{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T08:56:57Z","timestamp":1767430617726,"version":"3.48.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Stockholm School of Economics"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The digitalization of our societies makes them increasingly vulnerable to emerging cyberthreats. These cyberthreats can manifest themselves in the form of organized, sophisticated, and persistent threat actors, as well as nonadversarial mistakes. Staff involved in responding to cyberthreats and handling incidents in organizations need cyber situation awareness. This paper presents a case study on what challenges members of staff involved in cybersecurity in a large, complex organization experience when developing cyber situation awareness while handling a remote code execution vulnerability in the form of Log4Shell. Two types of qualitative empirical material were used for the case study, data collected through semi-structured interviews with ten informants, and internal documentation. The empirical material was analyzed to create a timeline of events in the organization. The results show how information about the threat spread throughout the organization, the types of artifacts that served as common operational pictures, and the role played by information sharing in maintaining staff cyber situation awareness. Three major challenges to the organization were found: (i)\u00a0information sharing among staff was not effortless, (ii)\u00a0there was no organization-wide common operational picture established, and (iii)\u00a0inaccurate information was shared. This study adds a real-world contribution to the literature on organizational handling of cyberthreats.<\/jats:p>","DOI":"10.1007\/s10207-025-01106-z","type":"journal-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T12:06:03Z","timestamp":1758888363000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber situation awareness during an emerging cyberthreat: a case study"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1748-3769","authenticated-orcid":false,"given":"Annika","family":"Andreasson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-9072","authenticated-orcid":false,"given":"Henrik","family":"Artman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2677-9759","authenticated-orcid":false,"given":"Joel","family":"Brynielsson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2017-7914","authenticated-orcid":false,"given":"Ulrik","family":"Franke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,26]]},"reference":[{"key":"1106_CR1","doi-asserted-by":"publisher","unstructured":"Joint Task Force Interagency Working Group: Security and privacy controls for information systems and organizations. NIST Special Publication 800-53, Revision 5, National Institute of Standards and Technology, U.S. Department of Commerce (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-53r5","DOI":"10.6028\/NIST.SP.800-53r5"},{"key":"1106_CR2","doi-asserted-by":"publisher","unstructured":"de\u00a0Smale, S., van Dijk, R., Bouwman, X., van\u00a0der Ham, J., van Eeten, M.: No one drinks from the firehose: how organizations filter and prioritize vulnerability information. In: Proceedings of the 44th IEEE Symposium on Security and Privacy (SP 2023), pp. 203\u2013219. IEEE, Piscataway, NJ (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.10179447","DOI":"10.1109\/SP46215.2023.10179447"},{"key":"1106_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10207-017-0365-1","volume":"17","author":"A Shah","year":"2018","unstructured":"Shah, A., Ganesan, R., Jajodia, S., Cam, H.: A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Secur. 17, 121\u2013134 (2018). https:\/\/doi.org\/10.1007\/s10207-017-0365-1","journal-title":"Int. J. Inf. Secur."},{"key":"1106_CR4","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/s10207-021-00573-4","volume":"21","author":"A Shah","year":"2022","unstructured":"Shah, A., Ganesan, R., Jajodia, S., Cam, H.: Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Secur. 