{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:36:43Z","timestamp":1752550603806,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356454","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"479-483","source":"Crossref","is-referenced-by-count":2,"title":["Shared situational awareness in information security incident management"],"prefix":"10.23919","author":[{"given":"Keshnee","family":"Padayachee","sequence":"first","affiliation":[]},{"given":"Elias","family":"Worku","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.85"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682765"},{"journal-title":"Cyber Security Incident Management Guide","year":"2015","key":"ref13"},{"journal-title":"Situational Awareness in Cyber Security","year":"2015","author":"hawk","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.05.004"},{"key":"ref17","first-page":"46","article-title":"A model of inter-and intrateam situation awareness: Implications for design, training, and measurement","author":"endsley","year":"2001","journal-title":"New Trends in Cooperative Activities Understanding System Dynamics in Complex Environments"},{"key":"ref18","article-title":"Defining and measuring shared situational awareness","author":"nofi","year":"2000","journal-title":"CENTER FOR NAVAL ANALYSES ALEXANDRIA VA"},{"key":"ref19","first-page":"47","article-title":"A theoretical framework for shared situational awareness in sociotechnical systems","author":"kurapati","year":"2012","journal-title":"Proc 2nd Workshop Awareness Reflection Technol Enhanced Learning"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.75"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.001"},{"key":"ref27","article-title":"Application of Situation Awareness in Incident Response","author":"oyewole","year":"2016","journal-title":"ISACA Journal 3"},{"journal-title":"Responding to security incidents on a large academic network","year":"2006","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2015.7118968"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.003"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/17538157.2016.1255629"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2014.9"},{"journal-title":"Situation awareness","year":"1989","key":"ref9"},{"key":"ref1","first-page":"23","article-title":"Information security management system standards: A comparative study of the big five","volume":"11","author":"susanto","year":"2011","journal-title":"International Journal of Electrical & Computer Sciences IJECSIJENS"},{"journal-title":"ed Geneva","article-title":"Information Technology-Security Techniques-Information Security Incident Management","year":"2011","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2011.15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"ref24","first-page":"3","article-title":"Theoretical underpinnings of situation awareness: A critical review","author":"endsley","year":"2000","journal-title":"Situation Awareness Analysis and Measurement"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20609-7_55"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0140-8_1"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356454.pdf?arnumber=8356454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:24:07Z","timestamp":1527539047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356454\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356454","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}