[
Barry, E., & Perlroth, N. (2020). Patients of a Vermont Hospital Are Left ‘in the Dark’ After a Cyberattack. The New York Times, available at: https://www.nytimes.com/2020/11/26/us/hospital-cyber-attack.html.
]Search in Google Scholar
[
Booher, H.R., & Minninger, J. (2003). Human systems integration in army systems acquisition in Handbook of Human Systems Integration, 663–698. Available at: https://doi.org/10.1002/0471721174.ch18.
]Search in Google Scholar
[
Boyce, M., Duma, K.M., Hettinger, L.J., Malone, T.B., Wilson, D.P., & Lockett-Reynolds, J. (2011). Human Performance in Cybersecurity: a Research Agenda. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 55, Issue 1, 1115–1119. DOI:10.1177/1071181311551233.
]Search in Google Scholar
[
Burrell, D.N., Bhargava, N., Springs, D., Dawson, M., Burton, S.L., Anderson, D.P., & Wright, J.B. (2020). Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol. 4, Issue 1, 13–28. Doi:10.4018/IJHIoT.2020010102.
]Search in Google Scholar
[
Carter, S., & Perriam, J. (2021). Cybersecurity, digital failure, and social harm. Understanding Digital Societies, 359–386, SAGE Publications. Available at: https://pure.itu.dk/en/publications/cybersecurity-digital-failure-and-social-harm.
]Search in Google Scholar
[
Chaiken, B.P., & Holmquest, D.L. (2003). Patient Safety: Modifying Processes to Eliminate Medical Errors. Nursing Outlook, Vol. 51, Issue 3: S21–4. DOI: 10.1016/s0029-6554(03)00097-6.
]Search in Google Scholar
[
Chamorro-Premuzic, T. (2023). Human Error Drives Most Cyber Incidents. Could A.I. Help? Harvard Business Review, available at: https://hbr.org/2023/05/human-error-drives-most-cyber-incidents-could-ai-help.
]Search in Google Scholar
[
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas, Vol. 113, 48–52. Available at: https://www.maturitas.org/article/S0378-5122(18)30165-8/fulltext.
]Search in Google Scholar
[
Cummings, T.G., & Worley, C.G. (2014). Organization development and change. Mason, USA: South-Western Cengage Learning.
]Search in Google Scholar
[
Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol. 35, Issue 2, 60–67. Available at: https://doi.org/10.1177/0266382118773624.
]Search in Google Scholar
[
Dawson, M. (2020). Cybercrime: Internet Driven Illicit Activities and Behavior. Land Forces Academy Review, Vol. 25, Issue 4, 356–362. DOI: 10.2478/raft-2020-0043.
]Search in Google Scholar
[
Dent, E. (2003). The complexity science organizational development practitioner. Organization Development Journal, Vol. 21, Issue 2. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2297056.
]Search in Google Scholar
[
Evans, M., He, Y., Maglaras, L., & Janicke, H. (2019). HEART-IS: A novel technique for evaluating human error-related information security incidents. Computers & Security, Vol. 80, 74–89. DOI:10.1016/j.cose.2018.09.002.
]Search in Google Scholar
[
Fogelberg, D., & Frauwirth, S. (2010). A complexity science approach to occupation: Moving beyond the individual. Journal of Occupational Science, Vol. 17, Issue 3, 131–139. Available at: https://doi.org/10.1080/14427591.2010.9686687.
]Search in Google Scholar
[
Janofsky, A. (2019, October 06). Smaller Medical Providers Get Burned by Ransomware. Wall Street Journal, available at: https://www.wsj.com/articles/smaller-medical-providers-get-burned-by-ransomware-11570366801.
]Search in Google Scholar
[
Kayisoglu, G., Bolat, P., & Tam, K. (2022). Evaluating SLIM-based human error probability for ECDIS cybersecurity in maritime. The Journal of Navigation, Vol. 75, Issue 6, 1364–1388. Available at: https://doi.org/10.1017/S0373463322000534.
]Search in Google Scholar
[
Kennedy-Sims, C. (2021). Supply chain management in level I trauma care facilities: Can it determine patient care delivery and funding? (Order No. 28539929). Available from ProQuest Dissertations & Theses Global.
]Search in Google Scholar
[
Landsburg, A.C., Avery, L., Beaton, R., Bost, J.R., Comperatore, C., Khandpur, R., Malone, T.B., Parker, C., Popkin, S., & Sheridan, T.B. (2008). The art of successfully applying human systems integration. Naval Engineers Journal, Vol. 120, Issue 1, 77–107. Available at: https://doi.org/10.1111/j.1559-3584.2008.00113.x.
]Search in Google Scholar
[
Leape, L.L. (2000). Institute of Medicine medical error figures are not exaggerated. JAMA, Vol. 284, Issue 1, 95–7. DOI: 10.1001/jama.284.1.95.
]Search in Google Scholar
[
Levinthal, D.A., & Warglien, M. (1999). Landscape Design: Designing for Local Action in Complex Worlds. Organization Science, Vol. 10, Issue 3, 342–357. DOI:10.1287/orsc.10.3.342.
]Search in Google Scholar
[
McNeese, M.D., Cooke, N.J., D’Amico, A., Endsley, M.R., Gonzalez, C., Roth, E., & Salas, E. (2012). Perspectives on the role of cognition in cyber security. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 56, Issue 1, 268–271. DOI:10.1177/1071181312561063.
]Search in Google Scholar
[
Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business Organizations. HOLISTICA – Journal of Business and Public Administration, Vol. 9, Issue 3, 71–88. DOI: https://doi.org/10.2478/hjbpa-2018-0024.
