{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:40:09Z","timestamp":1751841609036,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030811105"},{"type":"electronic","value":"9783030811112"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81111-2_3","type":"book-chapter","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:02:42Z","timestamp":1625637762000},"page":"22-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Experiences of Using SETA in\u00a0Nordic Municipalities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7462-1809","authenticated-orcid":false,"given":"Aous Al","family":"Salek","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5962-9995","authenticated-orcid":false,"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Aldawood, H., Skinner, G.: Educating and raising awareness on cyber security social engineering: a literature review. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), pp. 62\u201368. IEEE (2018)","DOI":"10.1109\/TALE.2018.8615162"},{"key":"3_CR2","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)"},{"key":"3_CR3","unstructured":"Berelson, B.: Content Analysis in Communication Research. Content Analysis in Communication Research, Free Press, New York (1952)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Berndtsson, M., Hansson, J., Olsson, B., Lundell, B.: Thesis Projects: a Guide for Students in Computer Science and Information Systems. Springer, London (2007)","DOI":"10.1007\/978-1-84800-009-4"},{"issue":"1","key":"3_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.giq.2017.02.007","volume":"34","author":"H de Bruijn","year":"2017","unstructured":"de Bruijn, H., Janssen, M.: Building cybersecurity awareness: the need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1\u20137 (2017)","journal-title":"Gov. Inf. Q."},{"key":"3_CR6","unstructured":"Cybint: 15 alarming cyber security facts and stats (2020). https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/"},{"key":"3_CR7","unstructured":"EC-Council: The top types of cybersecurity attacks of 2019, till date (2019). https:\/\/blog.eccouncil.org\/the-top-types-of-cybersecurity-attacks-of-2019-till-date\/"},{"key":"3_CR8","unstructured":"Fowler, F.J., Jr.: Survey Research Methods. Sage publications, Los Angeles (2013)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Gjertsen, E.G.B., Gjaere, E.A., Bartnes, M., Flores, W.R.: Gamification of information security awareness and training. In: ICISSP (2017)","DOI":"10.5220\/0006128500590070"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Hadlington, L.: Human factors in cybersecurity; examining the link between internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 3(7), e00346 (2017)","DOI":"10.1016\/j.heliyon.2017.e00346"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Handayani, V., Budiono, F.L., Rosyada, D., Amriza, R.N.S., Masruroh, S.U., et al.: Gamified learning platform analysis for designing a gamification-based ui\/ux of e-learning applications: A systematic literature review. In: 2020 8th International Conference on Cyber and IT Service Management (CITSM), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/CITSM50537.2020.9268791"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-66715-7_19","volume-title":"Entertainment Computing \u2013 ICEC 2017","author":"D Huynh","year":"2017","unstructured":"Huynh, D., Luong, P., Iida, H., Beuran, R.: Design and evaluation of a cybersecurity awareness training game. In: Munekata, N., Kunita, I., Hoshino, J. (eds.) ICEC 2017. LNCS, vol. 10507, pp. 183\u2013188. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66715-7_19"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Joinson, A., van Steen, T.: Human aspects of cyber security: Behaviour or culture change? Cyber Secur. Peer-Rev. J. 1(4), 351\u2013360 (2018)","DOI":"10.69554\/KMOS3545"},{"key":"3_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-030-57404-8_6","volume-title":"Human Aspects of Information Security and Assurance","author":"J K\u00e4vrestad","year":"2020","unstructured":"K\u00e4vrestad, J., Nohlberg, M.: Contextbased microtraining: a framework for information security training. In: Clarke, N., Furnell, S. (eds.) HAISA 2021. IAICT, vol. 593, pp. 71\u201381. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57404-8_6"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Krippendorff, K.: Reliability in content analysis: some common misconceptions and recommendations. Hum. Commun. Res. 30(3), 411\u2013433 (2006). https:\/\/doi.org\/10.1111\/j.1468-2958.2004.tb00738.x","DOI":"10.1111\/j.1468-2958.2004.tb00738.x"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Lim, I.K., Park, Y.G., Lee, J.K.: Design of security training system for individual users. Wirel. Pers. Commun. 90(3), 1105\u20131120 (2016) https:\/\/doi.org\/10.1007\/s11277-016-3380-z","DOI":"10.1007\/s11277-016-3380-z"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Puhakainen, P., Siponen, M.: Improving employees\u2019 compliance through information systems security training: an action research study. MIS quarterly, pp. 757\u2013778 (2010)","DOI":"10.2307\/25750704"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","volume":"57","author":"NS Safa","year":"2016","unstructured":"Safa, N.S., Von Solms, R.: An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57, 442\u2013451 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"3_CR19","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.respol.2012.05.003","volume":"42","author":"H Sauermann","year":"2013","unstructured":"Sauermann, H., Roach, M.: Increasing web survey response rates in innovation research: an experimental study of static and dynamic contact design features. Res. Policy 42(1), 273\u2013286 (2013)","journal-title":"Res. Policy"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manage. Comput. Secur. 8(1), 31\u201341 (2000)","DOI":"10.1108\/09685220010371394"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Takata, T., Ogura, K.: IEEE: Confront phishing attacks - from a perspective of security education. In: International Conference on Awareness Science and Technology, pp. 10\u201313 (2019)","DOI":"10.1109\/ICAwST.2019.8923444"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Taneski, V., Heri\u010dko, M., Brumen, B.: Impact of security education on password change, pp. 1350\u20131355 (2015)","DOI":"10.1109\/MIPRO.2015.7160484"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Tchakount\u00e9, F., Wabo, L.K., Atemkeng, M.: A review of gamification applied to phishing, pp. 1\u201326 (2020)","DOI":"10.20944\/preprints202003.0139.v1"},{"key":"3_CR24","unstructured":"Van Rensburg, W.J., Thomson, K.L., Futcher, L.: An Educational Intervention Towards Safe Smartphone Usage. HAISA, Dundee, vol. 2018 (2018)"},{"issue":"2","key":"3_CR25","first-page":"271","volume":"22","author":"JT Walston","year":"2006","unstructured":"Walston, J.T., Lissitz, R.W., Rudner, L.M.: The influence of web-based questionnaire presentation variations on survey cooperation and perceptions of survey quality. J. Official Stat. 22(2), 271 (2006)","journal-title":"J. Official Stat."},{"key":"3_CR26","unstructured":"Wheelan, C.: Naked Statistics: Stripping the Dread from the Data. WW Norton & Company, New York (2013)"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81111-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:02:46Z","timestamp":1751839366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81111-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030811105","9783030811112"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81111-2_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"8 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.43","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}