{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:13:54Z","timestamp":1742937234397,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030224189"},{"type":"electronic","value":"9783030224196"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22419-6_21","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:37:42Z","timestamp":1562715462000},"page":"299-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Training to Instill a Cyber-Aware Mindset"],"prefix":"10.1007","author":[{"given":"Kelly","family":"Neville","sequence":"first","affiliation":[]},{"given":"Larry","family":"Flint","sequence":"additional","affiliation":[]},{"given":"Lauren","family":"Massey","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Nickels","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Medina","sequence":"additional","affiliation":[]},{"given":"Amy","family":"Bolton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"issue":"4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"473","DOI":"10.3102\/00028312026004473","volume":"26","author":"H Borko","year":"1989","unstructured":"Borko, H., Livingston, C.: Cognition and improvisation: differences in mathematics instruction by expert and novice teachers. Am. Educ. Res. J. 26(4), 473\u2013498 (1989)","journal-title":"Am. Educ. Res. J."},{"issue":"3","key":"21_CR2","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1177\/1555343416646684","volume":"10","author":"L Boulton","year":"2016","unstructured":"Boulton, L.: Adaptive flexibility: examining the role of expertise in the decision making of authorized firearms officers during armed confrontation. J. Cogn. Eng. Decis. Making 10(3), 291\u2013308 (2016)","journal-title":"J. Cogn. Eng. Decis. Making"},{"issue":"3","key":"21_CR3","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1016\/j.chb.2004.10.005","volume":"21","author":"S Brand-Gruwel","year":"2005","unstructured":"Brand-Gruwel, S., Wopereis, I., Vermetten, Y.: Information problem solving by experts and novices: analysis of a complex cognitive skill. Comput. Hum. Behav. 21(3), 487\u2013508 (2005)","journal-title":"Comput. Hum. Behav."},{"key":"21_CR4","unstructured":"Canham, M.: Human element in cyber. Presented at the Cyber TRAINsitions Workshop, 10\u201311 January, University of Central Florida Institution for Simulation and Training (2019)"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1207\/s15327809jls1402_1","volume":"14","author":"MTH Chi","year":"2005","unstructured":"Chi, M.T.H.: Commonsense conceptions of emergent processes: why some misconceptions are robust. J. Learn. Sci. 14, 161\u2013199 (2005)","journal-title":"J. Learn. Sci."},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.5465\/19416520.2014.875669","volume":"8","author":"JP Cornelissen","year":"2014","unstructured":"Cornelissen, J.P., Werner, M.D.: Putting framing in perspective: a review of framing and frame analysis across the management and organizational literature. Acad. Manag. Ann. 8(1), 181\u2013235 (2014)","journal-title":"Acad. Manag. Ann."},{"issue":"4","key":"21_CR7","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1037\/a0031201","volume":"104","author":"AJ Crum","year":"2013","unstructured":"Crum, A.J., Salovey, P., Achor, S.: Rethinking stress: the role of mindsets in determining the stress response. J. Pers. Soc. Psychol. 104(4), 716\u2013733 (2013)","journal-title":"J. Pers. Soc. Psychol."},{"key":"21_CR8","unstructured":"Cyber Intelligence Task Force: Cyber intelligence: Preparing today\u2019s talent for tomorrow\u2019s threats. Intelligence and National Security Alliance (INSA), September 2015"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1177\/0018720818807357","volume":"60","author":"M Endsley","year":"2018","unstructured":"Endsley, M.: Combating information attacks in the age of the internet: new challenges for cognitive engineering. Hum. Factors 60, 1081\u20131094 (2018)","journal-title":"Hum. Factors"},{"key":"21_CR10","unstructured":"Feltovich, P.J., Spiro, P.J., Coulson, R.L.: The nature of conceptual understanding in biomedicine: the deep structure of complex ideas and the development of misconceptions (Technical report no. 440). University of Illinois at Urbana-Champaign: Center for the Study of Reading (1988)"},{"issue":"10","key":"21_CR11","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1037\/0003-066X.34.10.906","volume":"34","author":"JH Flavell","year":"1979","unstructured":"Flavell, J.H.: Metacognition and cognitive monitoring: a new area of cognitive\u2013developmental inquiry. Am. Psychol. 34(10), 906\u2013911 (1979)","journal-title":"Am. Psychol."},{"key":"21_CR12","unstructured":"Greenberg, A.: How an entire nation became Russia\u2019s test lab for cyberwar. Wire Magazine, 20 June 2017. https:\/\/www.wired.com\/. Accessed Feb 2019"},{"key":"21_CR13","first-page":"138","volume-title":"Decision Making in Action: Models and Methods","author":"GA Klein","year":"1993","unstructured":"Klein, G.A.: A recognition-primed decision (RPD) model of rapid decision making. In: Klein, G.A., Orasanu, J., Calderwood, R., Zsambok, C.E. (eds.) Decision Making in Action: Models and Methods, pp. 138\u2013147. Ablex, Norwood (1993)"},{"key":"21_CR14","series-title":"Learning, Requirements, and Metrics","first-page":"50","volume-title":"The PSI Handbook of Virtual Environments for Training and Education: Developments for the Military and Beyond","author":"G Klein","year":"2009","unstructured":"Klein, G., Baxter, H.C.: Cognitive transformation theory: contrasting cognitive and behavioral learning. In: Cohn, J.V., Schmorrow, D., Nicholson, D. (eds.) The PSI Handbook of Virtual Environments for Training and Education: Developments for the Military and Beyond. Learning, Requirements, and Metrics, vol. 1, pp. 50\u201364. Praeger Security International, Westport (2009)"},{"issue":"3","key":"21_CR15","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1177\/1555343416636515","volume":"10","author":"G Klein","year":"2016","unstructured":"Klein, G., Borders, J.: The ShadowBox approach to cognitive skills training: an empirical evaluation. J. Cogn. Eng. Decis. Making 10(3), 268\u2013280 (2016)","journal-title":"J. Cogn. Eng. Decis. Making"},{"issue":"4","key":"21_CR16","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s10111-018-0528-5","volume":"20","author":"G Klein","year":"2018","unstructured":"Klein, G., Borders, J., Newsome, E., Militello, L., Klein, H.A.: Cognitive skills training: lessons learned. Cogn. Technol. Work 20(4), 681\u2013687 (2018)","journal-title":"Cogn. Technol. Work"},{"issue":"5","key":"21_CR17","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MIS.2006.100","volume":"21","author":"G Klein","year":"2006","unstructured":"Klein, G., Moon, B., Hoffman, R.R.: Making sense of sensemaking 2: a macrocognitive model. IEEE Intell. Syst. 21(5), 88\u201392 (2006)","journal-title":"IEEE Intell. Syst."},{"key":"21_CR18","first-page":"113","volume-title":"Expertise Out of Context","author":"G Klein","year":"2007","unstructured":"Klein, G., Phillips, J.K., Rall, E., Peluso, D.A.: A data\/frame theory of sensemaking. In: Hoffman, R.R. (ed.) Expertise Out of Context, pp. 113\u2013158. Erlbaum, Mahwah (2007)"},{"issue":"3","key":"21_CR19","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1177\/1529100612451018","volume":"13","author":"S Lewandowsky","year":"2012","unstructured":"Lewandowsky, S., Ecker, U.K., Seifert, C.M., Schwarz, N., Cook, J.: Misinformation and its correction: continued influence and successful debiasing. Psychol. Sci. Public Interest 13(3), 106\u2013131 (2012)","journal-title":"Psychol. Sci. Public Interest"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Line, M.B., Zand, A., Stringhini, G., Kemmerer, R.: Targeted attacks against industrial control systems: is the power industry prepared? In: Proceedings of the 2nd Workshop on Smart Energy Grid Security, pp. 13\u201322. ACM, November 2014","DOI":"10.1145\/2667190.2667192"},{"key":"21_CR21","unstructured":"Michener, J.: Beating the air-gap: how attackers can gain access to supposedly isolated systems. Energy Central, 24 August 2018. www.energycentral.com. Accessed Feb 2019"},{"issue":"1","key":"21_CR22","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1177\/2372732215600886","volume":"2","author":"CK Morewedge","year":"2015","unstructured":"Morewedge, C.K., Yoon, H., Scopelliti, I., Symborski, C.W., Korris, J.H., Kassam, K.S.: Debiasing decisions: improved decision making with a single training intervention. Policy Insights Behav. Brain Sci. 2(1), 129\u2013140 (2015)","journal-title":"Policy Insights Behav. Brain Sci."},{"issue":"6","key":"21_CR23","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.leaqua.2007.09.002","volume":"18","author":"MD Mumford","year":"2007","unstructured":"Mumford, M.D., Friedrich, T.L., Caughron, J.J., Byrne, C.L.: Leader cognition in real-world settings: how do leaders think about crises? Leadersh. Q. 18(6), 515\u2013543 (2007)","journal-title":"Leadersh. Q."},{"key":"21_CR24","unstructured":"Neville, K.J., et al.: A complex cognitive skills acquisition framework. In: International Conference on Naturalistic Decision Making (2019, paper under review)"},{"key":"21_CR25","volume-title":"Cognition and Reality: Principles and Implications of Cognitive Psychology","author":"U Neisser","year":"1976","unstructured":"Neisser, U.: Cognition and Reality: Principles and Implications of Cognitive Psychology. W. H. Freeman, San Francisco (1976)"},{"key":"21_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-39345-7_16","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"CL Paul","year":"2013","unstructured":"Paul, C.L., Whitley, K.: A taxonomy of cyber awareness questions for the user-centered design of cyber situation awareness. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 145\u2013154. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39345-7_16"},{"key":"21_CR27","unstructured":"Schraagen, J.M., Klein, G., Hoffman, R.R.: The macrocognition framework of naturalistic decision making. In: Schraagen, J.M., Millitello, L., Ormerod, T., Lipshitz, R. (eds.) Naturalistic Decision Making and Macrocognition, pp. 3\u201325. Ashgate, Aldershot (2008)"},{"key":"21_CR28","unstructured":"Smith, R.: Russian hackers reach U.S. utility control rooms, homeland security officials say. Wall Street J. (2018). www.wsj.com. Accessed Feb 2019"},{"issue":"3","key":"21_CR29","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1177\/1555412016673262","volume":"12","author":"C Symborski","year":"2017","unstructured":"Symborski, C., Barton, M., Quinn, M.M., Korris, J.H., Kassam, K.S., Morewedge, C.K.: The design and development of serious games using iterative evaluation. Games Culture 12(3), 252\u2013268 (2017)","journal-title":"Games Culture"},{"key":"21_CR30","unstructured":"Trustwave: 2018 Trustwave global security report. Trustwave, Chicago (2018)"},{"key":"21_CR31","unstructured":"Verizon: 2018 Data Breach Investigations Report, 11th edn. Verizon (2018)"},{"key":"21_CR32","unstructured":"Wells, D.F.: Cyber training. Paper presented at the Cyber TRAINsitions Workshop, 10\u201311 February, University of Central Florida, Institution for Simulation and Training (2019)"}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22419-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T11:13:38Z","timestamp":1710242018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22419-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030224189","9783030224196"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22419-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}