{"id":"https://openalex.org/W4368276258","doi":"https://doi.org/10.1093/cybsec/tyad010","title":"The security mindset: characteristics, development, and consequences","display_name":"The security mindset: characteristics, development, and consequences","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4368276258","doi":"https://doi.org/10.1093/cybsec/tyad010"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyad010","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyad010","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/9/1/tyad010/50476410/tyad010.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/9/1/tyad010/50476410/tyad010.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033880802","display_name":"Koen Schoenmakers","orcid":null},"institutions":[{"id":"https://openalex.org/I136199984","display_name":"Harvard University","ror":"https://ror.org/03vek6s52","country_code":"US","type":"education","lineage":["https://openalex.org/I136199984"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Koen Schoenmakers","raw_affiliation_strings":["Department of Psychology, Harvard University , Cambridge, MA 02138 , USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Psychology, Harvard University , Cambridge, MA 02138 , USA","institution_ids":["https://openalex.org/I136199984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082420062","display_name":"Daniel Greene","orcid":"https://orcid.org/0000-0003-2576-8588"},"institutions":[{"id":"https://openalex.org/I4210122046","display_name":"Gryphon Scientific (United States)","ror":"https://ror.org/033200e31","country_code":"US","type":"company","lineage":["https://openalex.org/I4210122046"]},{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Greene","raw_affiliation_strings":["Gryphon Scientific LLC, 6930 Carroll Ave., Takoma Park MD 20912, and Center for International Security and Cooperation, Stanford University , Stanford, CA 94305 , USA"],"raw_orcid":"https://orcid.org/0000-0003-2576-8588","affiliations":[{"raw_affiliation_string":"Gryphon Scientific LLC, 6930 Carroll Ave., Takoma Park MD 20912, and Center for International Security and Cooperation, Stanford University , Stanford, CA 94305 , USA","institution_ids":["https://openalex.org/I4210122046","https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048183787","display_name":"Sarah E. Stutterheim","orcid":"https://orcid.org/0000-0001-9336-5022"},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Sarah Stutterheim","raw_affiliation_strings":["Care and Public Health Research Institute & Department of Health Promotion, Faculty of Health, Medicine, and Life Sciences, Maastricht University , 6200 MD, Maastricht , the Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Care and Public Health Research Institute & Department of Health Promotion, Faculty of Health, Medicine, and Life Sciences, Maastricht University , 6200 MD, Maastricht , the Netherlands","institution_ids":["https://openalex.org/I34352273"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024598182","display_name":"Herbert Lin","orcid":"https://orcid.org/0000-0001-7464-4069"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Herbert Lin","raw_affiliation_strings":["Center for International Security and Cooperation, Stanford University , Stanford, CA 94305 , USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for International Security and Cooperation, Stanford University , Stanford, CA 94305 , USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049497583","display_name":"Megan J. Palmer","orcid":"https://orcid.org/0000-0001-8310-2325"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Megan J Palmer","raw_affiliation_strings":["Department of Bioengineering and Center for International Security and Cooperation, Stanford University , Stanford, CA 94305 , USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Bioengineering and Center for International Security and Cooperation, Stanford University , Stanford, CA 94305 , USA","institution_ids":["https://openalex.org/I97018004"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033880802"],"corresponding_institution_ids":["https://openalex.org/I136199984"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":10.5196,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.98206759,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mindset","display_name":"Mindset","score":0.978040337562561},{"id":"https://openalex.org/keywords/thematic-analysis","display_name":"Thematic analysis","score":0.5237657427787781},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.47367602586746216},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4636361002922058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43396133184432983},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.4313799738883972},{"id":"https://openalex.org/keywords/critical-security-studies","display_name":"Critical