-
1
-
-
66749108916
-
Survey and analysis of multimodal sensor planning and integration for wide area surveillance
-
Besma R. Abidi, Nash R. Aragam, Yao Yi, and Mongi A. Abidi Survey and analysis of multimodal sensor planning and integration for wide area surveillance ACM Comput Surv 41 1 2008 1 36
-
(2008)
ACM Comput Surv
, vol.41
, Issue.1
, pp. 1-36
-
-
Abidi, B.R.1
Aragam, N.R.2
Yi, Y.3
Abidi, M.A.4
-
2
-
-
84862303039
-
Incident response teams - Challenges in supporting the organizational security function
-
Atif Ahmad, Justin Hadgkiss, and A.B. Ruighaver Incident response teams - challenges in supporting the organizational security function Comput Secur 31 2012 643 652
-
(2012)
Comput Secur
, vol.31
, pp. 643-652
-
-
Ahmad, A.1
Hadgkiss, J.2
Ruighaver, A.B.3
-
4
-
-
0013324190
-
Risk analysis: An interpretive feasibility tool in justifying information systems security
-
R. Baskerville Risk analysis: an interpretive feasibility tool in justifying information systems security Eur J Inf Syst 1 2 1991 121 130
-
(1991)
Eur J Inf Syst
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
5
-
-
0003913794
-
Theory of activity and situation awareness
-
Gregory Bedny, and David Meister Theory of activity and situation awareness Int J Cognitive Ergon 3 1 1999 63
-
(1999)
Int J Cognitive Ergon
, vol.3
, Issue.1
, pp. 63
-
-
Bedny, G.1
Meister, D.2
-
7
-
-
84902281808
-
-
Council on Foreign Relations website. Available at
-
Greg Bruno, and Sharon Otterman National intelligence estimates 2008 Council on Foreign Relations website. Available at http://www.cfr.org/iraq/ national-intelligence-estimates/p7758
-
(2008)
National Intelligence Estimates
-
-
Bruno, G.1
Otterman, S.2
-
8
-
-
85055310109
-
Coding choices for textual analysis: A comparison of content analysis and map analysis
-
Kathleen Carley Coding choices for textual analysis: a comparison of content analysis and map analysis Sociol Methodol 23 1 1993 75 126
-
(1993)
Sociol Methodol
, vol.23
, Issue.1
, pp. 75-126
-
-
Carley, K.1
-
9
-
-
84878960632
-
Human and organizational factors in maritime accidents: Analysis of collisions at sea using the HFACS
-
C. Chauvin, S. Lardjane, G. Morel, J.P. Clostermann, and B. Langard Human and organizational factors in maritime accidents: analysis of collisions at sea using the HFACS Accid Anal Prev 59 2013 26 37
-
(2013)
Accid Anal Prev
, vol.59
, pp. 26-37
-
-
Chauvin, C.1
Lardjane, S.2
Morel, G.3
Clostermann, J.P.4
Langard, B.5
-
10
-
-
0141903338
-
Operationalizing IT risk management
-
Robert S. Coles, and Rolf Moulton Operationalizing IT risk management Comput Secur 22 6 2003 487 493
-
(2003)
Comput Secur
, vol.22
, Issue.6
, pp. 487-493
-
-
Coles, R.S.1
Moulton, R.2
-
11
-
-
77956652072
-
Human factors in information security: The insider threat - Who can you trust these days?
