{"id":"https://openalex.org/W2035366639","doi":"https://doi.org/10.1109/imis.2013.147","title":"Toward Automated Reduction of Human Errors Based on Cognitive Analysis","display_name":"Toward Automated Reduction of Human Errors Based on Cognitive Analysis","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2035366639","doi":"https://doi.org/10.1109/imis.2013.147","mag":"2035366639"},"language":"en","primary_location":{"id":"doi:10.1109/imis.2013.147","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imis.2013.147","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036972537","display_name":"Daisuke Miyamoto","orcid":"https://orcid.org/0000-0003-4735-9240"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Daisuke Miyamoto","raw_affiliation_strings":["University of Tokyo, Tokyo, Japan","Univ. of Tokyo, Tokyo (Japan)"],"affiliations":[{"raw_affiliation_string":"University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]},{"raw_affiliation_string":"Univ. of Tokyo, Tokyo (Japan)","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029032117","display_name":"Takeshi Takahashi","orcid":"https://orcid.org/0000-0002-6477-7770"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takeshi Takahashi","raw_affiliation_strings":["National Institute of Information and Communications Technology, Tokyo, Japan","Nat. Inst. of Inf. & Commun. Technol., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I90023481"]},{"raw_affiliation_string":"Nat. Inst. of Inf. & Commun. Technol., Tokyo, Japan","institution_ids":["https://openalex.org/I90023481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036972537"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":0.8356,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82760063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"32","issue":null,"first_page":"820","last_page":"825"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/human-error","display_name":"Human error","score":0.8136682510375977},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7276415824890137},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7214901447296143},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.5650582909584045},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.5553122758865356},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.46112531423568726},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.45775142312049866},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.44253605604171753},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.42218217253685},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4139115810394287},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.37825092673301697},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.36070695519447327},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2767672836780548},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13020235300064087},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12437179684638977}],"concepts":[{"id":"https://openalex.org/C169806903","wikidata":"https://www.wikidata.org/wiki/Q5937752","display_name":"Human error","level":2,"score":0.8136682510375977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7276415824890137},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7214901447296143},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.5650582909584045},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.5553122758865356},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.46112531423568726},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.45775142312049866},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.44253605604171753},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.42218217253685},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4139115810394287},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37825092673301697},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.36070695519447327},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2767672836780548},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13020235300064087},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12437179684638977},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/imis.2013.147","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imis.2013.147","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.834.1895","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.834.1895","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.iplove.net/pdf/miyamoto-wais2013.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W657731981","https://openalex.org/W1485200701","https://openalex.org/W1486339539","https://openalex.org/W1512740566","https://openalex.org/W1514123819","https://openalex.org/W1569782300","https://openalex.org/W1575046377","https://openalex.org/W1575201818","https://openalex.org/W1592658141","https://openalex.org/W1863348750","https://openalex.org/W1967656199","https://openalex.org/W1967847731","https://openalex.org/W1973674948","https://openalex.org/W1990188874","https://openalex.org/W2004185679","https://openalex.org/W2010608681","https://openalex.org/W2030215259","https://openalex.org/W2039507996","https://openalex.org/W2048166082","https://openalex.org/W2049459183","https://openalex.org/W2056166488","https://openalex.org/W2058883231","https://openalex.org/W2063705912","https://openalex.org/W2073104441","https://openalex.org/W2077937403","https://openalex.org/W2081436185","https://openalex.org/W2085693768","https://openalex.org/W2087927558","https://openalex.org/W2100442755","https://openalex.org/W2112952440","https://openalex.org/W2113147897","https://openalex.org/W2114525843","https://openalex.org/W2128570208","https://openalex.org/W2136136174","https://openalex.org/W2141579073","https://openalex.org/W2157597875","https://openalex.org/W2157720178","https://openalex.org/W2281132419","https://openalex.org/W3162906515","https://openalex.org/W6630747704"],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W2598865957","https://openalex.org/W1576092969","https://openalex.org/W2524154428"],"abstract_inverted_index":{"Following":[0],"the":[1,14,62,71,76,83,107,110],"immense":[2],"development":[3],"of":[4,24,65,85,97,109,116],"cyber":[5],"society":[6],"where":[7],"various":[8],"activities":[9],"including":[10],"e-commerce":[11],"take":[12],"place,":[13],"demands":[15],"for":[16,82],"security":[17,25],"is":[18,27,31,79],"rapidly":[19],"growing.":[20],"Among":[21],"major":[22],"causes":[23,64],"flaws":[26],"human":[28,45,57,66,117],"error,":[29],"which":[30],"unintentionally":[32],"caused":[33],"by":[34,112],"humans.":[35],"To":[36],"cope":[37],"with":[38],"that,":[39],"we":[40],"intend":[41],"to":[42,70],"build":[43],"a":[44,54,80,93],"error":[46,118],"database":[47],"that":[48,61,89,95],"automatically":[49],"develops":[50],"further.":[51],"We":[52],"conducted":[53],"survey":[55],"on":[56,88],"factors":[58],"and":[59,75,101,120],"concluded":[60],"root":[63],"errors":[67],"are":[68],"related":[69],"internal":[72],"mental":[73],"processes,":[74],"cognitive-psychological":[77],"methodology":[78],"feasible":[81],"estimation":[84],"them.":[86],"Based":[87],"this":[90],"paper":[91],"proposes":[92],"framework":[94],"consists":[96],"data":[98,102,111],"collection":[99],"methods":[100],"structure.":[103],"It":[104],"also":[105],"explores":[106],"usability":[108],"presenting":[113],"use":[114],"cases":[115],"prevention":[119],"incident":[121],"handling.":[122]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
