{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T09:36:11Z","timestamp":1760866571243,"version":"3.44.0"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T00:00:00Z","timestamp":1753228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T00:00:00Z","timestamp":1753228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01096-y","type":"journal-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T10:38:58Z","timestamp":1753267138000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The impact of cyber threat intelligence (CTI) on employee behavior and skills and the implications for organizational cyber resilience"],"prefix":"10.1007","volume":"24","author":[{"given":"Zafrir","family":"Avrahami","sequence":"first","affiliation":[]},{"given":"Moti","family":"Zwilling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,23]]},"reference":[{"issue":"5","key":"1096_CR1","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1108\/ICS-11-2016-0085","volume":"25","author":"JH Addae","year":"2017","unstructured":"Addae, J.H., Brown, M., Sun, X., Towey, D., Radenkovic, M.: Measuring attitude towards personal data for adaptive cybersecurity. Inf. Comput. Secur. 25(5), 560\u2013579 (2017). https:\/\/doi.org\/10.1108\/ICS-11-2016-0085","journal-title":"Inf. Comput. Secur."},{"issue":"1","key":"1096_CR2","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Procedia Comput. Sci. 60(1), 708\u2013713 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.08.220","journal-title":"Procedia Comput. Sci."},{"issue":"8","key":"1096_CR3","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1002\/asi.24311","volume":"71","author":"A Ahmad","year":"2020","unstructured":"Ahmad, A., Desouza, K.C., Maynard, S.B., Naseer, H., Baskerville, R.L.: How integration of cyber security management and incident response enables organizational learning. J. Assoc. Inf. Sci. Technol. 71(8), 939\u2013953 (2020). https:\/\/doi.org\/10.1002\/asi.24311","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"4","key":"1096_CR4","doi-asserted-by":"publisher","first-page":"926","DOI":"10.51594\/csitrj.v5i4.1081","volume":"5","author":"MO Akinsanya","year":"2024","unstructured":"Akinsanya, M.O., Ekechi, C.C., Okeke, C.D.: The evolution of cyber resilience frameworks in network security: a conceptual analysis. Comput. Sci. IT Res. J. 5(4), 926\u2013949 (2024). https:\/\/doi.org\/10.51594\/csitrj.v5i4.1081","journal-title":"Comput. Sci. IT Res. J."},{"key":"1096_CR5","unstructured":"Alberts, C., Dorofee, A., Killcrece, G., Ruefle, R., Zajicek, M.: Defining incident management processes for CSIRTs: a work in progress. Carnegie Mellon Technical Report CMU\/SEI-2004-TR-015. https:\/\/citeseerx.ist.psu.edu\/document?repid=rep1&type=pdf&doi=97c3ba36dc7b26d697275e58a715c462a6d60af3"},{"issue":"11","key":"1096_CR6","doi-asserted-by":"publisher","first-page":"630","DOI":"10.14569\/IJACSA.2021.0121172","volume":"12","author":"L Alzahrani","year":"2021","unstructured":"Alzahrani, L.: Statistical analysis of cybersecurity awareness issues in higher education institutes. IJACSA: Int. J. Adv. Comput. Sci. Appl. 12(11), 630 (2021). https:\/\/doi.org\/10.14569\/IJACSA.2021.0121172","journal-title":"IJACSA: Int. J. Adv. Comput. Sci. Appl."},{"issue":"7","key":"1096_CR7","first-page":"1696","volume":"9","author":"A Arniyati","year":"2015","unstructured":"Arniyati, A., Johnson, C., Storer, T.: An Investigation on organisation cyber resilience. Int. J. Comput. Syst. Eng. 9(7), 1696\u20131701 (2015)","journal-title":"Int. J. Comput. Syst. Eng."},{"key":"1096_CR8","doi-asserted-by":"publisher","unstructured":"Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G., Scarfone, K.: Guide for cybersecurity event recovery. NIST Special Publication 800-184 (2016). https:\/\/doi.org\/10.6028\/NIST.SP.800-184","DOI":"10.6028\/NIST.SP.800-184"},{"key":"1096_CR9","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-16486-1_31","volume":"353","author":"F Bj\u00f6rck","year":"2015","unstructured":"Bj\u00f6rck, F., Henkel, M., Stirna, J., Zdravkovic, J.: Cyber resilience\u2014fundamentals for a definition. Adv. Intell. Syst. Comput. 