{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:37:42Z","timestamp":1742938662298,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_10","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"147-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Supporting the Human in Cyber Defence"],"prefix":"10.1007","author":[{"given":"Kirsi","family":"Helkala","sequence":"first","affiliation":[]},{"given":"Benjamin J.","family":"Knox","sequence":"additional","affiliation":[]},{"given":"\u00d8yvind","family":"J\u00f8sok","sequence":"additional","affiliation":[]},{"given":"Ricardo G.","family":"Lugo","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"S\u00fctterlin","sequence":"additional","affiliation":[]},{"given":"Geir Olav","family":"Dyrkolbotn","sequence":"additional","affiliation":[]},{"given":"Nils Kalstad","family":"Svendsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2013.72","volume":"46","author":"C Alcaraz","year":"2013","unstructured":"Alcaraz, C., Lopez, J.: Wide-area situational awareness for critical infrastructure protection. Computer 46(4), 30\u201337 (2013)","journal-title":"Computer"},{"key":"10_CR2","unstructured":"Association for Computing Machinery: Computer Engineering Curricula 2016: Curriculum Guidelines for Undergraduate Degree Programs in Computer Engineering. IEEE Computer Society, December 2016"},{"key":"10_CR3","volume-title":"Self-efficacy: The Exercise of Control","author":"A Bandura","year":"1997","unstructured":"Bandura, A.: Self-efficacy: The Exercise of Control. Freeman and Co., New York (1997)"},{"key":"10_CR4","volume-title":"The Tao of Network Security Monitoring-beyond Intrusion Detection","author":"R Bejtlich","year":"2005","unstructured":"Bejtlich, R.: The Tao of Network Security Monitoring-beyond Intrusion Detection. Addison-Wesley, Boston (2005)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-47560-8_6","volume-title":"Secure IT Systems","author":"B Blumbergs","year":"2016","unstructured":"Blumbergs, B., Pihelgas, M., Kont, M., Maennel, O., Vaarandi, R.: Creating and detecting IPv6 transition mechanism-based information exfiltration covert channels. In: Brumley, B.B., R\u00f6ning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 85\u2013100. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47560-8_6"},{"key":"10_CR6","doi-asserted-by":"crossref","first-page":"937","DOI":"10.3389\/fpsyg.2016.00937","volume":"7","author":"N Buchler","year":"2016","unstructured":"Buchler, N., Fitzhugh, S., Marusich, L., Ungvarsky, D., Lebiere, C., Gonzalez, C.: Mission command in the age of network-enabled operations: social network analysis of information sharing and situation awareness. Front. Psychol. 7, 937 (2016)","journal-title":"Front. Psychol."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Champion, M., Rajivan, P., Cooke, N., Jariwala, S.: Team-based cyber defence analysis. In: IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (2012)","DOI":"10.1109\/CogSIMA.2012.6188386"},{"key":"10_CR8","unstructured":"Choi, M., Levy, Y., Hovav, A.: The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse. In: Pre-ICIS Workshop on Information Security and Privacy (2013)"},{"issue":"3","key":"10_CR9","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/S0090-2616(96)90004-2","volume":"24","author":"MW Daudelin","year":"1996","unstructured":"Daudelin, M.W.: Learning from experience through reflection. Organ. Dyn. 24(3), 36\u201348 (1996)","journal-title":"Organ. Dyn."},{"key":"10_CR10","unstructured":"Dyrkolbotn, G.O.: Computer Network Defence in the Norwegian Armed Forces. NISlecture, January 2013. nislab.no\/nislecture\/nislecture_2013"},{"issue":"1","key":"10_CR11","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1518\/001872095779049499","volume":"37","author":"M Endsley","year":"1995","unstructured":"Endsley, M.: Measurement of situation awareness in dynamic systems. Hum. Factors 37(1), 65\u201384 (1995)","journal-title":"Hum. Factors"},{"key":"10_CR12","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1002\/job.322","volume":"26","author":"M Gang\u00e9","year":"2005","unstructured":"Gang\u00e9, M., Deci, E.: Self-determination theory and work motivation. J. Organ. Behav. 26, 331\u2013362 (2005)","journal-title":"J. Organ. Behav."},{"key":"10_CR13","unstructured":"Gibney, A.: Zero days. Documentary (2016)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Helkala, K., Knox, B., J\u00f8sok, \u00d8.: How the application of coping strategies can empower learning. In: Proceedings of Frontiers in Education Conference. IEEE (2015)","DOI":"10.1109\/FIE.2015.7344120"},{"issue":"2","key":"10_CR15","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1108\/ICS-01-2016-0001","volume":"24","author":"K Helkala","year":"2016","unstructured":"Helkala, K., Knox, B., J\u00f8sok, \u00d8., Knox, S., Lund, M.: Factors to affect improvement in cyber officer performance. Inf. Comput. Secur. 