{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:13:18Z","timestamp":1777371198930,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,21]]},"DOI":"10.1145\/3537674.3555782","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T16:08:30Z","timestamp":1662566910000},"page":"157-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Straight From the Human Factors Professionals\u2019 Mouth: The Need to Teach Human Factors in Cybersecurity"],"prefix":"10.1145","author":[{"given":"Calvin","family":"Nobles","sequence":"first","affiliation":[{"name":"Information Technology and Management, Illinois Institute of Technology, USA"}]},{"given":"Nikki","family":"Robinson","sequence":"additional","affiliation":[{"name":"Capitol Technology University, USA"}]},{"given":"Margaret","family":"Cunningham","sequence":"additional","affiliation":[{"name":"Independent Researcher, USA"}]},{"given":"Nikki","family":"Robinson","sequence":"additional","affiliation":[{"name":"Capitol Technology University, USA"}]},{"given":"Margaret","family":"Cunningham","sequence":"additional","affiliation":[{"name":"Independent Researcher, USA"}]},{"given":"Margaret","family":"Cunningham","sequence":"additional","affiliation":[{"name":"Independent Researcher, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Human Factors and Ergonomics Society. n.d. What are human factors and ergonomics? https:\/\/www.hfes.org\/About- HFES\/What-is-Human-Factors-and-Ergonomics  Human Factors and Ergonomics Society. n.d. What are human factors and ergonomics? https:\/\/www.hfes.org\/About- HFES\/What-is-Human-Factors-and-Ergonomics"},{"key":"e_1_3_2_1_2_1","article-title":"The Dunning-Kruger Effect around human factors in cybersecurity. (March 2022)","author":"Nobles Calvin","year":"2022","unstructured":"Calvin Nobles . 2022 . The Dunning-Kruger Effect around human factors in cybersecurity. (March 2022) . Top Cyber News Magazine. Retrieved July 1, 2022 from https:\/\/www.linkedin.com\/company\/topcybernews\/ Calvin Nobles. 2022. The Dunning-Kruger Effect around human factors in cybersecurity. (March 2022). Top Cyber News Magazine. Retrieved July 1, 2022 from https:\/\/www.linkedin.com\/company\/topcybernews\/","journal-title":"Top Cyber News Magazine. Retrieved"},{"key":"e_1_3_2_1_3_1","volume-title":"Investigation cloud computing misconfiguration errors using the human factors analysis and classification system. Scientific Bulletin, 1, (Jul","author":"Nobles Calvin","year":"2002","unstructured":"Calvin Nobles . 2022. Investigation cloud computing misconfiguration errors using the human factors analysis and classification system. Scientific Bulletin, 1, (Jul . 2002 ),53, 59-66. DOI:10.2478\/bsaft-2022-0007 10.2478\/bsaft-2022-0007 Calvin Nobles. 2022. Investigation cloud computing misconfiguration errors using the human factors analysis and classification system. Scientific Bulletin, 1, (Jul. 2002),53, 59-66. DOI:10.2478\/bsaft-2022-0007"},{"key":"e_1_3_2_1_4_1","unstructured":"Margaret Cunningham. 2021 October 19. The simmering cybersecurity risk of employee burnout. Dark Reading. https:\/\/www.darkreading.com\/careers-and-people\/the-simmering-cybersecurity-risk-of-employee-burnout  Margaret Cunningham. 2021 October 19. The simmering cybersecurity risk of employee burnout. Dark Reading. https:\/\/www.darkreading.com\/careers-and-people\/the-simmering-cybersecurity-risk-of-employee-burnout"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Calvin Nobles. 2022. Stress Burnout and Security Fatigue in Cybersecurity: A Human Factors Problem. HOLISTICA\u2013Journal of Business and Public Administration 13(1) 49-72.  Calvin Nobles. 2022. Stress Burnout and Security Fatigue in Cybersecurity: A Human Factors Problem. HOLISTICA\u2013Journal of Business and Public Administration 13(1) 49-72.","DOI":"10.2478\/hjbpa-2022-0003"},{"key":"e_1_3_2_1_6_1","unstructured":"Stephen Wilson Dean Hamilton & Scott Stallbaum. 2020. The unaddressed gap in cybersecurity: Human performance. MIT Sloan Management Review. https:\/\/sloanreview.mit.edu\/article\/the-unaddressed-gap-in-cybersecurity-human-performance\/  Stephen Wilson Dean Hamilton & Scott Stallbaum. 2020. The unaddressed gap in cybersecurity: Human performance. MIT Sloan Management Review. https:\/\/sloanreview.mit.edu\/article\/the-unaddressed-gap-in-cybersecurity-human-performance\/"},{"key":"e_1_3_2_1_7_1","volume-title":"Cost of a Data Breach Report","author":"Ponemon Institute","unstructured":"Ponemon Institute . 2019. Cost of a Data Breach Report ; IBM Security: North Traverse City, MI, USA. Ponemon Institute. 2019. Cost of a Data Breach Report; IBM Security: North Traverse City, MI, USA."},{"key":"e_1_3_2_1_8_1","volume-title":"11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)","author":"Dykstra Joshua","year":"2018","unstructured":"Joshua Dykstra and Celeste Lyn Paul . 2018 . Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations . In 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18) . Joshua Dykstra and Celeste Lyn Paul. 2018. Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations. In 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152893"}],"event":{"name":"SIGITE '22: The 23rd Annual Conference on Information Technology Education","location":"Chicago IL USA","acronym":"SIGITE '22","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"]},"container-title":["Proceedings of the 23rd Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3555782","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3537674.3555782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:50Z","timestamp":1750186970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3555782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":9,"alternative-id":["10.1145\/3537674.3555782","10.1145\/3537674"],"URL":"https:\/\/doi.org\/10.1145\/3537674.3555782","relation":{},"subject":[],"published":{"date-parts":[[2022,9,21]]},"assertion":[{"value":"2022-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}