{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T22:45:19Z","timestamp":1745621119055,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T00:00:00Z","timestamp":1676592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T00:00:00Z","timestamp":1676592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01691-7","type":"journal-article","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T13:09:09Z","timestamp":1676639349000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancement of a Company-Wide Information Security Management System Through Incident Learning"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8798-6666","authenticated-orcid":false,"given":"Hiroshi","family":"Horikawa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hisamichi","family":"Ohtani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuji","family":"Takahashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takehisa","family":"Kato","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fumihiko","family":"Magata","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yoshimi","family":"Teshigawara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryoichi","family":"Sasaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,2,17]]},"reference":[{"unstructured":"ISO\/IEC 27001: Information technology. Security techniques, Information security management systems, requirements, ISO\/IEC. 2013.","key":"1691_CR1"},{"doi-asserted-by":"crossref","unstructured":"Stoneburner G, Goguen A, Feringa A. Risk management guide for Information Technology systems, NIST800-30. 2002.","key":"1691_CR2","DOI":"10.6028\/NIST.SP.800-30"},{"issue":"8","key":"1691_CR3","first-page":"2022","volume":"45","author":"I Nakamura","year":"2004","unstructured":"Nakamura I, Hyodo T, Soga M, Mizuno T, Nishigaki M. A practical approach for security measure selection problem and its availability. Inf Process Soc Jpn J. 2004;45(8):2022\u201333 (in Japanese).","journal-title":"Inf Process Soc Jpn J"},{"unstructured":"Onibere M, Ahmad A, Maynard S. B. The chief information security officer and the five dimensions of a strategist. In Pacific Asia conference on information systems; 2017. p. 77.","key":"1691_CR4"},{"unstructured":"Cichonski P, Millar T, Grance T, Scarfone K. Computer security incident handling guide. NIST SP800-61, Rev, vol. 2; 2012.","key":"1691_CR5"},{"issue":"5","key":"1691_CR6","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.cose.2012.04.001","volume":"31","author":"A Ahmad","year":"2012","unstructured":"Ahmad A, Hadgkiss J, Ruighaver AB. Incident response teams\u2014challenges in supporting the organisational security function. Comput Secur. 2012;31(5):643\u201352.","journal-title":"Comput Secur"},{"unstructured":"Chuvakin A. Five mistakes of incident response. InfosecWriters; 2005.","key":"1691_CR7"},{"unstructured":"Shedden P, Ahmad A, Ruighaver AB. Organisational learning and incident response: promoting effective learning through the incident response process. In: Proceedings of the 8th Australian information security management conference; 2010. p. 139\u201350.","key":"1691_CR8"},{"doi-asserted-by":"crossref","unstructured":"Prat N. A hierarchical model for knowledge management: In Encyclopedia of knowledge management. IGI Global; 2005. p. 211\u201320.","key":"1691_CR9","DOI":"10.4018\/978-1-59140-573-3.ch028"},{"doi-asserted-by":"crossref","unstructured":"Zyngier S. Knowledge management governance. IGI Global: In Encyclopedia of knowledge management; 2005. p. 373\u201380.","key":"1691_CR10","DOI":"10.4018\/978-1-59140-573-3.ch049"},{"unstructured":"Brotby W. K. Information security governance: guidance for boards of directors and executive management. Information Systems Audit and Control Association. 2006.","key":"1691_CR11"},{"unstructured":"ISO\/IEC 27000: Information technology. Security techniques, Information security management systems\u2014overview and vocabulary, ISO\/IEC. 2014.","key":"1691_CR12"},{"unstructured":"Roberto MA. Know what you don\u2019t know. Wharton School Publishing; 2009.","key":"1691_CR13"},{"unstructured":"Rosling H. Factfulness: why things are better than you think. Sceptre; 2018.","key":"1691_CR14"},{"unstructured":"Hooey B. NASA aviation safety reporting system (ASRS), No. ARC-E-DAA-TN62103; 2018.","key":"1691_CR15"},{"issue":"5","key":"1691_CR16","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.ijinfomgt.2008.02.002","volume":"28","author":"R Bojanc","year":"2008","unstructured":"Bojanc R, Jerman-Blazic B. An economic modelling approach to information security risk management. Int J Inf Manage. 