{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:52:34Z","timestamp":1772254354124,"version":"3.50.1"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T00:00:00Z","timestamp":1749772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T00:00:00Z","timestamp":1749772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum-Cent Intell Syst"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>As cyberattacks grow more complex and frequent, organisations and nations face critical challenges in safeguarding their information systems and sensitive data. Recognising the limitations of traditional, solely human-centric defences, there is increasing agreement among practitioners and researchers on the need for a collaborative approach that integrates human intelligence with artificial intelligence (AI). This paper introduces the cybersecurity Augmented Intelligence Framework (<jats:italic>c<\/jats:italic>AIF), a conceptual framework designed to optimise human-AI teaming (HAIT) in cybersecurity. Augmented intelligence is about the role of AI enhancing rather than replacing human intelligence through a more harmonious working relationship. The methods followed consist of three phases. First, reviewing existing literature to identify foundational human\u2013machine interaction (HMI) paradigms. A systematic review of papers from three databases led to a final selection of 20 analysis units. Second, the strengths and weaknesses of the identified paradigms for HAIT were evaluated. Lastly, outlining the core architectural components of the <jats:italic>c<\/jats:italic>AIF from the strengths of each paradigm. Six key HMI paradigms were identified: Human-in-the-loop (HITL), Human-out-of-the-loop (HOOTL), Human-on-the-loop (HOTL), Human-alongside-the-loop, Human-in-command, and Coactive Systems. Each paradigm offers unique strengths: for instance, HITL emphasises active and direct human intervention, while HOOTL supports full autonomy of AI operations. On the other hand, HOTL balances AI autonomy with human oversight. The analysed data suggests that strategically leveraging the strength of each paradigm allows for a hybrid intelligent framework comprising five core components: the Decision-Making Matrix, Paradigm Allocation Engine, Task-Specific Modules, Feedback and Learning System, and Interoperability Framework. The <jats:italic>c<\/jats:italic>AIF shows promise in enhancing human-AI collaboration, integrating human insights with AI capabilities to improve resilience and adaptability against evolving cyber threats. Future research should focus on empirically validating the <jats:italic>c<\/jats:italic>AIF in various cybersecurity domains, including healthcare and finance.  <\/jats:p>","DOI":"10.1007\/s44230-025-00103-8","type":"journal-article","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:35:31Z","timestamp":1749789331000},"page":"151-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Augmented Intelligence Framework for Human\u2013Artificial Intelligence Teaming in Cybersecurity"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9893-9598","authenticated-orcid":false,"given":"Masike","family":"Malatji","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,13]]},"reference":[{"key":"103_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.60087\/jaigs.v3i1.75","volume":"3","author":"NG Camacho","year":"2024","unstructured":"Camacho NG. The role of AI in cybersecurity: addressing threats in the digital age. J Artif Intell Gen Sci. 2024;3:143\u201354. https:\/\/doi.org\/10.60087\/jaigs.v3i1.75.","journal-title":"J. Artif. Intell. Gen. Sci."},{"key":"103_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102722","volume":"57","author":"MM Yamin","year":"2021","unstructured":"Yamin MM, Ullah M, Ullah H, Katt B. Weaponized AI for cyber attacks. J Inf Secur Appl. 2021;57: 102722. https:\/\/doi.org\/10.1016\/j.jisa.2020.102722.","journal-title":"J Inf Secur Appl"},{"key":"103_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3430360","volume":"11","author":"S Samtani","year":"2020","unstructured":"Samtani S, Kantarcioglu M, Chen H. Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap. ACM Trans Manag Inf Syst. 2020;11:1\u201319. https:\/\/doi.org\/10.1145\/3430360.","journal-title":"ACM Trans Manag Inf Syst"},{"key":"103_CR4","first-page":"1","volume":"8","author":"W Chen","year":"2024","unstructured":"Chen W, Zhang J. Elevating security operations: the role of AI-driven automation in enhancing SOC efficiency and efficacy. J Artif Intell Mach Learn Manag. 2024;8:1\u201313.","journal-title":"J Artif Intell Mach Learn Manag"},{"key":"103_CR5","doi-asserted-by":"crossref","unstructured":"Dubey A, Abhinav K, Jain S, Arora V, Puttaveerana A. HACO: a framework for developing human-AI teaming. In: Proceedings of the 2020 Innovations in Software Engineering Conference. Association for Computing Machinery, New York; 2020. pp. 1\u20139.","DOI":"10.1145\/3385032.3385044"},{"key":"103_CR6","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s43681-022-00214-z","volume":"3","author":"M Pflanzer","year":"2023","unstructured":"Pflanzer M, Traylor Z, Lyons JB, Dubljevi\u0107 V, Nam CS. Ethics in human\u2013AI teaming: principles and perspectives. AI Ethics. 2023;3:917\u201335. https:\/\/doi.org\/10.1007\/s43681-022-00214-z.","journal-title":"AI Ethics"},{"key":"103_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-030-22419-6_12","volume-title":"Augmented cognition","author":"SR Gomez","year":"2019","unstructured":"Gomez SR, Mancuso V, Staheli D. Considerations for human-machine teaming in cybersecurity. In: Schmorrow DD, Fidopiastis CM, editors. Augmented cognition. Cham: Springer; 2019. p. 153\u201368."