{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:41:29Z","timestamp":1764603689105,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030592905"},{"type":"electronic","value":"9783030592912"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59291-2_8","type":"book-chapter","created":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T23:05:18Z","timestamp":1600124718000},"page":"110-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automating the Communication of Cybersecurity Knowledge: Multi-case Study"],"prefix":"10.1007","author":[{"given":"Alireza","family":"Shojaifar","sequence":"first","affiliation":[]},{"given":"Samuel A.","family":"Fricker","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Gwerder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,15]]},"reference":[{"key":"8_CR1","unstructured":"Muller, P., et al.: Annual report on European SMEs 2016\/2017: Focus on self-employment. European Commission (2017)"},{"key":"8_CR2","first-page":"5","volume":"2015","author":"T Caldwell","year":"2015","unstructured":"Caldwell, T.: Securing small businesses \u2013 the weakest link in a supply chain? Comput. Fraud Secur. 2015, 5\u201310 (2015)","journal-title":"Comput. Fraud Secur."},{"key":"8_CR3","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-33448-1_30","volume-title":"Global Security, Safety and Sustainability & e-Democracy","author":"T Ntouskas","year":"2012","unstructured":"Ntouskas, T., Papanikas, D., Polemi, N.: A collaborative system offering security management services for SMEs\/mEs. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds.) e-Democracy\/ICGS3 -2011. LNICSSITE, vol. 99, pp. 220\u2013228. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33448-1_30"},{"key":"8_CR4","first-page":"18","volume":"2011","author":"W Goucher","year":"2011","unstructured":"Goucher, W.: Do SMEs have the right attitude to security? Comput. Fraud Secur. 2011, 18\u201320 (2011)","journal-title":"Comput. Fraud Secur."},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1108\/09685220510614425","volume":"13","author":"A Gupta","year":"2005","unstructured":"Gupta, A., Hammond, R.: Information systems security issues and decisions for small businesses: an empirical examination. Inf. Manage. Comput. Secur. 13, 297\u2013310 (2005)","journal-title":"Inf. Manage. Comput. Secur."},{"issue":"11","key":"8_CR6","first-page":"106","volume":"56","author":"F Mijnhardt","year":"2016","unstructured":"Mijnhardt, F., Baars, T., Spruit, M.: Organizational characteristics influencing SME information security maturity. J. Comput. Inf. Syst. 56(11), 106\u2013115 (2016)","journal-title":"J. Comput. Inf. Syst."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(15)30017-8","volume":"2015","author":"T Kurpjuhn","year":"2015","unstructured":"Kurpjuhn, T.: The SME security challenge. Comput. Fraud Secur. 2015, 5\u20137 (2015)","journal-title":"Comput. Fraud Secur."},{"key":"8_CR8","unstructured":"Valli, C., Martinus, I.C., Johnstone, M.N.: Small to Medium Enterprise Cyber Security Awareness: an initial survey of Western Australian Business (2014)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Brunner, M., Sillaber, C., Breu, R.: Towards automation in information security management systems. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), Prague, Czech Republic, pp. 160\u2013167. IEEE (2017)","DOI":"10.1109\/QRS.2017.26"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1108\/09576050210447037","volume":"15","author":"SM Furnell","year":"2002","unstructured":"Furnell, S.M., Gennatou, M., Dowland, P.S.: A prototype tool for information security awareness and training. Logist. Inf. Manage. 15, 352\u2013357 (2002)","journal-title":"Logist. Inf. Manage."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","volume":"16","author":"G Dhillon","year":"2006","unstructured":"Dhillon, G., Torkzadeh, G.: Value-focused assessment of information system security in organizations. Inf. Syst. J. 16, 293\u2013314 (2006)","journal-title":"Inf. Syst. J."},{"key":"8_CR12","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop. In: UPSEC 2008 Proceedings of the 1st Conference on Usability, Psychology, Security, Berkeley, USA (2008)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., Mahmood, A.: Employees\u2019 behavior towards IS security policy compliance. In: 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), Hawaii, USA, pp. 156\u2013166. IEEE (2007)","DOI":"10.1109\/HICSS.2007.206"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","volume":"28","author":"H-S Rhee","year":"2009","unstructured":"Rhee, H.-S., Kim, C., Ryu, Y.U.: Self-efficacy in information security: its influence on end users\u2019 information security practice behavior. Comput. Secur. 28, 816\u2013826 (2009)","journal-title":"Comput. Secur."