21, 637\u2013651 (2022). https:\/\/doi.org\/10.1007\/s10207-021-00573-4","journal-title":"Int. J. Inf. Secur."},{"key":"1106_CR5","doi-asserted-by":"publisher","unstructured":"Franke, U., Andreasson, A., Artman, H., Brynielsson, J., Varga, S., Vilhelm, N.: Cyber situational awareness issues and challenges. In: Moustafa, A.A. (ed.) Cybersecurity and Cognitive Science, pp. 235\u2013265. Academic Press, London, United Kingdom (2022). https:\/\/doi.org\/10.1016\/B978-0-323-90570-1.00015-2","DOI":"10.1016\/B978-0-323-90570-1.00015-2"},{"issue":"3","key":"1106_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3384471","volume":"1","author":"RS Gutzwiller","year":"2020","unstructured":"Gutzwiller, R.S., Dykstra, J., Payne, B.: Gaps and opportunities in situational awareness for cybersecurity. Digital Threats: Research and Practice 1(3), 1\u20136 (2020). https:\/\/doi.org\/10.1145\/3384471","journal-title":"Digital Threats: Research and Practice"},{"key":"1106_CR7","doi-asserted-by":"publisher","first-page":"3253","DOI":"10.1007\/s10207-024-00872-6","volume":"23","author":"HJ Ofte","year":"2024","unstructured":"Ofte, H.J.: The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure. Int. J. Inf. Secur. 23, 3253\u20133282 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00872-6","journal-title":"Int. J. Inf. Secur."},{"key":"1106_CR8","doi-asserted-by":"publisher","unstructured":"Schraagen, J.M., Chipman, S.F., Shalin, V.L. (eds.): Cognitive Task Analysis. Lawrence Erlbaum (2000). https:\/\/doi.org\/10.4324\/9781410605795","DOI":"10.4324\/9781410605795"},{"issue":"2","key":"1106_CR9","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1207\/s15327108ijap0302_5","volume":"3","author":"MR Endsley","year":"1993","unstructured":"Endsley, M.R.: A survey of situation awareness requirements in air-to-air combat fighters. Int. J. Aviation Psychology 3(2), 157\u2013168 (1993). https:\/\/doi.org\/10.1207\/s15327108ijap0302_5","journal-title":"Int. J. Aviation Psychology"},{"key":"1106_CR10","first-page":"5013","volume-title":"International Encyclopedia of Business and Management","author":"K Dooley","year":"2002","unstructured":"Dooley, K.: Organizational complexity. In: Warner, M. (ed.) International Encyclopedia of Business and Management, 2nd edn., pp. 5013\u20135022. Thomson Learning, London, United Kingdom (2002)","edition":"2"},{"issue":"6","key":"1106_CR11","doi-asserted-by":"publisher","first-page":"5921","DOI":"10.1109\/TNSM.2024.3440188","volume":"21","author":"R Hiesgen","year":"2024","unstructured":"Hiesgen, R., Nawrocki, M., Schmidt, T.C., W\u00e4hlisch, M.: The Log4j incident: a comprehensive measurement study of a critical vulnerability. IEEE Trans. Netw. Serv. Manage. 21(6), 5921\u20135934 (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3440188","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"1106_CR12","unstructured":"Doll, J., McCarthy, C., McDougall, H., Bhunia, S.: Unraveling Log4Shell: analyzing the impact and response to the Log4j vulnerability (2025). https:\/\/doi.org\/10.48550\/arXiv.2501.17760"},{"key":"1106_CR13","unstructured":"Associated Press: Recently uncovered software flaw \u2018most critical vulnerability of the last decade.\u2019 The Guardian (2021). https:\/\/www.theguardian.com\/technology\/2021\/dec\/10\/software-flaw-most-critical-vulnerability-log-4-shell"},{"issue":"4","key":"1106_CR14","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1080\/14639220701561775","volume":"9","author":"PM Salmon","year":"2008","unstructured":"Salmon, P.M., Stanton, N.A., Walker, G.H., Baber, C., Jenkins, D.P., McMaster, R., Young, M.S.: What really is going on? Review of situation awareness models for individuals and teams. Theor. Issues Ergon. Sci. 9(4), 297\u2013323 (2008). https:\/\/doi.org\/10.1080\/14639220701561775","journal-title":"Theor. Issues Ergon. Sci."