{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:33:38Z","timestamp":1742956418714,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031613784"},{"type":"electronic","value":"9783031613791"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61379-1_9","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"126-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Why Do Organizations Fail to Practice Cyber Resilience?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8758-8681","authenticated-orcid":false,"given":"Rick","family":"van der Kleij","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8113-8065","authenticated-orcid":false,"given":"Tineke","family":"Hof","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"issue":"2","key":"9_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107376","volume":"136","author":"M Alanazi","year":"2022","unstructured":"Alanazi, M., Freeman, M., Tootell, H.: Exploring the factors that influence the cybersecurity behaviors of young adults. Comput. Hum. Behav. 136, 107376 (2022)","journal-title":"Comput. Hum. Behav."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Amemori, M., Michie, S., Korhonen, T., Murtomaa, H., Kinnunen, T.: Assessing implementation difficulties in tobacco use prevention and cessation counselling among dental providers. Implement Sci. 6, 50\u201310 (2011). 1186\/1748-5908-6-50","DOI":"10.1186\/1748-5908-6-50"},{"key":"9_CR4","unstructured":"Brennenraedts, R., et al.: De economische kansen van de cybersecuritysector. Report 2022.130.2308. Dialogic. The Netherlands, Utrecht (2023)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1186\/1748-5908-7-37","volume":"7","author":"J Cane","year":"2012","unstructured":"Cane, J., O\u2019Connor, D., Michie, S.: Validation of the theoretical domains framework for use in behaviour change and implementation research. Implement. Sci. 7, 37 (2012). https:\/\/doi.org\/10.1186\/1748-5908-7-37","journal-title":"Implement. Sci."},{"key":"9_CR6","unstructured":"Champion, V.L., Skinner, C.S.: The health belief model. Health Behav. Health Educ. Theory Res. Pract. 4, 45\u201365 (2008)"},{"issue":"8","key":"9_CR7","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1093\/abm\/kay082","volume":"53","author":"LE Connell","year":"2019","unstructured":"Connell, L.E., et al.: Links between behavior change techniques and mechanisms of action: an expert consensus study. Ann. Behav. Med. 53(8), 708\u2013720 (2019)","journal-title":"Ann. Behav. Med."},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.chb.2016.11.044","volume":"68","author":"M Dodel","year":"2017","unstructured":"Dodel, M., Mesch, G.: Cyber-victimization preventive behavior: a health belief model approach. Comput. Hum. Behav. 68, 359\u2013367 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"9_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103372","volume":"132","author":"B Dupont","year":"2023","unstructured":"Dupont, B., Shearing, C., Bernier, M., Leukfeldt, R.: The tensions of cyber-resilience: from sensemaking to practice. Comput. Secur. 132, 103372 (2023)","journal-title":"Comput. Secur."},{"key":"9_CR10","volume-title":"Health Behavior and Health Education Theory, Research, and Practice","author":"K Glanz","year":"2015","unstructured":"Glanz, K., Rimer, B.K., Orleans, C.T., Viswanath, K.: Health Behavior and Health Education Theory, Research, and Practice, 4th edn. Jossey-Bass, USA (2015)","edition":"4"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18, 106\u2013125 (2009)","journal-title":"Eur. J. Inf. Syst."},{"key":"9_CR12","unstructured":"Hoekstra, M., De Vries, S., Berkenpas, M., Jansen, J.: De werking van de basisscan cyberweerbaarheid. Thorbecke academie, NHL Stenden (2021)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/1748-5908-9-33","volume":"9","author":"JM Huijg","year":"2014","unstructured":"Huijg, J.M., Gebhardt, W.A., Dusseldorp, E., et al.: Measuring determinants of implementation behavior: psychometric properties of a questionnaire based on the theoretical domains framework. Implementat. Sci. 9, 33 (2014). https:\/\/doi.org\/10.1186\/1748-5908-9-33","journal-title":"Implementat. Sci."