{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:24:48Z","timestamp":1769919888825,"version":"3.49.0"},"reference-count":104,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Institute for Energy Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The digital era has introduced information technology, driving the demand for organizations to protect their critical assets and resources. Cybersecurity concerns the protection of information systems from attack. Organizational resilience refers to a system\u2019s ability to adapt to change, a modern concept that is increasingly significant in our continually evolving society and is particularly relevant in the context of cybersecurity. The organization\u2019s ability to respond to cyberattacks and its mature resilience against successful attacks reflect the concept of resilient systems. This study presents a cyber-resilience management framework based on an exploratory multiple-case study analysis across four organizations and an analysis of existing cybersecurity literature. We propose a framework for investment decisions in cyber-resilience systems, based on derived context, that enables organizations to make informed investment decisions in cybersecurity. The outcomes provide key insights into the factors that influence managerial and investment decision-making in the development of cyber-resilient systems.<\/jats:p>","DOI":"10.1007\/s10207-025-01196-9","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T14:23:22Z","timestamp":1769091802000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Context-based and investment decision-making cyber resilient systems: an empirical approach"],"prefix":"10.1007","volume":"25","author":[{"given":"Kousik","family":"Barik","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Fernandez-Sanz","sequence":"additional","affiliation":[]},{"given":"Sabarathinam","family":"Chockalingam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"issue":"4","key":"1196_CR1","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s12599-017-0509-x","volume":"60","author":"M-S Denner","year":"2018","unstructured":"Denner, M.-S., P\u00fcschel, L.C., R\u00f6glinger, M.: How to exploit the digitalization potential of business processes. Bus. Inf. Syst. Eng. 60(4), 331\u2013349 (2018). https:\/\/doi.org\/10.1007\/s12599-017-0509-x","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"4","key":"1196_CR2","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TSMC.2017.2700495","volume":"49","author":"G Tsakalidis","year":"2019","unstructured":"Tsakalidis, G., Vergidis, K.: A systematic approach toward description and classification of cybercrime incidents. IEEE Trans. Syst. Man Cybern. Syst. 49(4), 710\u2013729 (2019). https:\/\/doi.org\/10.1109\/TSMC.2017.2700495","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"1196_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2025.105177","volume":"26","author":"K Barik","year":"2025","unstructured":"Barik, K., Misra, S., L\u00f3pez-Baldominos, I.: Black-box adversarial attack defense approach: an empirical analysis from cybersecurity perceptive. Results Eng. 26, 105177 (2025). https:\/\/doi.org\/10.1016\/j.rineng.2025.105177","journal-title":"Results Eng."},{"issue":"5","key":"1196_CR4","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2012.12.017","journal-title":"Comput. Netw."},{"key":"1196_CR5","unstructured":"\u201cInternational Organization for Standardization(2012).\u201d ISO. [Online]. Available: https:\/\/www.iso.org\/home.html"},{"key":"1196_CR6","unstructured":"National Institute of Standards and Technology: NIST (2024). https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.29.pdf"},{"key":"1196_CR7","unstructured":"\u201cInternational Telecommunication Union: (2008). https:\/\/www.itu.int\/council\/C2008\/index.html"},{"issue":"1","key":"1196_CR8","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1111\/rmir.12169","volume":"24","author":"M Eling","year":"2021","unstructured":"Eling, M., McShane, M., Nguyen, T.: Cyber risk management: history and future research directions. Risk Manag. Insur. Rev. 24(1), 93\u2013125 (2021). https:\/\/doi.org\/10.1111\/rmir.12169","journal-title":"Risk Manag. Insur. Rev."},{"issue":"1","key":"1196_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cose.2009.07.008","volume":"29","author":"GP Spathoulas","year":"2010","unstructured":"Spathoulas, G.P., Katsikas, S.K.: Reducing false positives in intrusion detection systems. Comput. Secur. 29(1), 35\u201344 (2010). https:\/\/doi.org\/10.1016\/j.cose.2009.07.008","journal-title":"Comput. Secur."},{"key":"1196_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2019.119846","volume":"151","author":"J Ramezani","year":"2020","unstructured":"Ramezani, J., Camarinha-Matos, L.M.: Approaches for resilience and antifragility in collaborative business ecosystems. Technol. Forecast. Soc. Change 151, 119846 (2020). https:\/\/doi.org\/10.1016\/j.techfore.2019.119846","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"1","key":"1196_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s40685-019-0085-7","volume":"13","author":"S Duchek","year":"2020","unstructured":"Duchek, S.: Organizational resilience: a capability-based conceptualization. Bus. Res. 13(1), 215\u2013246 (2020). https:\/\/doi.org\/10.1007\/s40685-019-0085-7","journal-title":"Bus. Res."