{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:09:17Z","timestamp":1772122157206,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T00:00:00Z","timestamp":1442534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s10111-015-0350-2","type":"journal-article","created":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T16:50:06Z","timestamp":1442595006000},"page":"121-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Measuring team effectiveness in cyber-defense exercises: a cross-disciplinary case study"],"prefix":"10.1007","volume":"18","author":[{"given":"Magdalena","family":"Gran\u00e5sen","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Andersson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,18]]},"reference":[{"key":"350_CR1","unstructured":"Andersson D (2009) F-REX: event driven synchronized multimedia model visualization. In: Proceedings of the 15th international conference on distributed multimedia systems. Knowledge Systems Institute, Redwood City, pp 140\u2013145"},{"key":"350_CR2","unstructured":"Andersson D (2011) Privacy and distributed tactical operations evaluation. In: Proceedings of the 4th international conference on advances in human-oriented and personalized mechanisms, technologies, and services. Barcelona"},{"key":"350_CR3","doi-asserted-by":"crossref","unstructured":"Andersson D (2013) A knowledge base for capturing comprehensive mission experience. P Ann HICCS 46. IEEE, Wailea. doi: 10.1109\/HICSS.2013.40","DOI":"10.1109\/HICSS.2013.40"},{"issue":"3","key":"350_CR4","doi-asserted-by":"crossref","first-page":"16","DOI":"10.4018\/IJISCRAM.2014070102","volume":"6","author":"D Andersson","year":"2014","unstructured":"Andersson D (2014) An externalizable model of tactical mission control for knowledge transfer. Int J Inf Syst Crisis Response Manag 6(3):16\u201337. doi: 10.4018\/IJISCRAM.2014070102","journal-title":"Int J Inf Syst Crisis Response Manag"},{"key":"350_CR5","unstructured":"Andersson D, Gran\u00e5sen M, Sundmark T, Holm H, Hallberg J (2011) Analysis of a cyber defense exercise using exploratory sequential data analysis. In: Proceedings of the 16th international command and control research and technology symposium. DoD CCRP, Qu\u00e9bec City"},{"key":"350_CR6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4419-0140-8_1","volume-title":"Cyber situational awareness: advances in information security","author":"P Barford","year":"2010","unstructured":"Barford P, Dacier M, Dietterich TG et al (2010) Cyber SA: situational awareness for cyber defense. In: Jajodia S, Liu P, Swarup V, Wang C (eds) Cyber situational awareness: advances in information security 46. Springer, Berlin, pp 3\u201313. doi: 10.1007\/978-1-4419-0140-8_1"},{"key":"350_CR7","unstructured":"Branlat M (2011) Challenges to adversarial interplay under high uncertainty: staged-world study of a cyber security event. Dissertation, Ohio State University"},{"key":"350_CR8","first-page":"218","volume-title":"P CogSIMA 2","author":"MA Champion","year":"2012","unstructured":"Champion MA, Rajivan P, Cooke NJ, Jariwala S (2012) Team-based cyber defense analysis. In: P CogSIMA 2. IEEE, New Orleans, pp 218\u2013221. doi: 10.1109\/CogSIMA.2012.6188386"},{"key":"350_CR9","doi-asserted-by":"crossref","unstructured":"Conklin A (2006) Cyber defense competitions and information security education: an active learning solution for a capstone course. P Ann HICCS 39, Kauai. doi: 10.1109\/HICSS.2006.110","DOI":"10.1109\/HICSS.2006.110"},{"key":"350_CR10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1037\/10690-005","volume-title":"Team cognition: understanding the factors that drive process and performance","author":"NJ Cooke","year":"2004","unstructured":"Cooke NJ, Salas E, Kiekel PA, Bell B (2004) Advances in measuring team cognition. In: Salas E, Fiore SM (eds) Team cognition: understanding the factors that drive process and performance. American Psychological Association, Washington, pp 83\u2013106"},{"key":"350_CR11","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1086\/644212","volume":"58","author":"CD Cowger","year":"1984","unstructured":"Cowger CD (1984) Statistical significance tests: scientific ritualism or scientific method? Soc Serv Rev 58:358\u2013372","journal-title":"Soc Serv Rev"},{"key":"350_CR12","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1086\/644317","volume":"59","author":"CD Cowger","year":"1985","unstructured":"Cowger CD (1985) Author\u2019s reply. Soc Serv Rev 59:520\u2013522","journal-title":"Soc Serv Rev"},{"key":"350_CR13","doi-asserted-by":"crossref","unstructured":"Doup\u00e9 A, Egele M, Caillat B et al (2011) Hit\u2019em where it hurts: a live security exercise on cyber situational