{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T11:36:25Z","timestamp":1776771385123,"version":"3.51.2"},"reference-count":136,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T00:00:00Z","timestamp":1775952000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.cose.2026.104918","type":"journal-article","created":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T20:47:47Z","timestamp":1776026867000},"page":"104918","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Human-centered cybersecurity risk management for IT\/OT-converged oil and gas operating facilities"],"prefix":"10.1016","volume":"167","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9732-4999","authenticated-orcid":false,"given":"Huma","family":"Imran","sequence":"first","affiliation":[]},{"given":"Colin","family":"Turner","sequence":"additional","affiliation":[]},{"given":"Shereen","family":"Nassar","sequence":"additional","affiliation":[]},{"given":"Yen","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Salama","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2026.104918_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.51594\/csitrj.v5i1.699","article-title":"A review of cybersecurity strategies in modern organizations: examining the evolution and effectiveness of cybersecurity measures for data protection","volume":"5","author":"Abrahams","year":"2024","journal-title":"Comput. Sci. IT Res. J."},{"key":"10.1016\/j.cose.2026.104918_bib0002","first-page":"179","article-title":"The theory of planned behavior. Organizational behavior and human decision processes","volume":"50","author":"Ajzen","year":"1991","journal-title":"Theor. Cogn. Self-Regul."},{"key":"10.1016\/j.cose.2026.104918_bib0003","first-page":"51","article-title":"Critical success factors for cybersecurity just technical? Exploring the role of human factors in cybersecurity management","volume":"10","author":"Aksoy","year":"2023","journal-title":"Res. J. Bus. Manag."},{"key":"10.1016\/j.cose.2026.104918_bib0004","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.ijcip.2014.12.002","article-title":"Critical infrastructure protection: requirements and challenges for the 21st century","volume":"8","author":"Alcaraz","year":"2015","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.cose.2026.104918_bib0005","series-title":"2019 Cybersecurity and Cyberforensics Conference (CCC)","article-title":"Challenges of implementing training and awareness programs targeting cyber security social engineering","author":"Aldawood","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0006","first-page":"714","article-title":"Review of cyber security on oil and gas industry in United Arab Emirates: analysis on the effectiveness of the National Institute of Standards and Technology\u2019s (NIST) cybersecurity framework","volume":"12","author":"ALDhanhani","year":"2021","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"10.1016\/j.cose.2026.104918_bib0007","doi-asserted-by":"crossref","DOI":"10.26735\/16587790.2018.004","article-title":"Overview of cyberattack on Saudi organizations","author":"Alelyani","year":"2018","journal-title":"JISCR"},{"key":"10.1016\/j.cose.2026.104918_bib0008","doi-asserted-by":"crossref","first-page":"66","DOI":"10.5510\/OGP20190200391","article-title":"The industrial Internet of things: the evolution of automation in the oil and gas complex","author":"Alguliyev","year":"2019","journal-title":"Socar Proc."},{"key":"10.1016\/j.cose.2026.104918_bib0009","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1108\/00251749710173823","article-title":"Socio-technical systems theory: an intervention strategy for organizational development","volume":"35","author":"Appelbaum","year":"1997","journal-title":"Manag. Decis."},{"key":"10.1016\/j.cose.2026.104918_bib0010","series-title":"Digitalization","author":"Aramco","year":"2022"},{"key":"10.1016\/j.cose.2026.104918_bib0011","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1080\/23738871.2018.1520271","article-title":"Review of cybersecurity frameworks: context and shared concepts","volume":"3","author":"Azmi","year":"2018","journal-title":"J. Cyber Policy"},{"key":"10.1016\/j.cose.2026.104918_bib0012","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.intcom.2010.07.003","article-title":"Socio-technical systems: from design methods to systems engineering","volume":"23","author":"Baxter","year":"2011","journal-title":"Interact. Comput."