353, 311\u2013316 (2015). https:\/\/doi.org\/10.1007\/978-3-319-16486-1_31","journal-title":"Adv. Intell. Syst. Comput."},{"key":"1096_CR10","unstructured":"Brown, R., & Lee, R.M.: 2021 SANS Cyber Threat Intelligence (CTI) Survey (2021). https:\/\/www.sans.org\/white-papers\/40080\/"},{"key":"1096_CR11","unstructured":"Brown, R., Sfakianakis, A.: SANS CTI Survey 2024: managing the evolving threat landscape (2024). https:\/\/www.sans.org\/webcasts\/sans-2024-cti-survey-managing-the-evolving-threat-landscape\/"},{"key":"1096_CR12","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Roles of information security awareness and perceived fairness in information security policy compliance. AMCIS 2009 (2009). https:\/\/aisel.aisnet.org\/amcis2009\/419"},{"key":"1096_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/J.JISA.2018.08.002","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36\u201345 (2018). https:\/\/doi.org\/10.1016\/J.JISA.2018.08.002","journal-title":"J. Inf. Secur. Appl."},{"key":"1096_CR14","unstructured":"Callewaert, B.: Antecedents and impacts of behavioral adaptation of electronic medical records. Open Universiteit (2020). https:\/\/research.ou.nl\/en\/studentTheses\/antecedents-and-impacts-of-behavioral-adaptation-of-electronic-me"},{"key":"1096_CR15","unstructured":"Cambridge Dictionary: PROACTIVE | English meaning\u2014Cambridge Dictionary. Cambridge Dictionary. https:\/\/dictionary.cambridge.org\/dictionary\/english\/proactive (n.d.). Retrieved 14 Aug 2024"},{"issue":"5","key":"1096_CR16","doi-asserted-by":"publisher","first-page":"e1473","DOI":"10.1002\/widm.1473","volume":"12","author":"M Chaudhary","year":"2022","unstructured":"Chaudhary, M., Bansal, D.: Open source intelligence extraction for terrorism-related information: a review. Wiley Interdiscip. Rev.: Data Mining Knowl. Discov. 12(5), e1473 (2022). https:\/\/doi.org\/10.1002\/widm.1473","journal-title":"Wiley Interdiscip. Rev.: Data Mining Knowl. Discov."},{"key":"1096_CR17","unstructured":"Check Point Research: Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally\u2014Check Point Blog (2024). https:\/\/blog.checkpoint.com\/research\/shifting-attack-landscapes-and-sectors-in-q1-2024-with-a-28-increase-in-cyber-attacks-globally\/"},{"key":"1096_CR18","doi-asserted-by":"publisher","DOI":"10.2196\/51616","volume":"25","author":"JY Choi","year":"2023","unstructured":"Choi, J.Y., Choi, S., Song, K., Baek, J., Kim, H., Choi, M., Kim, Y., Chu, S.H., Shin, J.: Everyday digital literacy questionnaire for older adults: instrument development and validation study. J. Med. Internet Res. 25, e51616 (2023). https:\/\/doi.org\/10.2196\/51616","journal-title":"J. Med. Internet Res."},{"key":"1096_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/su151813404","author":"SH Choi","year":"2023","unstructured":"Choi, S.H., Youn, J., Kim, K., Lee, S., Kwon, O.J., Shin, D.: Cyber-resilience evaluation methods focusing on response time to cyber infringement. Sustainability (2023). https:\/\/doi.org\/10.3390\/su151813404","journal-title":"Sustainability"},{"key":"1096_CR20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-61r2","author":"P Cichonski","year":"2012","unstructured":"Cichonski, P., Millar, T., Grance, T., Scarfone, K.: Computer security incident handling guide: recommendations of the National Institute of Standards and Technology. NIST (2012). https:\/\/doi.org\/10.6028\/NIST.SP.800-61r2","journal-title":"NIST"},{"key":"1096_CR21","unstructured":"Congress.gov: S. 2201, American Cybersecurity Literacy Act | Congressional Budget Office (2023). https:\/\/www.cbo.gov\/publication\/59553"},{"issue":"2","key":"1096_CR22","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1002\/DA.10113","volume":"18","author":"KM Connor","year":"2003","unstructured":"Connor, K.M., Davidson, J.R.T.: Development of a new resilience scale: the Connor-Davidson Resilience Scale (CD-RISC). Depress. Anxiety 18(2), 