},{"issue":"1","key":"1196_CR12","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2055399","volume":"36","author":"K Barik","year":"2022","unstructured":"Barik, K., Misra, S., Konar, K., Fernandez-Sanz, L., Koyuncu, M.: Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl. Artif. Intell. 36(1), 2055399 (2022). https:\/\/doi.org\/10.1080\/08839514.2022.2055399","journal-title":"Appl. Artif. Intell."},{"key":"1196_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2024.100664","volume":"21","author":"K Barik","year":"2024","unstructured":"Barik, K., Misra, S.: IDS-anta: an open-source code with a defense mechanism to detect adversarial attacks for intrusion detection system. Softw. Impacts 21, 100664 (2024). https:\/\/doi.org\/10.1016\/j.simpa.2024.100664","journal-title":"Softw. Impacts"},{"key":"1196_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122784","volume":"195","author":"I Rubbio","year":"2023","unstructured":"Rubbio, I., Bruccoleri, M.: Unfolding the relationship between digital health and patient safety: the roles of absorptive capacity and healthcare resilience. Technol. Forecast. Soc. Change 195, 122784 (2023). https:\/\/doi.org\/10.1016\/j.techfore.2023.122784","journal-title":"Technol. Forecast. Soc. Change"},{"key":"1196_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-1-4614-1981-5_3","volume-title":"Economics of Information Security and Privacy III","author":"D Flor\u00eancio","year":"2013","unstructured":"Flor\u00eancio, D., Herley, C.: Sex, lies and cyber-crime surveys. In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 35\u201353. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_3"},{"key":"1196_CR16","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-39498-0_12","volume-title":"The Economics of Information Security and Privacy","author":"R Anderson","year":"2013","unstructured":"Anderson, R., et al.: Measuring the cost of cybercrime. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 265\u2013300. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39498-0_12"},{"key":"1196_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-025-00728-9","author":"K Barik","year":"2025","unstructured":"Barik, K., Misra, S., Mohan, R.: Web-based phishing URL detection model using deep learning optimization techniques. Int. J. Data Sci. Anal. (2025). https:\/\/doi.org\/10.1007\/s41060-025-00728-9","journal-title":"Int. J. Data Sci. Anal."},{"key":"1196_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103372","volume":"132","author":"B Dupont","year":"2023","unstructured":"Dupont, B., Shearing, C., Bernier, M., Leukfeldt, R.: The tensions of cyber-resilience: from sensemaking to practice. Comput. Secur. 132, 103372 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103372","journal-title":"Comput. Secur."},{"key":"1196_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102298","volume":"58","author":"P Stacey","year":"2021","unstructured":"Stacey, P., Taylor, R., Olowosule, O., Spanaki, K.: Emotional reactions and coping responses of employees to a cyber-attack: a case study. Int. J. Inf. Manag. 58, 102298 (2021). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102298","journal-title":"Int. J. Inf. Manag."},{"issue":"3","key":"1196_CR20","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1007\/s10207-023-00811-x","volume":"23","author":"V Tzavara","year":"2024","unstructured":"Tzavara, V., Vassiliadis, S.: Tracing the evolution of cyber resilience: a historical and conceptual review. Int. J. Inf. Secur. 23(3), 1695\u20131719 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00811-x","journal-title":"Int. J. Inf. Secur."},{"key":"1196_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100257","volume":"26","author":"PKR Maddikunta","year":"2022","unstructured":"Maddikunta, P.K.R., et al.: Industry 5.0: a survey on enabling technologies and potential applications. J. Ind. Inf. Integr. 26, 100257 (2022). https:\/\/doi.org\/10.1016\/j.jii.2021.100257","journal-title":"J. Ind. Inf. Integr."},{"key":"1196_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975","volume":"215","author":"M Ghiasi","year":"2023","unstructured":"Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., Ghadimi, N.: A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electr. Power Syst. Res. 215, 108975 (2023). https:\/\/doi.org\/10.1016\/j.epsr.2022.108975","journal-title":"Electr. Power Syst. Res."},{"key":"1196_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109644","volume":"241","author":"M Tian","year":"2024","unstructured":"Tian, M., Dong, Z., Gong, L., Wang, X.: Line hardening strategies for resilient power systems considering cyber-topology interdependence. Reliab. Eng. Syst. Saf. 241, 109644 (2024). https:\/\/doi.org\/10.1016\/j.ress.2023.109644","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"1196_CR24","series-title":"NATO Science for Peace and Security Series C: Environmental Security","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-94-024-1123-2_14","volume-title":"Resilience and Risk","author":"PE Roege","year":"2017","unstructured":"Roege, P.E., et al.: Bridging the gap from cyber security to resilience. In: Linkov, I., Palma-Oliveira, J.M. (eds.) Resilience