},{"given":"Kelly A.","family":"Sprehn","sequence":"additional","affiliation":[]},{"given":"Barrett S.","family":"Caldwell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2014.89","volume":"12","author":"R Ruefle","year":"2014","unstructured":"Ruefle, R., Dorofee, A., Mundie, D., Householder, A.D., Murray, M., Perl, S.J.: Computer security incident response team development and evolution. IEEE Secur. Priv. 12, 16\u201326 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2014.85","volume":"12","author":"TR Chen","year":"2014","unstructured":"Chen, T.R., Shore, D.B., Zaccaro, S.J., Dalal, R.S., Tetrick, L.E., Gorab, A.K.: An organizational psychology perspective to examining computer security incident response teams. IEEE Secur. Priv. 12, 61\u201367 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR3","unstructured":"Cobb, S.: Mind this gap: criminal hacking and the global cybersecurity skills shortage, a critical analysis. In: Virus Bulletin Conference. Virus Bulletin (2016)"},{"key":"22_CR4","unstructured":"Hewlett-Packard Development: Growing the Security Analyst (2014)"},{"key":"22_CR5","unstructured":"Bureau of Labor Statistics: Information Security Analysts. https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm"},{"key":"22_CR6","unstructured":"Neiva, C., Lawson, C., Bussa, T., Sadowski, G.: Innovation Insight for Security Orchestration, Automation and Response (SOAR) (2017)"},{"key":"22_CR7","unstructured":"National Academies of Sciences Engineering and Medicine: Foundational Cybersecurity Research. National Academies Press, Washington (2017)"},{"issue":"5","key":"22_CR8","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1177\/0018720815585906","volume":"57","author":"Robert W. Proctor","year":"2015","unstructured":"Proctor, R.W.: The role of human factors\/ergonomics in the science of security: Decision making and action selection in cyberspace (2015)","journal-title":"Human Factors: The Journal of the Human Factors and Ergonomics Society"},{"key":"22_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-60585-2_14","volume-title":"Advances in Human Factors in Cybersecurity","author":"SD Lathrop","year":"2018","unstructured":"Lathrop, S.D.: Interacting with synthetic teammates in cyberspace. In: Nicholson, D. (ed.) AHFE 2017. AISC, vol. 593, pp. 133\u2013145. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-60585-2_14"},{"key":"22_CR10","first-page":"3","volume-title":"Autonomous Systems: Issues for Defence Policy Makers","author":"PD Scharre","year":"2003","unstructured":"Scharre, P.D.: The opportunity & challenge of autonomous systems. In: Williams, A.P., Scharre, P.D. (eds.) Autonomous Systems: Issues for Defence Policy Makers, pp. 3\u201326. NATO Communications and Information Agency, Norfolk (2003)"},{"key":"22_CR11","unstructured":"Williams, L.C.: Spy chiefs set sights on AI and cyber (2017). https:\/\/fcw.com\/articles\/2017\/09\/07\/intel-insa-ai-tech-chiefs-insa.aspx"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Hoffman, L., Burley, D., Toregas, C.: Holistically Building the Cybersecurity Workforce (2012)","DOI":"10.1109\/MSP.2011.181"},{"key":"22_CR13","unstructured":"National Initiative for Cybersecurity Careers and Studies: NICE Cybersecurity Workforce Framework. https:\/\/niccs.us-cert.gov\/workforce-development\/cyber-security-workforce-framework"},{"key":"22_CR14","unstructured":"Bada, M., Creese, S., Goldsmith, M., Mitchell, C., Phillips, E.: Computer Security Incident Response Teams (CSIRTs): An Overview. Global Cyber Security Capacity Centre, pp. 1\u201323 (2014)"},{"key":"22_CR15","doi-asserted-by":"publisher","DOI":"10.21236\/ADA413778","volume-title":"Handbook for Computer Security Incident Response Teams (CSIRTs)","author":"MJ West-Brown","year":"2003","unstructured":"West-Brown, M.J., Stikvoort, D., Kossakowski, K.-P., Killcrece, G., Ruefle, R., Zajicek, M.: Handbook for Computer Security Incident Response Teams (CSIRTs). Carnegie Mellon Software Engineering Institute, Pittsburgh, PA (2003)"},{"key":"22_CR16","first-page":"60","volume":"22","author":"D Staheli","year":"2016","unstructured":"Staheli, D., Mancuso, V., Leahy, M.J., Kalke, M.M.: Cloudbreak: answering the challenges of cyber command and control. Lincoln Lab. J. 22, 60\u201373 (2016)","journal-title":"Lincoln Lab. J."},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Tyworth, M., Giacobe, N.A., Mancuso, V.: Cyber situation awareness as distributed socio-cognitive work. In: Cyber Sensing 2012, vol. 8408, p. 84080F. International Society for Optics and Photonics (2012)","DOI":"10.1117\/12.919338"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2015.71","volume":"13","author":"J Steinke","year":"2015","unstructured":"Steinke, J., et al.: Improving cybersecurity incident response team effectiveness using teams-based research. IEEE Secur. Priv. 13, 20\u201329 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1108\/09685221011035241","volume":"18","author":"R Werlinger","year":"2010","unstructured":"Werlinger, R., Muldner, K., Hawkey, K., Beznosov, K.: Preparation, detection, and analysis: the diagnostic work of IT security incident response. Inf. Manage. Comput. Secur. 