-
Carl Colwill Human factors in information security: the insider threat - who can you trust these days? Inf Secur Tech Rep 14 4 2009 186 196
-
(2009)
Inf Secur Tech Rep
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
12
-
-
35348898460
-
Gaining experience with military medical situational awareness and geographic information systems in a simulated influenza epidemic
-
Robert F. DeFraites, and William C. Chambers Gaining experience with military medical situational awareness and geographic information systems in a simulated influenza epidemic Mil Med 172 10 2007 1071 1076 (Pubitemid 47584255)
-
(2007)
Military Medicine
, vol.172
, Issue.10
, pp. 1071-1076
-
-
DeFraites, R.F.1
Chambers, W.C.2
-
13
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
T. Dinev, and Q. Hu The centrality of awareness in the formation of user behavioral intention toward protective information technologies J Assoc Inf Syst 8 7 2007 386 408
-
(2007)
J Assoc Inf Syst
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
14
-
-
84880570808
-
Malware target recognition of unknown threats
-
T.E. Dube, R.A. Raines, M.R. Grimaila, K.W. Bauer, and S.K. Rogers Malware target recognition of unknown threats IEEE Syst J 7 3 2013 467 477
-
(2013)
IEEE Syst J
, vol.7
, Issue.3
, pp. 467-477
-
-
Dube, T.E.1
Raines, R.A.2
Grimaila, M.R.3
Bauer, K.W.4
Rogers, S.K.5
-
17
-
-
0029004440
-
Toward a theory of situation awareness in dynamic systems
-
M.R. Endsley Toward a theory of situation awareness in dynamic systems Hum Factors 37 1 1995 32 64
-
(1995)
Hum Factors
, vol.37
, Issue.1
, pp. 32-64
-
-
Endsley, M.R.1
-
19
-
-
1842645961
-
-
SATech 00-01 SA Technologies, Inc Marietta, GA
-
M.R. Endsley, D.J. Garland, R.W.C. Shook, J. Coello, and M. Bandiero Situation awareness problems in general aviation SATech 00-01 2000 SA Technologies, Inc Marietta, GA
-
(2000)
Situation Awareness Problems in General Aviation
-
-
Endsley, M.R.1
Garland, D.J.2
Shook, R.W.C.3
Coello, J.4
Bandiero, M.5
-
21
-
-
38349093900
-
Team knowledge and coordination in geographically distributed software development
-
J.A. Espinosa, S.A. Slaughter, R.E. Kraut, and J.D. Herbsleb Team knowledge and coordination in geographically distributed software development J Manag Inf Syst 24 1 2007 135 169
-
(2007)
J Manag Inf Syst
, vol.24
, Issue.1
, pp. 135-169
-
-
Espinosa, J.A.1
Slaughter, S.A.2
Kraut, R.E.3
Herbsleb, J.D.4
-
22
-
-
77953835648
-
Beyond monitoring: Distributed situation awareness in anaesthesia
-
E. Fioratou, R. Flin, R. Glavin, and R. Patey Beyond monitoring: distributed situation awareness in anaesthesia BJA Br J Anaesth 105 1 2010 83 90
-
(2010)
BJA Br J Anaesth
, vol.105
, Issue.1
, pp. 83-90
-
-
Fioratou, E.1
Flin, R.2
Glavin, R.3
Patey, R.4
-
24
-
-
84861196489
-
Temporal aspects in crisis management and its implications on interface design for situation awareness
-
Anna Gryszkiewicz, and Fang Chen Temporal aspects in crisis management and its implications on interface design for situation awareness Cognition, Technol Work 14 2 2012 169 182
-
(2012)
Cognition, Technol Work
, vol.14
, Issue.2
, pp. 169-182
-
-
Gryszkiewicz, A.1
Chen, F.2
-
26
-
-
79960597292
-
To twist or poke? A method for identifying usability issues with the rotary controller and touch screen for control of in-vehicle information systems
-