},{"key":"8_CR15","unstructured":"Shojaifar, A., Fricker, S.A., Gwerder, M.: Elicitation of SME requirements for cybersecurity solutions by studying adherence to recommendations. In: REFSQ Workshops (2018)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.cose.2009.01.003","volume":"28","author":"E Albrechtsen","year":"2009","unstructured":"Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. 28, 476\u2013490 (2009)","journal-title":"Comput. Secur."},{"issue":"4","key":"8_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R West","year":"2008","unstructured":"West, R.: The psychology of security. Commun. ACM 51(4), 34\u201340 (2008)","journal-title":"Commun. ACM"},{"key":"8_CR18","volume-title":"The Theory and Practice of Change Management","author":"J Hayes","year":"2002","unstructured":"Hayes, J.: The Theory and Practice of Change Management. Palgrave, New York (2002)"},{"issue":"4","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1080\/07421222.2017.1394083","volume":"34","author":"P Menard","year":"2017","unstructured":"Menard, P., Bott, G.J., Crossler, R.E.: User motivations in protecting information security: protection motivation theory versus self-determination theory. J. Manage. Inf. Syst. 34(4), 1203\u20131230 (2017)","journal-title":"J. Manage. Inf. Syst."},{"key":"8_CR20","first-page":"1","volume":"21","author":"HC Pham","year":"2017","unstructured":"Pham, H.C., Pham, D.D., Brennan, L., Richardson, J.: Information security and people: a conundrum for compliance. AJIS 21, 1\u201316 (2017)","journal-title":"AJIS"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/0003-066X.55.1.68","volume":"55","author":"RM Ryan","year":"2000","unstructured":"Ryan, R.M., Deci, E.L.: Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. Am. Psychol. 55, 68\u201378 (2000)","journal-title":"Am. Psychol."},{"issue":"3","key":"8_CR22","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1037\/a0012801","volume":"49","author":"EL Deci","year":"2008","unstructured":"Deci, E.L., Ryan, R.M.: Self-determination theory: a macrotheory of human motivation, development, and health. Can. Psychol. 49(3), 182\u2013185 (2008)","journal-title":"Can. Psychol."},{"issue":"2","key":"8_CR23","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0092-6566(85)90023-6","volume":"19","author":"EL Deci","year":"1985","unstructured":"Deci, E.L., Ryan, R.M.: The general causality orientations scale: self-determination in personality. J. Res. Pers. 19(2), 109\u2013134 (1985)","journal-title":"J. Res. Pers."},{"key":"8_CR24","unstructured":"Deming, W.E.: Elementary principles of the statistical control of quality. Nippon Kagaku Gigutsu Remmei: Japanese Union of Science and Engineering (JUSE) (1951)"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-030-12085-6_5","volume-title":"Information and Operational Technology Security Systems","author":"B Yigit Ozkan","year":"2019","unstructured":"Yigit Ozkan, B., Spruit, M.: A questionnaire model for cybersecurity maturity assessment of critical infrastructures. In: Fournaris, A.P., Lampropoulos, K., Mar\u00edn Tordera, E. (eds.) IOSec 2018. LNCS, vol. 11398, pp. 49\u201360. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12085-6_5"},{"key":"8_CR26","volume-title":"Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats","author":"B Gardner","year":"2014","unstructured":"Gardner, B., Thomas, V.: Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats. Elsevier\/Syngress, Amsterdam (2014)"},{"key":"8_CR27","volume-title":"Case Study Research: Design and Methods","author":"RK Yin","year":"2009","unstructured":"Yin, R.K.: Case Study Research: Design and Methods, 4th edn. Sage, Thousand Oaks (2009)","edition":"4"},{"issue":"3","key":"8_CR28","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1037\/0021-9010.85.3.349","volume":"85","author":"RJ Bennett","year":"2000","unstructured":"Bennett, R.J., Robinson, S.L.: Development of a measure of workplace deviance. J. Appl. Psychol. 85(3), 349\u2013360 (2000)","journal-title":"J. Appl. Psychol."},{"key":"8_CR29","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering: Guidelines and Examples","author":"P Runeson","year":"2012","unstructured":"Runeson, P., H\u00f6st, M., Rainer, A., Regnell, B.: Case Study Research in Software Engineering: Guidelines and Examples. Wiley, Hoboken (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education. Information Security in Action"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59291-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:19:28Z","timestamp":1726359568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59291-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030592905","9783030592912"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59291-2_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Conference on Information Security Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise-ifip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifiptc11.org\/wg118-events\/wise13","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}