{"id":"https://openalex.org/W4286587339","doi":"https://doi.org/10.3390/jcp2030029","title":"Addressing Human Factors in Cybersecurity Leadership","display_name":"Addressing Human Factors in Cybersecurity Leadership","publication_year":2022,"publication_date":"2022-07-22","ids":{"openalex":"https://openalex.org/W4286587339","doi":"https://doi.org/10.3390/jcp2030029"},"language":"en","primary_location":{"id":"doi:10.3390/jcp2030029","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp2030029","pdf_url":"https://www.mdpi.com/2624-800X/2/3/29/pdf?version=1658727040","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/2/3/29/pdf?version=1658727040","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001833510","display_name":"William J. Triplett","orcid":"https://orcid.org/0000-0003-1325-9508"},"institutions":[{"id":"https://openalex.org/I98993165","display_name":"Capitol Technology University","ror":"https://ror.org/045ej2q36","country_code":"US","type":"education","lineage":["https://openalex.org/I98993165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"William J. Triplett","raw_affiliation_strings":["Department of Cybersecurity Leadership, Capitol Technology University, 11301 Springfield Road, Laurel, MD 20708, USA"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity Leadership, Capitol Technology University, 11301 Springfield Road, Laurel, MD 20708, USA","institution_ids":["https://openalex.org/I98993165"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5001833510"],"corresponding_institution_ids":["https://openalex.org/I98993165"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":22.3217,"has_fulltext":true,"cited_by_count":77,"citation_normalized_percentile":{"value":0.99517975,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"2","issue":"3","first_page":"573","last_page":"586"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6145579814910889},{"id":"https://openalex.org/keywords/mindset","display_name":"Mindset","score":0.6124389171600342},{"id":"https://openalex.org/keywords/ignorance","display_name":"Ignorance","score":0.5701560378074646},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.42032143473625183},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39178404211997986},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.36129170656204224},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3544114828109741},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1867898404598236}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6145579814910889},{"id":"https://openalex.org/C2778491294","wikidata":"https://www.wikidata.org/wiki/Q1339824","display_name":"Mindset","level":2,"score":0.6124389171600342},{"id":"https://openalex.org/C2778732403","wikidata":"https://www.wikidata.org/wiki/Q815577","display_name":"Ignorance","level":2,"score":0.5701560378074646},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.42032143473625183},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39178404211997986},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.36129170656204224},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3544114828109741},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1867898404598236},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp2030029","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp2030029","pdf_url":"https://www.mdpi.com/2624-800X/2/3/29/pdf?version=1658727040","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:05926b8dabca4a509cff84e54471aed6","is_oa":true,"landing_page_url":"https://doaj.org/article/05926b8dabca4a509cff84e54471aed6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 2, Iss 3, Pp 573-586 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp2030029","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp2030029","pdf_url":"https://www.mdpi.com/2624-800X/2/3/29/pdf?version=1658727040","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4286587339.pdf","grobid_xml":"https://content.openalex.org/works/W4286587339.