C. Harvey, N.A. Stanton, C.A. Pickering, M. McDonald, and P. Zheng To twist or poke? A method for identifying usability issues with the rotary controller and touch screen for control of in-vehicle information systems Ergonomics 54 7 2011 609 625
-
(2011)
Ergonomics
, vol.54
, Issue.7
, pp. 609-625
-
-
Harvey, C.1
Stanton, N.A.2
Pickering, C.A.3
McDonald, M.4
Zheng, P.5
-
28
-
-
84902272254
-
Getting at risk
-
M.E. Whitman, H.J. Mattord, Thomson Course Technology Boston
-
G.V. Hulme Getting at risk M.E. Whitman, H.J. Mattord, Management of information security 2004 Thomson Course Technology Boston 307 308
-
(2004)
Management of Information Security
, pp. 307-308
-
-
Hulme, G.V.1
-
34
-
-
33845723854
-
-
Research Report 1237 US Army Research Institute for the Behavioral and Social Sciences, US Army Intelligence and Security Command
-
Robert V. Katter, Christine A. Montgomery, and John R. Thompson Human processes in intelligence analysis Research Report 1237 1979 US Army Research Institute for the Behavioral and Social Sciences, US Army Intelligence and Security Command
-
(1979)
Human Processes in Intelligence Analysis
-
-
Katter, R.V.1
Montgomery, C.A.2
Thompson, J.R.3
-
35
-
-
84865171068
-
Intensive care unit nurses' information needs and recommendations for integrated displays to improve nurses' situation awareness
-
S.H. Koch, C. Weir, M. Haar, N. Staggers, J. Agutter, and M. Görges et al. Intensive care unit nurses' information needs and recommendations for integrated displays to improve nurses' situation awareness J Am Med Inf Assoc 19 4 2012 583 590
-
(2012)
J Am Med Inf Assoc
, vol.19
, Issue.4
, pp. 583-590
-
-
Koch, S.H.1
Weir, C.2
Haar, M.3
Staggers, N.4
Agutter, J.5
Görges, M.6
-
36
-
-
1242263532
-
Why there aren't more information security research studies
-
A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Inf Manag 41 2004 597 607
-
(2004)
Inf Manag
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
37
-
-
67650380184
-
-
Carnegie Mellon University Software Engineering Institute Washington, D.C., Pittsburgh, PA Available at
-
Eileen Kowalski, Cappelli Dawn, and Moore Andrew Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector. United States Secret Service National Threat Assessment Center and CERT program 2008 Carnegie Mellon University Software Engineering Institute Washington, D.C., Pittsburgh, PA Available at: http://www.secretservice.gov/ ntac/final-it-sector-2008-0109.pdf
-
(2008)
Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector. United States Secret Service National Threat Assessment Center and CERT Program
-
-
Kowalski, E.1
Dawn, C.2
Andrew, M.3
-
39
-
-
76049125873
-
CSR and the corporate cyborg: Ethical corporate information security practices
-
Andrea Matwyshyn CSR and the corporate cyborg: ethical corporate information security practices J Bus Ethics 88 2009 579 594
-
(2009)
J Bus Ethics
, vol.88
, pp. 579-594
-
-
Matwyshyn, A.1
-
40
-
-
84902239801
-
-
Department of Operational Sciences, Air Force Institute of Technology Wright Patterson, OH
-
J.O. Miller Modeling the US military intelligence process 2004 Department of Operational Sciences, Air Force Institute of Technology Wright Patterson, OH
-
(2004)
Modeling the US Military Intelligence Process
-
-
Miller, J.O.1
-
41
-
-
69149086795
-
Decision making during preoperative surgical planning
-
T. Morineau, X. Morandi, N. Le Moellic, S. Diabira, L. Riffaud, and C. Haegelen et al. Decision making during preoperative surgical planning Hum Factors 51 1 2009 67 77