and Risk. NATO Science for Peace and Security Series C: Environmental Security, pp. 383\u2013414. Springer, Dordrecht (2017). https:\/\/doi.org\/10.1007\/978-94-024-1123-2_14"},{"key":"1196_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109886","volume":"243","author":"A Abbasizadeh","year":"2024","unstructured":"Abbasizadeh, A., Azad-Farsani, E.: Cyber-constrained load shedding for smart grid resilience enhancement. Reliab. Eng. Syst. Saf. 243, 109886 (2024). https:\/\/doi.org\/10.1016\/j.ress.2023.109886","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"1196_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2024.104267","volume":"101","author":"S Elkady","year":"2024","unstructured":"Elkady, S., Hernantes, J., G\u00f3mez, E., Labaka, L.: Revealing resilience features: analyzing informal solutions adopted in emergency situations. Int. J. Disast. Risk Reduct. 101, 104267 (2024). https:\/\/doi.org\/10.1016\/j.ijdrr.2024.104267","journal-title":"Int. J. Disast. Risk Reduct."},{"key":"1196_CR27","unstructured":"The cyber resilient organization in Germany: learning to thrive against threats. Ponemon Institute LLC. https:\/\/www.ponemon.org\/local\/upload\/file\/The%20Cyber%20Resilient%20Enterprise%20Germany%20FINAL-2.pdf"},{"issue":"2","key":"1196_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-025-01004-4","volume":"24","author":"D Cohen","year":"2025","unstructured":"Cohen, D., et al.: Human\u2013AI enhancement of cyber threat intelligence. Int. J. Inf. Secur. 24(2), 99 (2025). https:\/\/doi.org\/10.1007\/s10207-025-01004-4","journal-title":"Int. J. Inf. Secur."},{"key":"1196_CR29","unstructured":"Gov.uk.: Collection Cyber resilience (2020). https:\/\/www.gov.uk\/government\/collections\/cyber-resilience"},{"key":"1196_CR30","unstructured":"Law Insider.: Cyber resilience (2022). https:\/\/www.lawinsider.com\/dictionary\/cyber-resilience"},{"key":"1196_CR31","unstructured":"European Central Bank (ECB): https:\/\/www.ecb.europa.eu\/paym\/cyber-resilience\/html\/index.en.html"},{"key":"1196_CR32","unstructured":"Australian Securities and Investments Commission (ASIC): (2023). https:\/\/asic.gov.au\/regulatory-resources\/corporate-governance\/cyber-resilience\/"},{"key":"1196_CR33","unstructured":"World economic forum: key strategies for building cyber resilience in 2024. https:\/\/www.weforum.org\/agenda\/2024\/04\/cybersecurity-key-strategies-cyber-resilience-2024\/"},{"key":"1196_CR34","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","volume":"24","author":"A Marotta","year":"2017","unstructured":"Marotta, A., Martinelli, F., Nanni, S., Orlando, A., Yautsiukhin, A.: Cyber-insurance survey. Comput. Sci. Rev. 24, 35\u201361 (2017). https:\/\/doi.org\/10.1016\/j.cosrev.2017.01.001","journal-title":"Comput. Sci. Rev."},{"issue":"3\/4","key":"1196_CR35","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1108\/GKMC-03-2023-0082","volume":"74","author":"H Nobanee","year":"2025","unstructured":"Nobanee, H., et al.: Mapping cyber insurance: a taxonomical study using bibliometric visualization and systematic analysis. Glob. Knowl. Mem. Commun. 74(3\/4), 1111\u20131138 (2025). https:\/\/doi.org\/10.1108\/GKMC-03-2023-0082","journal-title":"Glob. Knowl. Mem. Commun."},{"key":"1196_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-58986-8_5","volume-title":"Trust, Privacy and Security in Digital Business","author":"A Farao","year":"2020","unstructured":"Farao, A., et al.: SECONDO: a platform for cybersecurity investments and cyber insurance decisions. In: Gritzalis, S., Weippl, E.R., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, vol. 12395, pp. 65\u201374. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58986-8_5"},{"key":"1196_CR37","doi-asserted-by":"publisher","first-page":"12175","DOI":"10.1109\/ACCESS.2017.2773366","volume":"6","author":"M Chronopoulos","year":"2018","unstructured":"Chronopoulos, M., Panaousis, E., Grossklags, J.: An options approach to cybersecurity investment. IEEE Access 6, 12175\u201312186 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2017.2773366","journal-title":"IEEE Access"},{"key":"1196_CR38","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.dss.2016.02.012","volume":"86","author":"A Fielder","year":"2016","unstructured":"Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F.: Decision support approaches for cyber security investment. Decis. Support. Syst. 86, 13\u201323 (2016). https:\/\/doi.org\/10.1016\/j.dss.2016.02.012","journal-title":"Decis. Support. Syst."},{"issue":"1","key":"1196_CR39","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1111\/joes.12456","volume":"36","author":"A Fedele","year":"2022","unstructured":"Fedele, A., Roner, C.: Dangerous games: a literature review on cybersecurity investments. J. Econ. Surveys 36(1), 157\u2013187 (2022). https:\/\/doi.org\/10.1111\/joes.12456","journal-title":"J. Econ. Surveys"},{"issue":"4","key":"1196_CR40","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s11235-023-01039-9","volume":"84","author":"K Barik","year":"2023","unstructured":"Barik, K., Misra, S., Fernandez-Sanz, L., Koyuncu, M.: RONSI: a framework for calculating return on network security investment. Telecommun. Syst. 84(4), 533\u2013548 (2023). https:\/\/doi.org\/10.1007\/s11235-023-01039-9","journal-title":"Telecommun. Syst."