awareness. In: P ACSAC 27: 51\u201361. ACM, Orlando","DOI":"10.1145\/2076732.2076740"},{"key":"350_CR14","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley MR (1995) Toward a theory of situation awareness in dynamic systems. Human Factors 37:32\u201364. doi: 10.1518\/001872095779049543","journal-title":"Human Factors"},{"key":"350_CR15","doi-asserted-by":"crossref","DOI":"10.1201\/b12461","volume-title":"Situation awareness analysis and measurement","author":"MR Endsley","year":"2000","unstructured":"Endsley MR (2000) Direct measurement of situation awareness: validity and use of SAGAT. In: Endsley MR, Garland DJ (eds) Situation awareness analysis and measurement. Lawrence Erlbaum, Mahwah"},{"key":"350_CR16","first-page":"301","volume-title":"The Sage handbook of qualitative research","author":"B Flyvbjerg","year":"2011","unstructured":"Flyvbjerg B (2011) Case study. In: Denzin NK, Lincoln YS (eds) The Sage handbook of qualitative research, 4th edn. Sage, Thousand Oaks, pp 301\u2013316","edition":"4"},{"key":"350_CR17","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2014.06.008","volume":"46","author":"U Franke","year":"2014","unstructured":"Franke U, Brynielsson J (2014) Cyber situational awareness\u2014a systematic review of the literature. Comput Secur 46:18\u201331. doi: 10.1016\/j.cose.2014.06.008","journal-title":"Comput Secur"},{"key":"350_CR18","author":"K Geers","year":"2010","unstructured":"Geers K (2010) Live fire exercise: preparing for cyber war. J Homel Secur Emerg 7. doi: 10.2202\/1547-7355.1780","journal-title":"J Homel Secur Emerg 7"},{"key":"350_CR19","volume-title":"China\u2019s cyber attacks signal new battlefield is online","author":"L Greenemeier","year":"2007","unstructured":"Greenemeier L (2007) China\u2019s cyber attacks signal new battlefield is online. Scientific American, New York"},{"key":"350_CR20","unstructured":"Hammervik M, Andersson D, Hallberg J (2010) Capturing a cyber defence exercise. In: Proceedings of the first national symposium on technology and methodology for security and crisis management, Link\u00f6ping, Sweden"},{"key":"350_CR21","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MSP.2005.120","volume":"3","author":"LJ Hoffman","year":"2005","unstructured":"Hoffman LJ, Rosenberg T, Dodge R, Ragsdale D (2005) Exploring a national cybersecurity exercise for universities. IEEE Secur Priv 3:27\u201333. doi: 10.1109\/MSP.2005.120","journal-title":"IEEE Secur Priv"},{"key":"350_CR22","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/TDSC.2012.66","volume":"9","author":"H Holm","year":"2012","unstructured":"Holm H, Ekstedt M, Andersson D (2012) Empirical analysis of system-level vulnerability metrics through actual attacks. IEEE Trans Dependable Secur 9:825\u2013837. doi: 10.1109\/TDSC.2012.66","journal-title":"IEEE Trans Dependable Secur"},{"key":"350_CR23","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"VM Igure","year":"2006","unstructured":"Igure VM, Laughter SA, Williams RD (2006) Security issues in SCADA networks. Comput Secur 25:498\u2013506. doi: 10.1016\/j.cose.2006.03.001","journal-title":"Comput Secur"},{"key":"350_CR24","doi-asserted-by":"crossref","first-page":"449","DOI":"10.2307\/3250969","volume":"24","author":"KH Lim","year":"2000","unstructured":"Lim KH, Benbasat I (2000) The effect of multimedia on perceived equivocality and perceived usefulness of information systems. MIS Q 24:449\u2013471. doi: 10.2307\/3250969","journal-title":"MIS Q"},{"key":"350_CR25","first-page":"1016","volume-title":"Encyclopedia of science, technology and ethics","author":"J Malek","year":"2005","unstructured":"Malek J (2005) Informed consent. In: Mitcham C (ed) Encyclopedia of science, technology and ethics, vol 2. Macmillan, Detroit, pp 1016\u20131019"},{"key":"350_CR26","volume-title":"Cyber defence exercise baltic cyber shield 2010: after action report","author":"NATO","year":"2010","unstructured":"NATO (2010) Cyber defence exercise baltic cyber shield 2010: after action report. CCDCoE, Tallinn"},{"key":"350_CR27","volume-title":"Cyber defence exercise locked shields 2012: after action report","author":"NATO","year":"2012","unstructured":"NATO (2012) Cyber defence exercise locked shields 2012: after action report. CCDCoE, Tallinn"},{"key":"350_CR28","volume-title":"Cyber defence exercise locked shields 2013: after action report","author":"NATO","year":"2013","unstructured":"NATO (2013) Cyber defence exercise locked shields 2013: after action report. CCDCoE, Tallinn"},{"key":"350_CR29","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.im.2007.09.003","volume":"40","author":"RF Otondo","year":"2008","unstructured":"Otondo RF, van Scotter JR, Allen DG, Palvia