},{"key":"10.1016\/j.cose.2026.104918_bib0013","series-title":"2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW). Presented at the 2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW)","first-page":"8","article-title":"A review of Colonial Pipeline ransomware attack","author":"Beerman","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0014","doi-asserted-by":"crossref","first-page":"563","DOI":"10.3233\/JCS-150536","article-title":"Service security and privacy as a socio-technical problem","volume":"23","author":"Bella","year":"2015","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.cose.2026.104918_bib0015","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1111\/1468-5914.00031","article-title":"On the ontological status of ideas","volume":"27","author":"Bhaskar","year":"1997","journal-title":"J. Theory Soc. Behav."},{"key":"10.1016\/j.cose.2026.104918_bib0016","series-title":"Icte in Transportation and Logistics 2018","first-page":"65","article-title":"Information systems for supply chain management: uncertainties, risks and cyber security","author":"Boiko","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0017","series-title":"Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications","first-page":"266","article-title":"Cybersecurity for SMEs: introducing the Human element into socio-technical Cybersecurity risk assessment","author":"Boletsis","year":"2021"},{"key":"10.1016\/j.cose.2026.104918_bib0018","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/248710","article-title":"MIS problems and failures: a socio-technical perspective. Part I: the causes","volume":"1","author":"Bostrom","year":"1977","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104918_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","article-title":"The Industrial Internet of Things (IIoT): an analysis framework","volume":"101","author":"Boyes","year":"2018","journal-title":"Comput. Ind."},{"key":"10.1016\/j.cose.2026.104918_bib0020","series-title":"Emerging Risk Management in Industry 4.0: An Approach to Improve Organizational and Human Performance in the Complex Systems","author":"Brocal","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0021","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"Bulgurcu","year":"2010","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2026.104918_bib0022","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MITP.2013.88","article-title":"NIST and computer security","volume":"16","author":"Burr","year":"2014","journal-title":"IT Prof."},{"key":"10.1016\/j.cose.2026.104918_bib0023","doi-asserted-by":"crossref","first-page":"333","DOI":"10.69554\/EAZH4262","article-title":"Bridging the gap between IT and OT to improve industrial cyber security","volume":"7","author":"Busalachi","year":"2024","journal-title":"CSJ"},{"key":"10.1016\/j.cose.2026.104918_bib0024","series-title":"Practical Information Security Management: A Complete Guide to Planning and Implementation","author":"Campbell","year":"2016"},{"key":"10.1016\/j.cose.2026.104918_bib0025","series-title":"2024 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","first-page":"1","article-title":"Developing a security framework for converged OT\/IT systems in USA: a risk mitigation with operational efficiency (SDG 9), and economic policy","author":"Canice","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0026","doi-asserted-by":"crossref","DOI":"10.1080\/00140139.2015.1015623","article-title":"Advancing a sociotechnical systems approach to workplace safety\u2013developing the conceptual framework","author":"Carayon","year":"2015","journal-title":"Ergonomics"},{"key":"10.1016\/j.cose.2026.104918_bib0027","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cose.2016.09.007","article-title":"A multifaceted evaluation of the reference model of information assurance & security","volume":"63","author":"Cherdantseva","year":"2016","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2026.104918_bib0028","series-title":"Proceedings of the Nordic Conference on Secure IT Systems","article-title":"Bayesian network models in cyber security: a systematic review","author":"Chockalingam","year":"2017"},{"key":"10.1016\/j.cose.2026.104918_bib0029","doi-asserted-by":"crossref","first-page":"1290","DOI":"10.1080\/0144929X.2019.1583769","article-title":"The impact of time pressure on cybersecurity behaviour: a systematic literature review","volume":"38","author":"Chowdhury","year":"2019","journal-title":"Behav. Inf. Technol."},{"key":"10.1016\/j.cose.2026.104918_bib0030","doi-asserted-by":"crossref","unstructured":"Christine, D.I., Thinyane, M., 2022. Socio-technical cyber resilience: a systematic review of cyber resilience management frameworks. https:\/\/doi.org\/10.1007\/978-3-031-15420-1_28.","DOI":"10.1007\/978-3-031-15420-1_28"},{"key":"10.1016\/j.cose.2026.104918_bib0032","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/EMR.2019.2927559","article-title":"Addressing industry 4.0 cybersecurity challenges","volume":"47","author":"Culot","year":"2019","journal-title":"IEEE Eng. Manag. Rev."