{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:40:10Z","timestamp":1748493610444,"version":"3.41.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031937200","type":"print"},{"value":"9783031937217","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-93721-7_3","type":"book-chapter","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T03:59:32Z","timestamp":1748491172000},"page":"28-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of People Analytics for Reducing Human-Related Cyber Risk in the Context of Air Traffic Managers"],"prefix":"10.1007","author":[{"given":"Enrico","family":"Frumento","sequence":"first","affiliation":[]},{"given":"Francesca Silvia","family":"Carosio","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Guerini","sequence":"additional","affiliation":[]},{"given":"Irene","family":"Buselli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"3_CR1","unstructured":"McAfee, A., Brynjolfsson, E.: Big data: the management revolution. Harvard Bus. Rev. (2012)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Stankevi\u010di\u016bt\u0117, \u017d.: Data-driven decision making: application of people analytics in human resource management. In: Digital Transformation. Intelligent Systems Reference Library, vol. 253. Springer, Heidelberg (2024)","DOI":"10.1007\/978-3-031-55952-5_12"},{"issue":"1","key":"3_CR3","first-page":"3","volume":"28","author":"J Marler","year":"2017","unstructured":"Marler, J., Boudreau, J.: An evidence-based review of HR analytics. Int. J. Hum. Res. Manag. 28(1), 3\u201326 (2017)","journal-title":"Int. J. Hum. Res. Manag."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Maennel, K.: Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroSPW), September 2020 (2020)","DOI":"10.1109\/EuroSPW51379.2020.00013"},{"key":"3_CR5","unstructured":"Frumento, E.: Cybersecurity and the Human Element. Correlations, risks and mitigation, beginning with people. Cefriel, Milano (2024)"},{"issue":"7","key":"3_CR6","first-page":"1","volume":"5","author":"C Teixeira","year":"2015","unstructured":"Teixeira, C., Pereira, L.: ROI in training: how do HR Executives make investment decisions? Int. J. Sci. Res. Publ. 5(7), 1\u20136 (2015)","journal-title":"Int. J. Sci. Res. Publ."},{"key":"3_CR7","volume-title":"Evaluating Training Programs: The Four Levels","author":"DL Kirkpatrick","year":"2006","unstructured":"Kirkpatrick, D.L., Kirkpatrick, J.D.: Evaluating Training Programs: The Four Levels, 3rd edn. Berrett-Koehler Publishers, San Francisco (2006)","edition":"3"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Phillips, J.J.: Measuring the return on investment for technology initiatives: Trends and issues. In: ROI for Technology Projects, pp. 21\u201348 (2007)","DOI":"10.4324\/9780080551296-7"},{"key":"3_CR9","unstructured":"mimecast. Exposing Human Risk. Mimecast (2024)"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1515\/jhsem-2014-0031","volume":"11","author":"R Ottis","year":"2014","unstructured":"Ottis, R.: Light weight tabletop exercise for cybersecurity education. Homeland Secur. Emerg. Manag. 11(4), 579\u2013592 (2014)","journal-title":"Homeland Secur. Emerg. Manag."},{"key":"3_CR11","unstructured":"Bernsmed, K., Meland, P. , Tedeschi, S.-K.T.A., Dambra, C., Buselli, I., Frumento, E., et al.: SEC-AIRSPACE: addressing cyber security challenges in future air traffic management. In: SECURWARE 2024: The Eighteenth International Conference on Emerging Security Information, Systems and Technologies (2024)"},{"key":"3_CR12","unstructured":"DOGANA (GA. 653618). The role of Social Engineering in evolution of attacks (2015)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Jamison, F.: People analytics in practice: connecting employee, customer, and operational data to create evidence-based decision making. In: Smart Service Systems, Operations Management and Analytics, pp. 223\u2013228 (2019)","DOI":"10.1007\/978-3-030-30967-1_20"},{"issue":"5","key":"3_CR14","first-page":"30","volume":"46","author":"PSG Long","year":"2011","unstructured":"Long, P.S.G.: Penetrating the fog: analytics in learning and education. EDUCAUSE Rev. 46(5), 30 (2011)","journal-title":"EDUCAUSE Rev."