},{"key":"103_CR8","doi-asserted-by":"crossref","unstructured":"Xiang C-G, Yu Z. Human-machine hybrid augmented intelligence: human-machine relationship, collaboration and mutual enhancement. In: Proceedings of the 2023 China automation congress. IEEE Xplore, New York; 2024 pp. 7471\u20137478.","DOI":"10.1109\/CAC59555.2023.10451218"},{"key":"103_CR9","first-page":"138","volume":"7","author":"MI Khalil","year":"2023","unstructured":"Khalil MI, Abdel-Rahman M. Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eig Rev Sci Technol. 2023;7:138\u201358.","journal-title":"Eig Rev Sci Technol"},{"key":"103_CR10","doi-asserted-by":"publisher","first-page":"121118","DOI":"10.1109\/ACCESS.2023.3328351","volume":"11","author":"J Ferdous","year":"2023","unstructured":"Ferdous J, Islam R, Mahboubi A, Islam MdZ. A review of state-of-the-art malware attack trends and defense mechanisms. IEEE Access. 2023;11:121118\u201341. https:\/\/doi.org\/10.1109\/ACCESS.2023.3328351.","journal-title":"IEEE Access"},{"key":"103_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3390\/fi16030067","volume":"16","author":"P Scalise","year":"2024","unstructured":"Scalise P, Boeding M, Hempel M, Sharif H, Delloiacovo J, Reed J. A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas. Future Internet. 2024;16:67. https:\/\/doi.org\/10.3390\/fi16030067.","journal-title":"Future Internet"},{"key":"103_CR12","doi-asserted-by":"publisher","first-page":"416","DOI":"10.3390\/electronics11030416","volume":"11","author":"A Villal\u00f3n-Huerta","year":"2022","unstructured":"Villal\u00f3n-Huerta A, Ripoll-Ripoll I, Marco-Gisbert H. Key Requirements for the detection and sharing of behavioral indicators of compromise. Electronics. 2022;11:416. https:\/\/doi.org\/10.3390\/electronics11030416.","journal-title":"Electronics"},{"key":"103_CR13","doi-asserted-by":"publisher","first-page":"2170","DOI":"10.3390\/en15062170","volume":"15","author":"T Wallis","year":"2022","unstructured":"Wallis T, Leszczyna R. EE-ISAC\u2014practical cybersecurity solution for the energy sector. Energies. 2022;15:2170. https:\/\/doi.org\/10.3390\/en15062170.","journal-title":"Energies"},{"key":"103_CR14","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1109\/COMST.2021.3117338","volume":"23","author":"D Schlette","year":"2021","unstructured":"Schlette D, Caselli M, Pernul G. A comparative study on cyber threat intelligence: the security incident response perspective. IEEE Commun Surv Tutor. 2021;23:2525\u201356. https:\/\/doi.org\/10.1109\/COMST.2021.3117338.","journal-title":"IEEE Commun Surv Tutor"},{"key":"103_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/23742917.2019.1698178","volume":"4","author":"E Agyepong","year":"2020","unstructured":"Agyepong E, Cherdantseva Y, Reinecke P, Burnap P. Challenges and performance metrics for security operations center analysts: a systematic review. J Cyber Secur Technol. 2020;4:125\u201352. https:\/\/doi.org\/10.1080\/23742917.2019.1698178.","journal-title":"J Cyber Secur Technol"},{"key":"103_CR16","doi-asserted-by":"crossref","unstructured":"Bartwal U, Mukhopadhyay S, Negi R, Shukla S. Security orchestration, automation, and response engine for deployment of behavioural honeypots. In: Proceedings of the 2022 Dependable and Secure Computing Conference. IEEE Xplore, New York; 2022. pp. 1\u20138.","DOI":"10.1109\/DSC54232.2022.9888808"},{"key":"103_CR17","doi-asserted-by":"publisher","first-page":"51","DOI":"10.5281\/zenodo.10639463","volume":"2","author":"AS George","year":"2024","unstructured":"George AS, Baskar T, Srikaanth PB. Cyber threats to critical infrastructure: Assessing vulnerabilities across key sectors. Partn Univers Int Innov J. 2024;2:51\u201375. https:\/\/doi.org\/10.5281\/zenodo.10639463.","journal-title":"Partn Univers Int Innov J"},{"key":"103_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-031-43118-0_3","volume-title":"Information security planning: a practical approach","author":"S Lincke","year":"2024","unstructured":"Lincke S. Complying with the PCI DSS Standard. In: Lincke S, editor. Information security planning: a practical approach. Cham: Springer; 2024. p. 45\u201363."},{"key":"103_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10257-022-00575-2","volume":"21","author":"S Alahmari","year":"2023","unstructured":"Alahmari S, Renaud K, Omoronyia I. Moving beyond cyber security awareness and training to engendering security knowledge sharing. Inf Syst E-Bus Manag. 2023;21:123\u201358. https:\/\/doi.org\/10.1007\/s10257-022-00575-2.","journal-title":"Inf Syst E-Bus Manag"},{"key":"103_CR20","doi-asserted-by":"publisher","first-page":"4580","DOI":"10.3390\/app11104580","volume":"11","author":"A Djenna","year":"2021","unstructured":"Djenna A, Harous S, Saidouni DE. Internet of things meet internet of threats: new concern cyber security issues of critical cyber infrastructure. Appl Sci. 2021;11:4580. https:\/\/doi.org\/10.3390\/app11104580.","journal-title":"Appl Sci"},{"key":"103_CR21","doi-asserted-by":"publisher","first-page":"179","DOI":"10.17705\/1CAIS.05109","volume":"51","author":"R Sen","year":"2022","unstructured":"Sen R, Heim G, Zhu Q. Artificial intelligence and machine learning in cybersecurity: applications, challenges, and opportunities for MIS academics. Commun Assoc Inf Syst. 2022;51:179\u2013209. https:\/\/doi.org\/10.17705\/1CAIS.05109.","journal-title":"Commun Assoc Inf Syst"},{"key":"103_CR22","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, Abdulkadir SJ. Detecting cybersecurity attacks in Internet of Things using artificial intelligence methods: a systematic literature review. Electronics. 