},{"key":"10.1016\/j.cose.2026.104918_bib0033","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1108\/TQM-09-2020-0202","article-title":"The ISO\/IEC 27001 information security management standard: literature review and theory-based research agenda","volume":"33","author":"Culot","year":"2021","journal-title":"TQM J."},{"key":"10.1016\/j.cose.2026.104918_bib0034","article-title":"Investigating the formation of information security climate perceptions with social network analysis: a research proposal","author":"Dang-Pham","year":"2015","journal-title":"PACIS"},{"key":"10.1016\/j.cose.2026.104918_bib0035","doi-asserted-by":"crossref","first-page":"576","DOI":"10.51594\/csitrj.v5i3.872","article-title":"Emerging trends in cybersecurity for critical infrastructure protection: a comprehensive review","volume":"5","author":"Daniel","year":"2024","journal-title":"Comput. Sci. IT Res. J."},{"key":"10.1016\/j.cose.2026.104918_bib0036","first-page":"171","article-title":"Advancing socio-technical systems thinking: a call for bravery. Applied ergonomics, advances in socio-technical systems understanding and design: a festschrift in honour of K.D","volume":"45","author":"Davis","year":"2014","journal-title":"Eason"},{"key":"10.1016\/j.cose.2026.104918_bib0037","doi-asserted-by":"crossref","first-page":"273","DOI":"10.3390\/systems2030273","article-title":"Towards a metamodel to support the joint optimization of socio technical systems","volume":"2","author":"Di Maio","year":"2014","journal-title":"Systems"},{"key":"10.1016\/j.cose.2026.104918_bib0038","doi-asserted-by":"crossref","first-page":"85315","DOI":"10.1109\/ACCESS.2023.3303205","article-title":"A comparative analysis of industrial cybersecurity standards","volume":"11","author":"Djebbar","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.cose.2026.104918_bib0039","series-title":"OT Cybersecurity: The 2023 Year in Review","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0040","series-title":"Pragmatism, Critical Realism and the Study of Value","author":"Elder-Vass","year":"2022"},{"key":"10.1016\/j.cose.2026.104918_bib0041","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1080\/14767430.2022.2073692","article-title":"Overlapping traditions with divergent implications? Introduction to the special issue on pragmatism and critical realism","volume":"21","author":"Elder-Vass","year":"2022","journal-title":"J. Crit. Realism"},{"key":"10.1016\/j.cose.2026.104918_bib0042","series-title":"Report On Cyber Security Information Sharing in the Energy Sector","year":"2016"},{"key":"10.1016\/j.cose.2026.104918_bib0043","series-title":"A Conceptual Framework to Study Socio-Technical Security","author":"Ferreira","year":"2014"},{"key":"10.1016\/j.cose.2026.104918_bib0045","unstructured":"George, A.S., 2024. The impact of IT\/OT convergence on digital transformation in manufacturing. https:\/\/doi.org\/10.5281\/zenodo.10895704 2, 18\u201338. https:\/\/doi.org\/10.5281\/zenodo.10895704."},{"key":"10.1016\/j.cose.2026.104918_bib0046","first-page":"25","article-title":"Managing cyber risk in supply chains: a review and research agenda","volume":"2020","author":"Ghadge","year":"2019","journal-title":"Supply Chain Manag.: Int. J."},{"key":"10.1016\/j.cose.2026.104918_bib0047","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1108\/JMTM-02-2018-0057","article-title":"The future of manufacturing industry: a strategic roadmap toward Industry 4.0","volume":"29","author":"Ghobakhloo","year":"2018","journal-title":"J. Manuf. Technol. Manag."},{"key":"10.1016\/j.cose.2026.104918_bib0048","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.procs.2022.12.206","article-title":"Industry 4.0 vs. Industry 5.0: co-existence, transition, or a hybrid","volume":"217","author":"Golovianko","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.cose.2026.104918_bib0049","series-title":"The Essential Guide to the IEC 62443 Industrial Cybersecurity Standards","author":"Gordon","year":"2021"},{"key":"10.1016\/j.cose.2026.104918_bib0050","series-title":"Machine Learning Approach for Automated Defense Against Network Intrusions","author":"Hamdani","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0051","series-title":"Proceeding of the 33rd European Safety and Reliability Conference. Presented at the 33rd European Safety and Reliability Conference","first-page":"3190","article-title":"A continuous OT cybersecurity risk analysis and mitigation process","author":"Hanssen","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0052","series-title":"SANS 2016 State of ICS Security Survey","author":"Harp","year":"2016"},{"key":"10.1016\/j.cose.2026.104918_bib0053","series-title":"Information and Communication Technologies For Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D, IFIP Advances in Information and Communication Technology","first-page":"14","article-title":"Combining pragmatism and critical realism in ICT4D research: an e-resilience case example","author":"Heeks","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0054","doi-asserted-by":"crossref","DOI":"10.1080\/21665095.2024.2439407","article-title":"Pragmatist-critical realism as a development studies research paradigm","volume":"12","author":"Heeks","year":"2025","journal-title":"Dev. Stud. Res."