{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:59:44Z","timestamp":1742943584104,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503086"},{"type":"electronic","value":"9783030503093"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50309-3_11","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"162-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of a Test Battery for Cyber Soldiers"],"prefix":"10.1007","author":[{"given":"Patrik","family":"Lif","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jacob","family":"L\u00f6fvenberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Per","family":"Wikberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ove","family":"Jansson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"11_CR1","unstructured":"Stockholms Handelskammare: Programmerare - vanligaste yrket i Stockholmsregionen, Stockholm (2014)"},{"key":"11_CR2","unstructured":"SCB: Trender och Prognoser 2017 (2017)"},{"key":"11_CR3","unstructured":"Freedberg, S.: Do young humans\u2009+\u2009artificial intelligence\u2009=\u2009cybersecurity? Intel Cyber Strategy Policy (2017). https:\/\/breakingdefense.com\/2017\/11\/do-young-humans-artificial-intelligence-cybersecurity\/"},{"key":"11_CR4","unstructured":"Construx: Productivity Variations Among Software Developers and Teams The Origin of 10x | Construx. Construx (2019)"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.intell.2007.06.001","volume":"36","author":"W Johnson","year":"2008","unstructured":"Johnson, W., te Nijenhuis, J., Bouchard, T.J.: Still just 1\u00a0g: consistent results from five test batteries. Intelligence 36(1), 81\u201395 (2008)","journal-title":"Intelligence"},{"key":"11_CR6","volume-title":"Frames of Mind: The Theory of Multiple Intelligences","author":"H Gardner","year":"2011","unstructured":"Gardner, H.: Frames of Mind: The Theory of Multiple Intelligences. Basic Books, New York (2011)"},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1037\/0033-2909.124.2.262","volume":"124","author":"FL Schmidt","year":"1998","unstructured":"Schmidt, F.L., Hunter, J.E.: The validity and utility of selection methods in personnel psychology: practical and theoretical implications of 85 years of research findings. Psychol. Bull. 124(2), 262 (1998)","journal-title":"Psychol. Bull."},{"key":"11_CR8","unstructured":"Schmidt, F.L., Oh, I.-S., Shaffer, J.A.: the validity and utility of selection methods in personnel psychology: practical and theoretical implications of 100 years. Working Paper (2016)"},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0034092","volume":"28","author":"DC McClelland","year":"1973","unstructured":"McClelland, D.C.: Testing for Competence rather than for \u2018intelligence\u2019. Am. Psychol. 28(1), 1 (1973)","journal-title":"Am. Psychol."},{"key":"11_CR10","volume-title":"Administrators\u2019 Handbook for the Differential Aptitude Test (Forms V and W)","author":"G Bennett","year":"1982","unstructured":"Bennett, G., Seashore, H.G., Wesman, A.G.: Administrators\u2019 Handbook for the Differential Aptitude Test (Forms V and W). Psychological Corp, New York (1982)"},{"issue":"3","key":"11_CR11","first-page":"168","volume":"7","author":"B Carlstedt","year":"2002","unstructured":"Carlstedt, B.: Beg\u00e5vning, utbildningsval och utbildningsresultat | Pedagogisk Forskning i Sverige. Pedagog. Forsk. i Sverige 7(3), 168 (2002)","journal-title":"Pedagog. Forsk. i Sverige"},{"key":"11_CR12","unstructured":"Annell, S.: Vilka s\u00f6kande antas till och p\u00e5b\u00f6rjar polisutbildningen? Karlstad (2014)"},{"key":"11_CR13","unstructured":"Lantz, J., Wolgers, G.: Psykologiska tester och testanv\u00e4ndning i samband med psykologiskt urval av flygf\u00f6rare i F\u00f6rsvarsmakten 1944\u20132013: en sammanfattande historik och test\u00f6versikt (2013)"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1037\/0003-066X.48.1.26","volume":"48","author":"LR Goldberg","year":"1993","unstructured":"Goldberg, L.R.: The structure of phenotypic personality traits. Am. Psychol. 48(1), 26\u201334 (1993)","journal-title":"Am. Psychol."},{"key":"11_CR15","unstructured":"John, O.P., Srivastava, S.: The big five trait taxonomy: history, measurement, and theoretical perspectives. In: Handbook of Personality: Theory and Research, pp. 102\u2013138 (1999)"},{"issue":"1\/2","key":"11_CR16","first-page":"9","volume":"9","author":"MR Barrick","year":"2001","unstructured":"Barrick, M.R., Mount, M.K., Judge, T.A.: Personality and performance at the beginning of the new millennium: what do we know and where do we go next? Pers. Perform. 9(1\/2), 9\u201330 (2001)","journal-title":"Pers. Perform."},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1037\/0021-9010.82.1.30","volume":"82","author":"JF Salgado","year":"1997","unstructured":"Salgado, J.F.: The five factor model of personality and job performance in the European community. J. Appl. Psychol. 82(1), 30\u201343 (1997)","journal-title":"J. Appl. Psychol."},{"key":"11_CR18","first-page":"103","volume-title":"Measures of Leadership","author":"CP Sparks","year":"1990","unstructured":"Sparks, C.P.: Testing for management potential. In: Clark, K.E., Clark, M.B. (eds.) Measures of Leadership, pp. 103\u2013112. Center for Creative Leadership, Greensboro (1990)"},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1080\/08959285.2013.765877","volume":"26","author":"T Sitser","year":"2013","unstructured":"Sitser, T., van der Linden, D., Born, M.P.: Predicting sales performance criteria with personality measures: the use of the general factor of personality, the big five and narrow traits. Hum. Perform. 26(2), 126\u2013149 (2013)","journal-title":"Hum. Perform."