2022;11:198. https:\/\/doi.org\/10.3390\/electronics11020198.","journal-title":"Electronics"},{"key":"103_CR23","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6, Aktu\u011f SS, Ozkan-Okay M, Yilmaz AA, Akin E. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics. 2023;12:1333. https:\/\/doi.org\/10.3390\/electronics12061333.","journal-title":"Electronics"},{"key":"103_CR24","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.future.2018.09.063","volume":"92","author":"J Srinivas","year":"2019","unstructured":"Srinivas J, Das AS, Kumar N. Government regulations in cyber security: framework, standards and recommendations. Future Gener Comput Syst. 2019;92:178\u201388. https:\/\/doi.org\/10.1016\/j.future.2018.09.063.","journal-title":"Future Gener Comput Syst"},{"key":"103_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.11610\/isij.4812","volume":"48","author":"T Wallis","year":"2021","unstructured":"Wallis T, Johnson C, Khamis M. Interorganizational cooperation in supply chain cybersecurity: a cross-industry study of the effectiveness of the UK implementation of the NIS directive. Inf Secur Int J. 2021;48:36\u201368. https:\/\/doi.org\/10.11610\/isij.4812.","journal-title":"Inf. Secur. Int. J."},{"issue":"316","key":"103_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3588999","volume":"55","author":"B Hammi","year":"2023","unstructured":"Hammi B, Zeadally S, Nebhen J. Security threats, countermeasures, and challenges of digital supply chains. ACM Comput Surv. 2023;55(316):1\u2013316. https:\/\/doi.org\/10.1145\/3588999.","journal-title":"ACM Comput Surv"},{"key":"103_CR27","doi-asserted-by":"publisher","unstructured":"Mern J, Hatch K, Silva R, Hickert C, Sookoor T, Kochenderfer MJ. Autonomous attack mitigation for industrial control systems. In: Proceedings of the 2022 Dependable Systems and Networks Workshops. IEEE Xplore, New York; 2022. pp. 28\u201336. https:\/\/doi.org\/10.1109\/DSN-W54100.2022.00015.","DOI":"10.1109\/DSN-W54100.2022.00015"},{"key":"103_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804","volume":"97","author":"R Kaur","year":"2023","unstructured":"Kaur R, Gabrijel\u010di\u010d D, Klobu\u010dar T. Artificial intelligence for cybersecurity: literature review and future research directions. Inf Fusion. 2023;97: 101804. https:\/\/doi.org\/10.1016\/j.inffus.2023.101804.","journal-title":"Inf Fusion"},{"key":"103_CR29","doi-asserted-by":"publisher","first-page":"205395172211428","DOI":"10.1177\/20539517221142824","volume":"9","author":"MH Jarrahi","year":"2022","unstructured":"Jarrahi MH, Lutz C, Newlands G. Artificial intelligence, human intelligence and hybrid intelligence based on mutual augmentation. Big Data Soc. 2022;9:20539517221142824. https:\/\/doi.org\/10.1177\/20539517221142824.","journal-title":"Big Data Soc"},{"key":"103_CR30","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.bushor.2018.03.007","volume":"61","author":"MH Jarrahi","year":"2018","unstructured":"Jarrahi MH. Artificial intelligence and the future of work: human-AI symbiosis in organizational decision making. Bus Horiz. 2018;61:577\u201386. https:\/\/doi.org\/10.1016\/j.bushor.2018.03.007.","journal-title":"Bus Horiz"},{"key":"103_CR31","doi-asserted-by":"publisher","unstructured":"Cu MK, Gamboa VL, J. J. Abraham JJ, Tan SM, Ong E. Humans + AI: exploring the collaboration between AI and human labor in the workplace. In: Proceedings of the 2023 HCI and UX Conference. IEEE Xplore, New York; 2024. pp. 35\u201340. https:\/\/doi.org\/10.1109\/CHIuXiD59550.2023.10452733.","DOI":"10.1109\/CHIuXiD59550.2023.10452733"},{"key":"103_CR32","doi-asserted-by":"publisher","unstructured":"Ezer N, Bruni S, Cai Y, Hepenstal SJ, Miller CA, Schmorrow DD. Trust engineering for human-AI teams. In: Proceedings of the human factors and ergonomics society annual meeting. Thousand Oaks: Sage Journals; 2019. pp. 63:322\u2013326. https:\/\/doi.org\/10.1177\/1071181319631264.","DOI":"10.1177\/1071181319631264"},{"key":"103_CR33","doi-asserted-by":"publisher","unstructured":"Wang D, Churchill E, Maes P, Fan X, Shneiderman B, Shi Y, Wang Q. From human-human collaboration to human-AI collaboration: Designing AI systems that can work together with people. In: Proceedings of the 2020 human factors in computing systems conference. Association for Computing Machinery, New York; 2020. pp. 1\u20136. https:\/\/doi.org\/10.1145\/3334480.3381069.","DOI":"10.1145\/3334480.3381069"},{"key":"103_CR34","doi-asserted-by":"publisher","unstructured":"Bansal G, Nushi B, Kamar E, Weld DS, Lasecki WS, Horvitz E. Updates in human-AI teams: understanding and addressing the performance\/compatibility tradeoff. In: Proceedings of the AAAI conference on artificial intelligence. Burnaby: public knowledge project; 2019. pp. 33:2429\u20132437. https:\/\/doi.org\/10.1609\/aaai.v33i01.33012429.","DOI":"10.1609\/aaai.v33i01.33012429"},{"key":"103_CR35","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/3635116","volume":"31","author":"W Xu","year":"2024","unstructured":"Xu W, Gao Z. Applying HCAI in developing effective human-AI teaming: a perspective from human-AI joint cognitive systems. Interactions. 2024;31:32\u20137. https:\/\/doi.org\/10.1145\/3635116.","journal-title":"Interactions"},{"key":"103_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101846","volume":"95","author":"M Malatji","year":"2020","unstructured":"Malatji M, Marnewick A, Von Solms S. Validation of a socio-technical management process for optimising cybersecurity practices. Comput Secur. 2020;95: 101846. https:\/\/doi.org\/10.1016\/j.cose.2020.101846.","journal-title":"Comput Secur"},{"key":"103_CR37","doi-asserted-by":"publisher","unstructured":"Xi Z, Chen W, Guo X, He W, Ding Y, Hong B, Zhang M, Wang W, Jin S, Zhou E, Zheng R, Fan X, Wang X, Xiong L, Zhou Y, Wang W, Jiang C, Zou Y, Liu X, Yin Z, Dou S, Weng R, Cheng W, Zhang Q, Qin W, Zheng Y, Qiu X, Huang X, Gui T. The rise and potential of large language model based agents: a survey. arXiv. 