},{"key":"10.1016\/j.cose.2026.104918_bib0056","doi-asserted-by":"crossref","unstructured":"Hollnagel, E., 2012. FRAM: the functional resonance analysis method: modelling complex socio-technical systems. https:\/\/doi.org\/10.1201\/9781315255071.","DOI":"10.1201\/9781315255071"},{"key":"10.1016\/j.cose.2026.104918_bib0057","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","author":"Ifinedo","year":"2014","journal-title":"Inf. Manag."},{"key":"10.1016\/j.cose.2026.104918_bib0058","first-page":"5953","article-title":"Pragmatic critical realism and mixed methods in inter-disciplinary research\u2014management and information systems","author":"Imran","year":"2024","journal-title":"Int. J. Sci. Res. Manag."},{"key":"10.1016\/j.cose.2026.104918_bib0059","series-title":"2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)","first-page":"1","article-title":"Digitization, cybersecurity and risk management in the oil and gas sector in the post COVID world: a systematic review","author":"Imran","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0060","series-title":"Presented at the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022)","article-title":"Oil and gas sector: a systematic literature review of digitalization, cybersecurity, and human factors in the post COVID world, in: human-centered design and user experience","author":"Imran","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0061","series-title":"Advances in Information and Communication, Lecture Notes in Networks and Systems. Presented at the Future of Information and Communication Conference","first-page":"871","article-title":"Cybersecurity risk management Frameworks in the oil and gas sector: a systematic literature review","author":"Imran","year":"2022"},{"key":"10.1016\/j.cose.2026.104918_bib0062","series-title":"Economic and Social Development: Book of Proceedings. Presented at the 69th International Scientific Conference on Economic and Social Development Development \u2013 \u201cSustainability and Post Covid World","article-title":"A systematic literature review on the technical and non-technical cyber risk management models in the oil and gas sector","author":"Imran","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0063","series-title":"ISO-27001, ISA\/IEC-62443, and NIST CSF: Selecting the Right Standard\/Framework for Your OT Cybersecurity Program \u2013 INTECH Automation Intelligence","year":"2022"},{"key":"10.1016\/j.cose.2026.104918_bib0064","series-title":"ISA\/IEC 62443 Series of Standards - ISA","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0065","series-title":"ISO\/IEC 27001:2022","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0066","series-title":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","first-page":"1864","article-title":"Security management of cyber physical control systems using NIST SP 800-82r2","author":"Jillepalli","year":"2017"},{"key":"10.1016\/j.cose.2026.104918_bib0067","first-page":"44","article-title":"Unveiling human factors: aligning facets of cybersecurity leadership, insider threats, and arsonist attributes to reduce cyber risk","volume":"8","author":"Jones","year":"2024","journal-title":"Socio Econ. Chall."},{"key":"10.1016\/j.cose.2026.104918_bib0068","doi-asserted-by":"crossref","first-page":"e1188","DOI":"10.54751\/revistafoco.v16n2-215","article-title":"Cyber risk management and ISO 27005 applied in organizations: a systematic literature review","volume":"16","author":"Junior","year":"2023","journal-title":"Rev. Foco"},{"key":"10.1016\/j.cose.2026.104918_bib0069","first-page":"10","article-title":"Cyber-physical systems as sociotechnical systems: a view towards human\u2013technology interaction","volume":"5","author":"Kant","year":"2017","journal-title":"Eur. J. Futures Res."},{"key":"10.1016\/j.cose.2026.104918_bib0070","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1108\/ICS-06-2021-0073","article-title":"The effect of perceived organizational culture on employees\u2019 information security compliance","volume":"30","author":"Karlsson","year":"2021","journal-title":"Inf. Comput. Secur."