{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:24:48Z","timestamp":1761740688388,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031615719"},{"type":"electronic","value":"9783031615726"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61572-6_17","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:03:59Z","timestamp":1717203839000},"page":"250-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["What Works Well? A Safety-II Approach to Cybersecurity"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5805-4664","authenticated-orcid":false,"given":"Tommy","family":"van Steen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3069-4974","authenticated-orcid":false,"given":"Cristina","family":"Del-Real","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4810-0460","authenticated-orcid":false,"given":"Bibi","family":"van den Berg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"17_CR1","unstructured":"Goldman, E.O., Warner, M.: Why a Digital Pearl Harbor Makes Sense. .. and Is Possible. Understanding Cyber Conflict: Fourteen Analogies (2017)"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Lawson, S.T., Yeo, S.K., Yu, H., Greene, E.: The cyber-doom effect: the impact of fear appeals in the US cyber security debate. In: International Conference on Cyber Conflict, CYCON (2016). https:\/\/doi.org\/10.1109\/CYCON.2016.7529427","DOI":"10.1109\/CYCON.2016.7529427"},{"key":"17_CR3","doi-asserted-by":"publisher","DOI":"10.1111\/rmir.12016","author":"G Dionne","year":"2013","unstructured":"Dionne, G.: Risk management: history, definition, and critique. Risk Manag. Insur. Rev. (2013). https:\/\/doi.org\/10.1111\/rmir.12016","journal-title":"Risk Manag. Insur. Rev."},{"key":"17_CR4","unstructured":"Hollnagel, E.: From Safety-I to Safety-II: A White Paper (2013)"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Reason, J.: The Human Contribution: Unsafe Acts, Accidents and Heroic Recoveries. Routledge, London (2017). https:\/\/doi.org\/10.1201\/9781315239125","DOI":"10.1201\/9781315239125"},{"key":"17_CR6","unstructured":"Kleinberg, H., Reinicke, B., Cummings, J.: Cyber security best practices: what to do? In 2014 Proceedings of the Conference for Information Systems Applied Research. Univeristy of North Carolina, Baltimore (2014)"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11948-014-9551-y","volume":"20","author":"M Dunn Cavelty","year":"2014","unstructured":"Dunn Cavelty, M.: Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities. Sci. Eng. Ethics 20, 701\u2013715 (2014). https:\/\/doi.org\/10.1007\/s11948-014-9551-y","journal-title":"Sci. Eng. Ethics"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"541","DOI":"10.3384\/cu.2000.1525.1572541","volume":"7","author":"R Dahlberg","year":"2015","unstructured":"Dahlberg, R.: Resilience and complexity. J. Curr. Cult. Res. 7, 541\u2013557 (2015)","journal-title":"J. Curr. Cult. Res."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Woods, D.D.: Essential characteristics of resilience. In: Hollnagel, E., Woods, D.D., Leveson, N. (ed.) Resilience Engineering: Concepts and Precepts, pp. 21\u201334. Taylor and Francis Group (2006)","DOI":"10.1201\/9781315605685-4"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Dekker, S.: Drift into Failure. Taylor and Francis Group (2016). https:\/\/doi.org\/10.1201\/9781315257396","DOI":"10.1201\/9781315257396"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Cozens, P.: Crime prevention through environmental design. In: Environmental Criminology and Crime Analysis, pp. 175\u2013199 (2013). https:\/\/doi.org\/10.4324\/9780203118214-19","DOI":"10.4324\/9780203118214-19"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1126\/science.277.5328.918","volume":"277","author":"RJ Sampson","year":"1997","unstructured":"Sampson, R.J., Raudenbush, S.W., Earls, F.: Neighborhoods and violent crime: a multilevel study of collective efficacy. Science 277, 918\u2013924 (1997)","journal-title":"Science"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.im.2013.11.004","volume":"51","author":"R Baskerville","year":"2014","unstructured":"Baskerville, R., Spagnoletti, P., Kim, J.: Incident-centered information security: managing a strategic balance between prevention and response. Inf. Manag. 51, 138\u2013151 (2014)","journal-title":"Inf. Manag."},{"key":"17_CR14","unstructured":"van den Berg, B., Oldengarm, P.: Een tijdlijn voor het denken over digitale incidenten. In: Handboek Digitale Veiligheid. Wolters Kluwer (2024)"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10669-013-9485-y","volume":"33","author":"I Linkov","year":"2013","unstructured":"Linkov, I., Eisenberg, D.A., Plourde, K., Seager, T.P., Allen, J., Kott, A.: Resilience metrics for cyber systems. Environ. Syst. Decis. 33, 471\u2013476 (2013)","journal-title":"Environ. Syst. Decis."},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.ssci.2008.06.004","volume":"47","author":"L Harms-Ringdahl","year":"2009","unstructured":"Harms-Ringdahl, L.: Analysis of safety functions and barriers in accidents. Saf. Sci. 47, 353\u2013363 (2009)","journal-title":"Saf. Sci."