2023. https:\/\/doi.org\/10.48550\/arXiv.2309.07864. Accessed 15 May 2025.","DOI":"10.48550\/arXiv.2309.07864"},{"key":"103_CR38","volume-title":"Artificial intelligence: a modern approach","author":"SJ Russell","year":"2020","unstructured":"Russell SJ, Norvig P. Artificial intelligence: a modern approach. 4th ed. Prentice Hall; 2020.","edition":"4"},{"key":"103_CR39","doi-asserted-by":"publisher","DOI":"10.1108\/LHTN-01-2023-0009","author":"BD Lund","year":"2023","unstructured":"Lund BD, Wang T. Chatting about ChatGPT: how may AI and GPT impact academia and libraries? Libr Hi Tech News. 2023. https:\/\/doi.org\/10.1108\/LHTN-01-2023-0009.","journal-title":"Libr. Hi Tech News."},{"key":"103_CR40","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1111\/rego.12344","volume":"15","author":"M Firlej","year":"2021","unstructured":"Firlej M, Taeihagh A. Regulating human control over autonomous systems. Regul Gov. 2021;15:1071\u201391. https:\/\/doi.org\/10.1111\/rego.12344.","journal-title":"Regul Gov"},{"key":"103_CR41","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s40747-020-00212-w","volume":"7","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Lu J, Jin Y. Artificial intelligence in recommender systems. Complex Intell Syst. 2021;7:439\u201357. https:\/\/doi.org\/10.1007\/s40747-020-00212-w.","journal-title":"Complex Intell Syst"},{"key":"103_CR42","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-030-58779-6_15","volume-title":"Business process management: blockchain and robotic process automation forum","author":"T Chakraborti","year":"2020","unstructured":"Chakraborti T, Isahagian V, Khalaf R, Khazaeni Y, Muthusamy V, Rizk Y. From robotic process automation to\u00a0intelligent process automation. In: Asatiani A, Garc\u00eda JM, Helander N, Jim\u00e9nez-Ram\u00edrez A, Koschmider A, Mendling J, Meroni G, Reijers HA, editors. Business process management: blockchain and robotic process automation forum. Cham: Springer; 2020. p. 215\u201328."},{"key":"103_CR43","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-91470-1_25","volume-title":"Augmented cognition: intelligent technologie","author":"FJ Maym\u00ed","year":"2018","unstructured":"Maym\u00ed FJ, Thomson R. Human-machine teaming and cyberspace. In: Schmorrow DD, Fidopiastis CM, editors. Augmented cognition: intelligent technologie. Springer: Cham; 2018. p. 299\u2013315."},{"key":"103_CR44","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-031-50887-5_14","volume-title":"Intelligent computing and optimization: lecture notes in networks and systems","author":"IH Sarker","year":"2024","unstructured":"Sarker IH, Janicke H, Mohammad N, Watters P, Nepal S. AI potentiality and awareness: a position paper from the perspective of human-AI teaming in cybersecurity. In: Vasant P, Panchenko V, Munapo E, Weber G-H, Thomas JJ, Intan R, Arefin MS, editors. Intelligent computing and optimization: lecture notes in networks and systems, vol. 874. Cham: Springer; 2024. p. 140\u20139."},{"key":"103_CR45","first-page":"1","volume":"2","author":"Y Wang","year":"2022","unstructured":"Wang Y. Human-centered design of AI-driven user interfaces for autonomous vehicle cybersecurity. J AI-Assist Sci Discov. 2022;2:1\u201324.","journal-title":"J AI-Assist Sci Discov"},{"key":"103_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107451","volume":"138","author":"AI Hauptman","year":"2023","unstructured":"Hauptman AI, Schelble BG, McNeese NJ, Madathil KC. Adapt and overcome: perceptions of adaptive autonomous agents for human-AI teaming. Comput Hum Behav. 2023;138: 107451. https:\/\/doi.org\/10.1016\/j.chb.2022.107451.","journal-title":"Comput Hum Behav"},{"key":"103_CR47","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.jmsy.2021.10.006","volume":"61","author":"X Xu","year":"2021","unstructured":"Xu X, Lu Y, Vogel-Heuser B, Wang L. Industry 4.0 and Industry 5.0\u2014Inception, conception and perception. J Manuf Syst. 2021;61:530\u20135. https:\/\/doi.org\/10.1016\/j.jmsy.2021.10.006.","journal-title":"J Manuf Syst"},{"key":"103_CR48","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.jmsy.2022.09.017","volume":"65","author":"J Leng","year":"2022","unstructured":"Leng J, Sha W, Wang B, Zheng P, Zhuang C, Liu Q, Wuest T, Mourtzis D, Wang L. Industry 5.0: prospect and retrospect. J Manuf Syst. 2022;65:279\u201395. https:\/\/doi.org\/10.1016\/j.jmsy.2022.09.017.","journal-title":"J Manuf Syst"},{"key":"103_CR49","doi-asserted-by":"publisher","unstructured":"Hornb\u00e6k K, Oulasvirta A. What is interaction?. In: Proceedings of the 2017 Human Factors in Computing Systems Conference. Association for Computing Machinery, New York; 2017. pp. 5040\u20135052. https:\/\/doi.org\/10.1145\/3025453.3025765.","DOI":"10.1145\/3025453.3025765"},{"key":"103_CR50","doi-asserted-by":"publisher","first-page":"162","DOI":"10.3390\/fi15050162","volume":"15","author":"D Mourtzis","year":"2023","unstructured":"Mourtzis D, Angelopoulos J, Panopoulos N. The future of the human\u2013machine interface (HMI) in society 5.0. Future Internet. 2023;15:162. https:\/\/doi.org\/10.3390\/fi15050162.","journal-title":"Future Internet."},{"key":"103_CR51","unstructured":"Al-Mansoori S, Salem MB. The role of artificial intelligence and machine learning in shaping the future of cybersecurity: trends, applications, and ethical considerations. Int. J. Soc. Anal. 2023;8. https:\/\/norislab.com\/index.php\/ijsa\/article\/view\/36."