{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:54:33Z","timestamp":1742972073392,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393988"},{"type":"electronic","value":"9783319393995"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39399-5_23","type":"book-chapter","created":{"date-parts":[[2016,6,22]],"date-time":"2016-06-22T18:24:13Z","timestamp":1466619853000},"page":"241-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Human-Technology Interaction in Layered Security Military Applications"],"prefix":"10.1007","author":[{"given":"Amanda","family":"Wachtel","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Hoffman","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Lawton","sequence":"additional","affiliation":[]},{"given":"Ann","family":"Speed","sequence":"additional","affiliation":[]},{"given":"John","family":"Gauthier","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kittinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,22]]},"reference":[{"key":"23_CR1","unstructured":"U.S. Department of Energy Office of Inspector General: Inquiry into the Security Breach at the National Nuclear Security Administration\u2019s Y-12 National Security Complex. Special report DOE\/IG-0868, DOE (2012)"},{"key":"23_CR2","unstructured":"Stars and Stripes. \n                      http:\/\/www.stripes.com\/news\/a-moment-that-changed-everything-1.88432"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Lafleur, J.M., Purvis, L.K., Roesler, A.W.: The Perfect Heist: Recipes from Around the World. SAND2014-1790, Sandia National Laboratories (2014)","DOI":"10.2172\/1154957"},{"key":"23_CR4","unstructured":"Lieberman, H.R., Bathalon, G.P., Falco, C.M., Morgan III, C.A., Niro, P.J., Tharion, W.J.: The fog of war: decrements in cognitive performance and mood associated with combat-like stress. Aviat. Space Environ. Med. 76(7), Section II (2005)"},{"key":"23_CR5","unstructured":"FlexSim. \n                      https:\/\/www.flexsim.com"},{"issue":"2","key":"23_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1002\/prs.10184","volume":"26","author":"JC Wincek","year":"2007","unstructured":"Wincek, J.C., Haight, J.M.: Realistic human error rates for process hazard analyses. Process Saf. Prog. 26(2), 95\u2013100 (2007). American Institute of Chemical Engineers","journal-title":"Process Saf. Prog."},{"key":"23_CR7","doi-asserted-by":"crossref","DOI":"10.4324\/9781410611147","volume-title":"Detection Theory: A User\u2019s Guide","author":"NA Macmillan","year":"2004","unstructured":"Macmillan, N.A., Creelman, C.D.: Detection Theory: A User\u2019s Guide. Psychology Press, Abingdon (2004)"}],"container-title":["Lecture Notes in Computer Science","HCI in Business, Government, and Organizations: Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39399-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T15:12:27Z","timestamp":1596121947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39399-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393988","9783319393995"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39399-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}