},{"issue":"3","key":"1196_CR41","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1007\/s10796-023-10404-7","volume":"26","author":"FA Shaikh","year":"2024","unstructured":"Shaikh, F.A., Siponen, M.: Organizational learning from cybersecurity performance: effects on cybersecurity investment decisions. Inf. Syst. Front. 26(3), 1109\u20131120 (2024). https:\/\/doi.org\/10.1007\/s10796-023-10404-7","journal-title":"Inf. Syst. Front."},{"key":"1196_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2024.109448","volume":"279","author":"M Brho","year":"2025","unstructured":"Brho, M., Jazairy, A., Glassburner, A.V.: The finance of cybersecurity: quantitative modeling of investment decisions and net present value. Int. J. Prod. Econ. 279, 109448 (2025). https:\/\/doi.org\/10.1016\/j.ijpe.2024.109448","journal-title":"Int. J. Prod. Econ."},{"issue":"2","key":"1196_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.digbus.2021.100014","volume":"1","author":"M Wessels","year":"2021","unstructured":"Wessels, M., Van Den Brink, P., Verburgh, T., Cadet, B., Van Ruijven, T.: Understanding incentives for cybersecurity investments: development and application of a typology. Digit. Bus. 1(2), 100014 (2021). https:\/\/doi.org\/10.1016\/j.digbus.2021.100014","journal-title":"Digit. Bus."},{"issue":"1","key":"1196_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.es.04.110173.000245","volume":"4","author":"CS Holling","year":"1973","unstructured":"Holling, C.S.: Resilience and stability of ecological systems. Annu. Rev. Ecol. Syst. 4(1), 1\u201323 (1973). https:\/\/doi.org\/10.1146\/annurev.es.04.110173.000245","journal-title":"Annu. Rev. Ecol. Syst."},{"key":"1196_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494","volume":"112","author":"AE Omolara","year":"2022","unstructured":"Omolara, A.E., et al.: The internet of things security: a survey encompassing unexplored areas and new insights. Comput. Secur. 112, 102494 (2022). https:\/\/doi.org\/10.1016\/j.cose.2021.102494","journal-title":"Comput. Secur."},{"issue":"18","key":"1196_CR46","doi-asserted-by":"publisher","first-page":"15241","DOI":"10.1007\/s00521-022-06959-2","volume":"34","author":"HI Kure","year":"2022","unstructured":"Kure, H.I., Islam, S., Mouratidis, H.: An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Comput. Appl. 34(18), 15241\u201315271 (2022). https:\/\/doi.org\/10.1007\/s00521-022-06959-2","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"1196_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3587255","volume":"7","author":"M Asiri","year":"2023","unstructured":"Asiri, M., Saxena, N., Gjomemo, R., Burnap, P.: Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM Trans. Cyber-Phys. Syst. 7(2), 1\u201333 (2023). https:\/\/doi.org\/10.1145\/3587255","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"issue":"8","key":"1196_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3649218","volume":"56","author":"SM Alhidaifi","year":"2024","unstructured":"Alhidaifi, S.M., Asghar, M.R., Ansari, I.S.: A survey on cyber resilience: key strategies, research challenges, and future directions. ACM Comput. Surv. 56(8), 1\u201348 (2024). https:\/\/doi.org\/10.1145\/3649218","journal-title":"ACM Comput. Surv."},{"key":"1196_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2024.102470","volume":"76","author":"TD Le","year":"2024","unstructured":"Le, T.D., Le-Dinh, T., Uwizeyemungu, S.: Search engine optimization poisoning: a cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises. Technol. Soc. 76, 102470 (2024). https:\/\/doi.org\/10.1016\/j.techsoc.2024.102470","journal-title":"Technol. Soc."},{"key":"1196_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.03.001","volume":"122","author":"K Awuson-David","year":"2021","unstructured":"Awuson-David, K., Al-Hadhrami, T., Alazab, M., Shah, N., Shalaginov, A.: BCFL logging: an approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem. Future Gener. Comput. Syst. 122, 1\u201313 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.03.001","journal-title":"Future Gener. Comput. Syst."},{"key":"1196_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103614","volume":"137","author":"A Corallo","year":"2022","unstructured":"Corallo, A., Lazoi, M., Lezzi, M., Luperto, A.: Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review. Comput. Ind. 137, 103614 (2022). https:\/\/doi.org\/10.1016\/j.compind.2022.103614","journal-title":"Comput. Ind."},{"issue":"5","key":"1196_CR52","doi-asserted-by":"publisher","first-page":"4998","DOI":"10.1109\/TSG.2024.3373008","volume":"15","author":"M Liu","year":"2024","unstructured":"Liu, M., et al.: Enhancing cyber-resiliency of DER-based smart grid: a survey. IEEE Trans. Smart Grid 15(5), 4998\u20135030 (2024). https:\/\/doi.org\/10.1109\/TSG.2024.3373008","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"1196_CR53","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10669-015-9540-y","volume":"35","author":"D DiMase","year":"2015","unstructured":"DiMase, D., Collier, Z.A., Heffner, K., Linkov, I.: Systems engineering framework for cyber physical security and resilience. Environ. Syst. Decis. 35(2), 291\u2013300 (2015). https:\/\/doi.org\/10.1007\/s10669-015-9540-y","journal-title":"Environ. Syst. Decis."