},{"key":"10.1016\/j.cose.2026.104918_bib0071","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.101804","article-title":"Artificial intelligence for cybersecurity: literature review and future research directions","volume":"97","author":"Kaur","year":"2023","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.cose.2026.104918_bib0072","doi-asserted-by":"crossref","first-page":"255","DOI":"10.3390\/socsci8090255","article-title":"Pragmatism as a research paradigm and its implications for social work research","volume":"8","author":"Kaushik","year":"2019","journal-title":"Soc. Sci."},{"key":"10.1016\/j.cose.2026.104918_bib0073","first-page":"369","article-title":"Literature review on phishing detection","volume":"12","author":"Khonji","year":"2021","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"10.1016\/j.cose.2026.104918_bib0074","first-page":"1361","article-title":"A survey on cyber physical system security for IoT: issues, challenges, threats, solutions","volume":"14","author":"Kim","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"10.1016\/j.cose.2026.104918_bib0075","doi-asserted-by":"crossref","first-page":"72","DOI":"10.19101\/IJACR.SOC6","article-title":"A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution","volume":"9","author":"Kim","year":"2019","journal-title":"Int. J. Adv. Comput. Res."},{"key":"10.1016\/j.cose.2026.104918_bib0077","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","article-title":"A survey of cyber security management in Industrial control systems","volume":"9","author":"Knowles","year":"2015","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.cose.2026.104918_bib0078","doi-asserted-by":"crossref","DOI":"10.3390\/app8060898","article-title":"An integrated cyber security risk management approach for a cyber-physical system","volume":"8","author":"Kure","year":"2018","journal-title":"Appl. Sci."},{"key":"10.1016\/j.cose.2026.104918_bib0079","series-title":"2024 IEEE IAS Petroleum and Chemical Industry Technical Conference (PCIC)","first-page":"1","article-title":"Implementing cybersecurity for industrial-connected products","author":"Laan","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0080","first-page":"76","article-title":"Information security","volume":"33","author":"Laybats","year":"2016","journal-title":"Bus. Inf. Rev."},{"key":"10.1016\/j.cose.2026.104918_bib0081","series-title":"Proceedings of the 14th International Conference on Availability, Reliability and Security","first-page":"1","article-title":"Applicability of the IEC 62443 standard in Industry 4.0 \/IIoT","author":"Leander","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0082","first-page":"1","article-title":"An analytical study on eavesdropping attacks in wireless nets of things","volume":"2016","author":"Li","year":"2016","journal-title":"Mob. Inf. Syst."},{"key":"10.1016\/j.cose.2026.104918_bib0083","doi-asserted-by":"crossref","first-page":"41426","DOI":"10.1109\/ACCESS.2019.2907695","article-title":"Blockchain technology in the oil and gas industry: a review of applications, opportunities, challenges, and risks","volume":"7","author":"Lu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.cose.2026.104918_bib0084","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1057\/s41267-021-00448-9","article-title":"A general framework of digitization risks in international business","volume":"53","author":"Luo","year":"2022","journal-title":"J. Int. Bus Stud."},{"key":"10.1016\/j.cose.2026.104918_bib0085","series-title":"2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA)","first-page":"1","article-title":"Comparative analysis of adversarial AI injection attacks: a preliminary study","author":"Malatji","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0086","series-title":"2023 International Conference on Cyber Management and Engineering (CyMaEn)","first-page":"117","article-title":"Management of enterprise cyber security: a review of ISO\/IEC 27001:2022","author":"Malatji","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0087","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1108\/ICS-03-2018-0031","article-title":"Socio-technical systems cybersecurity framework","volume":"27","author":"Malatji","year":"2019","journal-title":"Inf. Comput. Secur."},{"key":"10.1016\/j.cose.2026.104918_bib0088","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1361-3723(21)00129-9","article-title":"IT\/OT convergence and cyber security","volume":"2021","author":"Maleh","year":"2021","journal-title":"Comput. Fraud Secur."