{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:29:26Z","timestamp":1769750966535,"version":"3.49.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031101823","type":"print"},{"value":"9783031101830","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10183-0_6","type":"book-chapter","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T13:06:54Z","timestamp":1657717614000},"page":"108-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Found in\u00a0Translation: Co-design for\u00a0Security Modelling"],"prefix":"10.1007","author":[{"given":"Albes\u00eb","family":"Demjaha","sequence":"first","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]},{"given":"Tristan","family":"Caulfield","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,14]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-319-47413-7_21","volume-title":"Decision and Game Theory for Security","author":"G Anderson","year":"2016","unstructured":"Anderson, G., McCusker, G., Pym, D.: A logic for the compliance budget. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 370\u2013381. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47413-7_21"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.envsoft.2017.01.014","volume":"91","author":"L Basco-Carrera","year":"2017","unstructured":"Basco-Carrera, L., Warren, A., van Beek, E., Jonoski, A., Giardino, A.: Collaborative modelling or participatory modelling? a framework for water resources management. Environ. Model. Softw. 91, 95\u2013110 (2017)","journal-title":"Environ. Model. Softw."},{"key":"6_CR3","unstructured":"Beautement, A., Becker, I., Parkin, S., Krol, K., Sasse, A.: Productive security: a scalable methodology for analysing employee security behaviours. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 253\u2013270. USENIX Association, Denver, CO, June 2016. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/beautement"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behaviour in organisations. In: Proceedings of the 2008 New Security Paradigms Workshop, pp. 47\u201358 (2008)","DOI":"10.1145\/1595676.1595684"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"issue":"15","key":"6_CR6","first-page":"3","volume":"14","author":"T Caulfield","year":"2016","unstructured":"Caulfield, T., Baddeley, M., Pym, D.: Social learning in systems security modelling. Constructions 14(15), 3 (2016)","journal-title":"Constructions"},{"key":"6_CR7","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. College Publications, London (2012)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"D\u2019Arcy, J., Greene, G.: Security culture and the employment relationship as drivers of employees\u2019 security compliance. Inf. Manage. Comput. Secur. (2014)","DOI":"10.1108\/IMCS-08-2013-0057"},{"key":"6_CR9","unstructured":"David, S., Sabiescu, A.G., Cantoni, L.: Co-design with communities. a reflection on the literature. In: Proceedings of the 7th International Development Informatics Association Conference, pp. 152\u2013166. IDIA Pretoria, South Africa (2013)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Demjaha, A., Caulfield, T., Sasse, M.A., Pym, D.: 2 fast 2 secure: a case study of post-breach security changes. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 192\u2013201. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00028"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Dignum, V., Dignum, F.: Perspectives on Culture and Agent-based Simulations, vol.\u00a03. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-3-319-01952-9","DOI":"10.1007\/978-3-319-01952-9"},{"issue":"6","key":"6_CR12","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.destud.2011.07.006","volume":"32","author":"K Dorst","year":"2011","unstructured":"Dorst, K.: The core of \u2018design thinking\u2019 and its application. Des. Stud. 32(6), 521\u2013532 (2011)","journal-title":"Des. Stud."},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"65","DOI":"10.4013\/sdrj.2018.112.03","volume":"11","author":"C Heath","year":"2018","unstructured":"Heath, C., Hall, P., Coles-Kemp, L.: Holding on to dissensus: participatory interactions in security design. Strateg. Des. Res. J. 11(2), 65\u201378 (2018). https:\/\/doi.org\/10.4013\/sdrj.2018.112.03","journal-title":"Strateg. Des. Res. J."},{"key":"6_CR14","unstructured":"Ionita, D., Wieringa, R., Bullee, J.W., Vasenev, A.: Investigating the usability and utility of tangible modelling of socio-technical architectures. No. TR-CTIT-15-03 in CTIT Technical Report Series, Centre for Telematics and Information Technology (CTIT), Netherlands, May 2015"},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.destud.2008.03.003","volume":"29","author":"M Kleinsmann","year":"2008","unstructured":"Kleinsmann, M., Valkenburg, R.: Barriers and enablers for creating shared understanding in co-design projects. Des. Stud. 29(4), 369\u2013386 (2008)","journal-title":"Des. Stud."