{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:14:35Z","timestamp":1776111275281,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s10111-010-0159-y","type":"journal-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T01:01:41Z","timestamp":1283216501000},"page":"121-134","source":"Crossref","is-referenced-by-count":15,"title":["Toward understanding distributed cognition in IT security management: the role of cues and norms"],"prefix":"10.1007","volume":"13","author":[{"given":"David","family":"Botta","sequence":"first","affiliation":[]},{"given":"Kasia","family":"Muldner","sequence":"additional","affiliation":[]},{"given":"Kirstie","family":"Hawkey","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,1]]},"reference":[{"key":"159_CR1","first-page":"155","volume":"13","author":"MS Ackerman","year":"2004","unstructured":"Ackerman MS, Halverson C (2004) Organizational memory as objects, processes, and trajectories: an examination of organizational memory in use. CSCW 13:155\u2013189","journal-title":"CSCW"},{"issue":"5","key":"159_CR2","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1108\/09685220710831152","volume":"15","author":"K Beznosov","year":"2007","unstructured":"Beznosov K, Beznosova O (2007) On the imbalance of the security problem space and its expected consequences. Inf Manage Comput Secur 15(5):420\u2013431","journal-title":"Inf Manage Comput Secur"},{"key":"159_CR3","doi-asserted-by":"crossref","unstructured":"Botta D, Werlinger R, Gagn\u00e9 A, Beznosov K, Iverson L, Fels S, Fisher B (2007) Towards understanding IT security professionals and their tools. In: Proceedings of SOUPS, pp 100\u2013111","DOI":"10.1145\/1280680.1280693"},{"key":"159_CR4","first-page":"46","volume":"1","author":"V Braithwaite","year":"1998","unstructured":"Braithwaite V (1998) Communal and exchange trust norms: their value base and relevance to institutional trust. Trust Governance 1:46\u201374","journal-title":"Trust Governance"},{"issue":"1","key":"159_CR5","doi-asserted-by":"crossref","first-page":"25","DOI":"10.3917\/th.691.0025","volume":"69","author":"J Busby","year":"2006","unstructured":"Busby J, Hibberd R (2006) The role of coordination of organizational artefacts in distributed cognition, and their failure in maritime operations. Trav Hum 69(1):25\u201348","journal-title":"Trav Hum"},{"key":"159_CR6","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0142-694X(00)00028-4","volume":"22","author":"JS Busby","year":"2001","unstructured":"Busby JS (2001) Error and distributed cognition in design. Des Stud 22:233\u2013254","journal-title":"Des Stud"},{"issue":"4","key":"159_CR7","first-page":"59","volume":"11","author":"B Chandrasekaran","year":"1990","unstructured":"Chandrasekaran B (1990) Design problem solving: a task analysis. AI Mag 11(4):59\u201371","journal-title":"AI Mag"},{"issue":"4","key":"159_CR8","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolua","year":"2005","unstructured":"Chebrolua S, Abraham A, Thomas J (2005) Feature deduction and ensemble design of intrusion detection systems. Comput Secur 24(4):295\u2013307","journal-title":"Comput Secur"},{"key":"159_CR9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511620539","volume-title":"Using language","author":"HH Clark","year":"1996","unstructured":"Clark HH (1996) Using language. Cambridge University Press, Cambridge"},{"key":"159_CR10","unstructured":"Cohen P, Levesque H (1991) Teamwork. Technical report, SRI, Menlo Park, CA"},{"issue":"4","key":"159_CR11","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/0167-8116(88)90033-X","volume":"4","author":"E Fouquier","year":"1988","unstructured":"Fouquier E (1988) Figures of reception: concepts and rules for a semiotic analysis of mass media reception. Int J Res Mark 4(4):331\u2013348","journal-title":"Int J Res Mark"},{"key":"159_CR12","unstructured":"Fuchs L, Pernul G (2007) Supporting compliant and secure user handling\u2014a structured approach for in-house idm. In: Proceedings of ARES, pp 374\u2013384"},{"key":"159_CR13","unstructured":"Gagn\u00e9 A, Muldner K, Beznosov K (2008) Identifying differences between security and other IT professionals: a qualitative analysis. In: Proceedings of HAISA, pp 