},{"key":"103_CR52","doi-asserted-by":"publisher","unstructured":"Aliberti L, D\u2019Aniello G, Fortino G, Gaeta M. Situation projection for enhanced human-machine interaction based on rule mining. In: Proceedings of the 2024 international conference on human-machine systems. IEEE Xplore, New York; 2024. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICHMS59971.2024.10555614.","DOI":"10.1109\/ICHMS59971.2024.10555614"},{"key":"103_CR53","unstructured":"Bela\u00efd A. Human-machine collaboration for incident response in cybersecurity operations for autonomous vehicles. Afr. J. Artif. Intell. Sustain. Dev. 2024; 4. https:\/\/africansciencegroup.com\/index.php\/AJAISD\/article\/view\/98."},{"key":"103_CR54","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/THMS.2024.3439625","volume":"54","author":"L Chen","year":"2024","unstructured":"Chen L, Zhang W, Song Y, Chen J. Machine learning for human\u2013machine systems with advanced persistent threats. IEEE Trans Hum Mach Syst. 2024;54:753\u201361. https:\/\/doi.org\/10.1109\/THMS.2024.3439625.","journal-title":"IEEE Trans. Hum. Mach. Syst"},{"key":"103_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3670009","volume":"12","author":"MB Chhetri","year":"2024","unstructured":"Chhetri MB, Tariq S, Singh S, Jalalvand F, Paris C, Nepal S. Towards human-AI teaming to mitigate alert fatigue in security operations centres. ACM Trans Internet Technol. 2024;12:1\u201312. https:\/\/doi.org\/10.1145\/3670009.","journal-title":"ACM Trans Internet Technol"},{"key":"103_CR56","doi-asserted-by":"publisher","unstructured":"Chowdhury A, Nguyen H, Ashenden D, Pogrebna G. POSTER: a teacher-student with human feedback model for human-AI collaboration in cybersecurity. In: Proceedings of the 2023 Asia conference on computer and communications security. New York: Association for computing machinery; 2023. pp. 1040\u20131042. https:\/\/doi.org\/10.1145\/3579856.3592829.","DOI":"10.1145\/3579856.3592829"},{"key":"103_CR57","doi-asserted-by":"publisher","unstructured":"Desai B, Patil K, Mehta I, Patil A. Explainable AI in cybersecurity: a comprehensive framework for enhancing transparency, trust, and human-AI collaboration. In: Proceedings of the 2024 international seminar on application for technology of information and communication. New York: IEEE Xplore; 2024. pp. 135\u2013150. https:\/\/doi.org\/10.1109\/iSemantic63362.2024.10762690.","DOI":"10.1109\/iSemantic63362.2024.10762690"},{"key":"103_CR58","doi-asserted-by":"publisher","unstructured":"Gore S, Hamsa S, Roychowdhury S, Patil G, Gore S, Karmode S. Augmented intelligence in machine learning for cybersecurity: enhancing threat detection and human-machine collaboration. In: Proceedings of the 2023 international conference on augmented intelligence and sustainable systems. New York: IEEE Xplore; 2023. pp. 638\u2013644. https:\/\/doi.org\/10.1109\/ICAISS58487.2023.10250514.","DOI":"10.1109\/ICAISS58487.2023.10250514"},{"key":"103_CR59","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-51064-0_1","volume-title":"Advances in simulation and digital human modelling","author":"B Hayes","year":"2021","unstructured":"Hayes B, Moniz M. Trustworthy human-centered automation through explainable AI and high-fidelity simulation. In: Cassenti DN, Scataglini S, Rajulu SL, Wright JL, editors. Advances in simulation and digital human modelling. Cham: Springer; 2021. p. 3\u20139."},{"key":"103_CR60","doi-asserted-by":"publisher","DOI":"10.54368\/qijmsrd.2.3.0011","author":"A Karunamurthy","year":"2023","unstructured":"Karunamurthy A, Kiruthivasan AR, Gauthamkrishna S. Human-in-the-loop intelligence: advancing AI-centric cybersecurity for the future. Quing Int J Multidiscip Sci Res Dev. 2023. https:\/\/doi.org\/10.54368\/qijmsrd.2.3.0011.","journal-title":"Quing Int J Multidiscip Sci Res Dev"},{"key":"103_CR61","doi-asserted-by":"publisher","unstructured":"Mikhalevich IF, Ryjov AP. Augmented intelligence framework for protecting against cyberattacks. In: Proceedings of the 2018 engineering and telecommunication conference. New York: IEEE Xplore; 2019. pp. 143\u2013145. https:\/\/doi.org\/10.1109\/EnT-MIPT.2018.00039.","DOI":"10.1109\/EnT-MIPT.2018.00039"},{"key":"103_CR62","doi-asserted-by":"publisher","unstructured":"Olla R, Hand E, Louis SJ, Houmanfar R, Sengupta S. A cybersecurity game to probe human-AI teaming. In: Proceedings of the 2024 conference on games. New York: IEEE Xplore; 2024. pp. 1\u20135. https:\/\/doi.org\/10.1109\/CoG60054.2024.10645666.","DOI":"10.1109\/CoG60054.2024.10645666"},{"key":"103_CR63","doi-asserted-by":"publisher","unstructured":"Parlapalli V, Jayaram V, Aarella SG, Peddireddy K, Palle RR. Enhancing cybersecurity: a deep dive into augmented intelligence through machine learning and image processing. In: Proceedings of the 2023 international workshop on artificial intelligence and image processing. New York: IEEE Xplore; 2024. pp. 96\u2013100. https:\/\/doi.org\/10.1109\/IWAIIP58158.2023.10462845.","DOI":"10.1109\/IWAIIP58158.2023.10462845"},{"key":"103_CR64","unstructured":"Roch N, Sievers H, Sch\u00f6ni L, Zimmermann V. Navigating autonomy: Unveiling security experts\u2019 Perspectives on augmented intelligence in cybersecurity. In: Proceedings of the 2024 symposium on usable privacy and security. Berkeley: usenix association; 2024. pp. 41\u201360. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/roch."},{"key":"103_CR65","doi-asserted-by":"publisher","unstructured":"Vats V, Nizam MB, Liu M, Wang Z, Ho R, Prasad MS, Titterton V, Malreddy SV, Aggarwal R, Xu Y, Ding L, Mehta J, Grinnell N, Liu L, Zhong S, Gandamani DN, Tang X, Ghosalkar R, Shen C, Shen R, Hussain N, Ravichandran K, Davis J. A survey on human-AI teaming with large pre-trained models. arXiv. 