},{"issue":"1","key":"1106_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"MR Endsley","year":"1995","unstructured":"Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37(1), 32\u201364 (1995). https:\/\/doi.org\/10.1518\/001872095779049543","journal-title":"Hum. Factors"},{"key":"1106_CR16","doi-asserted-by":"publisher","unstructured":"Tadda, G.P., Salerno, J.S.: Overview of cyber situation awareness. In: Jajodia, S., Liu, P., Swarup, V., Wang, C. (eds.) Cyber Situational Awareness: Issues and Research, volume\u00a046 of Advances in Information Security, pp. 15\u201335. Springer, Boston, MA (2010). https:\/\/doi.org\/10.1007\/978-1-4419-0140-8_2","DOI":"10.1007\/978-1-4419-0140-8_2"},{"key":"1106_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2014.06.008","volume":"46","author":"U Franke","year":"2014","unstructured":"Franke, U., Brynielsson, J.: Cyber situational awareness: a systematic review of the literature. Comput. Secur. 46, 18\u201331 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.06.008","journal-title":"Comput. Secur."},{"key":"1106_CR18","doi-asserted-by":"publisher","unstructured":"Brynielsson, J., Franke, U., Varga, S.: Cyber situational awareness testing. In: Akhgar, B., Brewster, B. (eds.) Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities, Advanced Sciences and Technologies for Security Applications, chapter\u00a012, pp. 209\u2013233. Springer, Cham, Switzerland (2016). https:\/\/doi.org\/10.1007\/978-3-319-38930-1_12","DOI":"10.1007\/978-3-319-38930-1_12"},{"key":"1106_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103069","volume":"126","author":"HJ Ofte","year":"2023","unstructured":"Ofte, H.J., Katsikas, S.: Understanding situation awareness in SOCs, a systematic literature review. Comput. Secur. 126, 103069 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.103069","journal-title":"Comput. Secur."},{"key":"1106_CR20","doi-asserted-by":"publisher","first-page":"57525","DOI":"10.1109\/ACCESS.2022.3178195","volume":"10","author":"L Jiang","year":"2022","unstructured":"Jiang, L., Jayatilaka, A., Nasim, M., Grobler, M., Zahedi, M., Babar, M.A.: Systematic literature review on cyber situational awareness visualizations. IEEE Access 10, 57525\u201357554 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3178195","journal-title":"IEEE Access"},{"issue":"4","key":"1106_CR21","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s10111-024-00779-1","volume":"26","author":"A Andreasson","year":"2024","unstructured":"Andreasson, A., Artman, H., Brynielsson, J., Franke, U.: Cybersecurity work at Swedish administrative authorities: taking action or waiting for approval. Cognition, Technology & Work 26(4), 709\u2013731 (2024). https:\/\/doi.org\/10.1007\/s10111-024-00779-1","journal-title":"Cognition, Technology & Work"},{"issue":"1","key":"1106_CR22","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1111\/j.1540-6210.2007.00827.x","volume":"67","author":"LK Comfort","year":"2007","unstructured":"Comfort, L.K.: Crisis management in hindsight: cognition, communication, coordination, and control. Public Adm. Rev. 67(1), 189\u2013197 (2007). https:\/\/doi.org\/10.1111\/j.1540-6210.2007.00827.x","journal-title":"Public Adm. Rev."},{"issue":"4","key":"1106_CR23","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1111\/1468-5973.12027","volume":"21","author":"J Wolbers","year":"2013","unstructured":"Wolbers, J., Boersma, K.: The common operational picture as collective sensemaking. J. Conting. Crisis Manage. 21(4), 186\u2013199 (2013). https:\/\/doi.org\/10.1111\/1468-5973.12027","journal-title":"J. Conting. Crisis Manage."},{"key":"1106_CR24","unstructured":"MSB: Gemensamma grunder f\u00f6r samverkan och ledning vid samh\u00e4llsst\u00f6rningar [Common bases for collaboration and management in the event of societal disruptions]. Publ. MSB777, Swedish Civil Contingencies Agency, Karlstad, Sweden (2018)"},{"key":"1106_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102239","volume":"105","author":"S Varga","year":"2021","unstructured":"Varga, S., Brynielsson, J., Franke, U.: Cyber-threat perception and risk management in the Swedish financial sector. Comput. Secur. 