{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:02:48Z","timestamp":1755036168060,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_2","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T12:22:30Z","timestamp":1511266950000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Developing a Cyber Incident Communication Management Exercise for CI Stakeholders"],"prefix":"10.1007","author":[{"given":"Tomomi","family":"Aoyama","sequence":"first","affiliation":[]},{"given":"Kenji","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Ichiro","family":"Koshijima","sequence":"additional","affiliation":[]},{"given":"Yoshihiro","family":"Hashimoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"2_CR1","unstructured":"SANS Institute: 2016 Security Awareness Report. SANS Institute (2016). http:\/\/securingthehuman.sans.org\/resources\/security-awareness-report"},{"key":"2_CR2","unstructured":"Department of Homeland Security: Training available through ICS-CERT. https:\/\/ics-cert.us-cert.gov\/Training-Available-Through-ICS-CERT#workshop"},{"key":"2_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-39377-8_9","volume-title":"Information Assurance and Security Education and Training","author":"E Sitnikova","year":"2013","unstructured":"Sitnikova, E., Foo, E., Vaughn, R.B.: The power of hands-on exercises in SCADA cyber security education. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009. IAICT, vol. 406, pp. 83\u201394. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39377-8_9"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Foo, E., Branagan, M., Morris, T.: A proposed Australian industrial control system security curriculum. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 1754\u20131762. IEEE (2013)","DOI":"10.1109\/HICSS.2013.55"},{"key":"2_CR5","unstructured":"European Network for Cyber Security: E.ON teams get trained on ICS and smart grid cyber security during the ENCS red team blue team course\u2014ENCS. https:\/\/www.encs.eu\/2015\/11\/10\/"},{"key":"2_CR6","unstructured":"Branlat, M.: Challenges to adversarial interplay under high uncertainty: staged-world study of a cyber security event. Ph.D. thesis, The Ohio State University (2011)"},{"key":"2_CR7","unstructured":"Branlat, M., Morison, A., Finco, G., Gertman, D., Le Blanc, K., Woods, D.: A study of adversarial interplay in a cybersecurity event. In: Proceedings of the 10th International Conference on Naturalistic Decision Making (NDM 2011), 31 May\u20133 June 2011"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"1082","DOI":"10.1016\/j.promfg.2015.07.178","volume":"3","author":"T Aoyama","year":"2015","unstructured":"Aoyama, T., Naruoka, H., Koshijima, I., Watanabe, K.: How management goes wrong? The human factor lessons learned from a cyber incident handling exercise. Procedia Manuf. 3, 1082\u20131087 (2015). 6th International Conference on Applied Human Factors and Ergonomics (AHFE 2015) and the Affiliated Conferences, AHFE 2015. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2351978915001791","journal-title":"Procedia Manuf."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Aoyama, T., Naruoka, H., Koshijima, I., Machii, W., Seki, K.: Studying resilient cyber incident management from large-scale cyber security training. In: 2015 10th Asian Control Conference (ASCC), pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ASCC.2015.7244713"},{"issue":"4","key":"2_CR10","doi-asserted-by":"crossref","first-page":"335","DOI":"10.69554\/ZQHT6435","volume":"3","author":"K Watanabe","year":"2009","unstructured":"Watanabe, K.: Developing public-private partnership based business continuity management for increased community resilience. J. Bus. Contin. Emerg. Plann. 3(4), 335\u2013344 (2009)","journal-title":"J. Bus. Contin. Emerg. Plann."},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.ijdrr.2013.05.001","volume":"5","author":"J Borell","year":"2013","unstructured":"Borell, J., Eriksson, K.: Learning effectiveness of discussion-based crisis management exercises. Int. J. Disaster Risk Reduct. 5, 28\u201337 (2013). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2212420913000332","journal-title":"Int. J. Disaster Risk Reduct."},{"key":"2_CR12","unstructured":"US Department of Homeland Security and United States of America: Homeland security exercise and evaluation program (HSEEP) volume I: HSEEP overview and exercise program management (2007)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Aoyama, T., Koike, M., Koshijima, I., Hashimoto, Y.: A unified framework for safety and security assessment in critical infrastructures. In: Safety and Security Engineering V. Witpress Ltd., September 2013. http:\/\/dx.doi.org\/10.2495\/SAFE130071","DOI":"10.2495\/SAFE130071"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Takagi, H., Morita, T., Matta, M., Moritani, H., Hamaguchi, T., Jing, S., Koshijima, I., Hashimoto, Y.: Strategic security protection for industrial control systems. In: 2015 54th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), pp. 986\u2013992. IEEE (2015)","DOI":"10.1109\/SICE.2015.7285554"},{"issue":"1","key":"2_CR15","first-page":"41","volume":"47","author":"Y Sheffi","year":"2005","unstructured":"Sheffi, Y., Rice Jr., J.B.: A supply chain view of the resilient enterprise. MIT Sloan Manag. Rev. 47(1), 41 (2005)","journal-title":"MIT Sloan Manag. Rev."},{"issue":"6","key":"2_CR16","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.2307\/3069401","volume":"44","author":"GA Bigley","year":"2001","unstructured":"Bigley, G.A., Roberts, K.H.: The incident command system: high-reliability organizing for complex and volatile task environments. Acad. Manag. J. 44(6), 1281\u20131299 (2001)","journal-title":"Acad. Manag. J."},{"key":"2_CR17","first-page":"221","volume-title":"Individual and Group Decision Making: Current Issues","author":"S Converse","year":"1993","unstructured":"Converse, S.: Shared mental models in expert team decision making. In: Castellan, N.J. (ed.) Individual and Group Decision Making: Current Issues, p. 221. Lawrence Erlbaum, Hillsdale (1993)"},{"issue":"2","key":"2_CR18","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1037\/0021-9010.85.2.273","volume":"85","author":"JE Mathieu","year":"2000","unstructured":"Mathieu, J.E., Heffner, T.S., Goodwin, G.F., Salas, E., Cannon-Bowers, J.A.: The influence of shared mental models on team process and performance. J. Appl. Psychol. 85(2), 273 (2000)","journal-title":"J. Appl. Psychol."},{"key":"2_CR19","unstructured":"Bronk, H., Thorbruegge, M., Hakkaja, M.: A step-by-step approach on how to set up a CSIRT (2006)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T06:19:55Z","timestamp":1751005195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}