2024. https:\/\/doi.org\/10.48550\/arXiv.2403.04931. Accessed 15 May 2025.","DOI":"10.48550\/arXiv.2403.04931"},{"key":"103_CR66","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-031-16613-6_3","volume-title":"Cyber deception: techniques, strategies, and human aspects","author":"C Gonzalez","year":"2023","unstructured":"Gonzalez C, Aggarwal P, Cranford EA, Lebiere C. Adaptive cyberdefense with deception: a human\u2013AI cognitive approach. In: Bao T, Tambe M, Wang C, editors. Cyber deception: techniques, strategies, and human aspects. Cham: Springer; 2023. p. 41\u201357."},{"key":"103_CR67","doi-asserted-by":"publisher","DOI":"10.29173\/irie477","author":"M Anderson","year":"2022","unstructured":"Anderson M, Fort K. Human where? A new scale defining human involvement in technology communities from an ethical standpoint. Int Rev Inf Ethics. 2022. https:\/\/doi.org\/10.29173\/irie477.","journal-title":"Int Rev Inf Ethics."},{"key":"103_CR68","first-page":"559","volume-title":"Advances in production management systems Production management systems for responsible manufacturing, service, and logistics futures","author":"D Aschenbrenner","year":"2023","unstructured":"Aschenbrenner D, Colloseus C. Human in\u00a0command in\u00a0manufacturing. In: Alfnes E, Romsdal A, Strandhagen JO, von Cieminski G, Romero D, editors. Advances in production management systems Production management systems for responsible manufacturing, service, and logistics futures. Cham: Springer; 2023. p. 559\u201372."},{"key":"103_CR69","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.arcontrol.2017.09.010","volume":"44","author":"B Berberian","year":"2017","unstructured":"Berberian B, Somon B, Saha\u00ef A, Gouraud J. The out-of-the-loop brain: a neuroergonomic approach of the human automation interaction. Annu Rev Control. 2017;44:303\u201315. https:\/\/doi.org\/10.1016\/j.arcontrol.2017.09.010.","journal-title":"Annu Rev Control"},{"key":"103_CR70","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/MC.2022.3227656","volume":"56","author":"M Campbell","year":"2023","unstructured":"Campbell M. Tomorrow\u2019s applications require IT operations that are autonomous, ubiquitous, and smarter\u2014In a word, invisible. Computer. 2023;56:129\u201333. https:\/\/doi.org\/10.1109\/MC.2022.3227656.","journal-title":"Computer"},{"key":"103_CR71","first-page":"800","volume":"37","author":"DF Engstrom","year":"2020","unstructured":"Engstrom DF, Ho DE. Algorithmic accountability in the administrative State. Yale J Regul. 2020;37:800\u201354.","journal-title":"Yale J Regul"},{"key":"103_CR72","doi-asserted-by":"publisher","first-page":"43","DOI":"10.5898\/JHRI.3.1.Johnson","volume":"3","author":"M Johnson","year":"2014","unstructured":"Johnson M, Bradshaw JM, Feltovich PJ, Jonker CM, van Riemsdijk MB, Sierhuis M. Coactive design: designing support for interdependence in joint activity. J Hum-Robot Interact. 2014;3:43\u201369. https:\/\/doi.org\/10.5898\/JHRI.3.1.Johnson.","journal-title":"J Hum-Robot Interact"},{"key":"103_CR73","doi-asserted-by":"publisher","unstructured":"Li N, Adepu S, Kang E, Garlan D. Explanations for human-on-the-loop: a probabilistic model checking approach. In: Proceedings of the 2020 international symposium on software engineering for adaptive and self-managing systems. New York: Association for Computing Machinery; 2020. pp. 181\u2013187. https:\/\/doi.org\/10.1145\/3387939.3391592.","DOI":"10.1145\/3387939.3391592"},{"key":"103_CR74","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MSMC.2016.2623867","volume":"3","author":"S Nahavandi","year":"2017","unstructured":"Nahavandi S. Trusted autonomy between humans and robots: toward human-on-the-loop in robotics and autonomous systems. IEEE Syst Man Cybern Mag. 2017;3:10\u20137. https:\/\/doi.org\/10.1109\/MSMC.2016.2623867.","journal-title":"IEEE Syst Man Cybern Mag"},{"key":"103_CR75","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10676-017-9430-8","volume":"20","author":"I Rahwan","year":"2018","unstructured":"Rahwan I. Society-in-the-loop: programming the algorithmic social contract. Ethics Inf Technol. 2018;20:5\u201314. https:\/\/doi.org\/10.1007\/s10676-017-9430-8.","journal-title":"Ethics Inf Technol"},{"key":"103_CR76","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4324\/9781003018599-2","volume-title":"Handbook of integrative developmental science","author":"Z Stein","year":"2020","unstructured":"Stein Z. Between the natural and the normative: the concept of development in integrative theories of human development. In: Mascolo MF, Bidell TR, editors. Handbook of integrative developmental science. Oxfordshire: Routledge; 2020. p. 38\u201362."},{"key":"103_CR77","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.future.2022.05.014","volume":"135","author":"X Wu","year":"2022","unstructured":"Wu X, Xiao L, Sun Y, Zhang J, Ma T, He L. A survey of human-in-the-loop for machine learning. Future Gener Comput Syst. 2022;135:364\u201381. https:\/\/doi.org\/10.1016\/j.future.2022.05.014.","journal-title":"Future Gener Comput Syst"},{"key":"103_CR78","volume-title":"Control systems engineering","author":"NS Nise","year":"2020","unstructured":"Nise NS. Control systems engineering. Hoboken, NJ, USA: Wiley; 2020."},{"key":"103_CR79","volume-title":"Handbook of human factors and ergonomics 736\u2013760","author":"TB Sheridan","year":"2021","unstructured":"Sheridan TB. Human supervisory control of automation. In: Handbook of human factors and ergonomics 736\u2013760. 