76\u201382 (2003). https:\/\/doi.org\/10.1002\/DA.10113","journal-title":"Depress. Anxiety"},{"key":"1096_CR23","doi-asserted-by":"publisher","unstructured":"Deelman, E., Stodden, V., Taufer, M., Welch, V.: Initial thoughts on cybersecurity and reproducibility. In: ACM Digital Library, pp. 13\u201315 (2019). https:\/\/doi.org\/10.1145\/3322790.3330593","DOI":"10.1145\/3322790.3330593"},{"issue":"2","key":"1096_CR24","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/S10669-015-9540-Y\/METRICS","volume":"35","author":"D DiMase","year":"2015","unstructured":"DiMase, D., Collier, Z.A., Heffner, K., Linkov, I.: Systems engineering framework for cyber physical security and resilience. Environ. Syst. Decis. 35(2), 291\u2013300 (2015). https:\/\/doi.org\/10.1007\/S10669-015-9540-Y\/METRICS","journal-title":"Environ. Syst. Decis."},{"issue":"1","key":"1096_CR25","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/J.COSE.2006.10.009","volume":"26","author":"RC Dodge","year":"2007","unstructured":"Dodge, R.C., Carver, C., Ferguson, A.J.: Phishing for user security awareness. Comput. Secur. 26(1), 73\u201380 (2007). https:\/\/doi.org\/10.1016\/J.COSE.2006.10.009","journal-title":"Comput. Secur."},{"issue":"3","key":"1096_CR26","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/J.GLOENVCHA.2006.04.002","volume":"16","author":"C Folke","year":"2006","unstructured":"Folke, C.: Resilience: the emergence of a perspective for social\u2013ecological systems analyses. Glob. Environ. Chang. 16(3), 253\u2013267 (2006). https:\/\/doi.org\/10.1016\/J.GLOENVCHA.2006.04.002","journal-title":"Glob. Environ. Chang."},{"key":"1096_CR27","unstructured":"Gartner Research: Definition: threat intelligence. gartner research (2013, May 16). https:\/\/www.gartner.com\/en\/documents\/2487216"},{"key":"1096_CR28","unstructured":"Goodwyn, J.C., Moore, R.A., Jordan, W., Richardson, J.: Defense advanced research projects agency technology transition (1997). https:\/\/apps.dtic.mil\/sti\/tr\/pdf\/ADA434135.pdf"},{"key":"1096_CR29","doi-asserted-by":"publisher","first-page":"110397","DOI":"10.1016\/j.dib.2024.110397","volume":"54","author":"Y Harmawati","year":"2024","unstructured":"Harmawati, Y., Sapriya, Abdulkarim, A., Bestari, P., Sari, B.I.: Data of digital literacy level measurement of Indonesian students. Data Brief 54, 110397 (2024). https:\/\/doi.org\/10.1016\/j.dib.2024.110397","journal-title":"Data Brief"},{"key":"1096_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/J.IOT.2020.100204","volume":"11","author":"K Hausken","year":"2020","unstructured":"Hausken, K.: Cyber resilience in firms, organizations and societies. Internet Things 11, 100204 (2020). https:\/\/doi.org\/10.1016\/J.IOT.2020.100204","journal-title":"Internet Things"},{"key":"1096_CR31","unstructured":"Hollnagel, E.. Introduction to the resilience analysis grid (RAG). RAG-resilience analysis grid. erikhollnagel.com (2015). https:\/\/erikhollnagel.com\/onewebmedia\/RAG%20Outline%20V2.pdf"},{"key":"1096_CR32","doi-asserted-by":"publisher","DOI":"10.1201\/9781317065265","volume-title":"Resilience Engineering in Practice: A Guidebook","author":"E Hollnagel","year":"2013","unstructured":"Hollnagel, E., Pari\u00e8s, J., Woods, D., Wreathall, J.: Resilience Engineering in Practice: A Guidebook. Ashgate Publishing Ltd, Farnham (2013). https:\/\/doi.org\/10.1201\/9781317065265"},{"key":"1096_CR33","unstructured":"Homeland Security (DHS). Homeland Threat Assessment 2024. In DHS.GOV (2024). https:\/\/www.dhs.gov\/sites\/default\/files\/2023-09\/23_0913_ia_23-333-ia_u_homeland-threat-assessment-2024_508C_V6_13Sep23.pdf"},{"key":"1096_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph181910120","author":"Y Huang","year":"2021","unstructured":"Huang, Y., Liu, H., Wang, W., Dong, R., Tang, Y.: The junior students\u2019 internet literacy scale: measure development and validation. Int. J. Environ. Res. Public Health (2021). https:\/\/doi.org\/10.3390\/ijerph181910120","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"1096_CR35","unstructured":"ISO