24(2), 152\u2013163 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"10_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-40548-3_32","volume-title":"HCI International 2016 \u2013 Posters\u2019 Extended Abstracts","author":"K Helkala","year":"2016","unstructured":"Helkala, K., Knox, B., J\u00f8sok, \u00d8., Lugo, R., S\u00fctterlin, S.: How coping strategies influence cyber task performance in the hybrid space. In: Stephanidis, C. (ed.) HCI 2016. CCIS, vol. 617, pp. 192\u2013196. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40548-3_32"},{"key":"10_CR17","unstructured":"Homeland Security, August 2016. www.dhs.gov\/how-do-i\/report-cyber-incidents"},{"key":"10_CR18","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M., Lockheed Martin Corporation: White Paper: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains (2011). www.lockheedmartin.com\/content\/dam\/lockheed\/data\/corporate\/documents\/LM-White-Paper-Intel-Driven-Defense.pdf"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-319-39952-2_18","volume-title":"Foundations of Augmented Cognition: Neuroergonomics and Operational Neuroscience","author":"\u00d8 J\u00f8sok","year":"2016","unstructured":"J\u00f8sok, \u00d8., Knox, B.J., Helkala, K., Lugo, R.G., S\u00fctterlin, S., Ward, P.: Exploring the hybrid space. In: Schmorrow, D.D.D., Fidopiastis, C.M.M. (eds.) AC 2016. LNCS (LNAI), vol. 9744, pp. 178\u2013188. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39952-2_18"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-319-58625-0_35","volume-title":"Augmented Cognition. Enhancing Cognition and Behavior in Complex Human Environments","author":"\u00d8 J\u00f8sok","year":"2017","unstructured":"J\u00f8sok, \u00d8., Knox, B.J., Helkala, K., Wilson, K., S\u00fctterlin, S., Lugo, R.G., \u00d8degaard, T.: Macrocognition applied to the hybrid space: team environment, functions and processes in cyber operations. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC 2017. LNCS (LNAI), vol. 10285, pp. 486\u2013500. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58625-0_35"},{"issue":"1","key":"10_CR21","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1037\/0021-9010.92.1.107","volume":"92","author":"T Judge","year":"2007","unstructured":"Judge, T., Jackson, C., Shaw, J., Scott, B., Rich, B.: Self-efficacy and work-related performance: the integral role of individual differences. J. Appl. Psychol. 92(1), 107\u2013127 (2007)","journal-title":"J. Appl. Psychol."},{"key":"10_CR22","unstructured":"Klein, D.E., Klein, H.A., Klein, G.: Macrocognition: linking cognitive psychology and cognitive ergonomics. In: Proceedings of the 5th International Conference on Human Interactions with Complex Systems (2000)"},{"issue":"3","key":"10_CR23","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1518\/001872008X288385","volume":"50","author":"G Klein","year":"2008","unstructured":"Klein, G.: Naturalistic decision making. J. Hum. Factors Ergon. Soc. 50(3), 456\u2013460 (2008)","journal-title":"J. Hum. Factors Ergon. Soc."},{"key":"10_CR24","unstructured":"Klein, G.: Seeing what others don\u2019t, the remarkable ways we gain insight. PublicAffairs (2013)"},{"issue":"3","key":"10_CR25","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MIS.2003.1200735","volume":"18","author":"G Klein","year":"2003","unstructured":"Klein, G., Ross, K.G., Moon, B.M., Klein, D.E., Hoffman, R.R., Hollnagel, E.: Macrocognition. IEEE Intell. Syst. 18(3), 81\u201385 (2003)","journal-title":"IEEE Intell. Syst."},{"key":"10_CR26","unstructured":"Knox, B.J.: An exploration of the ways institutional development may be affected by the growing influence of cyberpower. Master\u2019s thesis. The Open University of the United Kingdom, Development Management Program, April 2017"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Knox, B.J., J\u00f8sok, \u00d8., Helkala, K., Khooshabeh, P., \u00d8degaard, T., Lugo, R.G., S\u00fctterlin, S.: Socio-technical communication: the hybrid space and the OLB-model for science-based cyber education. J Mil. Psychol. (2017, to appear)","DOI":"10.1080\/08995605.2018.1478546"},{"key":"10_CR28","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-319-58750-9_46","volume-title":"HCI International 2017 \u2013 Posters\u2019 Extended Abstracts","author":"BJ Knox","year":"2017","unstructured":"Knox, B.J., Lugo, R.G., J\u00f8sok, \u00d8., Helkala, K., S\u00fctterlin, S.: Towards a cognitive agility index: the role of metacognition in human computer interaction. In: Stephanidis, C. (ed.) HCI 2017. CCIS, vol. 713, pp. 330\u2013338. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58750-9_46"},{"key":"10_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11391-3","volume-title":"Cyber Defense and Situational Awareness","author":"A Kott","year":"2014","unstructured":"Kott, A., Wang, C., Erbacher, R.F.: Cyber Defense and Situational Awareness. Springer, Switzerland (2014). https:\/\/doi.org\/10.1007\/978-3-319-11391-3"},{"key":"10_CR30","unstructured":"Lugo, R.G., Kwei-Nahra, P., J\u00f8sok, \u00d8., Knox, B.J., Helkala, K., S\u00fctterlin, S.: Team workload demands influence on cyber detection performance. In: Proceedings of 13th International Conference on Naturalistic Decision Making, pp. 223\u2013225. The University of Bath (2017). https:\/\/www.eventsforce.net\/uob\/media\/uploaded\/EVUOB\/event_2\/GoreWard_NDM13Proceedings_2017.pdf"},{"issue":"1","key":"10_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1515\/jms-2016-0001","volume":"7","author":"RG Lugo","year":"2016","unstructured":"Lugo, R.G., S\u00fctterlin, S., Knox, B.J., J\u00f8sok, \u00d8., Helkala, K., Lande, N.M.: The moderating influence of self-efficacy on interoceptive ability and counterintuitive decision making in officer cadets. J. Mil. Stud. 7(1), 1\u20139 (2016)","journal-title":"J. Mil. Stud."},{"key":"10_CR32","unstructured":"Malmedal, B., Cyberforsvaret: White Paper: Arkitektur for en Forsvarbar Informasjonsinfrastruktur (2012). https:\/\/norcydef.blogspot.no\/2013\/03\/jeg-har-skrevet-et-whitepaper-om.html"},{"key":"10_CR33","volume-title":"Teams of Teams: New Rules of Engagement for a Complex World","author":"S McChrystal","year":"2016","unstructured":"McChrystal, S., Collins, T., Silverman, D., Fussell, C.: Teams of Teams: New Rules of Engagement for a Complex World. Penguin, New York (2016)"},{"key":"10_CR34","unstructured":"Merza, M.: The importance of investing in people, September 2016. http:\/\/federalnewsradio.com\/commentary\/2016\/09\/importance-investing-people\/"},{"key":"10_CR35","unstructured":"Ministry of Defence, United Kingdom: Future trends programme future operating environment, December 2015"},{"key":"10_CR36","first-page":"178","volume-title":"The Oxford Handbook of Cognitive Engineering","author":"DG Morrow","year":"2013","unstructured":"Morrow, D.G., Fischer, U.M.: Communication in socio-technical systems. In: Lee, J.D., Kirlik, A. (eds.) The Oxford Handbook of Cognitive Engineering, pp. 178\u2013199. Oxford University Press, Oxford (2013)"},{"key":"10_CR37","unstructured":"Murray, S.: Human skills are essential in battle against cyber crime, November 2016. https:\/\/www.ft.com\/content\/46449768-7031-11e6-a0c9-1365ce54b926"},{"key":"10_CR38","volume-title":"Science, Strategy and War : The Strategic Theory of John Boyd","author":"F Osinga","year":"2005","unstructured":"Osinga, F.: Science, Strategy and War : The Strategic Theory of John Boyd. Eburon Academic Publishers, Delft (2005)"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Rajivan, P., Janssen, M.A., Cooke, N.J.: Agent-based model of a cyber security defence analyst team. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 57, pp. 314\u2013318. SAGE (2013)","DOI":"10.1177\/1541931213571069"},{"issue":"5","key":"10_CR40","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2014.89","volume":"12","author":"R Ruefle","year":"2014","unstructured":"Ruefle, R., Dorofee, A., Mundie, D., Householder, A.D., Murray, M., Perl, S.J.: Computer security incident response team development and evolution. IEEE Secur. Priv. 12(5), 16\u201326 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"10_CR41","unstructured":"Smy, V., Cahillane, M., MacLean, P.: Cognitive and metacognitive prompting in ill-structured tasks: the art of asking. In: Proceedings of International Conference on Information, Communication Technologies in Education (2015)"},{"issue":"2","key":"10_CR42","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1037\/0033-2909.124.2.240","volume":"124","author":"A Stajkovic","year":"1998","unstructured":"Stajkovic, A., Luthans, F.: Self-efficacy and work-related performance: a metaanalysis. Psychol. Bull. 124(2), 240 (1998)","journal-title":"Psychol. Bull."},{"key":"10_CR43","unstructured":"The World Bank: World development report 2016: digital dividends, May 2016. http:\/\/www.worldbank.org\/en\/publication\/wdr2016"},{"issue":"1","key":"10_CR44","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1002\/(SICI)1099-1328(199601)8:1<95::AID-JID348>3.0.CO;2-B","volume":"8","author":"A Thomas","year":"1996","unstructured":"Thomas, A.: What is development management? J. Int. Dev. 8(1), 95\u2013100 (1996)","journal-title":"J. Int. Dev."}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T07:45:38Z","timestamp":1570520738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}