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W97947587","https://openalex.org/W416992885","https://openalex.org/W1990067238","https://openalex.org/W2025451090","https://openalex.org/W2241728765","https://openalex.org/W2407680306","https://openalex.org/W2508177851","https://openalex.org/W2514707791","https://openalex.org/W2563010877","https://openalex.org/W2626529610","https://openalex.org/W2779766358","https://openalex.org/W2800771502","https://openalex.org/W2898933733","https://openalex.org/W2900542336","https://openalex.org/W2901197445","https://openalex.org/W2901669506","https://openalex.org/W2905592043","https://openalex.org/W2910687894","https://openalex.org/W2954118786","https://openalex.org/W2965675231","https://openalex.org/W2989918477","https://openalex.org/W3006556904","https://openalex.org/W3030593508","https://openalex.org/W3041784138","https://openalex.org/W3140779277","https://openalex.org/W3159239323","https://openalex.org/W3164381539","https://openalex.org/W3166620705","https://openalex.org/W3176520181","https://openalex.org/W3177310074","https://openalex.org/W3183780585","https://openalex.org/W3191656082","https://openalex.org/W3211065488","https://openalex.org/W4239087746","https://openalex.org/W4245811697","https://openalex.org/W4246379277","https://openalex.org/W4285108278","https://openalex.org/W6603963452","https://openalex.org/W6648078871","https://openalex.org/W6747501678","https://openalex.org/W6756916147","https://openalex.org/W6757353779","https://openalex.org/W6773904236","https://openalex.org/W6792529586","https://openalex.org/W6798007229","https://openalex.org/W6798900207","https://openalex.org/W6799537151","https://openalex.org/W6805473666"],"related_works":["https://openalex.org/W4281773849","https://openalex.org/W4239175313","https://openalex.org/W4386786145","https://openalex.org/W2908046332","https://openalex.org/W4232834483","https://openalex.org/W3192666801","https://openalex.org/W3009062738","https://openalex.org/W3163116104","https://openalex.org/W4389580136","https://openalex.org/W4210648132"],"abstract_inverted_index":{"This":[0,176],"article":[1],"identifies":[2],"human":[3,61,90,117,187],"factors":[4,118],"in":[5,119],"workplaces":[6],"that":[7,125],"contribute":[8],"to":[9,53,59,98,114],"the":[10,70,87,128,132,147,154],"challenges":[11],"faced":[12],"by":[13,146,182],"cybersecurity":[14,120,157,195],"leadership":[15],"within":[16],"organizations":[17],"and":[18,28,49,63,65,140,151,162,189],"discusses":[19],"strategic":[20,101],"communication,":[21],"human\u2013computer":[22],"interaction,":[23],"organizational":[24],"factors,":[25],"social":[26],"environments,":[27],"security":[29,184],"awareness":[30],"training.":[31],"Cybersecurity":[32,79],"does":[33],"not":[34],"simply":[35],"focus":[36],"on":[37,159],"information":[38,47],"technology":[39],"systems;":[40],"it":[41],"also":[42],"considers":[43],"how":[44,191],"humans":[45,126],"use":[46],"systems":[48],"susceptible":[50],"actions":[51],"leading":[52],"vulnerabilities.":[54],"As":[55],"cyber":[56],"leaders":[57,150],"begin":[58],"identify":[60],"behavior":[62],"processes":[64],"collaborate":[66],"with":[67],"individuals":[68],"of":[69,89,134,149,156],"same":[71],"mindset,":[72],"an":[73,82,99,179],"organization\u2019s":[74],"strategy":[75],"can":[76,94,193],"improve":[77],"substantially.":[78],"has":[80],"been":[81],"expanding":[83],"focal":[84],"point":[85],"from":[86,185],"viewpoint":[88],"factors.":[91],"Human":[92],"inaccuracy":[93],"be":[95],"unintentional":[96,116,141],"due":[97],"inaccurate":[100],"implementation":[102],"or":[103],"accurate":[104],"unsatisfactory":[105],"plan":[106],"implementation.":[107],"A":[108,164],"systematic":[109],"literature":[110],"review":[111],"was":[112],"conducted":[113],"realize":[115],"leadership.":[121],"The":[122],"results":[123],"indicate":[124],"were":[127,143],"weakest":[129],"link":[130],"during":[131],"transmission":[133],"secure":[135],"data.":[136],"Furthermore,":[137],"specific":[138],"complacent":[139],"behaviors":[142],"observed,":[144],"enabled":[145],"ignorance":[148],"employees.":[152],"Therefore,":[153],"enforcement":[155],"focuses":[158],"education,":[160],"awareness,":[161],"communication.":[163],"research":[165],"agenda":[166],"is":[167],"outlined,":[168],"highlighting":[169],"a":[170,186],"further":[171],"need":[172],"for":[173],"interdisciplinary":[174],"research.":[175],"study":[177],"adopts":[178],"original":[180],"approach":[181],"viewing":[183],"perspective":[188],"assessing":[190],"people":[192],"reduce":[194],"incidents.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