Organization. ISO\/IEC 27001:2022\u2014Information security management systems (2022). https:\/\/www.iso.org\/standard\/27001"},{"key":"1096_CR36","unstructured":"Jeimy, C.: ISACA\u2014the human factor in information security. ISACA J. (2019). https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2019\/volume-5\/the-human-factor-in-information-security#4"},{"key":"1096_CR37","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyad007","author":"AN Joinson","year":"2023","unstructured":"Joinson, A.N., Dixon, M., Coventry, L., Briggs, P.: Development of a new \u2018human cyber-resilience scale.\u2019 J. Cybersecur. (2023). https:\/\/doi.org\/10.1093\/cybsec\/tyad007","journal-title":"J. Cybersecur."},{"key":"1096_CR38","unstructured":"Klein, G.: Anomaly detection: the art of noticing the unexpected | psychology today. Psychology Today (2020). https:\/\/www.psychologytoday.com\/us\/blog\/seeing-what-others-dont\/202010\/anomaly-detection-the-art-noticing-the-unexpected"},{"key":"1096_CR39","doi-asserted-by":"publisher","first-page":"80","DOI":"10.15388\/Im.2023.96.67","volume":"96","author":"KR Kont","year":"2023","unstructured":"Kont, K.R.: Cyber literacy skills of Estonians: activities and policies for encouraging knowledge-based cyber security attitudes. Inf. Media 96, 80\u201394 (2023). https:\/\/doi.org\/10.15388\/Im.2023.96.67","journal-title":"Inf. Media"},{"key":"1096_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3","volume-title":"Cyber Resilience of Systems and Networks","author":"A Kott","year":"2019","unstructured":"Kott, A., Linkov, I.: Cyber Resilience of Systems and Networks. Springer, Berlin (2019). https:\/\/doi.org\/10.1007\/978-3-319-77492-3"},{"key":"1096_CR41","doi-asserted-by":"publisher","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: Conference on Human Factors in Computing Systems - Proceedings, pp. 905\u2013914 (2007). https:\/\/doi.org\/10.1145\/1240624.1240760","DOI":"10.1145\/1240624.1240760"},{"key":"1096_CR42","doi-asserted-by":"publisher","first-page":"144895","DOI":"10.1109\/ACCESS.2021.3122433","volume":"9","author":"MH Larsen","year":"2021","unstructured":"Larsen, M.H., Lund, M.S.: Cyber risk perception in the maritime domain: a systematic literature review. IEEE Access 9, 144895\u2013144905 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3122433","journal-title":"IEEE Access"},{"issue":"1","key":"1096_CR43","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/S10611-016-9662-2","volume":"67","author":"ER Leukfeldt","year":"2017","unstructured":"Leukfeldt, E.R., Kleemans, E.R., Stol, W.P.: A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists. Crime Law Soc. Change 67(1), 21\u201337 (2017). https:\/\/doi.org\/10.1007\/S10611-016-9662-2","journal-title":"Crime Law Soc. Change"},{"issue":"4","key":"1096_CR44","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1177\/002224299105500403","volume":"55","author":"DJ Maclnnis","year":"1991","unstructured":"Maclnnis, D.J., Moorman, C., Jaworski, B.J.: Enhancing and measuring consumers\u2019 motivation, opportunity, and ability to process brand information from ads. J. Mark. (JM) 55(4), 32\u201353 (1991). https:\/\/doi.org\/10.1177\/002224299105500403","journal-title":"J. Mark. (JM)"},{"key":"1096_CR45","unstructured":"Maricus, K.B., Mayunga, O.: Developing and assessing a cyber-resilience framework for Kenyan banks. Africa Nazarene University (2019). http:\/\/hdl.handle.net\/123456789\/527"},{"issue":"2","key":"1096_CR46","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1108\/17504971311328071","volume":"7","author":"J Matzenberger","year":"2013","unstructured":"Matzenberger, J.: A novel approach to exploring the concept of resilience and principal drivers in a learning environment. Multicult. Educ. Technol. J. 7(2), 192\u2013206 (2013). https:\/\/doi.org\/10.1108\/17504971311328071","journal-title":"Multicult. Educ. Technol. J."