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1080\/13876988.2012.687619","volume":"14","author":"CC Demchak","year":"2012","unstructured":"Demchak, C.C.: Resilience and cyberspace: recognizing the challenges of a global socio-cyber infrastructure (GSCI). J. Comp. Policy Anal. Res. Pract. 14, 254\u2013269 (2012)","journal-title":"J. Comp. Policy Anal. Res. Pract."},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1109\/COMST.2021.3117338","volume":"23","author":"D Schlette","year":"2021","unstructured":"Schlette, D., Caselli, M., Pernul, G.: A comparative study on cyber threat intelligence: the security incident response perspective. IEEE Commun. Surv. Tutor. 23, 2525\u20132556 (2021)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"17_CR19","unstructured":"Petrosyan, A.: Global mean time to identify and contain data breaches 2017\u20132023. https:\/\/www.statista.com\/statistics\/1417455\/worldwide-data-breaches-identify-and-contain\/. Accessed 26 Feb 2024"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.chb.2015.01.039","volume":"48","author":"N Ben-Asher","year":"2015","unstructured":"Ben-Asher, N., Gonzalez, C.: Effects of cyber security knowledge on attack detection. Comput. Hum. Behav. 48, 51\u201361 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1108\/ICS-04-2021-0046","volume":"30","author":"S Manoharan","year":"2022","unstructured":"Manoharan, S., Katuk, N., Hassan, S., Ahmad, R.: To click or not to click the link: the factors influencing internet banking users\u2019 intention in responding to phishing emails. Inf. Comput. Secur. 30, 37\u201362 (2022)","journal-title":"Inf. Comput. Secur."},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"100540","DOI":"10.1109\/ACCESS.2022.3207272","volume":"10","author":"T Sutter","year":"2022","unstructured":"Sutter, T., Bozkir, A.S., Gehring, B., Berlich, P.: Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception. IEEE ACCESS. 10, 100540\u2013100565 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3207272","journal-title":"IEEE ACCESS."},{"key":"17_CR23","unstructured":"Quinkert, F., Degeling, M., Holz, T.: Spotlight on phishing: a longitudinal study on phishing awareness trainings. Presented at the Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, 14\u201316 July 2021, Proceedings 18 (2021)"},{"key":"17_CR24","doi-asserted-by":"publisher","unstructured":"Canham, M.: Repeat clicking: a lack of awareness is not the problem. In: Degen, H., Ntoa, S., Moallem, A. (eds.) HCII 2023. LNCS, vol. 14059, pp. 325\u2013342. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-48057-7_20","DOI":"10.1007\/978-3-031-48057-7_20"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., Marchetti, M.: On the effectiveness of machine and deep learning for cyber security. Presented at the 2018 10th International Conference on Cyber Conflict (CyCon) (2018)","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"17_CR26","doi-asserted-by":"publisher","first-page":"2861","DOI":"10.1007\/s11831-020-09478-2","volume":"28","author":"R Geetha","year":"2021","unstructured":"Geetha, R., Thilagam, T.: A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Arch. Comput. Methods Eng. 28, 2861\u20132879 (2021)","journal-title":"Arch. Comput. Methods Eng."},{"key":"17_CR27","doi-asserted-by":"publisher","first-page":"102334","DOI":"10.1016\/j.ijinfomgt.2021.102334","volume":"59","author":"A Naseer","year":"2021","unstructured":"Naseer, A., Naseer, H., Ahmad, A., Maynard, S.B., Siddiqui, A.M.: Real-time analytics, incident response process agility and enterprise cybersecurity performance: a contingent resource-based analysis. Int. J. Inf. Manage. 59, 102334 (2021)","journal-title":"Int. J. Inf. Manage."},{"key":"17_CR28","doi-asserted-by":"publisher","first-page":"103525","DOI":"10.1016\/j.cose.2023.103525","volume":"135","author":"A Naseer","year":"2023","unstructured":"Naseer, A., Naseer, H., Ahmad, A., Maynard, S.B., Siddiqui, A.M.: Moving towards agile cybersecurity incident response: a case study exploring the enabling role of big data analytics-embedded dynamic capabilities. Comput. Secur. 135, 103525 (2023)","journal-title":"Comput. Secur."},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Zare, H., Wang, P., Zare, M.J., Azadi, M., Olsen, P.: Business continuity plan and risk assessment analysis in case of a cyber attack disaster in healthcare organizations. Presented at the 17th International Conference on Information Technology\u2013New Generations (ITNG 2020) (2020)","DOI":"10.1007\/978-3-030-43020-7_19"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.ijinfomgt.2013.03.001","volume":"33","author":"J J\u00e4rvel\u00e4inen","year":"2013","unstructured":"J\u00e4rvel\u00e4inen, J.: IT incidents and business impacts: validating a framework for continuity management in information systems. Int. J. Inf. Manage. 33, 583\u2013590 (2013)","journal-title":"Int. J. Inf. Manage."