5th ed. Hoboken, NJ USA: Wiley; 2021.","edition":"5"},{"key":"103_CR80","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41746-023-00873-0","volume":"6","author":"B Mesk\u00f3","year":"2023","unstructured":"Mesk\u00f3 B, Topol EJ. The imperative for regulatory oversight of large language models (or generative AI) in healthcare. Npj Digit Med. 2023;6:1\u20136. https:\/\/doi.org\/10.1038\/s41746-023-00873-0.","journal-title":"Npj Digit Med"},{"key":"103_CR81","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/3511597","volume":"65","author":"SE Middleton","year":"2022","unstructured":"Middleton SE, Letouz\u00e9 E, Hossaini A, Chapman A. Trust, regulation, and human-in-the-loop AI: within the European region. Commun ACM. 2022;65:64\u20138. https:\/\/doi.org\/10.1145\/3511597.","journal-title":"Commun ACM"},{"key":"103_CR82","doi-asserted-by":"publisher","unstructured":"Fanni R, Steinkogler VE, Zampedri G, Pierson J. Active human agency in artificial intelligence mediation. In: Proceedings of the 2020 EAI international conference on smart objects and technologies for social good. New York: Association for computing machinery; 2020. pp. 84\u201389. https:\/\/doi.org\/10.1145\/3411170.3411226.","DOI":"10.1145\/3411170.3411226"},{"key":"103_CR83","volume-title":"Losing humanity: the case against killer robots","author":"B Docherty","year":"2012","unstructured":"Docherty B, Neunschwander E, Karir M, Flinner K. Losing humanity: the case against killer robots. Commun: ACM; 2012."},{"key":"103_CR84","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1518\/001872008X312198","volume":"50","author":"R Parasuraman","year":"2008","unstructured":"Parasuraman R, Wickens CD. Humans: still vital after all these years of automation. Hum Factors. 2008;50:511\u201320. https:\/\/doi.org\/10.1518\/001872008X312198.","journal-title":"Hum Factors"},{"key":"103_CR85","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/0018720816681350","volume":"59","author":"MR Endsley","year":"2017","unstructured":"Endsley MR. From here to autonomy: lessons learned from human-automation research. Hum Factors. 2017;59:5\u201327.","journal-title":"Hum Factors"},{"key":"103_CR86","doi-asserted-by":"publisher","first-page":"296","DOI":"10.3390\/drones8070296","volume":"8","author":"D Caballero-Martin","year":"2024","unstructured":"Caballero-Martin D, Lopez-Guede JM, Estevez J, Gra\u00f1a M. Artificial intelligence applied to drone control: a state of the art. Drones. 2024;8:296. https:\/\/doi.org\/10.3390\/drones8070296.","journal-title":"Drones"},{"key":"103_CR87","doi-asserted-by":"publisher","first-page":"102015","DOI":"10.1016\/j.jksuci.2024.102015","volume":"36","author":"F Dakalbab","year":"2024","unstructured":"Dakalbab F, Talib MA, Nasir Q, Saroufil T. Artificial intelligence techniques in financial trading: a systematic literature review. J King Saud Univ Comput Inf Sci. 2024;36:102015. https:\/\/doi.org\/10.1016\/j.jksuci.2024.102015.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"103_CR88","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104004","volume":"232","author":"A Mahboubi","year":"2024","unstructured":"Mahboubi A, Luong K, Aboutorab H, Bui HT, Jarrad G, Bahutair M, Camtepe S, Pogrebna G, Ahmed E, Barry GH. Evolving techniques in cyber threat hunting: a systematic review. J Netw Comput Appl. 2024;232: 104004. https:\/\/doi.org\/10.1016\/j.jnca.2024.104004.","journal-title":"J Netw Comput Appl"},{"key":"103_CR89","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/systems11050217","volume":"11","author":"K Hou","year":"2023","unstructured":"Hou K, Hou T, Cai L. Exploring trust in human\u2013AI collaboration in the context of multiplayer online games. Systems. 2023;11:217. https:\/\/doi.org\/10.3390\/systems11050217.","journal-title":"Systems"},{"key":"103_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1126\/scirobotics.aay7120","volume":"4","author":"D Gunning","year":"2019","unstructured":"Gunning D, Stefik M, Choi J, Miller T, Stumpf S, Yang G-Z. XAI\u2014explainable artificial intelligence. Sci Robot. 2019;4:1\u20137. https:\/\/doi.org\/10.1126\/scirobotics.aay7120.","journal-title":"Sci Robot"},{"key":"103_CR91","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s44230-023-00038-y","volume":"3","author":"W Yang","year":"2023","unstructured":"Yang W, Wei Y, Wei H, Chen Y, Huang G, Li X, Li R, Yao N, Wang X, Gu X, Amin MB, Kang B. Survey on explainable AI: from approaches, limitations and applications aspects. Hum Centric Intell Syst. 2023;3:161\u201388. https:\/\/doi.org\/10.1007\/s44230-023-00038-y.","journal-title":"Hum Centric Intell Syst"},{"key":"103_CR92","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/s44230-024-00074-2","volume":"4","author":"VA Laptev","year":"2024","unstructured":"Laptev VA, Feyzrakhmanova DR. Application of artificial intelligence in justice: current trends and future prospects. Hum -Centric Intell Syst. 2024;4:394\u2013405. https:\/\/doi.org\/10.1007\/s44230-024-00074-2.","journal-title":"Hum -Centric Intell Syst"},{"key":"103_CR93","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s44230-023-00036-0","volume":"3","author":"S Treacy","year":"2023","unstructured":"Treacy S. Mechanisms and constraints underpinning ethically aligned artificial intelligence systems: an exploration of key performance areas. Hum Centric Intell Syst. 2023;3:189\u201396. https:\/\/doi.org\/10.1007\/s44230-023-00036-0.","journal-title":"Hum Centric Intell Syst"},{"key":"103_CR94","first-page":"12","volume":"1","author":"JR Machireddy","year":"2021","unstructured":"Machireddy JR, Rachakatla SK, Ravichandran P. Leveraging AI and machine learning for data-driven business strategy: a comprehensive framework for analytics integration. Afr J Artif Intell Sustain Dev. 2021;1:12\u2013150.","journal-title":"Afr J Artif Intell Sustain Dev"},{"key":"103_CR95","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s40309-022-00202-w","volume":"10","author":"TC B\u00e4chle","year":"2022","unstructured":"B\u00e4chle TC, Bareis J. \u2018Autonomous weapons\u2019 as a geopolitical signifier in a national power play: analysing AI imaginaries in Chinese and US military policies. Eur J Futur Res. 2022;10:20. https:\/\/doi.org\/10.1186\/s40309-022-00202-w.","journal-title":"Eur J Futur Res"},{"key":"103_CR96","volume-title":"Coactive design in systems engineering: human-machine teaming in search and rescue (SAR) operations","author":"JEM Tai","year":"2021","unstructured":"Tai JEM. Coactive design in systems engineering: human-machine teaming in search and rescue (SAR) operations. Monterey, CA USA: Naval Postgraduate School; 2021."