},{"issue":"4","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1111\/j.1744-6570.2007.00100.x","volume":"60","author":"F Morgeson","year":"2007","unstructured":"Morgeson, F., Campion, M., Dipboye, R., Hollenbeck, J., Murphy, K., Schmitt, N.: Are we getting fooled again? Coming to terms with limitations in the use of personality tests for personnel selection. Pers. Psychol. 60(4), 1029\u20131049 (2007)","journal-title":"Pers. Psychol."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Morgeson, F.P., Campion, M.A., Dipboye, R.L., Hollenbeck, J.R., Murphy, K., Schmitt, N.: Reconsidering the use of personality tests in personnel selection contexts (2007)","DOI":"10.1111\/j.1744-6570.2007.00089.x"},{"key":"11_CR22","unstructured":"ChallyGroup: The Trouble with Personality Tests, Larkspur, CA (2011)"},{"key":"11_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-41932-9_35","volume-title":"Advances in Human Factors in Cybersecurity","author":"LD Saner","year":"2016","unstructured":"Saner, L.D., Campbell, S., Bradley, P., Michael, E., Pandza, N., Bunting, M.: Assessing aptitude and talent for cyber operations. In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol. 501, pp. 431\u2013437. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41932-9_35"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Newhouse, B., Keith, S., Scribner, B., Witte, G.: National Initiative for Cybersecurity Eduction (NICE) cybersecurity workforce framework, Gaithersburg, MD, USA (2017)","DOI":"10.6028\/NIST.SP.800-181"},{"key":"11_CR25","unstructured":"National Initiative for Cybersecurity Careers and Studies: NICE Cybersecurity Workforce Framework | National Initiative for Cybersecurity Careers and Studies. Department of Homeland Security (2018)"},{"key":"11_CR26","unstructured":"Napolitano, J.: Homeland security advisory council cyberskills task force report (2012)"},{"key":"11_CR27","unstructured":"IBM: Defense Cyber Aptitude Test (DCAT). IBM (2018)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Cambell, S., O\u2019Rourke, P., Bunting, M.: Identifying dimensions of cyber aptitude: the design of the cyber aptitude and talent assessment. In: Human Factors and Egonomics Society 59th Annual Meeting, pp. 721\u2013725 (2015)","DOI":"10.1177\/1541931215591170"},{"key":"11_CR29","unstructured":"ArmedForces: Navy Rating ASVAB Score Requirements. U.S. Armed Forces (2018)"},{"key":"11_CR30","unstructured":"Morris, J., Waage, F.: Cyber aptitude assessment-finding the next generation of enlisted cyber soldiers (2015)"},{"key":"11_CR31","volume-title":"Human Factors Methods: A Practical Guide for Engineering and Design","author":"NA Stanton","year":"2013","unstructured":"Stanton, N.A., Salmon, P.R., Walker, G.B., Jenkins, D.: Human Factors Methods: A Practical Guide for Engineering and Design. Ashgate Publishing Limited, Surrey (2013)"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Lif, P., Granasen, M., Sommestad, T.: Development and validation of technique to measure cyber situation awareness. In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1\u20138 (2017)","DOI":"10.1109\/CyberSA.2017.8073388"},{"key":"11_CR33","series-title":"Methodology of Educational Measurement and Assessment","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-58689-2_2","volume-title":"Advancing Human Assessment","author":"T Moses","year":"2017","unstructured":"Moses, T.: A Review of developments and applications in item analysis. In: Bennett, R., von Davier, M. (eds.) Advancing Human Assessment. Methodology of Educational Measurement and Assessment, pp. 19\u201346. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58689-2_2"},{"key":"11_CR34","unstructured":"Understanding Item Analyses | Office of Educational Assessment. https:\/\/www.washington.edu\/assessment\/scanning-scoring\/scoring\/reports\/item-analysis\/. Accessed 07 Oct 2019"},{"key":"11_CR35","unstructured":"Kehoe, J.: Basic item analysis for multiple-choice tests. Pract. Assess. Res. Eval. 4(10) (1995)"},{"issue":"3\/4","key":"11_CR36","doi-asserted-by":"publisher","first-page":"591","DOI":"10.2307\/2333709","volume":"52","author":"SS Shapiro","year":"1965","unstructured":"Shapiro, S.S., Wilk, M.B.: An analysis of variance test for normality (complete samples). Biometrika 52(3\/4), 591 (1965)","journal-title":"Biometrika"},{"key":"11_CR37","volume-title":"Discovering Statistics Using R","author":"A Field","year":"2012","unstructured":"Field, A., Miles, J., Field, Z.: Discovering Statistics Using R. Sage Publications Inc., London (2012)"},{"key":"11_CR38","unstructured":"Bureau of Labor Statistics: Software Developers\u202f: Occupational Outlook Handbook: U.S. Bureau of Labor Statistics. United States Department of Labor (2019)"},{"key":"11_CR39","unstructured":"SANS: SANS Cyber Security Certifications &amp; Research. SANS (2018). https:\/\/www.sans.org\/. Accessed 23 Nov 2018"},{"key":"11_CR40","unstructured":"Sommestad, T.: STO-MP-IST-133 Experimentation on operational cyber security in CRATE (2015)"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Holm, H., Sommestad, T.: SVED: scanning, vulnerabilities, exploits and detection. In: MILCOM 2016 - 2016 IEEE Military Communications Conference, pp. 976\u2013981 (2016)","DOI":"10.1109\/MILCOM.2016.7795457"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50309-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:31:24Z","timestamp":1720571484000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50309-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503086","9783030503093"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50309-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}