{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:29:22Z","timestamp":1766305762343,"version":"3.48.0"},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":272,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1016\/j.procs.2025.09.558","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T22:15:25Z","timestamp":1762467325000},"page":"4334-4342","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cyber Resilient Employee \u2013 Determinants and Definition"],"prefix":"10.1016","volume":"270","author":[{"given":"Tim Warzawa,","family":"Ralf-Christian H\u00e4rting","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2025.09.558_bib1","doi-asserted-by":"crossref","unstructured":"Alrehili, Afnan A.\/Alhazmi, Omar H. (ISO\/IEC 27001 Standard: Analytical and Comparative Overview, 2024): ISO\/IEC 27001 Standard: Analytical and Comparative Overview, in: Swagatam Das u. a. (Hrsg.), Advances, 2024, p. 143\u2013156","DOI":"10.1007\/978-981-99-9524-0_12"},{"key":"10.1016\/j.procs.2025.09.558_bib2","unstructured":"European Union Agency For Network and Information Security ENISA (Cyber Security Culture in Organisations. p.7, 2017): Cyber Security Culture in Organisations. 2017, <https:\/\/www.enisa.europa.eu\/publications\/cyber-security-culture-in-organisations\/@@download\/fullReport> \u2014 (ENISA Threat Landscape 2024, p.7, 2024): ENISA Threat Landscape 2024, 19. September 2024, <https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape2024\/@@download\/fullReport>"},{"key":"10.1016\/j.procs.2025.09.558_bib3","unstructured":"Bitkom e.V. (Hrsg.) (Kompass der IT-Sicherheitsstandards, p.10, 2014): Kompass der IT-Sicherheitsstandards: Ausz\u00fcge zum Thema Elektronische Identit\u00e4ten (2014), <https:\/\/www.bitkom.org\/sites\/default\/files\/file\/import\/140311-Kompass-der-IT-Sicherheitsstandards.pdf> \u2014 (Wirtschaftsschutz, 2023): Wirtschaftsschutz 2023, September 2023, <https:\/\/www.bitkom.org\/sites\/main\/files\/2023-09\/Bitkom-Charts-Wirtschaftsschutz-Cybercrime.pdf>"},{"key":"10.1016\/j.procs.2025.09.558_bib4","unstructured":"Deutscher Bundestag (Bundeshaushalt 2023, 2022): Bundeshaushalt 2023 in H\u00f6he von 476 Milliarden Euro beschlossen"},{"key":"10.1016\/j.procs.2025.09.558_bib5","unstructured":"Bundeskriminalamt (Bundeslagebild Cybercrime, 2024): Bundeslagebild Cybercrime 2023, 13. Mai 2024, <https:\/\/www.bka.de\/SharedDocs\/Downloads\/DE\/Publikationen\/JahresberichteUndLagebilder\/Cybercrime\/cybercrimeBundeslagebild2023.pdf?__blob=publicationFile&v=5>"},{"key":"10.1016\/j.procs.2025.09.558_bib6","unstructured":"Verordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz (BSI-Kritisver ordnung-BSI-KritisV) Anhang 6 (zu \u00a7 1 Nummer 4 und 5, \u00a7 7 Absatz 7 Nummer 1 und 2) Anlagenkategorien und Schwellenwerte im Sektor Finanz-und Versicherungswesen (Ver ordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz Anhang 6, 2024) (2024), <https:\/\/www.gesetze-im-internet.de\/bsi-kritisv\/anhang_6.html>."},{"key":"10.1016\/j.procs.2025.09.558_bib7","unstructured":"Open Kritis (Kritische Infrastrukturen): Kritische Infrastrukturen, <https:\/\/www.openkritis.de\/itsicherheitsgesetz\/index.html>"},{"key":"10.1016\/j.procs.2025.09.558_bib8","doi-asserted-by":"crossref","unstructured":"Mack, Oliver\/Khare, Anshuman (Perspectives on a VUCA World, 2015): Perspectives on a VUCA World, in: Oliver Mack u. a. (Hrsg.), Managing, 2015","DOI":"10.1007\/978-3-319-16889-0_1"},{"key":"10.1016\/j.procs.2025.09.558_bib9","unstructured":"R\u00fcegg-St\u00fcrm, Johannes\/Grand, Simon (Das St. Galler Management-Modell, p.122ff., 2017): Das St. Galler Management-Modell: Wissenschaftliche Grundlagen und Praxisbeispiele, 3. Aufl.: Haupt Verlag, Bern, 2017"},{"key":"10.1016\/j.procs.2025.09.558_bib10","doi-asserted-by":"crossref","unstructured":"Wolfrum, Bernd (Strategisches, 1991): Strategisches Technologiemanagement: Gabler, 1991","DOI":"10.1007\/978-3-663-06893-8"},{"key":"10.1016\/j.procs.2025.09.558_bib11","unstructured":"Stone, Raymond J. (Human resource management, p.57, 2014): Human resource management, 8. Aufl., Milton, Qld: Wiley Australia, 2014"},{"key":"10.1016\/j.procs.2025.09.558_bib12","unstructured":"Armstrong, Michael\/Taylor, Stephen (Armstrong\u2019s handbook of human resource management practice, p.189, 2020): Armstrong\u2019s handbook of human resource management practice, 15th edition, London, United Kingdom\/New York, NY: KoganPage, 2020"},{"key":"10.1016\/j.procs.2025.09.558_bib13","doi-asserted-by":"crossref","unstructured":"Singer, P. W.