security studies","score":0.42389440536499023},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3757467269897461},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3683302402496338},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3365629315376282},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.295621395111084},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22735339403152466},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.21369525790214539},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.20224109292030334},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.17979973554611206},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.10359671711921692},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.09437784552574158}],"concepts":[{"id":"https://openalex.org/C2778491294","wikidata":"https://www.wikidata.org/wiki/Q1339824","display_name":"Mindset","level":2,"score":0.978040337562561},{"id":"https://openalex.org/C74196892","wikidata":"https://www.wikidata.org/wiki/Q7781188","display_name":"Thematic analysis","level":3,"score":0.5237657427787781},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.47367602586746216},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4636361002922058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43396133184432983},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.4313799738883972},{"id":"https://openalex.org/C505623098","wikidata":"https://www.wikidata.org/wiki/Q3002932","display_name":"Critical security studies","level":5,"score":0.42389440536499023},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3757467269897461},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3683302402496338},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3365629315376282},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.295621395111084},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22735339403152466},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.21369525790214539},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.20224109292030334},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.17979973554611206},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.10359671711921692},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.09437784552574158},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyad010","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyad010","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/9/1/tyad010/50476410/tyad010.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:cris.maastrichtuniversity.nl:openaire/167c58d5-a094-4a7f-b9db-70f6ea855cda","is_oa":true,"landing_page_url":"https://cris.maastrichtuniversity.nl/en/publications/167c58d5-a094-4a7f-b9db-70f6ea855cda","pdf_url":null,"source":{"id":"https://openalex.org/S4306402616","display_name":"Research Publications (Maastricht University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I34352273","host_organization_name":"Maastricht University","host_organization_lineage":["https://openalex.org/I34352273"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Schoenmakers, K, Greene, D, Stutterheim, S, Lin, H & Palmer, M J 2023, 'The security mindset: characteristics, development, and consequences', Journal of Cybersecurity, vol. 9, no. 1, tyad010. https://doi.org/10.1093/cybsec/tyad010","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyad010","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyad010","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/9/1/tyad010/50476410/tyad010.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320315389","display_name":"Open Philanthropy Project","ror":"https://ror.org/004d1k391"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4368276258.pdf"},"referenced_works_count":78,"referenced_works":["https://openalex.org/W37573976","https://openalex.org/W172404779","https://openalex.org/W1509938432","https://openalex.org/W1832238961","https://openalex.org/W1966850535","https://openalex.org/W1972950717","https://openalex.org/W1976916517","https://openalex.org/W1979290264","https://openalex.org/W1988138196","https://openalex.org/W2001581888","https://openalex.org/W2011098038","https://openalex.org/W2033213440","https://openalex.org/W2044925735","https://openalex.org/W2045594163","https://openalex.org/W2095358913","https://openalex.org/W2102441139","https://openalex.org/W2107202675","https://openalex.org/W2112720435","https://openalex.org/W2112726096","https://openalex.org/W2118377505","https://openalex.org/W2126513753","https://openalex.org/W2134075127","https://openalex.org/W2149848137","https://openalex.org/W2149988893","https://openalex.org/W2151259821","https://openalex.org/W2156178609","https://openalex.org/W2171501656","https://openalex.org/W2197765600","