{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T15:18:53Z","timestamp":1774883933247,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/cogsima.2016.7497780","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T11:38:44Z","timestamp":1466854724000},"page":"14-20","source":"Crossref","is-referenced-by-count":32,"title":["A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts"],"prefix":"10.1109","author":[{"given":"Robert S.","family":"Gutzwiller","sequence":"first","affiliation":[]},{"given":"Sarah M.","family":"Hunt","sequence":"additional","affiliation":[]},{"given":"Douglas S.","family":"Lange","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-8765.2010.01114.x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_1"},{"key":"ref31","article-title":"Watchdog: DHS still struggles with cyber response","author":"moore","year":"2015","journal-title":"Nextgov"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2012.6188386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"ref13","article-title":"Cyber-cognitive situation awareness: A review and future directions","author":"gutzwiller","year":"0","journal-title":"Under Review"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591067"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/1071181311551233"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1557234X0600200102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2011.5753450"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213571086"},{"key":"ref19","article-title":"Factors impacting performance in competitive cyber exercises","author":"silva","year":"2014","journal-title":"Proc Interservice\/Interagency Training Simul Educ Con!"},{"key":"ref4","first-page":"1","article-title":"The OPM breach: Timeline of a hack","author":"bisson","year":"2015","journal-title":"Tripwire"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1518\/155534309X12599553478791"},{"key":"ref3","first-page":"1","article-title":"Timeline: North Korea and the Sony Pictures hack","author":"grisham","year":"2015","journal-title":"USA Today"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2663887.2663899"},{"key":"ref6","article-title":"Maintaining perspective on who is the enemy in the security systems administration of computer networks","author":"yurcik","year":"2003","journal-title":"ACM CHI Work Syst Adm Are Users"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/prs.680170110"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2667218"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2667190.2667192"},{"key":"ref7","article-title":"Uncertainty and Risk Management in Cyber Situational Awareness Abstract","author":"li","year":"2009","journal-title":"ARO Work Cyber Situational Aware"},{"key":"ref2","first-page":"1","article-title":"DHS, Incident Response Activity: Trends in incident response","year":"2013","journal-title":"2013 ICT-CERTMonit"},{"key":"ref1","first-page":"1","article-title":"Kaspersky security bulletin 2014: Overall statistics for 2014","author":"garnaeva","year":"2014","journal-title":"Kaspersky Lab"},{"key":"ref9","article-title":"Characterizing the human limitations and impediments to cyber situation awareness","author":"hunt","year":"2015","journal-title":"Appl Hum Factors Ergon Annu Meet Poster"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/154193121005400403"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/154193120504900304"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/001401398186108"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7304.001.0001","author":"crandall","year":"2006","journal-title":"Working Minds A Practitioner's Guide to Cognitive Task Analysis"},{"key":"ref26","article-title":"The theory underlying concept maps and how to construct and use them","author":"novak","year":"2008","journal-title":"IHMC Tech Rep 2006-01 Rev 2008&#x2013;01C"},{"key":"ref25","article-title":"Protocols for cognitive task analysis","author":"hoffman","year":"2005","journal-title":"Inst Hum Mach Cogn"}],"event":{"name":"2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","location":"San Diego, CA, USA","start":{"date-parts":[[2016,3,21]]},"end":{"date-parts":[[2016,3,25]]}},"container-title":["2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7493811\/7497773\/07497780.pdf?arnumber=7497780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T05:31:20Z","timestamp":1568093480000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7497780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2016.7497780","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}