},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Algarni, A.M., Malaiya, Y.K.: A consolidated approach for estimation of data security breach costs. Presented at the 2016 2nd International Conference on Information Management (ICIM) (2016)","DOI":"10.1109\/INFOMAN.2016.7477530"},{"key":"17_CR32","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1057\/s41299-021-00121-9","volume":"25","author":"S Kuipers","year":"2022","unstructured":"Kuipers, S., Schonheit, M.: Data breaches and effective crisis communication: a comparative analysis of corporate reputational crises. Corp. Reput. Rev. 25, 176\u2013197 (2022)","journal-title":"Corp. Reput. Rev."},{"key":"17_CR33","volume-title":"Managing the Unexpected","author":"KE Weick","year":"2001","unstructured":"Weick, K.E., Sutcliffe, K.M.: Managing the Unexpected. Jossey-Bass, San Francisco (2001)"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Beris, O., Beautement, A., Sasse, M.A.: Employee rule breakers, excuse makers and security champions: mapping the risk perceptions and emotions that drive security behaviors. Presented at the Proceedings of the 2015 New Security Paradigms Workshop (2015)","DOI":"10.1145\/2841113.2841119"},{"key":"17_CR35","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(11)70082-3","volume":"2011","author":"T Gabriel","year":"2011","unstructured":"Gabriel, T., Furnell, S.: Selecting security champions. Comput. Fraud Secur. 2011, 8\u201312 (2011)","journal-title":"Comput. Fraud Secur."},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Pr\u00fcmmer, J., van Steen, T., van den Berg, B.: A systematic review of current cybersecurity training methods. Comput. Secur. 103585 (2023)","DOI":"10.1016\/j.cose.2023.103585"},{"key":"17_CR37","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1002\/sim.5408","volume":"32","author":"NA Christakis","year":"2013","unstructured":"Christakis, N.A., Fowler, J.H.: Social contagion theory: examining dynamic social networks and human behavior. Stat. Med. 32, 556\u2013577 (2013)","journal-title":"Stat. Med."},{"key":"17_CR38","doi-asserted-by":"publisher","unstructured":"van Steen, T.: When choice is (not) an option: nudging and techno-regulation approaches to behavioural cybersecurity. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) HCII 2022. LNCS, vol. 13310, pp. 120\u2013130. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-05457-0_10","DOI":"10.1007\/978-3-031-05457-0_10"},{"key":"17_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0022-1031(87)90022-9","volume":"23","author":"SG Harkins","year":"1987","unstructured":"Harkins, S.G.: Social loafing and social facilitation. J. Exp. Soc. Psychol. 23, 1\u201318 (1987)","journal-title":"J. Exp. Soc. Psychol."},{"key":"17_CR40","first-page":"58","volume":"15","author":"A Simms","year":"2014","unstructured":"Simms, A., Nichols, T.: Social loafing: a review of the literature. J. Manag. Policy Pract. 15, 58 (2014)","journal-title":"J. Manag. Policy Pract."},{"key":"17_CR41","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1177\/1745691614543972","volume":"9","author":"PR Sackett","year":"2014","unstructured":"Sackett, P.R., Walmsley, P.T.: Which personality attributes are most important in the workplace? Perspect. Psychol. Sci. 9, 538\u2013551 (2014)","journal-title":"Perspect. Psychol. Sci."},{"key":"17_CR42","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.bpa.2011.03.001","volume":"25","author":"KM Sutcliffe","year":"2011","unstructured":"Sutcliffe, K.M.: High reliability organizations (HROs). Best Pract. Res. Clin. Anaesthesiol. 25, 133\u2013144 (2011)","journal-title":"Best Pract. Res. Clin. Anaesthesiol."},{"key":"17_CR43","doi-asserted-by":"publisher","first-page":"70","DOI":"10.5465\/ame.2001.5229613","volume":"15","author":"KH Roberts","year":"2001","unstructured":"Roberts, K.H., Bea, R.: Must accidents happen? Lessons from high-reliability organizations. Acad. Manag. Perspect. 15, 70\u201378 (2001)","journal-title":"Acad. Manag. Perspect."},{"key":"17_CR44","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10111-008-0110-7","volume":"11","author":"SW Dekker","year":"2009","unstructured":"Dekker, S.W.: Just culture: who gets to draw the line? Cogn. Technol. Work 11, 177\u2013185 (2009)","journal-title":"Cogn. Technol. Work"},{"key":"17_CR45","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/2738210.2738216","volume":"45","author":"I Kirlappos","year":"2015","unstructured":"Kirlappos, I., Parkin, S., Sasse, M.A.: \u201cShadow security\u201d as a tool for the learning organization. ACM SIGCAS Comput. Soc. 45, 29\u201337 (2015)","journal-title":"ACM SIGCAS Comput. Soc."}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61572-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:09:06Z","timestamp":1717204146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61572-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031615719","9783031615726"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61572-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}