\/Singer, P.W\/Friedman, Allan (Cybersecurity, 2014): Cybersecurity and cyberwar: What everyone needs to know, New York: Oxford University Press, 2014","DOI":"10.1093\/wentk\/9780199918096.001.0001"},{"key":"10.1016\/j.procs.2025.09.558_bib14","doi-asserted-by":"crossref","unstructured":"H\u00e4rting, Ralf Christian\/Gerst, Maren\/Zerrer, Jasmin (Opportunities and Obstacles of Using Gamification in the Recruiting Process, p.242, 2024): Opportunities and Obstacles of Using Gamification in the Recruiting Process, in: Ewa Ziemba\/Witold Chmielarz\/Jaros\u0142aw W\u0105tr\u00f3bski (Hrsg.), Information, 2024, p. 242\u2013260","DOI":"10.1007\/978-3-031-61657-0_12"},{"key":"10.1016\/j.procs.2025.09.558_bib15","unstructured":"Hylender, C. David; Langlois, Philippe; Pinto, Alex; Widup, Suzanne (2024), \u20182024 Data Breach Investigations Report\u2019, verizon business, p.8 https:\/\/www.verizon.com\/business\/resources\/Tbf7\/reports\/2024-dbir-data-breach-investigations-report.pdf"},{"key":"10.1016\/j.procs.2025.09.558_bib16","doi-asserted-by":"crossref","unstructured":"Bennett, N.\/Lemoine, G. (What a difference a word makes: Understanding threats to performance in a VUCA world, 2014): What a difference a word makes: Understanding threats to performance in a VUCA world, in: Business Horizons 57 (2014), magazine 3, p. 311\u2013317","DOI":"10.1016\/j.bushor.2014.01.001"},{"key":"10.1016\/j.procs.2025.09.558_bib17","unstructured":"Bennett, Nathan\/Lemonie, James G. (What VUCA Really Means for You, p.27, 2014): What VUCA Really Means for You, in: Harvard Business Review 92 (2014), magazine 1, p. 27"},{"key":"10.1016\/j.procs.2025.09.558_bib18","doi-asserted-by":"crossref","unstructured":"Thun-Hohenstein, Leonhard\/Lampert, Kerstin\/Altendorfer-Kling, Ulrike (Resilienz\u2013Geschichte, Modelle und Anwendung, p.8, 2020): Resilienz\u2013Geschichte, Modelle und Anwendung, in: Z Psychodrama Soziom 19 (2020), magazine 1, p. 7\u201320, https:\/\/doi.org\/10.1007\/s11620-020-00524-6","DOI":"10.1007\/s11620-020-00524-6"},{"key":"10.1016\/j.procs.2025.09.558_bib19","doi-asserted-by":"crossref","unstructured":"Walker, Brian H. (Resilience: what it is and is not, p.1, 2020): Resilience: what it is and is not, in: E&S 25 (2020), magazine 2, https:\/\/doi.org\/10.5751\/ES-11647-250211","DOI":"10.5751\/ES-11647-250211"},{"key":"10.1016\/j.procs.2025.09.558_bib20","doi-asserted-by":"crossref","unstructured":"Conz, Elisa\/Magnani, Giovanna (A dynamic perspective on the resilience of firms, 2020): A dynamic perspective on the resilience of firms: A systematic literature review and a frame work for future research, in: European Management Journal 38 (2020), magazine 3, p. 408-409, https:\/\/doi.org\/10.1016\/j.emj.2019.12.004","DOI":"10.1016\/j.emj.2019.12.004"},{"key":"10.1016\/j.procs.2025.09.558_bib21","doi-asserted-by":"crossref","unstructured":"Alshaikh, Moneer (Developing cybersecurity culture to influence employee behavior, p.2, 2020): Developing cybersecurity culture to influence employee behavior: A practice perspective, in: Computers & Security 98 (2020), p. 102003, https:\/\/doi.org\/10.1016\/j.cose.2020.102003","DOI":"10.1016\/j.cose.2020.102003"},{"key":"10.1016\/j.procs.2025.09.558_bib22","unstructured":"National Institute of Standards and Technology (Glossary \u2018cyber resiliency\u2019): Glossary \u2018cyber resiliency\u2019, <https:\/\/csrc.nist.gov\/glossary\/term\/cyber_resiliency>"},{"key":"10.1016\/j.procs.2025.09.558_bib23","doi-asserted-by":"crossref","unstructured":"Craigen, Dan\/Diakun-Thibault, Nadia\/Purse, Randy (Defining Cybersecurity, p.17, 2014): Defining Cybersecurity, in: Technology Innovation Management Review 4 (2014), Heft 10, S. 13\u201321, https:\/\/doi.org\/10.22215\/timreview\/835","DOI":"10.22215\/timreview\/835"},{"key":"10.1016\/j.procs.2025.09.558_bib24","doi-asserted-by":"crossref","unstructured":"Hair, Joe\/Page, Michael\/Brunsveld, Niek (Essentials of Business Research Methods, p.305f., 2019): Essentials of Business Research Methods, 4th Edition, New York\/London: Routledge Taylor & Francis Group, 2019","DOI":"10.4324\/9780429203374-11"},{"key":"10.1016\/j.procs.2025.09.558_bib25","doi-asserted-by":"crossref","unstructured":"Guest, Greg\/Namey, Emily E.\/Mitchell, Marilyn L. (Collecting Qualitative Data: A Field Manual for Applied Research, p.1, 2013): Collecting Qualitative Data: A Field Manual for Applied Research: SAGE Publications, 2013","DOI":"10.4135\/9781506374680"},{"key":"10.1016\/j.procs.2025.09.558_bib26","unstructured":"Stake, Robert E. (Qualitative Research Studying How Things Work, 2010): Qualitative Research: Studying How Things Work, New York\/London: The Guilford Press, 2010"},{"key":"10.1016\/j.procs.2025.09.558_bib27","doi-asserted-by":"crossref","unstructured":"Thommen, Jean-Paul u. a. (Hrsg.) (Allgemeine, 2018): Allgemeine Betriebswirtschaftslehre, 8., vollst\u00e4ndig \u00fcberarbeitete Auflage, Wiesbaden: Springer Gabler, 2018 \u2014 (Organisation, p. 335, 2018): Organisation, in: Jean-Paul Thommen u. a. (Hrsg.), Allgemeine, 2018, p. 329\u2013351","DOI":"10.1007\/978-3-658-16556-7_29"},{"key":"10.1016\/j.procs.2025.09.558_bib28","unstructured":"Packer, Martin (The Science Of Qualitative Research, 2018): The Science of Qualitative Research, Second Edition: Cambridge University Press, 2018"},{"key":"10.1016\/j.procs.2025.09.558_bib29","unstructured":"Creswell, John W.\/Creswell J. David (Research Design, 2018): Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, Fifth Edition, Thousand Oaks: SAGE Publications, 2018"},{"key":"10.1016\/j.procs.2025.09.558_bib30","doi-asserted-by":"crossref","unstructured":"Mayring, Philipp (Qualitative Inhaltsanalyse, p.602ff., 2010): Qualitative Inhaltsanalyse, in: G. Mey\/K. Mruck (Hrsg.), Handbuch, 2010, p. 601\u2013613","DOI":"10.1007\/978-3-531-92052-8_42"},{"key":"10.1016\/j.procs.2025.09.558_bib31","doi-asserted-by":"crossref","unstructured":"Mayring, P.\/Fenzl, T. (Qualitative Inhaltsanalyse, p.633ff., 2019): Qualitative Inhaltsanalyse, in: N. Baur\/J. Blasius (Hrsg.), Handbuch, 2019, p. 633\u2013648","DOI":"10.1007\/978-3-658-21308-4_42"},{"key":"10.1016\/j.procs.2025.09.558_bib32","doi-asserted-by":"crossref","unstructured":"Aksoy, Cenk (Building a Cyber Security Culture For Resilient Organizations Against Cyber Attacks, \u0130\u015fletme Ekonomi ve Y\u00f6netim Ara\u015ft\u0131rmalar\u0131 Dergisi, p. 102, 2024): Building a Cyber Security Culture For Resilient Organizations Against Cyber Attacks, in: The Journal of Business, Economics and Management 7 (1): 96-110. DOI: https:\/\/doi.org\/10.33416\/baybem.13212345","DOI":"10.33416\/baybem.1374001"},{"key":"10.1016\/j.procs.2025.09.558_bib33","unstructured":"Warzawa, Tim: (Appendix MaxQDA 2024), Interview Guideline User perspective, http:\/\/www.kmu-aalen.de\/kmu\/veroeffentlichungen\/"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925032314?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925032314?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:28:04Z","timestamp":1766305684000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050925032314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"alternative-id":["S1877050925032314"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.558","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cyber Resilient Employee \u2013 Determinants and Definition","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.558","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}