-
(2009)
Hum Factors
, vol.51
, Issue.1
, pp. 67-77
-
-
Morineau, T.1
Morandi, X.2
Le Moellic, N.3
Diabira, S.4
Riffaud, L.5
Haegelen, C.6
-
42
-
-
84872425020
-
Designing simulator tools for rail research: The case study of a train driving microworld
-
A. Naweed, G.R.J. Hockey, and S.D. Clarke Designing simulator tools for rail research: the case study of a train driving microworld Appl Ergon 44 3 2013 445 454
-
(2013)
Appl Ergon
, vol.44
, Issue.3
, pp. 445-454
-
-
Naweed, A.1
Hockey, G.R.J.2
Clarke, S.D.3
-
44
-
-
84902259213
-
Information systems for large-scale event management: A case study
-
Boon-Yuen Ng, and Atreyi Kankanhalli Information systems for large-scale event management: a case study Pac Asia J Assoc Inf Syst 4 3 2012 1
-
(2012)
Pac Asia J Assoc Inf Syst
, vol.4
, Issue.3
, pp. 1
-
-
Ng, B.-Y.1
Kankanhalli, A.2
-
45
-
-
84902265506
-
-
The Director Of National Intelligence O. Intelligence Consumer's Guide Washington, DC
-
ODNI - Office of the Director of National Intelligence US national intelligence: an overview 2011 Intelligence Consumer's Guide Washington, DC
-
(2011)
US National Intelligence: An Overview
-
-
-
46
-
-
79952899403
-
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter
-
O. Oh, M. Agrawal, and H.R. Rao Information control and terrorism: tracking the Mumbai terrorist attack through twitter Inf Syst Front 13 1 2011 33 43
-
(2011)
Inf Syst Front
, vol.13
, Issue.1
, pp. 33-43
-
-
Oh, O.1
Agrawal, M.2
Rao, H.R.3
-
47
-
-
34147190861
-
Risks of risk-based security
-
DOI 10.1145/1226736.1226774
-
Donn B. Parker Risks of risk-based security Commun ACM 50 3 2007 120 (Pubitemid 46555352)
-
(2007)
Communications of the ACM
, vol.50
, Issue.3
, pp. 120
-
-
Parker, D.B.1
-
48
-
-
79958234700
-
Emergency department patient-tracking system evaluation
-
P.R. Pennathur, D.P. Cao, A.M. Bisantz, L. Lin, R.J. Fairbanks, and R.L. Wears et al. Emergency department patient-tracking system evaluation Int J Industrial Ergon 41 4 2011 360 369
-
(2011)
Int J Industrial Ergon
, vol.41
, Issue.4
, pp. 360-369
-
-
Pennathur, P.R.1
Cao, D.P.2
Bisantz, A.M.3
Lin, L.4
Fairbanks, R.J.5
Wears, R.L.6
-
49
-
-
84862135175
-
Cyber-threat evolution: The past year
-
Costin Raiu Cyber-threat evolution: the past year Comput Fraud Secur 3 2012 5 8
-
(2012)
Comput Fraud Secur
, vol.3
, pp. 5-8
-
-
Raiu, C.1
-
50
-
-
55049124085
-
The state of risk assessment practices in information security: An exploratory investigation
-
J. Rees, and J. Allen The state of risk assessment practices in information security: an exploratory investigation J Organ Comput Electron Commer 18 4 2008 255 277
-
(2008)
J Organ Comput Electron Commer
, vol.18
, Issue.4
, pp. 255-277
-
-
Rees, J.1
Allen, J.2
-
51
-
-
77957277962
-
Priming, sense-making and help: Analysis of player behaviour in an immersive theatrical experience
-
J. Reid, R. Hull, B. Clayton, G. Porter, and P. Stenton Priming, sense-making and help: analysis of player behaviour in an immersive theatrical experience Pervasive Mob Comput 6 5 2010 499 511
-
(2010)
Pervasive Mob Comput
, vol.6
, Issue.5
, pp. 499-511
-
-
Reid, J.1
Hull, R.2
Clayton, B.3
Porter, G.4
Stenton, P.5
-
52
-
-
0345872245
-
Situation awareness and attention allocation measures for quantifying telepresence experiences in teleoperation
-
J.M. Riley, D.B. Kaber, and J.V. Draper Situation awareness and attention allocation measures for quantifying telepresence experiences in teleoperation Hum Factors Ergon Manuf Serv Industries 14 1 2004 51 67