},{"key":"103_CR97","first-page":"185","volume-title":"Advances in child development and behaviour","author":"MF Mascolo","year":"2013","unstructured":"Mascolo MF. Chapter Eight\u2014Developing through relationships: an embodied coactive systems framework. In: Lerner RM, Benson JB, editors. Advances in child development and behaviour, vol. 45. Oxfordshire: Routledge; 2013. p. 185\u2013225."},{"key":"103_CR98","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.jclinepi.2021.03.001","volume":"134","author":"MJ Page","year":"2021","unstructured":"Page MJ, McKenzie JE, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, Shamseer L, Tetzlaff JM, Akl EA, Brennan SE, Chou R, Glanville J, Grimshaw JM, Hr\u00f3bjartsson A, Lalu MM, Li T, Loder EW, Mayo-Wilson E, McDonald S, McGuinness LA, Stewart LA, Thomas J, Tricco AC, Welch VA, Whiting P, Moher D. The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. J Clin Epidemiol. 2021;134:178\u201389. https:\/\/doi.org\/10.1016\/j.jclinepi.2021.03.001.","journal-title":"J Clin Epidemiol"},{"key":"103_CR99","doi-asserted-by":"publisher","DOI":"10.1093\/aje\/kwae232","author":"R Brignardello-Petersen","year":"2025","unstructured":"Brignardello-Petersen R, Santesso N, Guyatt GH. Systematic reviews of the literature: an introduction to current methods. Am J Epidemiol. 2025. https:\/\/doi.org\/10.1093\/aje\/kwae232.","journal-title":"Am J Epidemiol"},{"key":"103_CR100","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s43681-024-00489-4","volume":"5","author":"A Tsamados","year":"2024","unstructured":"Tsamados A, Floridi L, Taddeo M. Human control of AI systems: from supervision to teaming. AI Ethics. 2024;5:1535\u201348. https:\/\/doi.org\/10.1007\/s43681-024-00489-4.","journal-title":"AI Ethics"},{"key":"103_CR101","doi-asserted-by":"publisher","unstructured":"Kamruzzaman A, Thakur K, Ali ML. Cybersecurity threats using application programming interface (API). In: 2024 International conference on computing, internet of things and microwave systems (ICCIMS). 2024; pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCIMS61672.2024.10690413.","DOI":"10.1109\/ICCIMS61672.2024.10690413"},{"key":"103_CR102","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ecosta.2017.01.006","volume":"5","author":"F Lamperti","year":"2017","unstructured":"Lamperti F. An information theoretic criterion for empirical validation of simulation models. Econom Stat. 2017;5:83\u2013106. https:\/\/doi.org\/10.1016\/j.ecosta.2017.01.006.","journal-title":"Econom Stat"},{"key":"103_CR103","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1007\/s10614-021-10191-w","volume":"60","author":"S Tieleman","year":"2022","unstructured":"Tieleman S. Towards a validation methodology for macroeconomic agent-based models. Comput Econ. 2022;60:1507\u201327. https:\/\/doi.org\/10.1007\/s10614-021-10191-w.","journal-title":"Comput Econ"},{"key":"103_CR104","volume-title":"Case study research and applications: design and methods","author":"RK Yin","year":"2017","unstructured":"Yin RK. Case study research and applications: design and methods. 6th ed. Thousand Oaks; 2017.","edition":"6"},{"key":"103_CR105","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyab005","volume":"7","author":"H Kavak","year":"2021","unstructured":"Kavak H, Padilla JJ, Vernon-Bido D, Diallo SY, Gore R, Shetty S. Simulation for cybersecurity: state of the art and future directions. J Cybersecurity. 2021;7:1\u201313. https:\/\/doi.org\/10.1093\/cybsec\/tyab005.","journal-title":"J Cybersecurity"},{"key":"103_CR106","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1097\/MLR.0000000000001664","volume":"60","author":"JA Teresi","year":"2022","unstructured":"Teresi JA, Yu X, Stewart AL, Hays RD. Guidelines for designing and evaluating feasibility pilot studies. Med Care. 2022;60:95\u2013103. https:\/\/doi.org\/10.1097\/MLR.0000000000001664.","journal-title":"Med Care"}],"container-title":["Human-Centric Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44230-025-00103-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44230-025-00103-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44230-025-00103-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:17:13Z","timestamp":1757186233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44230-025-00103-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,13]]},"references-count":106,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["103"],"URL":"https:\/\/doi.org\/10.1007\/s44230-025-00103-8","relation":{},"ISSN":["2667-1336"],"issn-type":[{"value":"2667-1336","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,13]]},"assertion":[{"value":"29 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author has no relevant financial or non-financial interests to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"The author declares consent for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}