},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1080\/0960085X.2021.1927213","volume":"31","author":"LM Giermindl","year":"2022","unstructured":"Giermindl, L.M., Strich, F., Christ, O.: The dark sides of people analytics: reviewing the perils for organisations and employees. Eur. J. Inf. Syst. 31(3), 410\u2013435 (2022)","journal-title":"Eur. J. Inf. Syst."},{"issue":"10","key":"3_CR16","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1177\/0002764213498851","volume":"57","author":"G Siemens","year":"2013","unstructured":"Siemens, G.: Learning analytics: the emergence of a discipline. Am. Behav. Sci. 57(10), 1380\u20131400 (2013)","journal-title":"Am. Behav. Sci."},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s11528-014-0822-x","volume":"59","author":"D Ga\u0161evi\u0107","year":"2015","unstructured":"Ga\u0161evi\u0107, D., Dawson, S., Siemens, G.: Let\u2019s not forget: learning analytics are about learning. TechTrends 59(1), 64\u201371 (2015)","journal-title":"TechTrends"},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"6","DOI":"10.18608\/jla.2014.11.3","volume":"1","author":"S Jayaprakash","year":"2014","unstructured":"Jayaprakash, S., Moody, E., Laur\u00eda, E., Regan, J.: Early alert of academically at-risk students: an open source analytics initiative. J. Learn. Anal. 1(1), 6\u201347 (2014)","journal-title":"J. Learn. Anal."},{"key":"3_CR19","unstructured":"Khalil, H., Ebner, M.: Learning analytics: principles and constraints. In: Proceedings of EdMedia: World Conference on Educational Media and Technology, pp. 1789\u20131799. Association for the Advancement of Computing in Education (AACE) (2015)"},{"key":"3_CR20","unstructured":"World Economic Forum. The Global Risks Report 2022 (2022)"},{"key":"3_CR21","unstructured":"HERMENEUT. HERMENEUT D2.1 Exposure of the target logics and methods. HERMENEUT Consortium, Rome (2018)"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40\u201351 (2017)","journal-title":"Comput. Secur."},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"157306","DOI":"10.1109\/ACCESS.2021.3130013","volume":"9","author":"D Fujs","year":"2021","unstructured":"Fujs, D., Vrhovec, S., Vavpoti\u010d, D.: Know your enemy: user segmentation based on human aspects of information security. IEEE Access 9, 157306\u2013157315 (2021)","journal-title":"IEEE Access"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"103558","DOI":"10.1016\/j.cose.2023.103558","volume":"136","author":"L Ribeiro","year":"2024","unstructured":"Ribeiro, L., Guedes, I., Cardoso, C.: Which factors predict susceptibility to phishing? An empirical study. Comput. Secur. 136, 103558 (2024)","journal-title":"Comput. Secur."},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/2635761","volume":"2021","author":"F Salimian","year":"2021","unstructured":"Salimian, F.: Measuring the return on investment of training modules of electrical protection and Uninterruptible Power Supply (UPS) using the corrective and AHP approaches. Math. Prob. Eng. 2021, 1\u201310 (2021)","journal-title":"Math. Prob. Eng."},{"issue":"4","key":"3_CR26","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1086\/705375","volume":"128","author":"G Gosnell","year":"2020","unstructured":"Gosnell, G., List, J., Metcalf, R.: The impact of management practices on employee productivity: a field experiment with airline captains. J. Polit. Econ. 128(4), 1195\u20131233 (2020)","journal-title":"J. Polit. Econ."},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1111\/1748-8583.12283","volume":"14","author":"K Greasley","year":"2020","unstructured":"Greasley, K., Thomas, P.: HR analytics: the onto-epistemology and politics of metricised HRM. Hum. Res. Manag. J. 14, 494\u2013507 (2020). https:\/\/doi.org\/10.1111\/1748-8583.12283","journal-title":"Hum. Res. Manag. J."},{"issue":"2","key":"3_CR28","first-page":"28","volume":"32","author":"N Wang","year":"2019","unstructured":"Wang, N., Katsamakas, E.: A network data science approach to people analytics. Inf. Res. Manag. J. 32(2), 28\u201351 (2019)","journal-title":"Inf. Res. Manag. J."