https://openalex.org/W2262972580","https://openalex.org/W2271788777","https://openalex.org/W2294992695","https://openalex.org/W2332447264","https://openalex.org/W2332747402","https://openalex.org/W2490192616","https://openalex.org/W2510619540","https://openalex.org/W2516812085","https://openalex.org/W2523074512","https://openalex.org/W2528930693","https://openalex.org/W2556475804","https://openalex.org/W2592104024","https://openalex.org/W2607676970","https://openalex.org/W2617164926","https://openalex.org/W2624496292","https://openalex.org/W2754497075","https://openalex.org/W2887472251","https://openalex.org/W2901447407","https://openalex.org/W2946461687","https://openalex.org/W2947297481","https://openalex.org/W2970884300","https://openalex.org/W2975610757","https://openalex.org/W2996617870","https://openalex.org/W2999704926","https://openalex.org/W3027643953","https://openalex.org/W3028823675","https://openalex.org/W3043314744","https://openalex.org/W3043379545","https://openalex.org/W3059467696","https://openalex.org/W3082359126","https://openalex.org/W3152983238","https://openalex.org/W3165300127","https://openalex.org/W3190207985","https://openalex.org/W3204633493","https://openalex.org/W4205875761","https://openalex.org/W4213058852","https://openalex.org/W4240090692","https://openalex.org/W4243636675","https://openalex.org/W4301892172","https://openalex.org/W4302617976","https://openalex.org/W6607044593","https://openalex.org/W6637756022","https://openalex.org/W6639209543","https://openalex.org/W6646893606","https://openalex.org/W6671015270","https://openalex.org/W6671560506","https://openalex.org/W6702353507","https://openalex.org/W6736655550","https://openalex.org/W6738024762","https://openalex.org/W6753950056"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2477687372","https://openalex.org/W4293098044","https://openalex.org/W3010945384","https://openalex.org/W2765826941","https://openalex.org/W3001139724","https://openalex.org/W4323980915","https://openalex.org/W4296654684","https://openalex.org/W110403769"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"world":[2],"is":[3,20,28,82],"facing":[4],"a":[5,33,56,62,102,107,154],"cybersecurity":[6,24,95,223],"skills":[7],"gap":[8],"as":[9,100,128,192],"cybercrime":[10],"and":[11,26,65,80,89,146,164,168,198,218,226],"cyberwarfare":[12],"grow":[13],"in":[14,49,153,161],"importance.":[15],"One":[16],"often-discussed":[17],"quality":[18],"that":[19,42,121],"potentially":[21],"relevant":[22],"to":[23,45,58,67,142],"recruitment":[25],"education":[27],"the":[29,69,117,122,148,176,206,215],"so-called":[30],"\u201csecurity":[31],"mindset\u201d:":[32],"way":[34],"of":[35,38,116,130,150,175,208,214],"thinking":[36],"characteristic":[37],"some":[39,53],"security":[40,63,70,103,123,136,144,177,216],"professionals":[41,96],"they":[43,180],"believe":[44],"be":[46,126],"especially":[47],"advantageous":[48],"their":[50],"work.":[51],"Although":[52],"employers":[54],"express":[55],"desire":[57],"hire":[59],"people":[60],"with":[61],"mindset,":[64,178],"initiatives":[66],"cultivate":[68],"mindset":[71,104,124,217],"are":[72],"being":[73],"implemented,":[74],"it":[75],"has":[76],"no":[77],"common":[78],"definition":[79],"little":[81],"known":[83],"about":[84],"its":[85,87,90],"characteristics,":[86],"development,":[88],"consequences.":[91,170],"We":[92,204],"interviewed":[93],"21":[94],"who":[97],"strongly":[98],"identified":[99],"having":[101],"based":[105],"on":[106,201],"minimal":[108],"description":[109],"drawn":[110],"from":[111],"existing":[112,188],"literature.":[113],"Thematic":[114],"analysis":[115],"interview":[118],"data":[119],"suggests":[120],"can":[125],"conceptualized":[127],"consisting":[129],"three":[131,158],"interconnected":[132],"aspects\u2014\u201cmonitoring\u201d":[133],"for":[134,211,222],"potential":[135],"anomalies,":[137],"\u201cinvestigating\u201d":[138],"anomalies":[139],"more":[140],"deeply":[141],"identify":[143],"flaws,":[145],"\u201cevaluating\u201d":[147],"relevance":[149],"those":[151],"flaws":[152],"larger":[155],"context.":[156],"These":[157],"aspects":[159],"develop":[160],"different":[162,166],"ways":[163],"have":[165],"personal":[167,202],"professional":[169],"Participants":[171],"mostly":[172],"spoke":[173],"positively":[174],"but":[179],"also":[181],"mentioned":[182,186],"several":[183],"disadvantages":[184],"not":[185],"by":[187],"security-mindset":[189],"literature,":[190],"such":[191],"mental":[193],"health":[194],"pressures,":[195],"workplace":[196],"tensions,":[197],"negative":[199],"effects":[200],"relationships.":[203],"discuss":[205],"implications":[207,221],"these":[209],"findings":[210],"future":[212],"study":[213],"suggest":[219],"practical":[220],"management,":[224],"education,":[225],"recruitment.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