},{"key":"1196_CR54","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cose.2016.05.001","volume":"61","author":"H Tran","year":"2016","unstructured":"Tran, H., Campos-Nanez, E., Fomin, P., Wasek, J.: Cyber resilience recovery model to combat zero-day malware attacks. Comput. Secur. 61, 19\u201331 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.05.001","journal-title":"Comput. Secur."},{"key":"1196_CR55","series-title":"NATO Science for Peace and Security Series C: Environmental Security","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-94-024-1123-2_15","volume-title":"Resilience and Risk","author":"M Nogal","year":"2017","unstructured":"Nogal, M., O\u2019Connor, A.: Cyber-transportation resilience context and methodological framework. In: Linkov, I., Palma-Oliveira, J.M. (eds.) Resilience and Risk. NATO Science for Peace and Security Series C: Environmental Security, pp. 415\u2013426. Springer, Dordrecht (2017). https:\/\/doi.org\/10.1007\/978-94-024-1123-2_15"},{"key":"1196_CR56","doi-asserted-by":"publisher","unstructured":"Rajamaki, J., Nevmerzhitskaya, J., Virag, C.: Cybersecurity education and training in hospitals: proactive resilience educational framework (Prosilience EF). In: 2018 IEEE Global Engineering Education Conference (EDUCON), IEEE, Tenerife, pp. 2042\u20132046 (2018). https:\/\/doi.org\/10.1109\/EDUCON.2018.8363488","DOI":"10.1109\/EDUCON.2018.8363488"},{"issue":"1","key":"1196_CR57","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz013","volume":"5","author":"B Dupont","year":"2019","unstructured":"Dupont, B.: The cyber-resilience of financial institutions: significance and applicability. J. Cybersecur. 5(1), tyz013 (2019). https:\/\/doi.org\/10.1093\/cybsec\/tyz013","journal-title":"J. Cybersecur."},{"key":"1196_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106829","volume":"149","author":"A Annarelli","year":"2020","unstructured":"Annarelli, A., Nonino, F., Palombi, G.: Understanding the management of cyber resilient systems. Comput. Ind. Eng. 149, 106829 (2020). https:\/\/doi.org\/10.1016\/j.cie.2020.106829","journal-title":"Comput. Ind. Eng."},{"issue":"23","key":"1196_CR59","doi-asserted-by":"publisher","DOI":"10.3390\/su132313065","volume":"13","author":"A Annarelli","year":"2021","unstructured":"Annarelli, A., Palombi, G.: Digitalization capabilities for sustainable cyber resilience: a conceptual framework. Sustainability 13(23), 13065 (2021). https:\/\/doi.org\/10.3390\/su132313065","journal-title":"Sustainability"},{"issue":"2","key":"1196_CR60","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1108\/ICS-06-2021-0091","volume":"30","author":"M Malatji","year":"2022","unstructured":"Malatji, M., Marnewick, A.L., Von Solms, S.: Cybersecurity capabilities for critical infrastructure resilience. Inf. Comput. Secur. 30(2), 255\u2013279 (2022). https:\/\/doi.org\/10.1108\/ICS-06-2021-0091","journal-title":"Inf. Comput. Secur."},{"issue":"1","key":"1196_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17477778.2021.1890533","volume":"17","author":"DA Sep\u00falveda Estay","year":"2023","unstructured":"Sep\u00falveda Estay, D.A.: A system dynamics, epidemiological approach for high-level cyber-resilience to zero-day vulnerabilities. J. Simul. 17(1), 1\u201316 (2023). https:\/\/doi.org\/10.1080\/17477778.2021.1890533","journal-title":"J. Simul."},{"issue":"5","key":"1196_CR62","doi-asserted-by":"publisher","DOI":"10.3390\/app14052116","volume":"14","author":"MSD Araujo","year":"2024","unstructured":"Araujo, M.S.D., Machado, B.A.S., Passos, F.U.: Resilience in the context of cyber security: a review of the fundamental concepts and relevance. Appl. Sci. 14(5), 2116 (2024). https:\/\/doi.org\/10.3390\/app14052116","journal-title":"Appl. Sci."},{"key":"1196_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100662","volume":"45","author":"Y-W Ma","year":"2024","unstructured":"Ma, Y.-W., Tu, Y.-H., Shen, C.-T.: DSACR: a defense-based system with adaptive cyber resilience for industrial control systems. Int. J. Crit. Infrastruct. Prot. 45, 100662 (2024). https:\/\/doi.org\/10.1016\/j.ijcip.2024.100662","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"2","key":"1196_CR64","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1017\/S0003055404001182","volume":"98","author":"J Gerring","year":"2004","unstructured":"Gerring, J.: What is a case study and what is it good for? Am. Polit. Sci. Rev. 98(2), 341\u2013354 (2004). https:\/\/doi.org\/10.1017\/S0003055404001182","journal-title":"Am. Polit. Sci. Rev."},{"issue":"4","key":"1196_CR65","doi-asserted-by":"publisher","first-page":"532","DOI":"10.2307\/258557","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K.M.: Building theories from case study research. Acad. Manage. Rev. 14(4), 532 (1989). https:\/\/doi.org\/10.2307\/258557","journal-title":"Acad. Manage. Rev."},{"issue":"3","key":"1196_CR66","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MITP.2020.2988330","volume":"22","author":"T Weil","year":"2020","unstructured":"Weil, T., Murugesan, S.: IT risk and resilience\u2014cybersecurity response to COVID-19. IT Prof. 22(3), 4\u201310 (2020). https:\/\/doi.org\/10.1109\/MITP.2020.2988330","journal-title":"IT Prof."