},{"key":"10.1016\/j.cose.2026.104918_bib0089","series-title":"Global Energy Cyberattacks: Night Dragon (White Paper No. Version 1.1)","year":"2011"},{"key":"10.1016\/j.cose.2026.104918_bib0090","first-page":"36","article-title":"When cyber met physical: it\u2019s time to evaluate your security system\u2019s cyber risks","volume":"54","author":"Meyer","year":"2017","journal-title":"Security"},{"key":"10.1016\/j.cose.2026.104918_bib0091","series-title":"Protecting the Connected barrels: Cybersecurity for Upstream Oil and Gas (Technical)","author":"Mittal","year":"2017"},{"key":"10.1016\/j.cose.2026.104918_bib0092","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.3390\/en14051380","article-title":"Emerging challenges in smart grid cybersecurity enhancement: a review","volume":"14","author":"Mohammadi","year":"2021","journal-title":"Energies"},{"key":"10.1016\/j.cose.2026.104918_bib0093","doi-asserted-by":"crossref","DOI":"10.1145\/3548691","article-title":"Cybersecurity challenges in the offshore oil and gas industry: an industrial cyber-physical systems (ICPS) perspective","volume":"6","author":"Mohammed","year":"2022","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"10.1016\/j.cose.2026.104918_bib0094","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1177\/15586898211049847","article-title":"Retroductive theorizing: a contribution of critical realism to mixed methods research","volume":"17","author":"Mukumbang","year":"2023","journal-title":"J. Mix. Methods Res."},{"key":"10.1016\/j.cose.2026.104918_bib0095","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1111\/j.1365-2575.2006.00221.x","article-title":"The story of socio-technical design: reflections on its successes, failures and potential","volume":"16","author":"Mumford","year":"2006","journal-title":"Inf. Syst. J."},{"key":"10.1016\/j.cose.2026.104918_bib0096","unstructured":"Murray, G., Johnstone, M.N., Valli, C., 2017. The convergence of IT and OT in critical infrastructure. Australian information security management conference. https:\/\/doi.org\/10.4225\/75\/5A84F7B595B4E."},{"key":"10.1016\/j.cose.2026.104918_bib0097","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1093\/cybsec\/tyx006","article-title":"Valuing information security from a phishing attack","volume":"3","author":"Nguyen","year":"2017","journal-title":"J. Cybersecur."},{"key":"10.1016\/j.cose.2026.104918_bib0098","doi-asserted-by":"crossref","first-page":"61183","DOI":"10.1109\/ACCESS.2020.2979678","article-title":"A systematic review of big data analytics for oil and Gas industry 4.0","volume":"8","author":"Nguyen","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.cose.2026.104918_bib0099","series-title":"Differentiation of the ISO 27000 and IEC 62443 IT Security Standards series: a Perspective on Automation Systems in the Manufacturing and Process Industries","author":"Niemann","year":"2021"},{"key":"10.1016\/j.cose.2026.104918_bib0100","doi-asserted-by":"crossref","first-page":"5119","DOI":"10.3390\/s21155119","article-title":"Influence of human factors on cyber security within healthcare organisations: a systematic review","volume":"21","author":"Nifakos","year":"2021","journal-title":"Sensors"},{"key":"10.1016\/j.cose.2026.104918_bib0101","series-title":"National Infrastructure Protection Plan-Partnering for Critical Infrastructure Security and Resilience","year":"2013"},{"key":"10.1016\/j.cose.2026.104918_bib0102","first-page":"15","article-title":"Assessing the impact of new technology on complex sociotechnical systems","volume":"27","author":"Oosthuizen","year":"2016","journal-title":"S. Afr. J. Ind. Eng."},{"key":"10.1016\/j.cose.2026.104918_bib0104","article-title":"Cyber security risks in globalized supply chains: conceptual framework","author":"Pandey","year":"2020","journal-title":"J. Glob. Oper. Strateg. Sourc."},{"key":"10.1016\/j.cose.2026.104918_bib0105","series-title":"Presented at the Paper presented at the Abu Dhabi International Petroleum Exhibition & Conference","article-title":"IT\/OT convergence \u2013 cybersecurity beyond technology, in: paper presented at the Abu Dhabi International Petroleum Exhibition & Conference, Abu Dhabi","author":"Paredes","year":"2020"},{"key":"10.1016\/j.cose.2026.104918_bib0106","unstructured":"Perwej, D.Y., Omer, M., Sheta, O., Harb, H., Adrees, M., 2019. The Future of Internet of Things (IoT) and its empowering technology Volume 9, Pages 20192\u201320203."},{"key":"10.1016\/j.cose.2026.104918_bib0121","article-title":"SANS ICS\/OT Cybersecurity Survey: 2023\u2019s Challenges and Tomorrow\u2019s Defenses","author":"Parsons","year":"2023","journal-title":"SANS\u2122 Institute."},{"key":"10.1016\/j.cose.2026.104918_bib0107","doi-asserted-by":"crossref","DOI":"10.1002\/sys.21664","article-title":"A systematic literature review of sociotechnical systems in systems engineering","volume":"26","author":"Poloj\u00e4rvi","year":"2023","journal-title":"Syst. Eng."