{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:58:24Z","timestamp":1757541504167,"version":"3.41.2"},"reference-count":75,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T00:00:00Z","timestamp":1515369600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["K"],"published-print":{"date-parts":[[2018,1,8]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Situation awareness theory is a primary mean to take decisions and actions in a dynamically changing environment. Nowadays, to implement situation awareness, theories and models in organizational scenarios have become an important research challenge. The purpose of this paper is to investigate the relationship between the situation awareness theory and cybernetics. Further, the aim is to use this relationship to check the feasibility of situation awareness-based information security risk management (ISRM) implementation in the organizational scenario.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>To investigate the relationship between situation awareness theory and cybernetics, Endsley\u2019s situation awareness theory and Norbert Wiener\u2019s cybernetics concepts and philosophy have been used in the present work. For a detailed study, concepts, techniques and philosophy of the cybernetics have been extracted from the thesis of Norbert Wiener titled \u201cThe human use of human beings\u201d and \u201cCybernetics or control and communication in the animal and the machine\u201d.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The present paper demonstrates that relationship can be successfully established between cybernetics and situation awareness theory. Further, this relationship can be used to solve organizational implementation issues related to situation awareness based systems. To demonstrate relationship and solutions of implementation issues, two case studies related to ISRM are also incorporated in the present case study.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The present work bridges two parallel and prominent theories of situation awareness and cybernetics. It also demonstrates that combination of both the theories can be used to feasibly implement situation awareness based systems in organizations.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/k-06-2017-0226","type":"journal-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T04:07:25Z","timestamp":1511755645000},"page":"58-79","source":"Crossref","is-referenced-by-count":10,"title":["Relating Wiener\u2019s cybernetics aspects and a situation awareness model implementation for information security risk management"],"prefix":"10.1108","volume":"47","author":[{"given":"Kushal","family":"Anjaria","sequence":"first","affiliation":[]},{"given":"Arun","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020100101581154100_ref001","first-page":"69","article-title":"Case study research: design and methods","volume-title":"The Canadian Journal of Action Research","year":"2013"},{"issue":"4","key":"key2020100101581154100_ref002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijcses.2015.6401","article-title":"OS verification-a survey as a source of future challenges","volume":"6","year":"2015","journal-title":"International Journal of Computer Science & Engineering Survey)"},{"key":"key2020100101581154100_ref003","doi-asserted-by":"publisher","DOI":"10.1108\/K-04-2017-0129","article-title":"Relation between cybernetics and information security: from Norbert Wiener\u2019s perspectives","year":"2017","journal-title":"Kybernetes"},{"issue":"1","key":"key2020100101581154100_ref004","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5815\/ijem.2017.01.01","article-title":"Relating interactive system design and information theory from information leakage perspective","volume":"7","year":"2017","journal-title":"IJEM-International Journal of Engineering and Manufacturing (IJEM)"},{"year":"2011","author":"AS\/NZS ISO\/IEC 27005:2011","key":"key2020100101581154100_ref005"},{"volume-title":"Social Foundations of Thought and Action: A Social Cognitive Perspective","year":"1986","key":"key2020100101581154100_ref006"},{"issue":"2","key":"key2020100101581154100_ref007","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1057\/ejis.1991.20","article-title":"Risk analysis: an interpretive feasibility tool in justifying information systems security","volume":"1","year":"1991","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"key2020100101581154100_ref008","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1207\/s15327566ijce0301_5","article-title":"Theory of activity and situation awareness","volume":"3","year":"1999","journal-title":"International Journal of Cognitive Ergonomics"},{"issue":"1","key":"key2020100101581154100_ref009","first-page":"24","article-title":"Bring your own device","volume":"54","year":"2012","journal-title":"IT Now"},{"first-page":"97","article-title":"Information security is information risk