},{"key":"1096_CR47","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1201\/9781315605685-16\/organisational-resilience-industrial-risk-nick-mcdonald","volume-title":"Resilience Engineering: Concepts and Precepts","author":"N McDonald","year":"2017","unstructured":"McDonald, N.: Organisational resilience and industrial risk. In: McDonald, N. (ed.) Resilience Engineering: Concepts and Precepts, pp. 155\u2013180. CRC Press, Boca Raton (2017). https:\/\/doi.org\/10.1201\/9781315605685-16\/organisational-resilience-industrial-risk-nick-mcdonald"},{"issue":"1","key":"1096_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1748-5908-6-42\/TABLES\/3","volume":"6","author":"S Michie","year":"2011","unstructured":"Michie, S., van Stralen, M.M., West, R.: The behaviour change wheel: a new method for characterising and designing behaviour change interventions. Implement. Sci. 6(1), 1\u201312 (2011). https:\/\/doi.org\/10.1186\/1748-5908-6-42\/TABLES\/3","journal-title":"Implement. Sci."},{"key":"1096_CR49","unstructured":"Naenfeldt, C.: Cyber risk perception and risk prioritization among cyber security professionals. Digitala Vetenskapliga Arkivet (2024). https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:hig:diva-44316"},{"key":"1096_CR50","doi-asserted-by":"publisher","DOI":"10.1177\/21582440211069146","author":"DG Nguyen","year":"2022","unstructured":"Nguyen, D.G., Ha, M.T.: What makes users continue to want to use the digital platform? Evidence from the ride-hailing service platform in Vietnam. SAGE Open (2022). https:\/\/doi.org\/10.1177\/21582440211069146","journal-title":"SAGE Open"},{"issue":"2","key":"1096_CR51","doi-asserted-by":"publisher","first-page":"215824402412538","DOI":"10.1177\/21582440241253889","volume":"14","author":"GD Nguyen","year":"2024","unstructured":"Nguyen, G.D., Thi Dao, T.H.: The moderating role of flow experience on mobile commerce continuance intention: the integrative view of user adaptation, expectation-confirmation, and task-technology models. SAGE Open 14(2), 21582440241253890 (2024). https:\/\/doi.org\/10.1177\/21582440241253889","journal-title":"SAGE Open"},{"key":"1096_CR52","doi-asserted-by":"publisher","unstructured":"NIST: Framework for improving critical infrastructure cybersecurity, version 1.1 (2018). https:\/\/doi.org\/10.6028\/NIST.CSWP.04162018","DOI":"10.6028\/NIST.CSWP.04162018"},{"key":"1096_CR53","doi-asserted-by":"publisher","unstructured":"NIST: The NIST Cybersecurity Framework (CSF) 2.0 (2024). https:\/\/doi.org\/10.6028\/NIST.CSWP.29","DOI":"10.6028\/NIST.CSWP.29"},{"key":"1096_CR54","unstructured":"NIST CSRC: cyber resiliency\u2014Glossary. NIST\u2014Computer Security Resource Center. https:\/\/csrc.nist.gov\/glossary\/term\/cyber_resiliency (n.d.). Retrieved 15 Sept 2024"},{"issue":"1","key":"1096_CR55","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1177\/1071181319631016","volume":"63","author":"M Nyre-Yu","year":"2019","unstructured":"Nyre-Yu, M., Gutzwiller, R.S., Caldwell, B.S.: Observing cyber security incident response: qualitative themes from field research. Proc. Hum. Factors Ergon. Soc. 63(1), 437\u2013431 (2019). https:\/\/doi.org\/10.1177\/1071181319631016","journal-title":"Proc. Hum. Factors Ergon. Soc."},{"issue":"1\u20132","key":"1096_CR56","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/B:CLIM.0000024668.70143.80\/METRICS","volume":"64","author":"K O\u2019Brien","year":"2004","unstructured":"O\u2019Brien, K., Sygna, L., Haugen, J.E.: Vulnerable or resilient? A multi-scale assessment of climate impacts and vulnerability in Norway. Clim. Change 64(1\u20132), 193\u2013225 (2004). https:\/\/doi.org\/10.1023\/B:CLIM.0000024668.70143.80\/METRICS","journal-title":"Clim. Change"},{"key":"1096_CR57","unstructured":"Oroszi, E.D.: ISACA\u2014exploitable traits as vulnerabilities: the human element in security. ISACA J. (2021) https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2021\/volume-5\/exploitable-traits-as-vulnerabilities"},{"key":"1096_CR58","doi-asserted-by":"publisher","first-page":"10282","DOI":"10.1109\/ACCESS.2020.2965257","volume":"8","author":"J