{"id":"https://openalex.org/W4400835129","doi":"https://doi.org/10.1007/s10207-024-00872-6","title":"The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure","display_name":"The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure","publication_year":2024,"publication_date":"2024-07-19","ids":{"openalex":"https://openalex.org/W4400835129","doi":"https://doi.org/10.1007/s10207-024-00872-6"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-024-00872-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00872-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00872-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00872-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051339503","display_name":"H\u00e5vard Jakobsen Ofte","orcid":"https://orcid.org/0000-0003-3271-3868"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"H\u00e5vard Jakobsen Ofte","raw_affiliation_strings":["Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gj\u00f8vik, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5051339503"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":2.5477,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88926958,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"23","issue":"5","first_page":"3253","last_page":"3282"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10809","display_name":"Occupational Health and Safety Research","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/3614","display_name":"Radiological and Ultrasound Technology"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7262680530548096},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6605077981948853},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.5952520370483398},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5169934034347534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5121405124664307},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.455200731754303},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.41003286838531494},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.37142759561538696},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.35124891996383667},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1347140073776245},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11442920565605164}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7262680530548096},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6605077981948853},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.5952520370483398},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5169934034347534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5121405124664307},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.455200731754303},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.41003286838531494},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.37142759561538696},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.35124891996383667},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1347140073776245},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11442920565605164},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-024-00872-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00872-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00872-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:ntnuopen.ntnu.no:11250/3147548","is_oa":true,"landing_page_url":"https://hdl.handle.net/11250/3147548","pdf_url":null,"source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Information Security","raw_type":"info:eu-repo/semantics/other"}],"best_oa_location":{"id":"doi:10.1007/s10207-024-00872-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00872-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00872-6.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1281740124","display_name":null,"funder_award_id":"333900","funder_id":"https://openalex.org/F4320323299","funder_display_name":"Norges Forskningsr\u00e5d"}],"funders":[{"id":"https://openalex.org/F4320323299","display_name":"Norges Forskningsr\u00e5d","ror":"https://ror.org/00epmv149"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4400835129.pdf"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W1498849823","https://openalex.org/W1590508536","https://openalex.org/W1595348505","https://openalex.org/W1633862057","https://openalex.org/W1823219032","https://openalex.org/W1965303214","https://openalex.org/W1969637839","https://openalex.org/W1969726991","https://openalex.org/W2012811511","https://openalex.org/W2050131929","https://openalex.org/W2064655388","https://openalex.org/W2072541188","https://openalex.org/W2072645635","https://openalex.org/W2079062448","https://openalex.org/W2084847608","https://openalex.org/W2087673348","https://openalex.org/W2110017066","https://openalex.org/W2124670621","https://openalex.org/W2136531883","https://openalex.org/W2146948159","https://openalex.org/W2251985815","https://openalex.org/W2296016106","https://openalex.org/W2427513720","https://openalex.org/W2463633928","https://openalex.org/W2483186778","https://openalex.org/W2521553233","https://openalex.org/W2571151646","https://openalex.org/W2592831245","https://openalex.org/W2726869989","https://openalex.org/W2766581748","https://openalex.org/W2772892608","https://openalex.org/W2800335238","https://openalex.org/W2898349228","https://openalex.org/W2903302155","https://openalex.org/W2969501957","https://openalex.org/W2977055143","https://openalex.org/W3040658903","https://openalex.org/W3082161389","https://openalex.org/W3099376495","https://openalex.org/W3108159510","https://openalex.org/W3111749540","https://openalex.org/W3119687955","https://openalex.org/W3130705826","https://openalex.org/W3178009047","https://openalex.org/W4226139221","https://openalex.org/W4240459686","https://openalex.org/W4297900482","https://openalex.org/W4311693894","https://openalex.org/W4327813705","https://openalex.org/W4380848880","https://openalex.org/W4381893318","https://openalex.org/W4385452929"],"related_works":["https://openalex.org/W4388870064","https://openalex.org/W2210139803","https://openalex.org/W4235186151","https://openalex.org/W2054685365","https://openalex.org/W2056057048","https://openalex.org/W2667588871","https://openalex.org/W2272354214","https://openalex.org/W2084768720","https://openalex.org/W2043010663","https://openalex.org/W4248308508"],"abstract_inverted_index":{"Abstract":[0],"Security":[1],"operation":[2],"centers":[3],"(SOCs)":[4],"are":[5,182],"increasingly":[6],"established":[7],"to":[8,21,52,89],"meet":[9],"the":[10,30,62,87,135,141,153,155,162,192,231,243],"growing":[11],"threat":[12],"against":[13],"cyber":[14],"security.":[15],"The":[16,101,180,224],"operators":[17,57,116,156,163,193,235],"of":[18,32,77,80,109,124,132,152,177,187,209,233,246],"SOCs":[19,39,70],"respond":[20],"complex":[22],"incidents":[23,201],"under":[24],"time":[25],"constraints.":[26],"Within":[27],"critical":[28,99],"infrastructure,":[29],"consequences":[31],"human":[33],"error":[34],"or":[35],"low":[36],"performance":[37],"in":[38,69,95,129,168,190,199],"may":[40],"be":[41,214],"detrimental.":[42],"In":[43],"other":[44],"domains,":[45],"situation":[46],"awareness":[47],"(SA)":[48],"has":[49,71],"proven":[50],"useful":[51],"understand":[53],"and":[54,60,111,117,128,137,165,196,202,216,236],"measure":[55],"how":[56,191],"use":[58,166,197],"information":[59,198],"decide":[61],"correct":[63],"actions.":[64],"Until":[65],"now,":[66],"SA":[67,81,167,178,211,222,232],"research":[68],"been":[72],"restricted":[73],"by":[74,121,184],"a":[75,91,96,106,122,145,149,174,207,227,239],"lack":[76],"in-depth":[78],"studies":[79],"mechanisms.":[82],"Therefore,":[83],"this":[84],"study":[85,102,225],"is":[86,144,171,237],"first":[88],"conduct":[90],"goal-directed":[92],"task":[93],"analysis":[94,186],"SOC":[97,115,136,234],"for":[98,241],"infrastructure.":[100],"was":[103],"conducted":[104],"through":[105],"targeted":[107],"series":[108],"unstructured":[110],"semi-structured":[112],"interviews":[113],"with":[114],"their":[118],"leaders":[119],"complemented":[120],"review":[123],"documents,":[125],"incident":[126],"reports,":[127],"situ":[130],"observation":[131],"work":[133],"within":[134],"real":[138],"incidents.":[139,160,204],"Among":[140],"presented":[142,172],"findings":[143,181],"goal":[146],"hierarchy":[147],"alongside":[148],"complete":[150,175],"overview":[151],"decisions":[154,170],"make":[157],"during":[158],"escalated":[159],"How":[161],"gain":[164],"these":[169],"as":[173],"set":[176],"requirements.":[179],"accompanied":[183],"an":[185],"contextual":[188],"differences":[189],"prioritize":[194],"goals":[195],"network":[200],"security":[203],"This":[205],"enables":[206],"discussion":[208],"what":[210],"processes":[212],"might":[213],"automated":[215],"which":[217],"would":[218],"benefit":[219],"from":[220],"different":[221],"models.":[223],"provides":[226],"unique":[228],"insight":[229],"into":[230],"thus":[238],"steppingstone":[240],"bridging":[242],"knowledge":[244],"gap":[245],"Cyber":[247],"SA.":[248]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