P (2008) The complexity of richness: media, message, and communication outcomes. Inf Manag 40:21\u201330. doi: 10.1016\/j.im.2007.09.003","journal-title":"Inf Manag"},{"key":"350_CR30","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"SL Pfleeger","year":"2012","unstructured":"Pfleeger SL, Caputo DD (2012) Leveraging behavioral science to mitigate cyber security risk. Comput Secur 31:597\u2013611. doi: 10.1016\/j.cose.2011.12.010","journal-title":"Comput Secur"},{"key":"350_CR31","doi-asserted-by":"crossref","first-page":"31","DOI":"10.5055\/jem.2008.0043","volume":"6","author":"S Pilemalm","year":"2008","unstructured":"Pilemalm S, Andersson D, Hallberg N (2008) Reconstruction and exploration of large-scale distributed operations: multimedia tools for evaluation of emergency management response. J Emerg Manag 6:31\u201347","journal-title":"J Emerg Manag"},{"key":"350_CR32","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/S1071-5819(03)00042-9","volume":"58","author":"J Riegelsberger","year":"2003","unstructured":"Riegelsberger J, Sasse MA, McCarthy J (2003) The researcher\u2019s dilemma: evaluating trust in computer-mediated communication. Int J Human Comput Stud 58:759\u2013781. doi: 10.1016\/S1071-5819(03)00042-9","journal-title":"Int J Human Comput Stud"},{"key":"350_CR33","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1086\/644316","volume":"59","author":"A Rubin","year":"1985","unstructured":"Rubin A (1985) Significance testing with population data. Soc Serv Rev 59:518\u2013520","journal-title":"Soc Serv Rev"},{"key":"350_CR34","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1177\/1046496405277134","volume":"36","author":"E Salas","year":"2005","unstructured":"Salas E, Sims DE, Burke CS (2005) Is there a \u201cBig Five\u201d in teamwork? Small Group Res 36:555\u2013599. doi: 10.1177\/1046496405277134","journal-title":"Small Group Res"},{"key":"350_CR35","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1207\/s15327051hci0903&4_2","volume":"9","author":"PM Sanderson","year":"1994","unstructured":"Sanderson PM, Fisher C (1994) Exploratory sequential data analysis: foundations. Human Comput Interact 9:251\u2013317. doi: 10.1207\/s15327051hci0903&4_2","journal-title":"Human Comput Interact"},{"key":"350_CR36","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-642-34210-3_4","volume-title":"Proceedings of the 17th Nordic conference on secure IT systems","author":"T Sommestad","year":"2012","unstructured":"Sommestad T, Hallberg J (2012) Cyber security exercises and competitions as a platform for cyber security experiments. In: J\u00f8sang A, Carlsson B (eds) Proceedings of the 17th Nordic conference on secure IT systems. Springer, Berlin, pp 47\u201360. doi: 10.1007\/978-3-642-34210-3_4"},{"key":"350_CR37","volume-title":"The art of case study research","author":"RE Stake","year":"1995","unstructured":"Stake RE (1995) The art of case study research. Sage, Thousand Oaks"},{"key":"350_CR38","volume-title":"P ISCRAM 9","author":"M Thorstensson","year":"2012","unstructured":"Thorstensson M (2012) Supporting observers in the field to perform model based data collection. In: Rothkrantz L, Ristvej J, Franco Z (eds) P ISCRAM 9. Simon Fraser University, Vancouver, Canada"},{"key":"350_CR39","first-page":"174","volume-title":"P CogSIMA 2","author":"M Tyworth","year":"2012","unstructured":"Tyworth M, Giacobe NA, Mancuso V, Dancy C (2012) The distributed nature of cyber situation awareness. In: P CogSIMA 2. IEEE, New Orleans, pp 174\u2013178. doi: 10.1109\/CogSIMA.2012.6188375"},{"key":"350_CR40","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1177\/0018720813515907","volume":"56","author":"JL Wildman","year":"2013","unstructured":"Wildman JL, Salas E, Scott CPR (2013) Measuring cognition in teams: a cross-domain review. Human Factors 56:911\u2013941. doi: 10.1177\/0018720813515907","journal-title":"Human Factors"},{"key":"350_CR41","volume-title":"Case study research: design and methods","author":"RK Yin","year":"2009","unstructured":"Yin RK (2009) Case study research: design and methods, 4th edn. Sage, Thousand Oaks","edition":"4"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-015-0350-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10111-015-0350-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-015-0350-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T13:04:21Z","timestamp":1599570261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10111-015-0350-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,18]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["350"],"URL":"https:\/\/doi.org\/10.1007\/s10111-015-0350-2","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,18]]}}}