{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:16:57Z","timestamp":1760645817594},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T00:00:00Z","timestamp":1295395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s10111-010-0171-2","type":"journal-article","created":{"date-parts":[[2011,1,18]],"date-time":"2011-01-18T03:31:11Z","timestamp":1295321471000},"page":"143-155","source":"Crossref","is-referenced-by-count":14,"title":["The human role in tools for improving robustness and resilience of critical infrastructures"],"prefix":"10.1007","volume":"14","author":[{"given":"Aladino","family":"Amantini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elyoenai","family":"Egozcue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Germanus","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reinhard","family":"Hutter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2011,1,19]]},"reference":[{"key":"171_CR1","doi-asserted-by":"crossref","unstructured":"Bevan N, Macleod D (1994) Usability measurement in context in behaviour & information technology 13(1 and 2):132\u2013145","DOI":"10.1080\/01449299408914592"},{"issue":"3","key":"171_CR2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10111-006-0039-7","volume":"8","author":"PC Cacciabue","year":"2006","unstructured":"Cacciabue PC, Martinetto M (2006) A user centred approach for designing driving support systems: the case of collision avoidance. Int J of Cogn Technol Work (CTW) 8(3):201\u2013214","journal-title":"Int J of Cogn Technol Work (CTW)"},{"key":"171_CR3","first-page":"35","volume":"11","author":"M Choras","year":"2009","unstructured":"Choras M, Stachowicz A, Kozik R, Flizikowski A, Renk R (2009) Ontology-based approach to SCADA systems vulnerabilities representation for CIP. Electronics 11:35\u201338","journal-title":"Electronics"},{"key":"171_CR4","unstructured":"MSHTML references http:\/\/www.msdn.microsoft.com\/en-us\/library\/aa741317.aspx"},{"key":"171_CR5","unstructured":"Introduction to ActiveX Controls http:\/\/www.msdn.microsoft.com\/en-us\/library\/aa751972%28VS.85%29.aspx"},{"key":"171_CR6","unstructured":"D\u2019Antonio S (2010) \u201cINSPIRE: increasing security and protection through infrastructure resilience\u201d. ESCoRTS workshop, Ispra, Italy, April 28"},{"key":"171_CR7","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: Proceedings of 1st international workshop on peer-to-peer systems (IPTPS)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"171_CR8","doi-asserted-by":"crossref","unstructured":"Germanus D, Khelil A, Suri N (2010) Increasing the resilience of critical scada systems using peer-to-peer overlays. In: Proceedings of the 1st international symposium on architecting critical systems (ISARCS)","DOI":"10.1007\/978-3-642-13556-9_10"},{"key":"171_CR9","unstructured":"ISO\u2013International Standard Organisation (1993) Guidance on usability. ISO\/DIS 9241-11"},{"key":"171_CR10","unstructured":"ISO\u2013International Standard Organisation (1999) Human-centred design processes for interactive systems. ISO\/FDIS 13407(E)"},{"key":"171_CR11","doi-asserted-by":"crossref","unstructured":"Khelil A, Jeckel S, Germanus D, Suri N (2010) Towards benchmarking of p2p technologies from a scada systems protection perspective. In: Proceedings of the 2nd international conference on mobile lightweight wireless systems (MOBILIGHT)","DOI":"10.1007\/978-3-642-16644-0_35"},{"key":"171_CR12","doi-asserted-by":"crossref","unstructured":"Kozik R, Choras M, Holubowicz W (2010) Fusion of bayesian and ontology approach applied to decision support system for critical infrastructures protection. In: Proceedings of MOBILIGHT (Mobile Lightweight Wireless Systems), Barcelona, May","DOI":"10.1007\/978-3-642-16644-0_39"},{"key":"171_CR13","doi-asserted-by":"crossref","unstructured":"Maymounkov P, Mazi\u00e8res D (2002) Kademlia: a peer-to-peer information system based on the XOR metric. In: 1st international workshop on peer-to-peer systems (IPTPS\u201902)","DOI":"10.1007\/3-540-45748-8_5"},{"key":"171_CR14","unstructured":"The WebKit Open Source Project http:\/\/www.webkit.org\/"},{"key":"171_CR15","unstructured":"Geko https:\/\/www.developer.mozilla.org\/en\/Gecko"},{"key":"171_CR16","unstructured":"Opera Presto http:\/\/www.dev.opera.com\/articles\/view\/presto-2-1-web-standards-supported-by\/"},{"key":"171_CR17","unstructured":"Konqueror http:\/\/www.konqueror.org\/features\/browser.php"},{"key":"171_CR18","unstructured":"Java http:\/\/www.java.com"},{"key":"171_CR19","unstructured":"VBScript http:\/\/www.msdn.microsoft.com\/en-us\/library\/t0aew7h6%28VS.85%29.aspx"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-010-0171-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10111-010-0171-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-010-0171-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T23:00:18Z","timestamp":1559948418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10111-010-0171-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,19]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["171"],"URL":"https:\/\/doi.org\/10.1007\/s10111-010-0171-2","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,19]]}}}