-
(2004)
Hum Factors Ergon Manuf Serv Industries
, vol.14
, Issue.1
, pp. 51-67
-
-
Riley, J.M.1
Kaber, D.B.2
Draper, J.V.3
-
53
-
-
84884930498
-
CrisisTracker: Crowdsourced social media curation for disaster awareness
-
J. Rogstadius, M. Vukovic, C.A. Teixeira, V. Kostakos, E. Karapanos, and J.A. Laredo CrisisTracker: crowdsourced social media curation for disaster awareness IBM J Res Dev 57 5 2013
-
(2013)
IBM J Res Dev
, vol.57
, Issue.5
-
-
Rogstadius, J.1
Vukovic, M.2
Teixeira, C.A.3
Kostakos, V.4
Karapanos, E.5
Laredo, J.A.6
-
54
-
-
36549067824
-
Defining and modeling situation awareness: A critical review
-
S. Tremblay, S. Banbury, Ashgate Publishing Company Burlington
-
R. Rousseau, S. Tremblay, and R. Breton Defining and modeling situation awareness: a critical review S. Tremblay, S. Banbury, A cognitive approach to situation awareness: theory and application 2004 Ashgate Publishing Company Burlington 3 21
-
(2004)
A Cognitive Approach to Situation Awareness: Theory and Application
, pp. 3-21
-
-
Rousseau, R.1
Tremblay, S.2
Breton, R.3
-
55
-
-
0037091950
-
Effects of display design on performance in a simulated ship navigation environment
-
DOI 10.1080/00140130110116128
-
J. Sauer, D.G. Wastell, G.R.J. Hockey, C.M. Crawshaw, M. Ishak, and J.C. Downing Effects of display design on performance in a simulated ship navigation environment Ergonomics 45 5 2002 329 347 (Pubitemid 34618532)
-
(2002)
Ergonomics
, vol.45
, Issue.5
, pp. 329-347
-
-
Sauer, J.1
Wastell, D.G.2
Robert, G.3
Hockey, J.4
Crawshaw, C.M.5
Ishak, M.6
Downing, J.C.7
-
56
-
-
84902283686
-
Performing a security risk assessment
-
Ron Schmittling Performing a security risk assessment ISACA J 1 2010 1 7
-
(2010)
ISACA J
, vol.1
, pp. 1-7
-
-
Schmittling, R.1
-
57
-
-
1042290841
-
Improved Flight Technical Performance in Flight Decks Equipped with Synthetic Vision Information System Displays
-
Thomas Schnell, Yongjin Kwon, Sohel Merchant, and Timothy Etherington Improved Flight technical performance in flight decks equipped with synthetic vision information system displays Int J Aviat Psychol 14 1 2004 79 102 (Pubitemid 38203197)
-
(2004)
International Journal of Aviation Psychology
, vol.14
, Issue.1
, pp. 79-102
-
-
Schnell, T.1
Kwon, Y.2
Merchant, S.3
Etherington, T.4
-
58
-
-
70449625038
-
Deploying a new system for recording and managing information during an emergency to aid decision making
-
Annette Senior, and Richard Copley Deploying a new system for recording and managing information during an emergency to aid decision making J Bus Continuity Emerg Plan 2 3 2008 267 280
-
(2008)
J Bus Continuity Emerg Plan
, vol.2
, Issue.3
, pp. 267-280
-
-
Senior, A.1
Copley, R.2
-
59
-
-
56249140028
-
The impact of information richness on information security awareness training effectiveness
-
R.S. Shaw, C.C. Chen, A.L. Harris, and H.J. Huang The impact of information richness on information security awareness training effectiveness Comput Educ 52 2009 92 100
-
(2009)
Comput Educ
, vol.52
, pp. 92-100
-
-
Shaw, R.S.1
Chen, C.C.2
Harris, A.L.3
Huang, H.J.4
-
60
-
-
84862276695
-
Risk management standards - The perception of ease of use
-
Piya Shedden, A.B. Ruighaver, and Atif Ahmad Risk management standards - the perception of ease of use J Inf Syst Secur 6 3 2010 23 41
-
(2010)
J Inf Syst Secur
