{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:01:21Z","timestamp":1769731281649,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995762","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Qualitative Factors in Organizational Cyber Resilience"],"prefix":"10.1109","author":[{"given":"Srinidhi","family":"Vasudevan","sequence":"first","affiliation":[{"name":"University College London,Department of Computer Science,London,United Kingdom"}]},{"given":"Anna","family":"Piazza","sequence":"additional","affiliation":[{"name":"University College London,Department of Computer Science,London,United Kingdom"}]},{"given":"Madeline","family":"Carr","sequence":"additional","affiliation":[{"name":"University College London,Department of Computer Science,London,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Impact of COVID-19 on cybersecurity","volume-title":"deloitte2.com","year":"2022"},{"key":"ref2","volume-title":"Cybersecurity Solutions for a riskier world","year":"2022"},{"key":"ref3","volume-title":"Check Point Research: Cyber attacks Increased 50% Year over Year","author":"Point","year":"2022"},{"key":"ref4","article-title":"The nature of effective defense: Shifting from Cyber Security to Cyber Resilience","volume-title":"Accenture.com","year":"2022"},{"key":"ref5","first-page":"126","article-title":"Cyber resilience: An essential new paradigm for ensuring national survival","volume-title":"ICCWS 2018 13th International Conference on Cyber Warfare and Security","author":"Conklin"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16486-1_31"},{"key":"ref7","article-title":"Global Cybersecurity Outlook 2022","volume-title":"weforum.org","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s40685-019-0085-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17261\/Pressacademia.2015313066"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.09.055"},{"key":"ref11","first-page":"1","article-title":"Organizational cyber resilience: research opportunities","volume-title":"ACIS 20 17: Australasian Conference on Information Systems","author":"Bagheri"},{"key":"ref12","article-title":"Partnering for Cyber Resilience","volume-title":"weforum.org","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1021\/es403443n"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-024-1123-2_14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2006.10.005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/0266382116650299"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100204"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz013"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1007\/978-3-030-80129-8_55","article-title":"Effectiveness and Adoption ofNIST Managerial Practices for Cyber Resilience in Italy","volume-title":"Intelligent Computing","author":"Annarelli","year":"2021"},{"issue":"3","key":"ref21","first-page":"146","article-title":"Cyber security and resilience Its all about governance","volume":"68","author":"North","year":"2016","journal-title":"Governance Directions"},{"issue":"2","key":"ref22","doi-asserted-by":"crossref","first-page":"112","DOI":"10.69554\/KXJH6961","article-title":"What good cyber resilience looks like","volume":"7","author":"Hult","year":"2014","journal-title":"Journal of business continuity & emergency planning"},{"issue":"2","key":"ref23","first-page":"134","article-title":"Cyber resilience: Leadership matters","volume":"1","author":"Armour","year":"2017","journal-title":"Cyber Security: A Peer-Reviewed Journal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2172\/1342373"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102840"},{"issue":"4","key":"ref26","first-page":"310","article-title":"Cyber risk: Leveraging a multidisciplinary approach","volume":"2","author":"Branfield","year":"2019","journal-title":"Cyber Security: A Peer-Reviewed Journal"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57805-3_29"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-160v2"},{"key":"ref29","author":"Fenwick","journal-title":"Reducing the impact of organizational silos on resilience: A report on the impact of silos on resilience and how the impacts might be reduced"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.11610\/isij.3800"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/josl.1_12177"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/0038038520973580"},{"key":"ref34","article-title":"Media coverage of crises faced by higher education institutions","author":"RA","year":"2011","journal-title":"University of Nevada, Reno"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/0893318911405623"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/11745398.2014.902292"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2022,10,6]]},"end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995762.pdf?arnumber=9995762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T15:40:27Z","timestamp":1728661227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995762","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}