Barry, E., & Perlroth, N. (2020). Patients of a Vermont Hospital Are Left ‘in the Dark’ After a Cyberattack. The New York Times, available at: https://www.nytimes.com/2020/11/26/us/hospital-cyber-attack.html.
Booher, H.R., & Minninger, J. (2003). Human systems integration in army systems acquisition in Handbook of Human Systems Integration, 663–698. Available at: <a href="https://doi.org/10.1002/0471721174.ch18." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1002/0471721174.ch18.</a>
Boyce, M., Duma, K.M., Hettinger, L.J., Malone, T.B., Wilson, D.P., & Lockett-Reynolds, J. (2011). Human Performance in Cybersecurity: a Research Agenda. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 55, Issue 1, 1115–1119. DOI:<a href="https://doi.org/10.1177/1071181311551233." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1177/1071181311551233.</a>
Burrell, D.N., Bhargava, N., Springs, D., Dawson, M., Burton, S.L., Anderson, D.P., & Wright, J.B. (2020). Adopting Organizational Cultural Changes Concerning Whistle-Blowing in Healthcare Around Information Security in the “Internet of Things” World. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), Vol. 4, Issue 1, 13–28. Doi:<a href="https://doi.org/10.4018/IJHIoT.2020010102." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4018/IJHIoT.2020010102.</a>
Carter, S., & Perriam, J. (2021). Cybersecurity, digital failure, and social harm. Understanding Digital Societies, 359–386, SAGE Publications. Available at: https://pure.itu.dk/en/publications/cybersecurity-digital-failure-and-social-harm.
Chamorro-Premuzic, T. (2023). Human Error Drives Most Cyber Incidents. Could A.I. Help? Harvard Business Review, available at: https://hbr.org/2023/05/human-error-drives-most-cyber-incidents-could-ai-help.
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats, and ways forward. Maturitas, Vol. 113, 48–52. Available at: https://www.maturitas.org/article/S0378-5122(18)30165-8/fulltext.
Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol. 35, Issue 2, 60–67. Available at: <a href="https://doi.org/10.1177/0266382118773624." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1177/0266382118773624.</a>
Dent, E. (2003). The complexity science organizational development practitioner. Organization Development Journal, Vol. 21, Issue 2. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2297056.
Fogelberg, D., & Frauwirth, S. (2010). A complexity science approach to occupation: Moving beyond the individual. Journal of Occupational Science, Vol. 17, Issue 3, 131–139. Available at: <a href="https://doi.org/10.1080/14427591.2010.9686687." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1080/14427591.2010.9686687.</a>
Janofsky, A. (2019, October 06). Smaller Medical Providers Get Burned by Ransomware. Wall Street Journal, available at: https://www.wsj.com/articles/smaller-medical-providers-get-burned-by-ransomware-11570366801.
Kayisoglu, G., Bolat, P., & Tam, K. (2022). Evaluating SLIM-based human error probability for ECDIS cybersecurity in maritime. The Journal of Navigation, Vol. 75, Issue 6, 1364–1388. Available at: <a href="https://doi.org/10.1017/S0373463322000534." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1017/S0373463322000534.</a>
Kennedy-Sims, C. (2021). Supply chain management in level I trauma care facilities: Can it determine patient care delivery and funding? (Order No. 28539929). Available from ProQuest Dissertations & Theses Global.
Leape, L.L. (2000). Institute of Medicine medical error figures are not exaggerated. JAMA, Vol. 284, Issue 1, 95–7. DOI: <a href="https://doi.org/10.1001/jama.284.1.95." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1001/jama.284.1.95.</a>
McNeese, M.D., Cooke, N.J., D’Amico, A., Endsley, M.R., Gonzalez, C., Roth, E., & Salas, E. (2012). Perspectives on the role of cognition in cyber security. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 56, Issue 1, 268–271. DOI:<a href="https://doi.org/10.1177/1071181312561063." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1177/1071181312561063.</a>
Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business Organizations. HOLISTICA – Journal of Business and Public Administration, Vol. 9, Issue 3, 71–88. DOI: <a href="https://doi.org/10.2478/hjbpa-2018-0024." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.2478/hjbpa-2018-0024.</a>
Reason, J. (2000). Human error: models and management. British Medical Journal, Vol. 320, 768–770. Available at: <a href="https://doi.org/10.1136/bmj.320.7237.768." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1136/bmj.320.7237.768.</a>
Slangen, R. (2016). Understanding Cyber-risk by Investigating the Behaviour of Defender and Threat Agent Organisations: Why a Complex Adaptive Systems Perspective Contributes to Further Understanding Cyber-risk. TUDelft, Master Thesis. Available at: http://resolver.tudelft.nl/uuid:3951b6a2-db0c-4e69-8da8-9fa28bc28237.