},{"key":"1196_CR67","volume-title":"Qualitative Research & Evaluation Methods [Nachdr.]","author":"MQ Patton","year":"2010","unstructured":"Patton, M.Q.: Qualitative Research & Evaluation Methods [Nachdr.], 3rd edn. Sage, Thousand Oaks (2010)","edition":"3"},{"issue":"1","key":"1196_CR68","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5465\/amj.2007.24160888","volume":"50","author":"KM Eisenhardt","year":"2007","unstructured":"Eisenhardt, K.M., Graebner, M.E.: Theory building from cases: opportunities and challenges. Acad. Manag. J. 50(1), 25\u201332 (2007). https:\/\/doi.org\/10.5465\/amj.2007.24160888","journal-title":"Acad. Manag. J."},{"issue":"1","key":"1196_CR69","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3138\/cjpe.30.1.108","volume":"30","author":"T Hollweck","year":"2015","unstructured":"Hollweck, T.: Robert K. Yin. (2014). Case study research design and methods (5th ed.). Can. J. Program Eval. 30(1), 108\u2013110 (2015). https:\/\/doi.org\/10.3138\/cjpe.30.1.108","journal-title":"Can. J. Program Eval."},{"issue":"2","key":"1196_CR70","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/10919392.2022.2068906","volume":"32","author":"E Tsen","year":"2022","unstructured":"Tsen, E., Ko, R.K.L., Slapnicar, S.: An exploratory study of organizational cyber resilience, its precursors and outcomes. J. Organ. Comput. Electron. Commer. 32(2), 153\u2013174 (2022). https:\/\/doi.org\/10.1080\/10919392.2022.2068906","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"1196_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103591","volume":"137","author":"S Durst","year":"2024","unstructured":"Durst, S., Hinteregger, C., Zieba, M.: The effect of environmental turbulence on cyber security risk management and organizational resilience. Comput. Secur. 137, 103591 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103591","journal-title":"Comput. Secur."},{"issue":"1","key":"1196_CR72","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TEM.2019.2909909","volume":"68","author":"EG Carayannis","year":"2021","unstructured":"Carayannis, E.G., Grigoroudis, E., Rehman, S.S., Samarakoon, N.: Ambidextrous cybersecurity: the seven pillars (7Ps) of cyber resilience. IEEE Trans. Eng. Manag. 68(1), 223\u2013234 (2021). https:\/\/doi.org\/10.1109\/TEM.2019.2909909","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"3","key":"1196_CR73","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1080\/01402390.2021.1895117","volume":"46","author":"FJ Egloff","year":"2023","unstructured":"Egloff, F.J., Smeets, M.: Publicly attributing cyber attacks: a framework. J. Strateg. Stud. 46(3), 502\u2013533 (2023). https:\/\/doi.org\/10.1080\/01402390.2021.1895117","journal-title":"J. Strateg. Stud."},{"issue":"4","key":"1196_CR74","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1057\/s41283-020-00063-2","volume":"22","author":"MH Uddin","year":"2020","unstructured":"Uddin, M.H., Ali, M.H., Hassan, M.K.: Cybersecurity hazards and financial system vulnerability: a synthesis of literature. Risk Manage. 22(4), 239\u2013309 (2020). https:\/\/doi.org\/10.1057\/s41283-020-00063-2","journal-title":"Risk Manage."},{"issue":"8","key":"1196_CR75","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1002\/asi.24311","volume":"71","author":"A Ahmad","year":"2020","unstructured":"Ahmad, A., Desouza, K.C., Maynard, S.B., Naseer, H., Baskerville, R.L.: How integration of cyber security management and incident response enables organizational learning. J. Assoc. Inf. Sci. Technol. 71(8), 939\u2013953 (2020). https:\/\/doi.org\/10.1002\/asi.24311","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"1","key":"1196_CR76","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/ablj.12238","volume":"61","author":"J Hiller","year":"2024","unstructured":"Hiller, J., Kisska\u2010Schulze, K., Shackelford, S.: Cybersecurity carrots and sticks. Am. Bus. Law J. 61(1), 5\u201329 (2024). https:\/\/doi.org\/10.1111\/ablj.12238","journal-title":"Am. Bus. Law J."},{"issue":"4","key":"1196_CR77","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1080\/00207543.2020.1856442","volume":"60","author":"T Sawik","year":"2022","unstructured":"Sawik, T.: A linear model for optimal cybersecurity investment in Industry 4.0 supply chains. Int. J. Prod. Res. 60(4), 1368\u20131385 (2022). https:\/\/doi.org\/10.1080\/00207543.2020.1856442","journal-title":"Int. J. Prod. Res."},{"key":"1196_CR78","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"JM Corbin","year":"2015","unstructured":"Corbin, J.M., Strauss, A.L.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 4th edn. SAGE, Thousand Oaks (2015)","edition":"4"},{"key":"1196_CR79","volume-title":"Casting Nets and Testing Specimens: Two Grand Methods of Psychology. Rev. Updated","author":"PJ Runkel","year":"2007","unstructured":"Runkel, P.J.: Casting Nets and Testing Specimens: Two Grand Methods of Psychology. Rev. Updated, 2nd edn. Living Control Systems Pub, Hayward (2007)","edition":"2"},{"key":"1196_CR80","doi-asserted-by":"publisher","DOI":"10.1021\/es403443n","author":"I Linkov","year":"2013","unstructured":"Linkov, I., et al.: Measurable resilience for actionable policy. Environ. Sci. Technol. (2013). https:\/\/doi.org\/10.1021\/es403443n","journal-title":"Environ. Sci. Technol."