, vol.6
, Issue.3
, pp. 23-41
-
-
Shedden, P.1
Ruighaver, A.B.2
Ahmad, A.3
-
61
-
-
79955934365
-
Incorporating a knowledge perspective into security risk assessments
-
Piya Shedden, Rens Scheepers, Wally Smith, and Atif Ahmad Incorporating a knowledge perspective into security risk assessments VINE J Inf Knowl Manag Syst 41 2 2011 152
-
(2011)
VINE J Inf Knowl Manag Syst
, vol.41
, Issue.2
, pp. 152
-
-
Shedden, P.1
Scheepers, R.2
Smith, W.3
Ahmad, A.4
-
62
-
-
84869171035
-
Information privacy situation awareness: Construct and validation
-
I. Sim, D. Liginlal, and L. Khansa Information privacy situation awareness: construct and validation J Comput Inf Syst 53 1 2012 57 64
-
(2012)
J Comput Inf Syst
, vol.53
, Issue.1
, pp. 57-64
-
-
Sim, I.1
Liginlal, D.2
Khansa, L.3
-
63
-
-
33747194078
-
Information security standards focus on the existence of process, not its content
-
DOI 10.1145/1145287.1145316, Music Information Retrieval
-
M. Siponen Information security standards focus on the existence of process, not its content Commun ACM 49 8 2006 97 100 (Pubitemid 44232133)
-
(2006)
Communications of the ACM
, vol.49
, Issue.8
, pp. 97-100
-
-
Siponen, M.1
-
64
-
-
0029069363
-
Situation awareness is adaptive, externally directed consciousness
-
K. Smith, and P.A. Hancock Situation awareness is adaptive, externally directed consciousness Hum Factors 37 1 1995 137 148
-
(1995)
Hum Factors
, vol.37
, Issue.1
, pp. 137-148
-
-
Smith, K.1
Hancock, P.A.2
-
65
-
-
4243103665
-
Designing to support situation awareness across distances: An example from a scientific collaboratory
-
Diane H. Sonnenwald, Kelly L. Maglaughlin, and Mary C. Whitton Designing to support situation awareness across distances: an example from a scientific collaboratory Inf Process Manag 40 6 2004 989 1011
-
(2004)
Inf Process Manag
, vol.40
, Issue.6
, pp. 989-1011
-
-
Sonnenwald, D.H.1
Maglaughlin, K.L.2
Whitton, M.C.3
-
66
-
-
84858678688
-
Death by a thousand facts: Criticising the technocratic approach to information security awareness
-
Geordie Stewart, and David Lacey Death by a thousand facts: criticising the technocratic approach to information security awareness Inf Manag Comput Secur 20 1 2012 29
-
(2012)
Inf Manag Comput Secur
, vol.20
, Issue.1
, pp. 29
-
-
Stewart, G.1
Lacey, D.2
-
70
-
-
77955678519
-
General misconceptions about information security lead to an insecure world
-
Daniil M. Utin, Mikhail A. Utin, and Jane Utin General misconceptions about information security lead to an insecure world Inf Secur J A Glob Perspect 17 4 2008 164 169
-
(2008)
Inf Secur J A Glob Perspect
, vol.17
, Issue.4
, pp. 164-169
-
-
Utin, D.M.1
Utin, M.A.2
Utin, J.3
-
71
-
-
77950780659
-
Evaluating intelligence: Answering questions asked and not
-
Kristan J. Wheaton Evaluating intelligence: answering questions asked and not Int J Intell Count Intell 22 4 2009 614 631
-
(2009)
Int J Intell Count Intell
, vol.22
, Issue.4
, pp. 614-631
-
-
Wheaton, K.J.1
-
74
-
-
84871523822
-
Design principles of integrated information platform for emergency responses: The case of 2008 Beijing Olympic Games
-
Lili Yang, Su Guofeng, and Yuan Hongyong Design principles of integrated information platform for emergency responses: the case of 2008 Beijing Olympic Games Information Syst Res 23 3 2012 761 786
-
(2012)
Information Syst Res
, vol.23
, Issue.3
, pp. 761-786
-
-
Yang, L.1
Guofeng, S.2
Hongyong, Y.3
|