},{"key":"6_CR16","unstructured":"Korzybski, A.: Science and Sanity: An Introduction to Non-Aristotelian Systems and General Semantics. Institute of GS, Brooklyn (1958)"},{"issue":"7","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1068\/a43482","volume":"43","author":"C Landstr\u00f6m","year":"2011","unstructured":"Landstr\u00f6m, C., Whatmore, S.J., Lane, S.N., Odoni, N.A., Ward, N., Bradley, S.: Coproducing flood risk knowledge: redistributing expertise in critical \u2018participatory modelling\u2019. Environ. Plann. A 43(7), 1617\u20131633 (2011)","journal-title":"Environ. Plann. A"},{"key":"6_CR18","unstructured":"Lawson, H.B.: A Journey Through the Systems Landscape. College Publications, London (2010)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Malcolmson, J.: What is security culture? does it differ in content from general organisational culture? In: 43rd Annual 2009 international Carnahan Conference on Security Technology, pp. 361\u2013366. IEEE (2009)","DOI":"10.1109\/CCST.2009.5335511"},{"key":"6_CR20","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-0-387-35586-3_16","volume-title":"Security in the Information Society","author":"A Martins","year":"2002","unstructured":"Martins, A., Elofe, J.: Information security culture. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds.) Security in the Information Society. IAICT, vol. 86, pp. 203\u2013214. Springer, Boston (2002). https:\/\/doi.org\/10.1007\/978-0-387-35586-3_16"},{"key":"6_CR21","volume-title":"Probability","author":"J McColl","year":"1995","unstructured":"McColl, J.: Probability. Butterworth-Heinemann, Elsevier (1995)"},{"issue":"11","key":"6_CR22","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1057\/palgrave.jors.2600969","volume":"48","author":"M Pidd","year":"1997","unstructured":"Pidd, M.: Tools for thinking-modelling in management science. J. Oper. Res. Soc. 48(11), 1150\u20131150 (1997)","journal-title":"J. Oper. Res. Soc."},{"key":"6_CR23","first-page":"20","volume":"1","author":"M Pidd","year":"2004","unstructured":"Pidd, M.: Systems modelling: theory and practice. Syst. Model. Theor. Pract. 1, 20 (2004)","journal-title":"Syst. Model. Theor. Pract."},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Reid, R., Van Niekerk, J., Renaud, K.: Information security culture: a general living systems theory perspective. In: 2014 Information Security for South Africa, pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/ISSA.2014.6950493"},{"key":"6_CR25","unstructured":"Schein, E.H.: Organizational Culture and Leadership, vol. 2. Wiley, Hoboken (2010)"},{"key":"6_CR26","unstructured":"Schein, E.H., Schein, P.A.: Humble Inquiry: The Gentle Art of Asking Instead of Telling. Berrett-Koehler Publishers, San Francisco (2021)"},{"issue":"2","key":"6_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1162\/DESI_a_00207","volume":"29","author":"M Steen","year":"2013","unstructured":"Steen, M.: Co-design as a process of joint inquiry and imagination. Des. Issues 29(2), 16\u201328 (2013)","journal-title":"Des. Issues"},{"issue":"2","key":"6_CR28","first-page":"46","volume":"5","author":"M Steen","year":"2011","unstructured":"Steen, M., Manschot, M., De Koning, N.: Benefits of co-design in service design projects. Int. J. Des. 5(2), 46\u201353 (2011)","journal-title":"Int. J. Des."},{"key":"6_CR29","unstructured":"Stephen, K., Robin, M., Denzin, N., Lincoln, Y.: Participatory action research: communicative action and the public sphere. Denzin, N.K., Lincoln, Y.S. (eds.), The Sage Handbook of Qualitative Research, United Kingdom: Sage Publications, pp. 559\u2013604 (2000)"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.envsoft.2018.08.028","volume":"109","author":"A Voinov","year":"2018","unstructured":"Voinov, A., et al.: Tools and methods in participatory modeling: selecting the right tool for the job. Environ. Model. Softw. 109, 232\u2013255 (2018)","journal-title":"Environ. Model. Softw."},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.envsoft.2015.11.016","volume":"77","author":"A Voinov","year":"2016","unstructured":"Voinov, A., et al.: Modelling with stakeholders-next generation. Environ. Model. Softw. 77, 196\u2013220 (2016)","journal-title":"Environ. Model. Softw."}],"container-title":["Lecture Notes in Computer Science","Socio-Technical Aspects in Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10183-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T13:11:21Z","timestamp":1657717881000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10183-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031101823","9783031101830"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10183-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Socio-Technical Aspects in Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stast2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/stast.uni.lu\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}