management","year":"2001","key":"key2020100101581154100_ref010"},{"issue":"3","key":"key2020100101581154100_ref011","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1080\/10508414.2010.487013","article-title":"Evaluation of computer-based situation awareness training for general aviation pilots","volume":"20","year":"2010","journal-title":"The International Journal of Aviation Psychology"},{"volume-title":"National Intelligence Estimates","year":"2008","key":"key2020100101581154100_ref012"},{"key":"key2020100101581154100_ref013","unstructured":"Burke, J.L. and Murphy, R.R. (2004), Situation Awareness and Task Performance in Robot-Assisted Technical Search: Bujold Goes to Bridgeport, available at: citeseer.ist.psu.edu\/burke04situation.html"},{"first-page":"39","article-title":"Arcaid: addressing situation awareness and simulator sickness in a virtual reality Pac-Man Game","year":"2016","key":"key2020100101581154100_ref014"},{"issue":"5","key":"key2020100101581154100_ref015","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1016\/j.chb.2012.05.003","article-title":"Information systems user security: a structured model of the knowing\u2013doing gap","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020100101581154100_ref016","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1037\/h0070405","article-title":"The reflex arc concept in psychology","volume":"3","year":"1896","journal-title":"Psychological Review"},{"issue":"7","key":"key2020100101581154100_ref017","doi-asserted-by":"crossref","first-page":"386","DOI":"10.17705\/1jais.00133","article-title":"The centrality of awareness in the formation of user behavioral intention toward protective information technologies","volume":"8","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"key2020100101581154100_ref018","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.jss.2016.03.012","article-title":"A software cybernetics approach to self-tuning performance of on-line transaction processing systems","volume":"124","year":"2017","journal-title":"Journal of Systems and Software"},{"first-page":"1","article-title":"Agile approach with Kanban in information security risk management","year":"2016","key":"key2020100101581154100_ref019"},{"issue":"2","key":"key2020100101581154100_ref020","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1177\/154193128803200221","article-title":"Design and evaluation for situation awareness enhancement","volume":"32","year":"1988","journal-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Sage Publications"},{"issue":"1","key":"key2020100101581154100_ref021","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1518\/001872095779049543","article-title":"Toward a theory of situation awareness in dynamic systems","volume":"37","year":"1995","journal-title":"Human Factors: The Journal of the Human Factors and Ergonomics Society"},{"volume-title":"Designing for Situation Awareness: An Approach to User-Centered Design","year":"2016","key":"key2020100101581154100_ref022"},{"first-page":"1393","article-title":"Charting the landscape of enterprise architecture complexity cybernetics: a systematic literature analysis","year":"2016","key":"key2020100101581154100_ref023"},{"issue":"3","key":"key2020100101581154100_ref024","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.tpb.2005.09.005","article-title":"Game theory and human evolution: a critique of some recent interpretations of experimental games","volume":"69","year":"2006","journal-title":"Theoretical Population Biology"},{"issue":"5","key":"key2020100101581154100_ref025","article-title":"Rationalizing the GMO debate: the ordonomic approach to addressing agricultural myths","volume":"13","year":"2016","journal-title":"International Journal of Environmental Research and Public Health"},{"volume-title":"A Situation Awareness Methodology for the Evaluation of Process Control Systems: Studies of Feasibility and the Implication of Use","year":"1993","key":"key2020100101581154100_ref026"},{"issue":"4","key":"key2020100101581154100_ref027","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.istr.2008.10.010","article-title":"Information security management standards: compliance, governance and risk management","volume":"13","year":"2008","journal-title":"Information Security Technical Report"},{"key":"key2020100101581154100_ref028","article-title":"Director of national intelligence","volume-title":"Intelligence Community Directive Number 203: Analytic Standards","author":"ICD 203","year":"2007"},{"volume-title":"National Security Intelligence","year":"2017","key":"key2020100101581154100_ref029"},{"volume-title":"The Cybernetics Moment: Or Why We Call Our Age the Information Age","year":"2015","key":"key2020100101581154100_ref030"},{"issue":"5","key":"key2020100101581154100_ref031","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.im.2003.08.001","article-title":"Why there aren\u2019t more information security research studies","volume":"41","year":"2004","journal-title":"Information & Management"},{"issue":"8\/9","key":"key2020100101581154100_ref032","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1108\/K-10-2014-0227","article-title":"Non-trivial philosophy: cybernetics, data analytics, and the biophysics of information theory","volume":"44","year":"2015","journal-title":"Kybernetes"},{"key":"key2020100101581154100_ref033","first-page":"72","article-title":"Learning game for training child bicyclists\u2019 situation awareness","volume":"105","year":"2016","journal-title":"Accident Analysis & Prevention"},{"key":"key2020100101581154100_ref034","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.firesaf.2013.11.010","article-title":"Situational awareness for supporting building fire emergency response: information needs, information sources, and implementation requirements","volume":"63","year":"2014","journal-title":"Fire Safety Journal"},{"issue":"1","key":"key2020100101581154100_ref035","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.dss.2012.06.010","article-title":"Theories in online information privacy research: a critical review and an integrated framework","volume":"54","year":"2012","journal-title":"Decision Support Systems"},{"issue":"1","key":"key2020100101581154100_ref036","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/18.61115","article-title":"Divergence measures based on the Shannon entropy","volume":"37","year":"1991","journal-title":"IEEE Transactions on Information Theory"},{"volume-title":"Intelligence: From Secrets to Policy","year":"2016","key":"key2020100101581154100_ref037"},{"volume-title":"Social Systems","year":"1995","key":"key2020100101581154100_ref038"},{"volume-title":"Theory of Society","year":"2012","key":"key2020100101581154100_ref039"},{"volume-title":"Assessing Situation Awareness in Field Training Exercises","year":"2002","key":"key2020100101581154100_ref040"},{"volume-title":"Modeling the US Military Intelligence Process","year":"2004","key":"key2020100101581154100_ref041"},{"issue":"2","key":"key2020100101581154100_ref042","article-title":"The ethics of algorithms: mapping the debate","volume":"3","year":"2016","journal-title":"Big Data & Society"},{"key":"key2020100101581154100_ref043","first-page":"369","article-title":"Team mental models and situation awareness","volume-title":"The Wiley-Blackwell Handbook of the Psychology of Team Working and Collaborative Processes","year":"2017"},{"volume-title":"Social Research Methods: Qualitative and Quantitative Approaches","year":"2002","key":"key2020100101581154100_ref044"},{"issue":"4","key":"key2020100101581154100_ref045","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"key":"key2020100101581154100_ref046","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1057\/978-1-137-54212-0_3","article-title":"Management control: the influence of cybernetics and the science of the unknowable","volume-title":"Pioneers of Critical Accounting","year":"2016"},{"volume-title":"US National Intelligence: An Overview","year":"2011","author":"ODNI e Office of the Director of National Intelligence","key":"key2020100101581154100_ref047"},{"key":"key2020100101581154100_ref048","first-page":"115","article-title":"Understanding and predicting electronic commerce adoption: an extension of the theory of planned behavior","year":"2006","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2020100101581154100_ref049","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1080\/10919390802421242","article-title":"The state of risk assessment practices in information security: an exploratory investigation","volume":"18","year":"2008","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"issue":"1","key":"key2020100101581154100_ref050","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1002\/hfm.10050","article-title":"Situation awareness and attention allocation measures for quantifying telepresence experiences in teleoperation","volume":"14","year":"2004","journal-title":"Human Factors and Ergonomics in Manufacturing & Manufacturing"},{"key":"key2020100101581154100_ref051","first-page":"353","article-title":"Automata (towards automation and robots)","volume-title":"Ancient Engineers\u2019 Inventions","year":"2017"},{"volume-title":"Grundlagen Der Soziologischen Theorie","year":"2009","key":"key2020100101581154100_ref052"},{"issue":"1","key":"key2020100101581154100_ref053","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.compedu.2008.06.011","article-title":"The impact of information richness on information security awareness training effectiveness","volume":"52","year":"2009","journal-title":"Computers & Education"},{"volume-title":"Risk Management Standards \u0152 The Perception of Ease of Use","year":"2006","key":"key2020100101581154100_ref054"},{"first-page":"465","article-title":"Anti-spyware security design patterns","year":"2016","key":"key2020100101581154100_ref055"},{"issue":"1","key":"key2020100101581154100_ref056","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1518\/001872095779049444","article-title":"Situation awareness is adaptive, externally