},{"key":"3_CR29","first-page":"224","volume":"43","author":"A Tursunbayeva","year":"2018","unstructured":"Tursunbayeva, A., Di Lauro, S., Pagliari, C.: People analytics - a scoping review of conceptual boundaries and value propositions. Int. J. Inf. Manage. 43, 224\u2013247 (2018)","journal-title":"Int. J. Inf. Manage."},{"key":"3_CR30","first-page":"1590","volume":"71","author":"S Garg","year":"2022","unstructured":"Garg, S., Sinha, S., Kar, A.K., Mani, M.: A review of machine learning applications in human resource management. Int. J. Prod. Perf. Manag. 71, 1590\u20131610 (2022)","journal-title":"Int. J. Prod. Perf. Manag."},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"\u0160ari\u0107-Grgi\u0107, I., Grubi\u0161i\u0107, A., \u0160eri\u0107, L., Robinson, T.J.: Student clustering based on learning behavior data in the intelligent tutoring system. In: Research Anthology on Remote Teaching and Learning and the Future of Online Education (2023)","DOI":"10.4018\/978-1-6684-7540-9.ch039"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Al-Shabandar, R., Hussain, A., Laws, A., Keight, R., Lunn, J., Radi, N.: Machine learning approaches to predict learning outcomes in massive open online courses. In: International Joint Conference on Neural Networks (IJCNN) (2017)","DOI":"10.1109\/IJCNN.2017.7965922"},{"issue":"1","key":"3_CR33","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.datak.2007.01.002","volume":"63","author":"R Gelbard","year":"2007","unstructured":"Gelbard, R., Goldman, O., Spiegler, I.: Investigating diversity of clustering methods: an empirical comparison. Data Knowl. Eng. 63(1), 155\u2013166 (2007)","journal-title":"Data Knowl. Eng."},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.anbehav.2015.11.009","volume":"120","author":"LZ Garamszegi","year":"2016","unstructured":"Garamszegi, L.Z.: A simple statistical guide for the analysis of behaviour when data are constrained due to practical or ethical reasons. Anim. Behav. 120, 223\u2013234 (2016)","journal-title":"Anim. Behav."},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Peach, R.L., Yaliraki, S.N., Lefevre, D., Barahona, M.: Data-driven unsupervised clustering of online learner behaviour. Sci. Learn. (2019)","DOI":"10.1038\/s41539-019-0054-0"},{"issue":"2","key":"3_CR36","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/23044042","volume":"35","author":"D Gefen","year":"2011","unstructured":"Gefen, D., Straub, D., Rigdon, E.: An update and extension to SEM Guidelines for Administrative and Social Science Research. MIS Q. 35(2), iii\u2013xiv (2011)","journal-title":"MIS Q."},{"issue":"1","key":"3_CR37","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1177\/001316447403400104","volume":"34","author":"C Werts","year":"1974","unstructured":"Werts, C., Linn, R., Joreskog, K.: Interclass reliability estimates: testing structural assumptions. Educ. Psychol. Measur. 34(1), 25\u201333 (1974)","journal-title":"Educ. Psychol. Measur."},{"key":"3_CR38","volume-title":"Multivariate Data Analysis with Readings","author":"JJ Hair","year":"1998","unstructured":"Hair, J.J., Anderson, R., Tatham, R., Black, W.: Multivariate Data Analysis with Readings. Englewood Cliffs, Prentice Hall (1998)"},{"issue":"1","key":"3_CR39","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0305-0483(96)00051-5","volume":"25","author":"A Segars","year":"1997","unstructured":"Segars, A.: Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research. Omega 25(1), 107\u2013121 (1997)","journal-title":"Omega"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Jarjoui, S.: Mindfulness: the first line of defense in cyberspace. In: Online Identity - An Essential Guide. IntechOpen (2023)","DOI":"10.5772\/intechopen.1003086"}],"container-title":["Lecture Notes in Computer Science","Engineering Psychology and Cognitive Ergonomics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-93721-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T03:59:40Z","timestamp":1748491180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-93721-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031937200","9783031937217"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-93721-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}