{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:22:28Z","timestamp":1772061748316,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319605845","type":"print"},{"value":"9783319605852","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-60585-2_23","type":"book-chapter","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T03:20:14Z","timestamp":1497496814000},"page":"244-254","source":"Crossref","is-referenced-by-count":14,"title":["Understanding Human Factors in Cyber Security as a Dynamic System"],"prefix":"10.1007","author":[{"given":"Heather","family":"Young","sequence":"first","affiliation":[]},{"given":"Tony","family":"van Vliet","sequence":"additional","affiliation":[]},{"given":"Josine","family":"van de Ven","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Jol","sequence":"additional","affiliation":[]},{"given":"Carlijn","family":"Broekman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"key":"23_CR1","unstructured":"Parsons, K., McCornac, A., Butavicus, M., Ferguson, L.: Human factors and information security: individual, culture and security environment. Technical report, DSTO (2010)"},{"key":"23_CR2","unstructured":"Marinos, L., Belmonte, A., Rekleitis, E.: ENISA threat landscape. Technical report, ENISA (2016)"},{"key":"23_CR3","unstructured":"Tofa, D., Theodoros, N., Darra, E.: The cost of incidents affecting CIIs. Technical report, ENISA (2016)"},{"issue":"1","key":"23_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25300\/MISQ\/2013\/37.1.01","volume":"37","author":"R Willisin","year":"2013","unstructured":"Willisin, R., Warketin, M.: Beyond deterrence: an expanded view of employee computer abuse. MIS Q. 37(1), 1\u201320 (2013)","journal-title":"MIS Q."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Ifinedo, P., Akinnuwesi, B.: Employees\u2019 non-malicious, counterproductive computer security behaviors (CCSB) in Nigeria and Canada: an empirical and comparative analysis. In: Proceedings of 2014 IEEE 6th International Conference on Adaptive Science and Technology (ICAST), Lagos, NG (2014)","DOI":"10.1109\/ICASTECH.2014.7068109"},{"key":"23_CR6","unstructured":"CERT Insider Threat Center: Common sense guide to mitigating insider threats, 5th edn. Technical report, Software Engineering Institute (2016)"},{"key":"23_CR7","first-page":"113","volume":"22","author":"K Krombholz","year":"2015","unstructured":"Krombholz, K., Hobel, H., Huber, M., Weippl, E.: Advanced social engineering attacks. J. Inf. Secur. Appl. 22, 113\u2013122 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"23_CR8","unstructured":"CERT Insider Threat Center: Unintentional insider threats: social engineering. Technical report, Software Engineering Institute (2014)"},{"key":"23_CR9","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.cose.2009.04.006","volume":"48","author":"S Kreamer","year":"2009","unstructured":"Kreamer, S., Carayon, P., Clem, J.: Human and organizational factors in computer and information security: pathways to vulnerabilities. Comput. Secur. 48, 509\u2013520 (2009)","journal-title":"Comput. Secur."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L., Downs, J: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pp. 373\u2013382. ACM Press, New York (2010)","DOI":"10.1145\/1753326.1753383"},{"key":"23_CR11","unstructured":"Kopper, A., Westner, M.: Deriving a framework for causes, consequences, and governance of shadow it from literature. In: Proceedings of MKWI 2016 (2016)"},{"key":"23_CR12","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.cose.2015.10.006","volume":"56","author":"NS Safa","year":"2016","unstructured":"Safa, N.S., Von Solms, R., Furnell, S.: Information security policy compliance model in organiz tions. Comput. Secur. 56, 70\u201382 (2016)","journal-title":"Comput. Secur."},{"key":"23_CR13","unstructured":"CERT Insider Threat Team: Unintentional insider threats: a foundational study. Technical report, Software Engineering Institute (2013)"},{"key":"23_CR14","unstructured":"Oltramari, A., Henshel, D.H., Cains, M., Hoffman., B: Towards a human factors ontology for cyber security. In: Proceedings of the Tenth Conference on Semantic Technology for Intelligence, Defense, and Security, Fairfax, VA, pp 26\u201333. (2015)"},{"key":"23_CR15","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/1592761.1592773","volume":"52","author":"B Lampson","year":"2009","unstructured":"Lampson, B.: Privacy and security usable security: how to get it. Commun. ACM 52, 25\u201327 (2009)","journal-title":"Commun. ACM"},{"issue":"6","key":"23_CR16","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1361-3723(15)30046-4","volume":"2016","author":"T Caldwell","year":"2016","unstructured":"Caldwell, T.: Making security awareness training work. Comput. Fraud Secur. 2016(6), 8\u201314 (2016)","journal-title":"Comput. Fraud Secur."},{"key":"23_CR17","unstructured":"Rudis, B., Hayden, L., Kretschmer, G., Sasse, A., Becker, A., Homer, J.: Security awareness report. Technical report, SANS (2016)"},{"key":"23_CR18","unstructured":"Cyber Security Assessment Netherlands (2016). https:\/\/www.ncsc.nl\/english\/current-topics\/Cyber+Security+Assessment+Netherlands . Accessed 8 Mar 2017"},{"key":"23_CR19","unstructured":"Bodua, D.J., Graubart, R.: Cyber resiliency engineering framework. Technical report, Mitre Corporation (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Human Factors in Cybersecurity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60585-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T03:18:18Z","timestamp":1569467898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60585-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"ISBN":["9783319605845","9783319605852"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60585-2_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,16]]}}}