Pastor-Galindo","year":"2020","unstructured":"Pastor-Galindo, J., Nespoli, P., Gomez Marmol, F., Martinez Perez, G.: The not yet exploited goldmine of OSINT: opportunities, open challenges and future trends. IEEE Access 8, 10282\u201310304 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2965257","journal-title":"IEEE Access"},{"key":"1096_CR59","unstructured":"Reeves, M., Goodson, B., Whitaker, K.: The power of anomaly. Harvard Business Review (2021). https:\/\/hbr.org\/2021\/07\/the-power-of-anomaly"},{"key":"1096_CR60","unstructured":"Reinm\u00fcller, K.: Towards the adaptation of warning driver assistance: behavioral effects and implications. Katholische Universit\u00e4t Eichst\u00e4tt-Ingolstadt (2019). https:\/\/opus4.kobv.de\/opus4-ku-eichstaett\/frontdoor\/index\/index\/docId\/524"},{"issue":"1\u20133","key":"1096_CR61","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/J.TOXLET.2003.12.051","volume":"149","author":"O Renn","year":"2004","unstructured":"Renn, O.: Perception of risks. Toxicol. Lett. 149(1\u20133), 405\u2013413 (2004). https:\/\/doi.org\/10.1016\/J.TOXLET.2003.12.051","journal-title":"Toxicol. Lett."},{"issue":"18","key":"1096_CR62","doi-asserted-by":"publisher","first-page":"13369","DOI":"10.3390\/su151813369","volume":"15","author":"MF Safitra","year":"2023","unstructured":"Safitra, M.F., Lubis, M., Fakhrurroja, H.: Counterattacking cyber threats: a framework for the future of cybersecurity. Sustainability (Switzerland) 15(18), 13369 (2023). https:\/\/doi.org\/10.3390\/su151813369","journal-title":"Sustainability (Switzerland)"},{"key":"1096_CR63","unstructured":"Schmidt, C., Tom, D.: The what, why, and how of the 1988 internet worm (2001). https:\/\/ethics.csc.ncsu.edu\/abuse\/wvt\/worm\/darby\/worm.html"},{"issue":"1","key":"1096_CR64","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/J.COMPEDU.2008.06.011","volume":"52","author":"RS Shaw","year":"2009","unstructured":"Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.J.: The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(1), 92\u2013100 (2009). https:\/\/doi.org\/10.1016\/J.COMPEDU.2008.06.011","journal-title":"Comput. Educ."},{"key":"1096_CR65","unstructured":"Slovic, P.: Perceptions of risk: reflections on the psychometric paradigm. Core.Ac.Uk (1990). https:\/\/core.ac.uk\/download\/pdf\/84755706.pdf"},{"key":"1096_CR66","doi-asserted-by":"publisher","DOI":"10.60087\/jaigs.v5i1.193","author":"J Smallman","year":"2024","unstructured":"Smallman, J.: The effectiveness of cyber threat intelligence in improving security operations. J. Artif. Intell. General Sci. (JAIGS) (2024). https:\/\/doi.org\/10.60087\/jaigs.v5i1.193","journal-title":"J. Artif. Intell. General Sci. (JAIGS)"},{"key":"1096_CR67","volume-title":"Risk Perception: Theories and Approaches","author":"T Spencer","year":"2016","unstructured":"Spencer, T.: Risk Perception: Theories and Approaches. Nova Science Publishers, New York (2016)"},{"key":"1096_CR68","doi-asserted-by":"publisher","DOI":"10.33050\/itee.v2i1.411","author":"Sulistio","year":"2023","unstructured":"Sulistio: Assessing the factors influencing cybersecurity effectiveness: a PLS-SEM approach. Int. Trans. Educ. Technol. (2023). https:\/\/doi.org\/10.33050\/itee.v2i1.411","journal-title":"Int. Trans. Educ. Technol."},{"key":"1096_CR69","doi-asserted-by":"publisher","unstructured":"Talib, S., Clarke, N.L., Furnell, S.M.: An analysis of information security awareness within home and work environments. In: ARES 2010\u20145th International Conference on Availability, Reliability, and Security, pp. 196\u2013203 (2010). https:\/\/doi.org\/10.1109\/ARES.2010.27","DOI":"10.1109\/ARES.2010.27"},{"key":"1096_CR70","doi-asserted-by":"publisher","DOI":"10.20965\/jdr.2008.p0429","author":"S Tatsuki","year":"2008","unstructured":"Tatsuki, S.: The development and validation of disaster response competency profile indices. J. Disaster Res. (2008). https:\/\/doi.org\/10.20965\/jdr.2008.p0429","journal-title":"J. Disaster Res."