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Linkov, I., Kott, A.: Fundamental concepts of cyber resilience: introduction and overview. In: Kott, A., Linkov, I. (eds.) Cyber Resilience of Systems and Networks, pp. 1\u201325 (2019)","DOI":"10.1007\/978-3-319-77492-3_1"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/1748-5908-6-42","volume":"6","author":"S Michie","year":"2011","unstructured":"Michie, S., Van Stralen, M.M., West, R.: The behaviour change wheel: a new method for characterising and designing behaviour change interventions. Implement. Sci. 6(1), 42 (2011)","journal-title":"Implement. Sci."},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Michie, S., Johnston, M.: Behavior change techniques. In: Gellman, M.D., Turner, J.R. (eds.) Encyclopedia of Behavioral Medicine, pp. 182\u2013187. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4419-1005-9_1661","DOI":"10.1007\/978-1-4419-1005-9_1661"},{"key":"9_CR17","unstructured":"NCTV: Cyber Security Assessment Netherlands 2023. Expect the unexpected. Ministry of Justice and Security, 9 January 2023. https:\/\/english.nctv.nl\/documents\/publications\/2023\/07\/03\/cyber-security-assessment-netherlands-2023"},{"key":"9_CR18","unstructured":"O\u2019Donnell, B.: 5 cybersecurity myths and how to address them. Techtarget, 16 March 2022. https:\/\/www.techtarget.com\/whatis\/post\/5-cybersecurity-myths-and-how-to-address-them"},{"issue":"1","key":"9_CR19","volume":"2","author":"S Pawar","year":"2022","unstructured":"Pawar, S., Palivela, H.: LCCI: a framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs). Int. J. Inf. Manag. Data Insights 2(1), 100080 (2022)","journal-title":"Int. J. Inf. Manag. Data Insights"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"van der Kleij, R., Leukfeldt, R.: Cyber resilient behavior: integrating human behavioral models and resilience engineering capabilities into cyber security. In: Ahram, T., Karwowski, W. (eds.) AHFE 2019. AISC, vol. 960, pp. 16\u201327. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20488-4_2","DOI":"10.1007\/978-3-030-20488-4_2"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"van der Kleij, R., van\u2019t Hoff-De Goede, S., van de Weijer, S., Leukfeldt, R.: How safely do we behave online? An explanatory study into the cybersecurity behaviors of dutch citizens. In: Zallio, M., Raymundo Iba\u00f1ez, C., Hernandez, J.H. (eds.) AHFE 2021. LNNS, vol. 268., pp. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79997-7_30","DOI":"10.1007\/978-3-030-79997-7_30"},{"key":"9_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101970","volume":"97","author":"R Van der Kleij","year":"2020","unstructured":"Van der Kleij, R., Wijn, R., Hof, T.: An application and empirical test of the capability opportunity motivation-behaviour model to data leakage prevention in financial organizations. Comput. Secur. 97, 101938 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101970","journal-title":"Comput. Secur."},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"van\u2019t Hoff-de Goede, M.S., Leukfeldt, E.R., van der Kleij, R., van de Weijer, S.G.A.: The online behaviour and victimization study: the development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In: Weulen Kranenbarg, M., Leukfeldt, R. (eds.) Cybercrime in Context. Crime and Justice in Digital Society, vol. I, pp. 21\u201341 . Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-60527-8_3","DOI":"10.1007\/978-3-030-60527-8_3"},{"issue":"6","key":"9_CR24","doi-asserted-by":"publisher","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","volume":"24","author":"M Workman","year":"2008","unstructured":"Workman, M., Bommer, W.H., Straub, D.: Security lapses and the omission of information security measures: a threat control model and empirical test. Comput. Hum. Behav. 24(6), 2799\u20132816 (2008)","journal-title":"Comput. Hum. Behav.Behav."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61379-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:57:02Z","timestamp":1717207022000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61379-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613784","9783031613791"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61379-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}