105, 102239 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102239","journal-title":"Comput. Secur."},{"key":"1106_CR26","doi-asserted-by":"publisher","unstructured":"Varga, S., Brynielsson, J., Franke, U.: Information requirements for national level cyber situational awareness. In: Proceedings of the 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2018), pp. 774\u2013781. IEEE, Piscataway, NJ (2018). https:\/\/doi.org\/10.1109\/ASONAM.2018.8508410","DOI":"10.1109\/ASONAM.2018.8508410"},{"key":"1106_CR27","doi-asserted-by":"publisher","unstructured":"McKenna, S., Staheli, D., Meyer, M.: Unlocking user-centered design methods for building cyber security visualizations. In: Proceedings of the 2015 IEEE Symposium on Visualization for Cyber Security (VizSec 2015), pp. 1\u20138. IEEE, Piscataway, NJ (2015). https:\/\/doi.org\/10.1109\/VIZSEC.2015.7312771","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"1106_CR28","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1007\/s10207-022-00613-7","volume":"21","author":"F Skopik","year":"2022","unstructured":"Skopik, F., Bonitz, A., Grantz, V., G\u00f6hler, G.: From scattered data to actionable knowledge: flexible cyber security reporting in the military domain. Int. J. Inf. Secur. 21, 1323\u20131347 (2022). https:\/\/doi.org\/10.1007\/s10207-022-00613-7","journal-title":"Int. J. Inf. Secur."},{"key":"1106_CR29","doi-asserted-by":"publisher","unstructured":"Rajivan, P., Cooke, N.: Impact of team collaboration on cybersecurity situational awareness. In: Liu, P., Jajodia, S., Wang, C. (eds.) Theory and Models for Cyber Situation Awareness, pp. 203\u2013226. Springer, Cham, Switzerland (2017). https:\/\/doi.org\/10.1007\/978-3-319-61152-5_8","DOI":"10.1007\/978-3-319-61152-5_8"},{"key":"1106_CR30","doi-asserted-by":"publisher","unstructured":"Paul, C.L., Whitley, K.: A taxonomy of cyber awareness questions for the user-centered design of cyber situation awareness. In: Proceedings of the 15th International Conference on Human-Computer Interaction, pp. 145\u2013154. Springer, Berlin\/Heidelberg, Germany (2013). https:\/\/doi.org\/10.1007\/978-3-642-39345-7_16","DOI":"10.1007\/978-3-642-39345-7_16"},{"key":"1106_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102122","volume":"101","author":"A Ahmad","year":"2021","unstructured":"Ahmad, A., Maynard, S.B., Desouza, K.C., Kotsias, J., Whitty, M.T., Baskerville, R.L.: How can organizations develop situation awareness for incident response: a case study of management practice. Comput. Secur. 101, 102122 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102122","journal-title":"Comput. Secur."},{"key":"1106_CR32","doi-asserted-by":"publisher","unstructured":"Nyre-Yu, M., Gutzwiller, R.S., Caldwell, B.S.: Observing cyber security incident response: qualitative themes from field research. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 63(1), 437\u2013441 (2019). https:\/\/doi.org\/10.1177\/1071181319631016","DOI":"10.1177\/1071181319631016"},{"key":"1106_CR33","doi-asserted-by":"publisher","unstructured":"Ofte, H.J., Katsikas, S.: Paralyzed or compromised: a case study of decisions in cyber-physical systems. In: Proceedings of the 26th International Conference on Human-Computer Interaction, pp. 134\u2013152. Springer, Cham, Switzerland (2024). https:\/\/doi.org\/10.1007\/978-3-031-61382-1_9","DOI":"10.1007\/978-3-031-61382-1_9"},{"key":"1106_CR34","doi-asserted-by":"publisher","unstructured":"Bartnes, M., Moe, N.B., Heegaard, P.E.: The future of information security incident management training: a case study of electrical power companies. Comput. Secur. 