},{"key":"1096_CR71","doi-asserted-by":"publisher","unstructured":"Tirumala, S.S., Valluri, M.R., Babu, G.A.. A survey on cybersecurity awareness concerns, practices and conceptual measures. In: 2019 International Conference on Computer Communication and Informatics, ICCCI 2019 (2019). https:\/\/doi.org\/10.1109\/ICCCI.2019.8821951","DOI":"10.1109\/ICCCI.2019.8821951"},{"issue":"3","key":"1096_CR72","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1007\/s10207-023-00811-x","volume":"23","author":"V Tzavara","year":"2024","unstructured":"Tzavara, V., Vassiliadis, S.: Tracing the evolution of cyber resilience: a historical and conceptual review. Int. J. Inf. Secur. 23(3), 1695\u20131719 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00811-x","journal-title":"Int. J. Inf. Secur."},{"key":"1096_CR73","unstructured":"U.S. Army: Joint Intelligence Joint Publication 2-0 (2013). https:\/\/irp.fas.org\/doddir\/dod\/jp2_0.pdf"},{"key":"1096_CR74","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-030-20488-4_2","volume":"960","author":"R van der Kleij","year":"2020","unstructured":"van der Kleij, R., Leukfeldt, R.: Cyber resilient behavior: Integrating human behavioral models and resilience engineering capabilities into cyber security. Adv. Intell. Syst. Comput. 960, 16\u201327 (2020). https:\/\/doi.org\/10.1007\/978-3-030-20488-4_2","journal-title":"Adv. Intell. Syst. Comput."},{"key":"1096_CR75","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.chb.2017.05.038","volume":"75","author":"P van Schaik","year":"2017","unstructured":"van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., Kusev, P.: Risk perceptions of cyber-security and precautionary behaviour. Comput. Human Behav. 75, 547\u2013559 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.05.038","journal-title":"Comput. Human Behav."},{"key":"1096_CR76","unstructured":"Verizon DBIR: Verizon\u20142024 Data Breach Investigations Report (2024). https:\/\/www.verizon.com\/business\/resources\/T134\/reports\/2024-dbir-data-breach-investigations-report.pdf"},{"issue":"4","key":"1096_CR77","first-page":"407","volume":"23","author":"C Yoon","year":"2012","unstructured":"Yoon, C., Hwang, J.-W., Kim, R.: Exploring factors that influence students\u2019 behaviors in information security. J. Inf. Syst. Educ. 23(4), 407\u2013416 (2012)","journal-title":"J. Inf. Syst. Educ."},{"key":"1096_CR78","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-60585-2_23","volume":"593","author":"H Young","year":"2018","unstructured":"Young, H., van Vliet, T., van de Ven, J., Jol, S., Broekman, C.: Understanding human factors in cyber security as a dynamic system. Adv. Intell. Syst. Comput. 593, 244\u2013254 (2018). https:\/\/doi.org\/10.1007\/978-3-319-60585-2_23","journal-title":"Adv. Intell. Syst. Comput."},{"key":"1096_CR79","unstructured":"Zou, Y., Mhaidli, A.H., Mccall, A., Schaub, F.: \u201cI\u2019ve got nothing to lose\u201d: consumers\u2019 risk perceptions and protective actions after the equifax data breach. USENIX Association (2018). https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/zou"},{"issue":"1","key":"1096_CR80","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2022","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141, Cetin, F., Basim, H.N.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62(1), 82\u201397 (2022). https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"J. Comput. Inf. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01096-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01096-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01096-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:36Z","timestamp":1757072016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01096-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,23]]},"references-count":80,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1096"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01096-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,7,23]]},"assertion":[{"value":"1 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"184"}}