2008;28(5):413\u201322.","journal-title":"Int J Inf Manage"},{"unstructured":"Yamamoto T, Usui Y, Magata F, Teshigawara Y, Sasaki R, Nishigaki M. A security measure selection scheme with consideration of potential lawsuits. In: Proceedings of the 2010 international conference on security & management, CD-ROM; 2010.","key":"1691_CR17"},{"issue":"4","key":"1691_CR18","first-page":"65","volume":"10","author":"SB Maynard","year":"2018","unstructured":"Maynard SB, Tan T, Ahmad A, Ruighaver T. Towards a framework for strategic security context in information security governance. Pac Asia J Assoc Inf Syst. 2018;10(4):65\u201388.","journal-title":"Pac Asia J Assoc Inf Syst"},{"issue":"5","key":"1691_CR19","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2005.09.006","volume":"25","author":"S Mitropoulos","year":"2006","unstructured":"Mitropoulos S, Patsos D, Douligeris C. On incident handling and response: a state-of-the-art approach. Comput Secur. 2006;25(5):351\u201370.","journal-title":"Comput Secur"},{"key":"1691_CR20","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.cose.2014.05.003","volume":"45","author":"IA T\u00f8ndel","year":"2014","unstructured":"T\u00f8ndel IA, Line MB, Jaatun MG. Information security incident management: current practice as reported in the literature. Comput Secur. 2014;45:42\u201357.","journal-title":"Comput Secur"},{"issue":"3","key":"1691_CR21","doi-asserted-by":"publisher","first-page":"363","DOI":"10.2307\/2391848","volume":"21","author":"C Argyris","year":"1976","unstructured":"Argyris C. Single-loop and double-loop models in research on decision making. Adm Sci Q. 1976;21(3):363\u201375.","journal-title":"Adm Sci Q"},{"unstructured":"van Niekerk J, von Solms R. Organisational learning models for information security. In: The ISSA 2004 enabling tomorrow conference 30 (2004)","key":"1691_CR22"},{"unstructured":"Webb J, Ahmad A, Maynard S, Baskerville R, Shanks G. Organizational security learning from Incident Response. In: International conference on information systems (Seoul, South Korea); 2017. p. 11.","key":"1691_CR23"},{"doi-asserted-by":"crossref","unstructured":"Nyre-Yu M, Gutzwiller RS, Caldwel BS. Observing cyber security incident response: qualitative themes from field research. In: Proceedings of the human factors and ergonomics society annual meeting. Sage: SAGE Publications; 2019. p. 437\u2013441.","key":"1691_CR24","DOI":"10.1177\/1071181319631016"},{"issue":"8","key":"1691_CR25","first-page":"939","volume":"71","author":"A Ahmad","year":"2020","unstructured":"Ahmad A, Desouza KC, Maynard SB, Naseer H, Baskerville R. How integration of security management and incident response enables organizational learning. J Am Soc Inf Sci. 2020;71(8):939\u201353.","journal-title":"J Am Soc Inf Sci"},{"issue":"3","key":"1691_CR26","first-page":"15","volume":"48","author":"D Whitten","year":"2008","unstructured":"Whitten D. The chief information security officer: an analysis of the skills required for success. J Comput Inf Syst. 2008;48(3):15\u20139.","journal-title":"J Comput Inf Syst"},{"unstructured":"ISO\/IEC 27002: Information Technology. Security techniques, Code of practice for information security controls, ISO\/IEC; 2013.","key":"1691_CR27"},{"doi-asserted-by":"crossref","unstructured":"Ross R, et al. Revision 4, NIST, Security and privacy controls for federal information systems and organizations, NIST SP 800-53; 2013.","key":"1691_CR28","DOI":"10.6028\/NIST.SP.800-53Ar4"},{"unstructured":"ISO: Guide 73, 2009, Risk management\u2014vocabulary, ISO; 2009.","key":"1691_CR29"},{"unstructured":"Verizon: Data breach investigations report. Verizon Communications; 2017.","key":"1691_CR30"},{"unstructured":"FireEye: M-TREND, FireEye, Inc.; 2017.","key":"1691_CR31"},{"unstructured":"Australian Cyber Security Centre: strategies to mitigate cyber security intrusions. Australian Cyber Security Centre; 2017.","key":"1691_CR32"},{"unstructured":"Hanson R. A $50 million hack just showed that the DAO was all too human, Wired, June; 2016.","key":"1691_CR33"},{"unstructured":"Chavez-Dreyfuss G. Cyber threat grows for bitcoin exchanges, Reuters, Aug; 2016.","key":"1691_CR34"},{"unstructured":"Australia\u2019s Defence Signals Directorate: strategies to mitigate targeted cyber intrusions\u2014mitigation details. Australian Government Department of Defence Intelligence and Security Cyber Security Operation Center; 2017.","key":"1691_CR35"},{"unstructured":"Lewis JA. Raising the bar for cybersecurity. The Center for Strategic and International Studies (CSIS); 2013.","key":"1691_CR36"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01691-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01691-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01691-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T10:09:12Z","timestamp":1682849352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01691-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,17]]},"references-count":36,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["1691"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01691-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2023,2,17]]},"assertion":[{"value":"15 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards. This article does not contain any studies with animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"211"}}