61, 32\u201345 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.05.004","DOI":"10.1016\/j.cose.2016.05.004"},{"key":"1106_CR35","unstructured":"Yin, R.K.: Case Study Research and Applications: Design and Methods, 6th edn. SAGE, Los Angeles, CA (2018)"},{"key":"1106_CR36","unstructured":"Creswell, J.W.: Qualitative Inquiry and Research Design: Choosing Among Five Approaches, 3rd edn. SAGE, Thousand Oaks, CA (2013)"},{"key":"1106_CR37","unstructured":"Spak, U.: The common operational picture: a powerful enabler or a cause of severe misunderstanding? In: Proceedings of the 22nd International Command and Control Research and Technology Symposium (22nd ICCRTS). International Command and Control Institute (2017). https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:fhs:diva-7172"},{"key":"1106_CR38","doi-asserted-by":"publisher","unstructured":"Patterson, C.M., Nurse, J.R.C., Franqueira, V.N.L.: I don\u2019t think we\u2019re there yet: the practices and challenges of organisational learning from cyber security incidents. Comput. Secur. 139, 103699 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103699","DOI":"10.1016\/j.cose.2023.103699"},{"issue":"8","key":"1106_CR39","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1002\/asi.24311","volume":"71","author":"A Ahmad","year":"2020","unstructured":"Ahmad, A., Desouza, K.C., Maynard, S.B., Naseer, H., Baskerville, R.L.: How integration of cyber security management and incident response enables organizational learning. J. Assn. Inf. Sci. Tec. 71(8), 939\u2013953 (2020). https:\/\/doi.org\/10.1002\/asi.24311","journal-title":"J. Assn. Inf. Sci. Tec."},{"key":"1106_CR40","doi-asserted-by":"publisher","unstructured":"Cheng, Y., Deng, J., Li, J., DeLoach, S.A., Singhal, A., Ou, X.: Metrics of security. In: Kott, A., Wang, C., Erbacher, R.F. (eds.) Cyber Defense and Situational Awareness, volume\u00a062 of Advances in Information Security, pp. 263\u2013295. Springer, Cham, Switzerland (2014). https:\/\/doi.org\/10.1007\/978-3-319-11391-3_13","DOI":"10.1007\/978-3-319-11391-3_13"},{"key":"1106_CR41","doi-asserted-by":"publisher","unstructured":"Andreasson, A., Lindquist, S.: Envisioning cyber situation awareness through participatory video prototyping. In: Proceedings of the 22nd International Conference on Information Systems for Crisis Response and Management (ISCRAM 2025), Halifax, Canada (2025). https:\/\/doi.org\/10.59297\/xp06tf49","DOI":"10.59297\/xp06tf49"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01106-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01106-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01106-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T08:52:24Z","timestamp":1767430344000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01106-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,26]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1106"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01106-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,9,26]]},"assertion":[{"value":"22 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: minor spelling and style deviations are corrected.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have influenced the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All participants in this study gave informed consent in accordance with Swedish law.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The study is designed in accordance with the Swedish Ethical Review Act (2003:460), which stipulates that an ethics review must be performed by a national agency (the Ethics Review Authority) if the research fulfills at least one of the following criteria: (i)\u00a0there is a physical intervention on the research subject (alive or deceased), (ii)\u00a0the research method is intended to physically or psychologically affect the research person, (iii)\u00a0there is an obvious risk of physical or psychological harm, (iv)\u00a0biological matter from the research persons (alive or deceased) is used and traceable to them, or (v)\u00a0sensitive personal data or personal data concerning the crime record are handled. In our case, it is obvious that the first four criteria do not apply. With respect to the fifth, KTH Royal Institute of Technology has assessed that the study is designed so that sensitive personal data or personal data about violations of the law are not included in the study, and that the study does not intend to process such data.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"217"}}