{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T02:40:58Z","timestamp":1755830458136,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"This work is supported by the Italian Ministry of University andResearch (MUR) under grant PRIN 2022 PNRR ?DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES","award":["H53D23008140001"],"award-info":[{"award-number":["H53D23008140001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3656650.3656720","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T18:27:17Z","timestamp":1717180037000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards a human factors assessment questionnaire for cybersecurity incidents"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8774-1789","authenticated-orcid":false,"given":"Grazia","family":"Ragone","sequence":"first","affiliation":[{"name":"Universit\u00e1 di Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1421-3686","authenticated-orcid":false,"given":"Paolo","family":"Buono","sequence":"additional","affiliation":[{"name":"Universit\u00e1 di Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6327-459X","authenticated-orcid":false,"given":"Domenico","family":"Desiato","sequence":"additional","affiliation":[{"name":"Universit\u00e1 di Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9894-2116","authenticated-orcid":false,"given":"Giuseppe","family":"Desolda","sequence":"additional","affiliation":[{"name":"Universit\u00e1 di Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2730-7697","authenticated-orcid":false,"given":"Francesco","family":"Greco","sequence":"additional","affiliation":[{"name":"Universit\u00e1 di Bari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2039-8162","authenticated-orcid":false,"given":"Rosa","family":"Lanzillotti","sequence":"additional","affiliation":[{"name":"Universit\u00e1 di Bari, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"World Economic\u00a0Forum 2024. 2023. 2023 Data Breach Investigations Report. Report. Verizon. www.verizon.com"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/K-12-2014-0283"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5020023"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Carmelo Ardito Paolo Bottoni Maria\u00a0Francesca Costabile Giuseppe Desolda Maristella Matera Antonio Piccinno and Matteo Picozzi. 2013. Enabling end users to create annotate and share personal information spaces. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7897 LNCS (2013) 40 \u2013 55. https:\/\/doi.org\/10.1007\/978-3-642-38706-7_5","DOI":"10.1007\/978-3-642-38706-7_5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18425-8_22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41932-9_11"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19830-9_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469886"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2478\/9788366675704"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2023.103056"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_2_1_13_1","volume-title":"21st Saudi Computer Society National Computer Conference (NCC)","author":"Alissa K.A.","year":"2018","unstructured":"Alissa K.A., Alshehri H.A., Dahdouh S.A., Alsubaie B.M., Alghamdi A.M., Alharby A., and Almubairik N.A.2018. An Instrument to Measure Human Behavior Toward Cyber Security Policies. 21st Saudi Computer Society National Computer Conference (NCC) (2018), 1\u20136. https:\/\/api.semanticscholar.org\/CorpusID:57364956"},{"key":"e_1_3_2_1_14_1","unstructured":"U.S. Army\u00a0Research Laboratory. 2018. Cyber Security Research Alliance. https:\/\/arl.devcom.army.mil\/cras\/cyber-security-cra\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/su151813369"},{"key":"e_1_3_2_1_16_1","unstructured":"Shappell S.A. and Wiegmann D.\u00a0A.2000. The Human Factors Analysis and Classification System (HFACS).https:\/\/www.faa.gov\/data_research\/research\/med_humanfacs\/oamtechreports"},{"key":"e_1_3_2_1_17_1","volume-title":"6th International Conference on Applied Human Factors and Ergonomics. 9","author":"Berre T.T.","year":"2015","unstructured":"Berre T.T., Eggemoen V., Haugrud T.D., Le W.H., and Sandnes M.2015. Phishing awareness among students at NTNU. 6th International Conference on Applied Human Factors and Ergonomics. 9 (2015), 1117\u20131124. https:\/\/api.semanticscholar.org\/CorpusID:231715387"}],"event":{"name":"AVI 2024: International Conference on Advanced Visual Interfaces 2024","acronym":"AVI 2024","location":"Arenzano, Genoa Italy"},"container-title":["Proceedings of the 2024 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3656720","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656650.3656720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:55:40Z","timestamp":1755788140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3656720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":17,"alternative-id":["10.1145\/3656650.3656720","10.1145\/3656650"],"URL":"https:\/\/doi.org\/10.1145\/3656650.3656720","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}