18, 26\u201342 (2010)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1108\/09685220710831152","volume":"15","author":"K Beznosov","year":"2007","unstructured":"Beznosov, K., Beznosova, O.: On the imbalance of the security problem space and its expected consequences. Inf. Manage. Comput. Secur. 15, 420\u2013431 (2007)","journal-title":"Inf. Manage. Comput. Secur."},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Ahrend, J.M., Jirotka, M., Jones, K.: On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge. In: 2016 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1\u201310. IEEE (2016)","DOI":"10.1109\/CyberSA.2016.7503279"},{"issue":"5","key":"22_CR22","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MSP.2014.84","volume":"12","author":"Sathya Chandran Sundaramurthy","year":"2014","unstructured":"Sundaramurthy, S.C., McHugh, J., Ou, X., Rajagopalan, S.R., Wesch, M.: An anthropological approach to studying CSIRTs. IEEE Secur. Priv. 12(5), 52\u201360 (2014)","journal-title":"IEEE Security & Privacy"},{"key":"22_CR23","unstructured":"Buford, J.F., Lewis, L., Jakobson, G.: Insider threat detection using situation-aware MAS. In: Proceedings of 11th International Conference on Information Fusion, FUSION 2008 (2008)"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Bowen, B.M., Devarajan, R., Stolfo, S.: Measuring the human factor of cyber security. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 230\u2013235 (2011)","DOI":"10.1109\/THS.2011.6107876"},{"key":"22_CR25","unstructured":"Faysel, M.A., Haque, S.S.: Towards cyber defense: research in intrusion detection and intrusion prevention systems. IJCSNS Int. J. Comput. Sci. Netw. Secur. 10, 316\u2013325 (2010)"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDSO.2005.53","volume":"6","author":"V Kumar","year":"2005","unstructured":"Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online 6, 1\u20139 (2005)","journal-title":"IEEE Distrib. Syst. Online"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1\u201310 (2010)","DOI":"10.1109\/HICSS.2010.35"},{"key":"22_CR28","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10270-012-0268-6","volume":"13","author":"M Memon","year":"2014","unstructured":"Memon, M.: Security modeling for service-oriented systems using security pattern refinement approach. Softw. Syst. Model. 13, 549\u2013573 (2014)","journal-title":"Softw. Syst. Model."},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10257-015-0276-5","volume":"14","author":"A Goldstein","year":"2016","unstructured":"Goldstein, A.: Components of a multi-perspective modeling method for designing and managing IT security systems. Inf. Syst. E-bus. Manag. 14, 101\u2013141 (2016)","journal-title":"Inf. Syst. E-bus. Manag."},{"key":"22_CR30","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/B978-0-12-800894-2.00008-9","volume-title":"Contextual Design","author":"Karen Holtzblatt","year":"2017","unstructured":"Holtzblatt, K.: Contextual Design\u202f: Design for Life. Elsevier, Amsterdam (2016)"},{"key":"22_CR31","unstructured":"Saldana, J.: The Coding Manual for Qualitative Researchers. SAGE, Los Angeles (2009)"},{"key":"22_CR32","unstructured":"Auerbach, C., Silverstein, L.B.: Qualitative Data: An Introduction to Coding and Analysis. New York University Press, New York (2003)"},{"issue":"5","key":"22_CR33","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MIS.2008.83","volume":"23","author":"R.R. Hoffman","year":"2008","unstructured":"Hoffman, R.R., Deal, S.V: Influencing versus informing design, part 1: a gap analysis. IEEE Intell. Syst. 23, 78\u201381(2008)","journal-title":"IEEE Intelligent Systems"},{"key":"22_CR34","first-page":"177","volume-title":"Participatory Design: Principles and Practices","author":"K Holtzblatt","year":"1993","unstructured":"Holtzblatt, K., Jones, S.: Contextual inquiry: a participatory technique for system design. In: Schuler, D., Namioka, A. (eds.) Participatory Design: Principles and Practices, pp. 177\u2013210. Lawrence Erlbaum Associates, Hillsdale (1993)"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22351-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:26:25Z","timestamp":1689726385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22351-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223502","9783030223519"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22351-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}