{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:49:58Z","timestamp":1744904998059,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319210056"},{"type":"electronic","value":"9783319210063"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21006-3_38","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T05:46:42Z","timestamp":1437371202000},"page":"396-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Survey on Risk Management Based on Information Security Psychology"],"prefix":"10.1007","author":[{"given":"Yasuko","family":"Fukuzawa","sequence":"first","affiliation":[]},{"given":"Masaki","family":"Samejima","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Ujita","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"38_CR1","unstructured":"Fukuzawa, Y., Samejima, M.: An approach to risks in cyber physical systems based on information security psychology. Inst. Electr. Eng. Jpn. Trans. Electron. Inf. Syst. 134(6), 756\u2013759 (2014) (in Japanese)"},{"key":"38_CR2","unstructured":"Uchida, K.: Information security psychology-information security from the human and psychology sides. J. Inf. Sci. Technol. Assoc. (Johono Kagaku to Gijutsu), 62(8), 336\u2013341 (2012) (in Japanese)"},{"key":"38_CR3","volume-title":"Social Engineering : The Art of Human Hacking","author":"C Hadnagy","year":"2010","unstructured":"Hadnagy, C.: Social Engineering : The Art of Human Hacking. Wiley, Indianapolis (2010)"},{"key":"38_CR4","unstructured":"Yuhara, N., Inagaki, T., Furukawa, Y.: Human Error and Mechanical Systems Design. Kodansha, Tokyo (2012) (in Japanese)"},{"key":"38_CR5","volume-title":"Groupthink: Psychological Studies of Policy Decisions and Fiascoes","author":"J Irving","year":"1982","unstructured":"Irving, J.: Groupthink: Psychological Studies of Policy Decisions and Fiascoes. Houghton Mifflin Company, Boston (1982)"},{"key":"38_CR6","unstructured":"Cappelli, D., Desai, A.G., Moore, A.P., Shimeall, T.J., Weaver, E.A., Willke, B.J.:\nManagement and Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage\nto Employers\u2019Information, Systems, or Networks (2007). \n                      http:\/\/www.sei.cmu.edu\/reports\/06tn041.pdf"},{"key":"38_CR7","series-title":"Crime Prevention Studies","volume-title":"Theory For Practice in Situational Crime Prevention","year":"2003","unstructured":"Smith, M.J., Conishi, D.B. (eds.): Theory For Practice in Situational Crime Prevention. Crime Prevention Studies, vol. 16. Criminal Justice Press, Monsey (2003)"},{"key":"38_CR8","unstructured":"Conish, D.B., Clarke, R.V.: Opportunities, precipitators and criminal decisions: a reply to wortley\u2019s critique of situational crime preventions (2003)"},{"key":"38_CR9","unstructured":"Amari, Y., Arai, S., Uchida, J.: Security Jitugen no Genten karamita Naibuyouin jiko youkuseishuhou. pp. 3\u201329. JNSA Press, Special Column (in Japanese)"},{"key":"38_CR10","unstructured":"Uchida, K.: Research of the application of situational crime prevention to information security (2010) (in Japanese). \n                      http:\/\/www.uchidak.com\/InfoSecPsycho\/20100922_uchidak01.pdf"},{"key":"38_CR11","unstructured":"Information-technology Promotion Agency, Japan: SoshikiNaibusha no Huseikoui ni yoru incident chousa (2012). \n                      http:\/\/www.ipa.go.jp\/files\/000014169.pdf"},{"key":"38_CR12","unstructured":"Information-technology Promotion Agency, Japan: Soshiki ni okeru NaibuFuseiBoushi guidelines (2013). \n                      http:\/\/www.ipa.go.jp\/files\/000027284.pdf\u2019"},{"key":"38_CR13","unstructured":"Fujitsu Develops Industry\u2019s First Technology That Identifies Users Vulnerable to Cyber Attack Based on Behavioral and Psychological Characteristics. \n                      http:\/\/www.fujitsu.com\/global\/about\/resources\/news\/press-releases\/2015\/0119-01.html"},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ijhcs.2005.01.001","volume":"62","author":"J Riegelsberger","year":"2005","unstructured":"Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: The mechanics of trust: a framework for research and design. Int. J. Hum. Comput. Stud. 62, 381\u2013422 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"38_CR15","unstructured":"CEN-CENELEC-ETSI: Smart Grid Coordination Group\u3000Investigate standards for information security and data privacy (2012)"},{"key":"38_CR16","unstructured":"Shimada, T.: Trends in standardization of smart grid cyber security. Inst. Electr. Eng. Jpn. Trans. Electron. Inf. Syst. 133(3), 558\u2013561 (2013) (in Japanese)"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. In: Proceedings of 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363\u2013369 (2008)","DOI":"10.1109\/ISORC.2008.25"},{"issue":"8","key":"38_CR18","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1109\/JPROC.2010.2050377","volume":"98","author":"R Poovendran","year":"2010","unstructured":"Poovendran, R.: Cyber-physical systems: close encounters between two parallel worlds [point of view]. Proc. IEEE 98(8), 1363\u20131366 (2010)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction: Users and Contexts"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21006-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:18:05Z","timestamp":1582413485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21006-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319210056","9783319210063"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21006-3_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}