},{"key":"10.1016\/j.cose.2026.104918_bib0108","doi-asserted-by":"crossref","first-page":"112","DOI":"10.3390\/jmse9020112","article-title":"Perspectives on cyber security for offshore oil and gas assets","volume":"9","author":"Progoulakis","year":"2021","journal-title":"J. Mar. Sci. Eng."},{"key":"10.1016\/j.cose.2026.104918_bib0109","first-page":"153","article-title":"Network security based on D-S evidence theory optimizing CS-BP neural Network situation assessment","author":"Qiang","year":"2018"},{"key":"10.1016\/j.cose.2026.104918_bib0110","series-title":"Cyber Risk Management for the Internet of Things (Working Paper)","author":"Radanliev","year":"2019"},{"key":"10.1016\/j.cose.2026.104918_bib0111","author":"Ritz","year":"2020","journal-title":"Comparing Abduction and Retroduction in Peircean pragmatism and Critical Realism"},{"key":"10.1016\/j.cose.2026.104918_bib0112","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MSP.2015.72","article-title":"A socio-technical framework for threat modeling a software supply chain","volume":"13","author":"Sabbagh","year":"2015","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.cose.2026.104918_bib0113","doi-asserted-by":"crossref","first-page":"6666","DOI":"10.3390\/s23156666","article-title":"Digital transformation and cybersecurity challenges for businesses resilience: issues and recommendations","volume":"23","author":"Saeed","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.cose.2026.104918_bib0114","unstructured":"Sanger, D.E., Perlroth, N., 2020. FireEye, a Top Cybersecurity Firm, Says It Was Hacked by A Nation-State. The New York Times."},{"key":"10.1016\/j.cose.2026.104918_bib0115","series-title":"2023 18th Iberian Conference on Information Systems and Technologies (CISTI)","first-page":"1","article-title":"IT\/OT convergence in industry 4.0: risks and analisy of the problems","author":"Santos","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0117","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1177\/1541931218621285","article-title":"Toward cyber workforce development: an exploratory survey of information security professionals","volume":"62","author":"Schuster","year":"2018","journal-title":"Proc. Hum. Factors Ergon. Soc. Annu. Meet."},{"key":"10.1016\/j.cose.2026.104918_bib0118","series-title":"Proceeding of the 33rd European Safety and Reliability Conference. Presented at the 33rd European Safety and Reliability Conference","first-page":"3414","article-title":"Critical convergence for enhanced safety: a literature review on integrated cybersecurity strategies for information technology and operational technology systems within critical infrastructure","author":"Sechi","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0119","doi-asserted-by":"crossref","first-page":"322","DOI":"10.3390\/s16030322","article-title":"A secure, intelligent, and smart-sensing approach for industrial system automation and transmission over unsecured wireless networks","volume":"16","author":"Shahzad","year":"2016","journal-title":"Sensors"},{"key":"10.1016\/j.cose.2026.104918_bib0120","first-page":"1","article-title":"Cybersecurity in SCADA systems with advanced AI and ML techniques","author":"Skrodelis","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0122","first-page":"215","article-title":"Information security management needs more holistic approach: a literature review","volume":"36","author":"Soomro","year":"2016","journal-title":"Int. J. Inf. Manag."},{"key":"10.1016\/j.cose.2026.104918_bib0123","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/sj.2015.40","article-title":"Human Factors in security: user-centred and socio-technical perspectives","volume":"29","author":"Stedmon","year":"2015","journal-title":"Secur. J."},{"key":"10.1016\/j.cose.2026.104918_bib0124","doi-asserted-by":"crossref","first-page":"128440","DOI":"10.1109\/ACCESS.2020.3007960","article-title":"Cyber-attacks on the oil & gas sector: a survey on incident assessment and attack patterns","volume":"8","author":"Stergiopoulos","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.cose.2026.104918_bib0125","first-page":"16","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"Stouffer","year":"2011","journal-title":"NIST Spec. Publ."},{"key":"10.1016\/j.cose.2026.104918_bib0126","article-title":"Suspicious minds: psychological techniques correlated with online phishing attacks","volume":"19","author":"Stylianou","year":"2025","journal-title":"Comput. Hum. Behav. Rep."