{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:45:29Z","timestamp":1774021529878,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cybersec.2012.6246110","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T17:52:55Z","timestamp":1343757175000},"page":"312-316","source":"Crossref","is-referenced-by-count":12,"title":["ST(CS)&lt;sup&gt;2&lt;\/sup&gt; - Featuring socio-technical cyber security warning systems"],"prefix":"10.1109","author":[{"given":"Bilal","family":"Al Sabbagh","sequence":"first","affiliation":[]},{"given":"Stewart","family":"Kowalski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"schj\ufffdlberg","year":"2011","journal-title":"A Global Treaty on Cybersecurity and Cybercrime"},{"key":"17","first-page":"1","article-title":"A Comparative analysis of cyber security initiatives worldwide","author":"dunn","year":"2005","journal-title":"WSIS Thematic Meeting on Cybersecurity"},{"key":"18","volume":"4","author":"brunner","year":"2008","journal-title":"International CIIP Handbook 2008 \/ 2009"},{"key":"15","year":"0","journal-title":"Defense in depth A practical strategy for achieving information assurance in today's highly networked environments"},{"key":"16","year":"0","journal-title":"Risk Management - Principles and Guidelines International Standards for Business Government and Society"},{"key":"13","article-title":"Mental models of computer security risks","author":"asgharpour","year":"2007","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"14","article-title":"Mental models of home computer security","author":"wash","year":"2008","journal-title":"Extended Abstract at SOUPS (Symposium on Usable Privacy and Security)"},{"key":"11","author":"alsabbagh","year":"0","journal-title":"Developing Social Metrics for Security Modeling the Security Culture of IT Workers Individuals (Case Study)"},{"key":"12","article-title":"Mental models of data privacy and security extracted from interviews with Indians","author":"diesner","year":"2005","journal-title":"55th Annual Conference of the International Communication Association"},{"key":"21","year":"0"},{"key":"20","year":"2012"},{"key":"22","author":"fuller","year":"2003","journal-title":"Federal Intrusion Detection Cyber Early Warning and the Federal Response"},{"key":"23","year":"0"},{"key":"24","year":"0"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/Metrisec.2011.15"},{"key":"26","article-title":"A Cultural Adaption Model for Global Cyber Security Warning Systems: A socio-techinal proposal","author":"alsabbagh","year":"2011","journal-title":"Mosharaka International Conference MIC-CNIT 2011"},{"key":"3","author":"douglas","year":"1982","journal-title":"Risk and Culture"},{"key":"2","article-title":"Cultural bias","author":"douglas","year":"1978","journal-title":"Occasional Paper No 35 Royal Anthropological Institute of Great Britain and Ireland"},{"key":"10","author":"krause","year":"1997","journal-title":"Handbook of Information Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203361832"},{"key":"7","author":"kowalski","year":"1994","journal-title":"IT Insecurity A Multi-discipline Inquiry"},{"key":"6","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1108\/09685220610670378","article-title":"Formulating information systems risk management strategies through cultural theory","volume":"14","author":"aggeliki","year":"2006","journal-title":"Information Management & Computer Security"},{"key":"5","article-title":"Divided we stand: Redefining politics, technology and social choice","author":"schwarz","year":"1990","journal-title":"Hemel Hempstead"},{"key":"4","author":"thompson","year":"1990","journal-title":"Cultural Theory"},{"key":"9","author":"kowalski","year":"2004","journal-title":"A Security and Trust Framework for A Wireless World A Cross Issue Approach"},{"key":"8","article-title":"The SBC model: Modeling the system for consensus","author":"kowalski","year":"1991","journal-title":"Proceedings of the 7th IFIP TC11 Conference on Information Security"}],"event":{"name":"2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2012,6,26]]},"end":{"date-parts":[[2012,6,28]]}},"container-title":["Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6238218\/6246077\/06246110.pdf?arnumber=6246110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:16:15Z","timestamp":1497982575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6246110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/cybersec.2012.6246110","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}