},{"key":"1196_CR81","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/j.bioactmat.2023.09.005","volume":"31","author":"L Bai","year":"2024","unstructured":"Bai, L., Wu, Y., Li, G., Zhang, W., Zhang, H., Su, J.: AI-enabled organoids: construction, analysis, and application. Bioact. Mater. 31, 525\u2013548 (2024). https:\/\/doi.org\/10.1016\/j.bioactmat.2023.09.005","journal-title":"Bioact. Mater."},{"issue":"6","key":"1196_CR82","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1080\/08874417.2023.2248925","volume":"64","author":"JC Fernandez De Arroyabe","year":"2024","unstructured":"Fernandez De Arroyabe, J.C., Arroyabe, M.F., Fernandez, I., Arranz, C.F.A.: Cybersecurity resilience in SMEs. A machine learning approach. J. Comput. Inf. Syst. 64(6), 711\u2013727 (2024). https:\/\/doi.org\/10.1080\/08874417.2023.2248925","journal-title":"J. Comput. Inf. Syst."},{"issue":"1","key":"1196_CR83","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1177\/15485129211051386","volume":"20","author":"S Noel","year":"2023","unstructured":"Noel, S., Swarup, V., Johnsgard, K.: Optimizing network microsegmentation policy for cyber resilience. J. Def. Model. Simul. Appl. Methodol. Technol. 20(1), 57\u201379 (2023). https:\/\/doi.org\/10.1177\/15485129211051386","journal-title":"J. Def. Model. Simul. Appl. Methodol. Technol."},{"issue":"1","key":"1196_CR84","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1080\/0960085X.2022.2088414","volume":"32","author":"J Kotsias","year":"2023","unstructured":"Kotsias, J., Ahmad, A., Scheepers, R.: Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur. J. Inf. Syst. 32(1), 35\u201351 (2023). https:\/\/doi.org\/10.1080\/0960085X.2022.2088414","journal-title":"Eur. J. Inf. Syst."},{"key":"1196_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103412","volume":"133","author":"W Yeoh","year":"2023","unstructured":"Yeoh, W., Liu, M., Shore, M., Jiang, F.: Zero trust cybersecurity: critical success factors and a maturity assessment framework. Comput. Secur. 133, 103412 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103412","journal-title":"Comput. Secur."},{"key":"1196_CR86","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2021.100548","volume":"44","author":"S Slapni\u010dar","year":"2022","unstructured":"Slapni\u010dar, S., Vuko, T., \u010cular, M., Dra\u0161\u010dek, M.: Effectiveness of cybersecurity audit. Int. J. Account. Inf. Syst. 44, 100548 (2022). https:\/\/doi.org\/10.1016\/j.accinf.2021.100548","journal-title":"Int. J. Account. Inf. Syst."},{"key":"1196_CR87","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/978-981-16-7610-9_36","volume-title":"Intelligent Data Communication Technologies and Internet of Things","author":"K Barik","year":"2022","unstructured":"Barik, K., Konar, K., Banerjee, A., Das, S., Abirami, A.: An exploration of attack patterns and protection approaches using penetration testing. In: Hemanth, D.J., Pelusi, D., Vuppalapati, C. (eds.) Intelligent Data Communication Technologies and Internet of Things. Lecture Notes on Data Engineering and Communications Technologies, vol. 101, pp. 491\u2013503. Singapore, Springer (2022). https:\/\/doi.org\/10.1007\/978-981-16-7610-9_36"},{"issue":"1","key":"1196_CR88","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2024.2379275","volume":"36","author":"K Barik","year":"2024","unstructured":"Barik, K., Misra, S., Sanz, L.F., Chockalingam, S.: Enhancing image data security using the APFB model. Connect. Sci. 36(1), 2379275 (2024). https:\/\/doi.org\/10.1080\/09540091.2024.2379275","journal-title":"Connect. Sci."},{"issue":"12","key":"1196_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571071","volume":"55","author":"J Dey","year":"2023","unstructured":"Dey, J., Dutta, R.: Progress in multivariate cryptography: systematic review, challenges, and research directions. ACM Comput. Surv. 55(12), 1\u201334 (2023). https:\/\/doi.org\/10.1145\/3571071","journal-title":"ACM Comput. Surv."},{"key":"1196_CR90","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103201","volume":"129","author":"RA Bridges","year":"2023","unstructured":"Bridges, R.A., et al.: Testing SOAR tools in use. Comput. Secur. 129, 103201 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103201","journal-title":"Comput. Secur."},{"issue":"5","key":"1196_CR91","doi-asserted-by":"publisher","first-page":"6081","DOI":"10.1007\/s10586-024-04291-z","volume":"27","author":"JM Ordu\u00f1a","year":"2024","unstructured":"Ordu\u00f1a, J.M., P\u00e9rez, C.: Using a nested virtualization tool for teaching VPN fundamentals. Clust. Comput. 27(5), 6081\u20136095 (2024). https:\/\/doi.org\/10.1007\/s10586-024-04291-z","journal-title":"Clust. Comput."},{"key":"1196_CR92","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2024.100681","volume":"21","author":"K Barik","year":"2024","unstructured":"Barik, K., Misra, S.: Adversarial attack defense analysis: an empirical approach in cybersecurity perspective. Software Impacts 21, 100681 (2024). https:\/\/doi.org\/10.1016\/j.simpa.2024.100681","journal-title":"Software Impacts"},{"key":"1196_CR93","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.future.2022.10.031","volume":"140","author":"T Zhang","year":"2023","unstructured":"Zhang, T., Shen, J., Lai, C.