},{"key":"10.1016\/j.cose.2026.104918_bib0127","series-title":"Perspectives on Organizational Design and Behaviour","first-page":"72","article-title":"Evolution of socio-technical systems-a conceptual framework and an action research program","author":"Trist","year":"1981"},{"key":"10.1016\/j.cose.2026.104918_bib0128","doi-asserted-by":"crossref","unstructured":"Troyer, L., 2016. Expanding sociotechnical systems theory through the trans-disciplinary lens of complexity theory. https:\/\/doi.org\/10.1007\/978-3-319-38756-7_7.","DOI":"10.1007\/978-3-319-38756-7_7"},{"key":"10.1016\/j.cose.2026.104918_bib0129","doi-asserted-by":"crossref","first-page":"18","DOI":"10.14445\/22312803\/IJCTT-V69I1P104","article-title":"Diagnostic, descriptive, predictive and prescriptive analytics with geospatial data","volume":"69","author":"Tyagi","year":"2021","journal-title":"IJCTT"},{"key":"10.1016\/j.cose.2026.104918_bib0130","doi-asserted-by":"crossref","unstructured":"Tyagi, P., 2021b. Convergence of IT and OT \u2013 cybersecurity related challenges and best practices.","DOI":"10.14445\/22312803\/IJCTT-V69I2P113"},{"key":"10.1016\/j.cose.2026.104918_bib0132","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1016\/j.jbusres.2019.09.022","article-title":"Digital transformation: a multidisciplinary reflection and research agenda","volume":"122","author":"Verhoef","year":"2021","journal-title":"J. Bus. Res."},{"key":"10.1016\/j.cose.2026.104918_bib0133","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.jsis.2019.01.003","article-title":"Understanding digital transformation: a review and a research agenda","volume":"28","author":"Vial","year":"2019","journal-title":"J. Strateg. Inf. Syst. SI: Rev. Issue"},{"key":"10.1016\/j.cose.2026.104918_bib0135","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1108\/13683040010362328","article-title":"System equivalence: the application of joint optimization","volume":"4","author":"Washington","year":"2000","journal-title":"Meas. Bus. Excell."},{"key":"10.1016\/j.cose.2026.104918_bib0136","series-title":"Interoperability and Security Challenges of Industry 4.0. Presented at the 2nd GI\/ACM Industry4.0 Security Standardisation Workshop on Industrial Automation and Control Systems (IACS)","author":"Watson","year":"2017"},{"key":"10.1016\/j.cose.2026.104918_bib0137","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1057\/sj.2011.31","article-title":"An empirical study of a behavioral decision model with moderated effects for long-range security initiatives","volume":"26","author":"Workman","year":"2013","journal-title":"Secur. J."},{"key":"10.1016\/j.cose.2026.104918_bib0138","series-title":"Global Cybersecurity Outlook 2024","year":"2024"},{"key":"10.1016\/j.cose.2026.104918_bib0140","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.dss.2015.01.006","article-title":"A framework for model integration and holistic modelling of socio-technical systems","volume":"71","author":"Wu","year":"2015","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.cose.2026.104918_bib0141","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.chaos.2015.10.030","article-title":"A new cyber security risk evaluation method for oil and gas SCADA based on factor state space","volume":"89","author":"Yang","year":"2016","journal-title":"Chaos Solit. Frac."},{"key":"10.1016\/j.cose.2026.104918_bib0142","doi-asserted-by":"crossref","first-page":"2174","DOI":"10.1080\/00207543.2011.562563","article-title":"A conceptual framework for the ubiquitous factory","volume":"50","author":"Yoon","year":"2012","journal-title":"Int. J. Prod. Res."},{"key":"10.1016\/j.cose.2026.104918_bib0143","series-title":"Security of IT\/OT Convergence: Design and Implementation Challenges","author":"Zahran","year":"2023"},{"key":"10.1016\/j.cose.2026.104918_bib0145","doi-asserted-by":"crossref","first-page":"65","DOI":"10.7250\/csimq.2019-18.04","article-title":"A socio-technical systems approach to design and support systems thinking in cybersecurity and risk management education","author":"Zoto","year":"2019","journal-title":"J. Complex Syst. Inf. Model. Q."},{"key":"10.1016\/j.cose.2026.104918_bib0146","first-page":"352","article-title":"Round table: is the common ground between pragmatism and critical realism more important than the differences?","volume":"21","author":"Zotzmann","year":"2022","journal-title":"J. Crit. Real."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000945?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000945?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T10:37:30Z","timestamp":1776767850000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404826000945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":136,"alternative-id":["S0167404826000945"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2026.104918","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Human-centered cybersecurity risk management for IT\/OT-converged oil and gas operating facilities","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2026.104918","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104918"}}