directed consciousness","volume":"37","year":"1995","journal-title":"Human Factors: The Journal of the Human Factors and Ergonomics Society"},{"issue":"3","key":"key2020100101581154100_ref057","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","article-title":"User participation in information systems security risk management","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020100101581154100_ref058","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1108\/09685221211219182","article-title":"Death by a thousand facts: criticising the technocratic approach to","volume":"20","year":"2012","journal-title":"Information Management & Computer Security"},{"issue":"11","key":"key2020100101581154100_ref059","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/1037187.1024404","article-title":"Secure program execution via dynamic information flow tracking","volume":"39","year":"2004","journal-title":"ACM Sigplan Notices"},{"volume-title":"Assessing the Tradecraft of Intelligence Analysis","year":"2008","key":"key2020100101581154100_ref060"},{"key":"key2020100101581154100_ref061","doi-asserted-by":"crossref","unstructured":"Treverton, G.F., Jones, S.G., Boraz, S. and Lipscy, P. (2006), \u201cToward a theory of intelligence\u201d, Workshop Report, Rand Corp Arlington VA National Security Research Div.","DOI":"10.7249\/CF219"},{"issue":"4","key":"key2020100101581154100_ref062","first-page":"79","article-title":"The role of cybernetics in science, technology and security policy","volume":"21","year":"2014","journal-title":"Cybernetics and Human Knowing"},{"issue":"3","key":"key2020100101581154100_ref063","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1108\/K-11-2016-0317","article-title":"Wiener and Luhmann on feedback: from complexity to sustainability","volume":"46","year":"2017","journal-title":"Kybernetes"},{"issue":"6","key":"key2020100101581154100_ref064","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1007\/s11213-016-9380-9","article-title":"Emergence: a systems theory\u2019s challenge to ethics","volume":"29","year":"2016","journal-title":"Systemic Practice and Action Research"},{"year":"1995","key":"key2020100101581154100_ref065","article-title":"Cybernetics of cybernetics:\u201d the control of control and the communication of communication\u201d; original edition prepared by the students enrolled in the\u201d Cybernetics of Cybernetics"},{"volume-title":"Theory of Games and Economic Behavior","year":"1947","key":"key2020100101581154100_ref066"},{"issue":"2","key":"key2020100101581154100_ref067","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1037\/0033-2909.113.2.211","article-title":"Comparative cognition: beginning the second century of the study of animal intelligence","volume":"113","year":"1993","journal-title":"Psychological Bulletin"},{"key":"key2020100101581154100_ref068","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2014.04.005","article-title":"A situation awareness model for information security risk management","volume":"44","year":"2014","journal-title":"Computers & Security"},{"issue":"4","key":"key2020100101581154100_ref069","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1080\/08850600903143122","article-title":"Evaluating intelligence: answering questions asked and not","volume":"22","year":"2009","journal-title":"International Journal of Intelligence and Counterintelligence"},{"volume-title":"The Human Use of Human Beings: Cybernetics and Society (No. 320)","year":"1954","key":"key2020100101581154100_ref070"},{"volume-title":"Cybernetics or Control and Communication in the Animal and the Machine","year":"1961","key":"key2020100101581154100_ref071"},{"issue":"1","key":"key2020100101581154100_ref072","first-page":"i65","article-title":"Objective measures of situation awareness in a simulated medical environment","volume":"13","year":"2004","journal-title":"Quality and Safety in Health Care"},{"key":"key2020100101581154100_ref073","article-title":"Research regarding the Kanban card losses and its significances","volume":"11","year":"2016","journal-title":"Abstract of Applied Sciences and Engineering"},{"volume-title":"Case Study Research: Design and Methods","year":"2009","key":"key2020100101581154100_ref074"},{"first-page":"116","article-title":"A template-based and pattern-driven approach to situation awareness and assessment in virtual humans","year":"2000","key":"key2020100101581154100_ref075"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-06-2017-0226\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-06-2017-0226\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:48:45Z","timestamp":1753393725000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/47\/1\/58-79\/272145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,8]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1,8]]}},"alternative-id":["10.1108\/K-06-2017-0226"],"URL":"https:\/\/doi.org\/10.1108\/k-06-2017-0226","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2018,1,8]]}}}