]Search in Google Scholar
[
Passmore, W., Winby, S., Mohrman, S., & Vanasse, R. (2019). Reflections: Sociotechnical Systems Design and Organization Change. Journal of Change Management, Vol. 19, Issue 2, 67–85. DOI:10.1080/14697017.2018.1553761.
]Search in Google Scholar
[
Reason, J. (2000). Human error: models and management. British Medical Journal, Vol. 320, 768–770. Available at: https://doi.org/10.1136/bmj.320.7237.768.
]Search in Google Scholar
[
Senge, P.M. (2006). The Fifth Discipline: The Art & Practice of the Learning Organization. New York: Doubleday.
]Search in Google Scholar
[
Senge, P.M. (1990). The Fifth Discipline: The Art & Practice of The Learning Organization. New York: Doubleday/Currency.
]Search in Google Scholar
[
Senge, P.M. (2014). The fifth discipline field book: Strategies and tools for building a learning organization. New York: Crown Currency.
]Search in Google Scholar
[
Slangen, R. (2016). Understanding Cyber-risk by Investigating the Behaviour of Defender and Threat Agent Organisations: Why a Complex Adaptive Systems Perspective Contributes to Further Understanding Cyber-risk. TUDelft, Master Thesis. Available at: http://resolver.tudelft.nl/uuid:3951b6a2-db0c-4e69-8da8-9fa28bc28237.
]Search in Google Scholar
[
Shufutinsky, A. (2018). Organizational Assessment of a Biotechnology Firm’s Safety, Health, and Environmental Department through an Organizational Development Lens. International Journal of Interdisciplinary & Multidisciplinary Studies, Vol. 4, Issue 3.
]Search in Google Scholar
[
Shufutinsky, A. (2019). Tribalism and Clone Theory in New Leaders and the Resulting Degradation of Organizational Culture. Psychology & Behavioral Science International Journal, Vol. 10, Issue 2: 555788. DOI:10.19080/PBSIJ.2019.10.555788.
]Search in Google Scholar
[
Shufutinsky, A., Sibel, J., Beach, Saraceno, A., & Beach, A. (2020). O.D. for Robots? Implications of Industry 4.0 on Talent Acquisition and Development. Organization Development Journal, Vol. 38, Issue 3, 59–76. Available at: https://www.researchgate.net/publication/343671489_OD_for_Robots_Implications_of_Industry_40_on_Talent_Acquisition_and_Development.
]Search in Google Scholar
[
Siggelkow, N., & Rivkin, J.W. (2005). Speed and search: Designing organizations for turbulence and complexity. Organization Science, Vol. 16, Issue 2, 101–122.
]Search in Google Scholar
[
Simon, H.A. (1962). The Architecture of Complexity. Proceedings of the American Philosophical Society, Vol. 106, Issue 6, 467–82.
]Search in Google Scholar
[
Simpson, P. (2007). Organizing in the mist: A case study in leadership and complexity. Leadership & Organization Development Journal, Vol. 28, Issue 5, 465–482. DOI:10.1108/01437730710761751.
]Search in Google Scholar
[
Skarzauskiene, A. (2010). Managing complexity: Systems thinking as a catalyst of the organization’s performance. Measuring Business Excellence, Vol. 14, Issue 4, 49–64. DOI:10.1108/13683041011093758.
]Search in Google Scholar
[
Stacey, R. (2011). Strategic management and organizational dynamics: The challenge of complexity to ways of thinking about organizations (6th Edition). London: Pearson Education Ltd.
]Search in Google Scholar
[
Trist, E. & Emery, F. (2005). Organizational Behavior 2: Essential Theories of Process and Structure, 169. New York: Routledge. Available at: https://doi.org/10.4324/9781315702001.
]Search in Google Scholar
[
Vermeulen, P., Zietsma, C., Greenwood, R., & Langley, A. (2016). Strategic responses to institutional complexity. Strategic Organization, Vol. 14, Issue 4, 277–286.
]Search in Google Scholar
[
van der Kleij, R., & Leukfeldt, R. (2020). Cyber resilient behavior: Integrating human behavioral models and resilience engineering capabilities into cyber security. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24–28, 2019, Washington DC, USA 10, 16–27. DOI:10.1007/978-3-030-20488-4_2.
]Search in Google Scholar
[
Walker, G.H., Stanton, N.A., Salmon, P.M., & Jenkins, D.P. (2008). A review of sociotechnical systems theory: a classic concept for new command and control paradigms. Theoretical Issues in Ergonomics Science, Vol. 9, Issue 6, 479–499.
]Search in Google Scholar
[
Wickham, M.H. (2019). Exploring data breaches and means to mitigate future occurrences in healthcare institutions: A content analysis (Order No. 13861149). Available from ProQuest Dissertations & Theses Global. (2216485062).
]Search in Google Scholar
[
Willett, K.D. (2016). Cybersecurity decision patterns as adaptive knowledge encoding in cybersecurity operations. Doctoral dissertation, Stevens Institute of Technology.
]Search in Google Scholar
[
Yan, D. (2020). A Systems Thinking for Cybersecurity Modeling. arXiv preprint arXiv:2001.05734.
]Search in Google Scholar
[
Zhadan, A. (2023). World Economic Forum finds that 95% of cybersecurity incidents occur due to human error. Cybernews. Available at: https://cybernews.com/editorial/world-economic-forum-finds-that-95-of-cybersecurity-incidents-occur-due-to-human-error/.
]Search in Google Scholar
[
Zoto, E., Kianpour, M., Kowalski, S.J., & Lopez-Rojas, E.A. (2019). A sociotechnical systems approach to design and support systems thinking in cybersecurity and risk management education. Complex Systems Informatics and Modeling Quarterly, Vol. 18, 65–75.
]Search in Google Scholar