Shufutinsky, A. (2018). Organizational Assessment of a Biotechnology Firm’s Safety, Health, and Environmental Department through an Organizational Development Lens. International Journal of Interdisciplinary & Multidisciplinary Studies, Vol. 4, Issue 3.
Shufutinsky, A. (2019). Tribalism and Clone Theory in New Leaders and the Resulting Degradation of Organizational Culture. Psychology & Behavioral Science International Journal, Vol. 10, Issue 2: 555788. DOI:<a href="https://doi.org/10.19080/PBSIJ.2019.10.555788." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.19080/PBSIJ.2019.10.555788.</a>
Shufutinsky, A., Sibel, J., Beach, Saraceno, A., & Beach, A. (2020). O.D. for Robots? Implications of Industry 4.0 on Talent Acquisition and Development. Organization Development Journal, Vol. 38, Issue 3, 59–76. Available at: https://www.researchgate.net/publication/343671489_OD_for_Robots_Implications_of_Industry_40_on_Talent_Acquisition_and_Development.
Simpson, P. (2007). Organizing in the mist: A case study in leadership and complexity. Leadership & Organization Development Journal, Vol. 28, Issue 5, 465–482. DOI:<a href="https://doi.org/10.1108/01437730710761751." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/01437730710761751.</a>
Skarzauskiene, A. (2010). Managing complexity: Systems thinking as a catalyst of the organization’s performance. Measuring Business Excellence, Vol. 14, Issue 4, 49–64. DOI:<a href="https://doi.org/10.1108/13683041011093758." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1108/13683041011093758.</a>
Stacey, R. (2011). Strategic management and organizational dynamics: The challenge of complexity to ways of thinking about organizations (6th Edition). London: Pearson Education Ltd.
Trist, E. & Emery, F. (2005). Organizational Behavior 2: Essential Theories of Process and Structure, 169. New York: Routledge. Available at: <a href="https://doi.org/10.4324/9781315702001." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4324/9781315702001.</a>
van der Kleij, R., & Leukfeldt, R. (2020). Cyber resilient behavior: Integrating human behavioral models and resilience engineering capabilities into cyber security. Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24–28, 2019, Washington DC, USA 10, 16–27. DOI:<a href="https://doi.org/10.1007/978-3-030-20488-4_2." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-030-20488-4_2.</a>
Walker, G.H., Stanton, N.A., Salmon, P.M., & Jenkins, D.P. (2008). A review of sociotechnical systems theory: a classic concept for new command and control paradigms. Theoretical Issues in Ergonomics Science, Vol. 9, Issue 6, 479–499.
Wickham, M.H. (2019). Exploring data breaches and means to mitigate future occurrences in healthcare institutions: A content analysis (Order No. 13861149). Available from ProQuest Dissertations & Theses Global. (2216485062).
Willett, K.D. (2016). Cybersecurity decision patterns as adaptive knowledge encoding in cybersecurity operations. Doctoral dissertation, Stevens Institute of Technology.
Zhadan, A. (2023). World Economic Forum finds that 95% of cybersecurity incidents occur due to human error. Cybernews. Available at: https://cybernews.com/editorial/world-economic-forum-finds-that-95-of-cybersecurity-incidents-occur-due-to-human-error/.
Zoto, E., Kianpour, M., Kowalski, S.J., & Lopez-Rojas, E.A. (2019). A sociotechnical systems approach to design and support systems thinking in cybersecurity and risk management education. Complex Systems Informatics and Modeling Quarterly, Vol. 18, 65–75.