{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T14:07:25Z","timestamp":1769954845153,"version":"3.49.0"},"reference-count":128,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"School of Computer Science, University College Dublin"},{"name":"Science Foundation Ireland ADAPT Research Centre with the SFI Research Centres Program","award":["13\/RC\/2106_P2"],"award-info":[{"award-number":["13\/RC\/2106_P2"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3655843","type":"journal-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:40:48Z","timestamp":1768941648000},"page":"13162-13180","source":"Crossref","is-referenced-by-count":0,"title":["Safety Science as a Source of Organizational Cyber Resilience in Incident Response"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2485-3067","authenticated-orcid":false,"given":"Haula Sani","family":"Galadima","sequence":"first","affiliation":[{"name":"ADAPT Centre, School of Computer Science, University College Dublin, Dublin, Ireland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deirdre","family":"Morris","sequence":"additional","affiliation":[{"name":"National Cyber Security Centre (NCSC), Dublin, Ireland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cormac","family":"Doherty","sequence":"additional","affiliation":[{"name":"Centre for Cybersecurity and Cybercrime Investigation, University College Dublin, Dublin, Ireland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8236-362X","authenticated-orcid":false,"given":"Rob","family":"Brennan","sequence":"additional","affiliation":[{"name":"ADAPT Centre, School of Computer Science, University College Dublin, Dublin, Ireland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/jeim-06-2023-0317"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/JIC-06-2021-0166"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/su132313065"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-61r3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-61r2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2017.10.005"},{"key":"ref8","volume-title":"Resilience Engineering in Practice: A Guidebook","author":"Hollnagel","year":"2013"},{"key":"ref9","volume-title":"Resilience Engineering: Concepts and Precepts","author":"Hollnagel","year":"2006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2013.07.026"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/ics-05-2015-0020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v27i0.4183"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.11.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-007-0092-x"},{"key":"ref15","volume-title":"Resilient Health Care","author":"Hollnagel","year":"2013"},{"key":"ref16","article-title":"Flight crew briefings with resilience engineering capacities-The STC model","author":"Mizzi","year":"2023","journal-title":"Preprint, ResearchGate"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ascc.2015.7244713"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110446"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2020.3038411"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2023.2208146"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2011.563826"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/jan.12888"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77492-3_1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3592307.3592323"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3638055"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2022.2068906"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.108077"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103435"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103309"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_31"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/09585192.2017.1289548"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1201\/9781315607511"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85954-1_2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2023.106176"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104654"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2014.07.009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2012.661087"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2006.09.003"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7535(00)00010-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.65.1.96"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7535(96)00067-7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/s0003-6870(00)00009-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2012.03.010"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1504\/ijcssr.2017.087797"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/su14105869"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/su12125164"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1201\/9781315255071"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104827"},{"key":"ref49","first-page":"7","article-title":"Development of early warning indicators based on resilience engineering","volume-title":"Proc. 10th Int. Probabilistic Saf. Assessment Manage. Conf. (PSAM)","author":"\u00d8ien"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2019.05.031"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/s0925-7535(03)00047-x"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105566"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.59297\/sfxddg82"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.b2700"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2021.02.003"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v27i0.4183"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"issue":"3","key":"ref58","first-page":"1","article-title":"Enhancing safety culture through effective communication","volume":"11","author":"Vecchio-Sadus","year":"2007","journal-title":"Saf. Sci. Monit."},{"key":"ref59","article-title":"Why communication and interpretation matters for safety","volume-title":"Advances in Reliability, Safety and Security: ESREL 2024 Contributions Part 8: Complex Systems and Critical Infrastructures Business Continuity Modelling and Optimization & Reliability, Safety and Security Related Management Systems","author":"Wold","year":"2024"},{"issue":"5","key":"ref60","first-page":"2020","article-title":"Knowledge management as a tool to enhance the safety culture in organizations","volume":"16","author":"Kiyantaj","year":"2019","journal-title":"IOH"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1080\/1463922X.2017.1356394"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/0739456X17723971"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3475716.3484190"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2022.101895"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106397"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.11.002"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/hst47167.2019.9032932"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/imf.2013.14"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/imf.2014.10"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1063\/5.0159475"},{"issue":"8","key":"ref71","first-page":"1","article-title":"Resilience engineering: Redefining the culture of safety and risk management","volume":"49","author":"Woods","year":"2006","journal-title":"Hum. Factors Ergon. Soc. Bull."},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2020.3004610"},{"key":"ref73","volume-title":"Resilience Management: A Framework for Assessing and Improving the Resilience of Organisations","author":"McManus","year":"2007"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/iccr56254.2022.9995762"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.23919\/cisti52073.2021.9476291"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.4236\/gep.2018.64001"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MECO62516.2024.10577790"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100398"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR61006.2024.10532881"},{"key":"ref80","volume-title":"Cyber Resiliency Design Principles","author":"Bodeau","year":"2017"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/informatics.2017.8327227"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/cybersa49311.2020.9139685"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_3"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/cbms58004.2023.00199"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2809826.2809830"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.hrmr.2010.07.001"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2018.2796181"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/iccr61006.2024.10532999"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2006.10.004"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9485-y"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/qrs-c57518.2022.00013"},{"key":"ref92","volume-title":"Cyber Resiliency Engineering Framework","author":"Bodeau","year":"2011"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2020.2979832"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600195"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/smartindustrycon57312.2023.10110721"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00108"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2012.83"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/wi.2018.00-55"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/NCS.2018.00007"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/cybersa.2018.8551486"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS60972.2024.10540775"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft57336.2023.10175486"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/csp51677.2021.9357588"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3670450"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544448"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2013.6754951"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ths.2013.6698986"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata55660.2022.10020736"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ficloud58648.2023.00056"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/cybersecpods.2019.8885240"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/dsc54232.2022.9888795"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.179"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2016.57"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102036"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/mzaa108"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1002\/9781118131350"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3454543"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1002\/9781394310562"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1136\/qshc.2005.015842"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/s0925-7535(00)00011-4"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2022.103759"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103970"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3669924"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1122200"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1080\/1359432x.2014.1000873"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2019.05.049"},{"key":"ref127","article-title":"From uncertainty to prosecution: Enhancing cyber resilience through forensic readiness","volume":"3","author":"Heitmann","year":"2024","journal-title":"Norsk IKT-Konferanse for Forskning OG Utdanning"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1186\/s12913-019-4362-0"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11359176.pdf?arnumber=11359176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:25:33Z","timestamp":1769721933000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11359176\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":128,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3655843","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}