-F., Ji, S., Ren, Y.: Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems. Future Gener. Comput. Syst. 140, 299\u2013310 (2023). https:\/\/doi.org\/10.1016\/j.future.2022.10.031","journal-title":"Future Gener. Comput. Syst."},{"key":"1196_CR94","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106071","volume":"122","author":"SM Dol","year":"2023","unstructured":"Dol, S.M., Jawandhiya, P.M.: Classification technique and its combination with clustering and association rule mining in educational data mining\u2014a survey. Eng. Appl. Artif. Intell. 122, 106071 (2023). https:\/\/doi.org\/10.1016\/j.engappai.2023.106071","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"4","key":"1196_CR95","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.1109\/COMST.2023.3299519","volume":"25","author":"B Nour","year":"2023","unstructured":"Nour, B., Pourzandi, M., Debbabi, M.: A survey on threat hunting in enterprise networks. IEEE Commun. Surv. Tutor. 25(4), 2299\u20132324 (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3299519","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1196_CR96","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126575","volume":"272","author":"S Manafi Varkiani","year":"2025","unstructured":"Manafi Varkiani, S., Pattarin, F., Fabbri, T., Fantoni, G.: Predicting employee attrition and explaining its determinants. Expert Syst. Appl. 272, 126575 (2025). https:\/\/doi.org\/10.1016\/j.eswa.2025.126575","journal-title":"Expert Syst. Appl."},{"issue":"15","key":"1196_CR97","doi-asserted-by":"publisher","DOI":"10.3390\/s23156757","volume":"23","author":"LF Ilca","year":"2023","unstructured":"Ilca, L.F., Lucian, O.P., Balan, T.C.: Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response. Sensors 23(15), 6757 (2023). https:\/\/doi.org\/10.3390\/s23156757","journal-title":"Sensors"},{"issue":"2","key":"1196_CR98","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.ejor.2023.05.003","volume":"311","author":"M Dacorogna","year":"2023","unstructured":"Dacorogna, M., Debbabi, N., Kratz, M.: Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data. Eur. J. Oper. Res. 311(2), 708\u2013729 (2023). https:\/\/doi.org\/10.1016\/j.ejor.2023.05.003","journal-title":"Eur. J. Oper. Res."},{"issue":"4","key":"1196_CR99","doi-asserted-by":"publisher","DOI":"10.1007\/s41062-024-01405-9","volume":"9","author":"WO Ewa","year":"2024","unstructured":"Ewa, W.O., Ugwu, O.O., Okafor, F.O.: Resilient\u2013vulnerability analysis of critical infrastructure, key resources, assets, and facilities. Innov. Infrastruct. Solut. 9(4), 109 (2024). https:\/\/doi.org\/10.1007\/s41062-024-01405-9","journal-title":"Innov. Infrastruct. Solut."},{"key":"1196_CR100","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103631","volume":"137","author":"M Wurzenberger","year":"2024","unstructured":"Wurzenberger, M., H\u00f6ld, G., Landauer, M., Skopik, F.: Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security. Comput. Secur. 137, 103631 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103631","journal-title":"Comput. Secur."},{"issue":"3","key":"1196_CR101","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10207-023-00660-8","volume":"22","author":"A Tsohou","year":"2023","unstructured":"Tsohou, A., Diamantopoulou, V., Gritzalis, S., Lambrinoudakis, C.: Cyber insurance: state of the art, trends and future directions. Int. J. Inf. Secur. 22(3), 737\u2013748 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00660-8","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"1196_CR102","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa005","volume":"6","author":"LA Gordon","year":"2020","unstructured":"Gordon, L.A., Loeb, M.P., Zhou, L.: Integrating cost\u2013benefit analysis into the NIST Cybersecurity Framework via the Gordon\u2013Loeb model. J. Cybersecur. 6(1), tyaa005 (2020). https:\/\/doi.org\/10.1093\/cybsec\/tyaa005","journal-title":"J. Cybersecur."},{"issue":"1","key":"1196_CR103","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2022","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141, Cetin, F., Basim, H.N.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62(1), 82\u201397 (2022). https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"J. Comput. Inf. Syst."},{"issue":"3","key":"1196_CR104","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1080\/08874417.2020.1845583","volume":"62","author":"A Georgiadou","year":"2022","unstructured":"Georgiadou, A., Mouzakitis, S., Bounas, K., Askounis, D.: A cyber-security culture framework for assessing organization readiness. J. Comput. Inf. Syst. 62(3), 452\u2013462 (2022). https:\/\/doi.org\/10.1080\/08874417.2020.1845583","journal-title":"J. Comput. Inf. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01196-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01196-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01196-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:08:02Z","timestamp":1769875682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01196-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":104,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1196"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01196-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"23 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"30"}}