69\u201380"},{"issue":"6","key":"159_CR14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1201\/1079\/43855.31.6.20031201\/78849.3","volume":"31","author":"R Garigue","year":"2003","unstructured":"Garigue R, Stefaniu M (2003) Information security governance reporting. EDPACS 31(6):11\u201317","journal-title":"EDPACS"},{"issue":"3","key":"159_CR15","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1207\/s15516709cog1603_3","volume":"16","author":"V Goel","year":"1992","unstructured":"Goel V, Pirolli P (1992) The structure of design problem spaces. Cogn Sci 16(3):395\u2013429","journal-title":"Cogn Sci"},{"key":"159_CR16","doi-asserted-by":"crossref","unstructured":"Goodall JR, Lutters WG, Komlodi A (2004a) I know my network: collaboration and expertise in intrusion detection. In: Proceedings of CSCW, pp 342\u2013345","DOI":"10.1145\/1031607.1031663"},{"key":"159_CR17","unstructured":"Goodall JR, Lutters WG, Komlodi A (2004b) The work of intrusion detection: rethinking the role of security analysts. In: Proceedings of AMCIS, pp 1421\u20131427"},{"key":"159_CR18","doi-asserted-by":"crossref","unstructured":"Gutwin C, Greenberg S (2000) The mechanics of collaboration: developing low cost us ability evaluation methods for shared workspaces. In: Proceedings of IEEE international workshop on enabling technologies: infrastructure for collaborative enterprises, pp 98\u2013103","DOI":"10.1109\/ENABL.2000.883711"},{"key":"159_CR19","unstructured":"Haber EM, Bailey J (2007) Design guidelines for system administration: tools developed through ethnographic field studies. In: Proceedings of CHIMIT, pp 1\u20139"},{"issue":"3","key":"159_CR20","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MIC.2008.61","volume":"12","author":"K Hawkey","year":"2008","unstructured":"Hawkey K, Muldner K, Beznosov K (2008) Searching for the Right Fit: balancing IT Security Model Trade-offs. IEEE Internet Comput 12(3):22\u201330","journal-title":"IEEE Internet Comput"},{"issue":"6","key":"159_CR21","first-page":"261","volume":"3","author":"TP Hofer","year":"2000","unstructured":"Hofer TP, Kerr EA, Hayward RA (2000) What is an error? Eff Clin Pract 3(6):261\u2013269","journal-title":"Eff Clin Pract"},{"key":"159_CR22","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1881.001.0001","volume-title":"Cognition in the wild","author":"E Hutchins","year":"1995","unstructured":"Hutchins E (1995) Cognition in the wild. MIT Press, Cambridge"},{"key":"159_CR23","first-page":"357","volume-title":"Security and usability: designing secure systems that people can use","author":"E Kandogan","year":"2005","unstructured":"Kandogan E, Haber EM (2005) Security administration tools and practices. In: Cranor LF, Garfinkel S (eds) Security and usability: designing secure systems that people can use. O\u2019Reilly Media, Inc, Sebastopol, pp 357\u2013378"},{"key":"159_CR24","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.apergo.2006.03.010","volume":"38","author":"S Kraemer","year":"2007","unstructured":"Kraemer S, Carayon P (2007) Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. Appl Ergon 38:143\u2013154","journal-title":"Appl Ergon"},{"key":"159_CR25","unstructured":"Maglio PP, Kandogan E, Haber E (2003) Distributed cognition and joint activity in collaborative problem solving. In: Proceedings of the conference of the cognitive science society"},{"key":"159_CR26","volume-title":"The tacit dimension","author":"M Polanyi","year":"1966","unstructured":"Polanyi M (1966) The tacit dimension. Doubleday & Company, Inc, Garden City"},{"key":"159_CR27","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1080\/00335638509383719","volume":"71","author":"MS Poole","year":"1985","unstructured":"Poole MS, Seibold DR, McPhee RD (1985) Group decision-making as a structurational process. Q J Speech 71:74\u2013102","journal-title":"Q J Speech"},{"issue":"1","key":"159_CR28","first-page":"43","volume":"38","author":"J Rockart","year":"1996","unstructured":"Rockart J, Earl M, Ross J (1996) Eight imperatives for the new IT organization. Sloan Manage Rev 38(1):43\u201355","journal-title":"Sloan Manage Rev"},{"key":"159_CR29","volume-title":"Distributed cognitions: psychological and educational considerations","author":"G Salomon","year":"1993","unstructured":"Salomon G (1993) Distributed cognitions: psychological and educational considerations. Cambridge University Press, Cambridge"},{"issue":"4","key":"159_CR30","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1002\/1098-240X(200008)23:4<334::AID-NUR9>3.0.CO;2-G","volume":"23","author":"M Sandelowski","year":"2000","unstructured":"Sandelowski M (2000) Whatever happened to qualitative description? Res Nursing Health 23(4):334\u2013340","journal-title":"Res Nursing Health"},{"key":"159_CR31","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/S1361-3723(07)70169-0","volume":"12","author":"EE Schultz","year":"2007","unstructured":"Schultz EE (2007) Computer forensics challenges in responding to incidents in real life setting. Comput Fraud Secur 12:12\u201316","journal-title":"Comput Fraud Secur"},{"key":"159_CR32","doi-asserted-by":"crossref","unstructured":"Siegel DA, Reid B, Dray SM (2006) IT security: protecting organizations in spite of themselves. Interactions 20\u201327","DOI":"10.1145\/1125864.1125885"},{"issue":"3","key":"159_CR33","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/0004-3702(73)90011-8","volume":"4","author":"HA Simon","year":"1973","unstructured":"Simon HA (1973) The structure of ill structured problems. Artif Intell 4(3):181\u2013201","journal-title":"Artif Intell"},{"issue":"1","key":"159_CR34","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2307\/249307","volume":"14","author":"D Straub","year":"1990","unstructured":"Straub D, Nance W (1990) Discovering and disciplining computer abuse in organizations: a field study. MIS Q 14(1):45\u201360","journal-title":"MIS Q"},{"issue":"1","key":"159_CR35","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1145\/357442.357445","volume":"4","author":"L Suchman","year":"1983","unstructured":"Suchman L (1983) Office procedure as practical action: models of work and system design. Trans Inf Syst 4(1):320\u2013328","journal-title":"Trans Inf Syst"},{"key":"159_CR36","doi-asserted-by":"crossref","unstructured":"Wegner DM (1986) Transactive memory: A contemporary analysis of the group mind. In: Mullen B, Goethals GR (eds) Theories of group behavior","DOI":"10.1007\/978-1-4612-4634-3_9"},{"key":"159_CR37","volume-title":"Managing the unexpected: assuring high performance in an age of complexity","author":"K Weick","year":"2001","unstructured":"Weick K, Sutcliffe K (2001) Managing the unexpected: assuring high performance in an age of complexity. Jossey-Bass, Hoboken"},{"issue":"1","key":"159_CR38","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1108\/09685220910944722","volume":"17","author":"R Werlinger","year":"2009","unstructured":"Werlinger R, Hawkey K, Beznosov K (2009) An integrated view of human, organizational, and technological challenges of IT security management. J Inf Manage Comput Secur 17(1):4\u201319","journal-title":"J Inf Manage Comput Secur"},{"key":"159_CR39","doi-asserted-by":"crossref","unstructured":"Werlinger R, Hawkey K, Botta D, Beznosov K (2009) Security practitioners in context: their activities and interactions with other stakeholders within organizations. Int J Human Comput Stud 1\u201341","DOI":"10.1016\/j.ijhcs.2009.03.002"},{"key":"159_CR40","unstructured":"Woods D, Cook R (1999) Perspectives on human error: hindsight biases and local rationality. Handb Appl Cogn 141\u201371"},{"issue":"9","key":"159_CR41","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1002\/(SICI)1097-4571(199807)49:9<801::AID-ASI5>3.0.CO;2-Q","volume":"49","author":"J Zhang","year":"1998","unstructured":"Zhang J (1998) A distributed representation approach to group problem-solving. J Am Soc Inf Sci 49(9):801\u2013809","journal-title":"J Am Soc Inf Sci"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-010-0159-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10111-010-0159-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-010-0159-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T07:39:19Z","timestamp":1740469159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10111-010-0159-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,1]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["159"],"URL":"https:\/\/doi.org\/10.1007\/s10111-010-0159-y","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,9,1]]}}}