{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:32:52Z","timestamp":1774866772655,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030574031","type":"print"},{"value":"9783030574048","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_6","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"71-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["ContextBased MicroTraining: A Framework for Information Security Training"],"prefix":"10.1007","author":[{"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"6_CR1","unstructured":"Al-Daeef, M.M., Basir, N., Saudi, M.M.: Security awareness training: a review. In: Proceedings of World Congress on Engineering, vol. 1, pp. 5\u20137 (2017)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Alshaikh, M., Maynard, S.B., Ahmad, A., Chang, S.: An exploratory study of current information security training and awareness practices in organizations. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)","DOI":"10.24251\/HICSS.2018.635"},{"issue":"1\u20132","key":"6_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.ijhcs.2005.04.017","volume":"63","author":"B Beckles","year":"2005","unstructured":"Beckles, B., Welch, V., Basney, J.: Mechanisms for increasing the usability of grid security. Int. J. Hum Comput Stud. 63(1\u20132), 74\u2013101 (2005)","journal-title":"Int. J. Hum Comput Stud."},{"key":"6_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-319-60585-2_6","volume-title":"Advances in Human Factors in Cybersecurity","author":"P Biocco","year":"2018","unstructured":"Biocco, P., Anwar, M.: Grid framework to address password memorability issues and offline password attacks. In: Nicholson, D. (ed.) AHFE 2017. AISC, vol. 593, pp. 52\u201361. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-60585-2_6"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"6_CR6","first-page":"527","volume":"25","author":"PA Bruck","year":"2012","unstructured":"Bruck, P.A., Motiwalla, L., Foerster, F.: Mobile learning with micro-content: a framework and evaluation. Bled e-Conf. 25, 527\u2013543 (2012)","journal-title":"Bled e-Conf."},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523\u2013548 (2010)","journal-title":"MIS Q."},{"issue":"6","key":"6_CR8","first-page":"39","volume":"11","author":"MB Desman","year":"2003","unstructured":"Desman, M.B.: The ten commandments of information security awareness training. Inf. Secur. J. A Glob. Perspect. 11(6), 39\u201344 (2003)","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"6_CR9","unstructured":"Dropbox: Low-budget password strength estimation. https:\/\/github.com\/dropbox\/zxcvbn. Accessed 07 Oct 2019"},{"key":"6_CR10","unstructured":"Hedin, A.: L\u00e4rande p\u00e5 h\u00f6g niv\u00e5. Uppsala universitet (2006)"},{"issue":"4","key":"6_CR11","doi-asserted-by":"crossref","first-page":"351","DOI":"10.69554\/KMOS3545","volume":"1","author":"A Joinson","year":"2018","unstructured":"Joinson, A., van Steen, T.: Human aspects of cyber security: behaviour or culture change? Cyber Secur. Peer-Rev. J. 1(4), 351\u2013360 (2018)","journal-title":"Cyber Secur. Peer-Rev. J."},{"key":"6_CR12","unstructured":"K\u00e4vrestad, J.: Defining, categorizing and defending against online fraud (2014)"},{"key":"6_CR13","unstructured":"K\u00e4vrestad, J.: Using contextbased microtraining to enforce secure behavior among computer users. In: 19th Seminar within the Framework of a Swedish IT Security Network for Ph.D. students, Karlstad (2019)"},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1108\/ICS-06-2018-0077","volume":"27","author":"J K\u00e4vrestad","year":"2019","unstructured":"K\u00e4vrestad, J., Eriksson, F., Nohlberg, M.: Understanding passwords-a taxonomy of password creation strategies. Inf. Comput. Secur. 27(3), 453\u2013467 (2019)","journal-title":"Inf. Comput. Secur."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"K\u00e4vrestad, J., Lennartsson, M., Birath, M., Nohlberg, M.: Constructing secure and memorable passwords. Inf. Comput. Secur. (2020)","DOI":"10.1108\/ICS-07-2019-0077"},{"key":"6_CR16","unstructured":"K\u00e4vrestad, J., Marcus, N.: Online fraud defence by context based micro training. In: Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), pp. 256\u2013264 (2015)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"K\u00e4vrestad, J., Nohlberg, M.: Using context based micro training to develop oer for the benefit of all. In: Proceedings of the 15th International Symposium on Open Collaboration, pp. 1\u201310 (2019)","DOI":"10.1145\/3306446.3340814"},{"key":"6_CR18","unstructured":"K\u00e4vrestad, J., Sk\u00e4rg\u00e5rd, M., Nohlberg, M.: Users perception of using CBMT for information security training. In: Human Aspects of Information Security & Assurance (HAISA 2019) International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019), Nicosia, Cyprus, pp. 122\u2013131 (2019)"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/IMCS-01-2013-0005","volume":"22","author":"EB Kim","year":"2014","unstructured":"Kim, E.B.: Recommendations for information security awareness training for college students. Inf. Manag. Comput. Secur. 22, 115\u2013126 (2014)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"6_CR20","unstructured":"Knowles, M.: Andragogy in action: applying modern principles of adult learning (1984)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Lincoln, Y.S., Guba, E.G.: Naturalistic inquiry (1985)","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"6_CR22","unstructured":"Marinos, L., Belmonte, A., Rekleitis, E.: Threat landscape 2013 (2013)"},{"issue":"3","key":"6_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MIC.2008.50","volume":"12","author":"BD Payne","year":"2008","unstructured":"Payne, B.D., Edwards, W.K.: A brief introduction to usable security. IEEE Internet Comput. 12(3), 13\u201321 (2008)","journal-title":"IEEE Internet Comput."},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"P Puhakainen","year":"2010","unstructured":"Puhakainen, P., Siponen, M.: Improving employees\u2019 compliance through information systems security training: an action research study. MIS Q. 34, 757\u2013778 (2010)","journal-title":"MIS Q."},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","volume":"57","author":"NS Safa","year":"2016","unstructured":"Safa, N.S., Von Solms, R.: An information security knowledge sharing model in organizations. Comput. Hum. Behavi. 57, 442\u2013451 (2016)","journal-title":"Comput. Hum. Behavi."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Wang, M., Xiao, J., Chen, Y., Min, W.: Mobile learning design: the LTCS model. In: 2014 International Conference on Intelligent Environments, pp. 318\u2013325. IEEE (2014)","DOI":"10.1109\/IE.2014.68"},{"key":"6_CR27","unstructured":"Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: 25th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 16), pp. 157\u2013173 (2016)"},{"key":"6_CR28","unstructured":"Whitten, A., Tygar, J.D.: Why johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol. 348, pp. 169\u2013184 (1999)"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-030-00470-5_12","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"SS Woo","year":"2018","unstructured":"Woo, S.S., Mirkovic, J.: GuidedPass: helping users to create strong and memorable passwords. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 250\u2013270. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_12"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:39:13Z","timestamp":1724330353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}