{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T22:40:02Z","timestamp":1754174402308,"version":"3.41.2"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030817008"},{"type":"electronic","value":"9783030817015"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81701-5_16","type":"book-chapter","created":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T15:16:19Z","timestamp":1628003779000},"page":"383-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Information Security and Privacy \u2013 Challenges and Outlook"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0984-7542","authenticated-orcid":false,"given":"Steven","family":"Furnell","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1365-0929","authenticated-orcid":false,"given":"Paul","family":"Haskell-Dowland","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7447-2367","authenticated-orcid":false,"given":"Manish","family":"Agrawal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2860-5215","authenticated-orcid":false,"given":"Richard","family":"Baskerville","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5438-0959","authenticated-orcid":false,"given":"Anirban","family":"Basu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7301-7060","authenticated-orcid":false,"given":"Matt","family":"Bishop","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Cuellar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-6734","authenticated-orcid":false,"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0406-8718","authenticated-orcid":false,"given":"Lynn","family":"Futcher","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0565-8656","authenticated-orcid":false,"given":"Nurit","family":"Gal-Oz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3653-5643","authenticated-orcid":false,"given":"Teju","family":"Herath","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0921-7148","authenticated-orcid":false,"given":"Christian","family":"Damsgaard Jensen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0301-4187","authenticated-orcid":false,"given":"Allen","family":"Johnston","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2661-8573","authenticated-orcid":false,"given":"Giovanni","family":"Livraga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8066-9991","authenticated-orcid":false,"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Marsh","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1091-8486","authenticated-orcid":false,"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Aljosa","family":"Pasic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4455-7287","authenticated-orcid":false,"given":"Stef","family":"Schinagl","sequence":"additional","affiliation":[]},{"given":"Abbas","family":"Shahim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6456-9701","authenticated-orcid":false,"given":"Kerry-Lynn","family":"Thomson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7420-6947","authenticated-orcid":false,"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4554-6176","authenticated-orcid":false,"given":"Tony","family":"Vance","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7435-7676","authenticated-orcid":false,"given":"Merrill","family":"Warkentin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,4]]},"reference":[{"key":"16_CR1","unstructured":"OECD: The OECD Privacy Framework (2013). https:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf. Accessed 16 Dec 2020"},{"key":"16_CR2","unstructured":"IFIP TC11: Aims and Scope (n.d.). https:\/\/www.ifiptc11.org\/aims-and-scope. Accessed 16 Dec 2020"},{"key":"16_CR3","unstructured":"IFIP TC11: Working Groups (n.d.). https:\/\/www.ifiptc11.org\/working-groups. Accessed 16 Dec 2020"},{"key":"16_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-55415-5_35","volume-title":"ICT Systems Security and Privacy Protection","author":"L Connolly","year":"2014","unstructured":"Connolly, L., Lang, M., Tygar, D.: Managing employee security behaviour in organisations: the role of cultural factors and individual values. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 417\u2013430. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_35"},{"key":"16_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-030-22312-0_10","volume-title":"ICT Systems Security and Privacy Protection","author":"S Wiefling","year":"2019","unstructured":"Wiefling, S., Lo Iacono, L., D\u00fcrmuth, M.: Is this really you? An empirical study on risk-based authentication applied in the wild. In: Dhillon, G., Karlsson, F., Hedstr\u00f6m, K., Z\u00faquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 134\u2013148. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22312-0_10"},{"key":"16_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-319-99828-2_5","volume-title":"ICT Systems Security and Privacy Protection","author":"G Giorgi","year":"2018","unstructured":"Giorgi, G., Martinelli, F., Saracino, A., Sheikhalishahi, M.: Walking through the deep: gait analysis for user authentication through deep learning. In: Janczewski, L.J., Kuty\u0142owski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 62\u201376. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99828-2_5"},{"key":"16_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-55415-5_27","volume-title":"ICT Systems Security and Privacy Protection","author":"YH Diaz-Tellez","year":"2014","unstructured":"Diaz-Tellez, Y.H., Bodanese, E.L., Dimitrakos, T., Turner, M.: Context-aware multifactor authentication based on dynamic pin. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 330\u2013338. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_27"},{"key":"16_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-030-23451-5_3","volume-title":"Information Security Education. Education in Proactive Information Security","author":"D Damopoulos","year":"2019","unstructured":"Damopoulos, D., Wetzel, S.: Introducing research into the undergraduate curriculum in cybersecurity. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IAICT, vol. 557, pp. 30\u201342. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23451-5_3"},{"key":"16_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-030-23451-5_5","volume-title":"Information Security Education. Education in Proactive Information Security","author":"S von Solms","year":"2019","unstructured":"von Solms, S., Marnewick, A.: Identifying security requirements body of knowledge for the security systems engineer. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IAICT, vol. 557, pp. 59\u201371. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23451-5_5"},{"key":"16_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-39218-4_17","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"VLL Thing","year":"2013","unstructured":"Thing, V.L.L., Chua, Z.-L.: Smartphone volatile memory acquisition for security analysis and forensics investigation. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 217\u2013230. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_17"},{"key":"16_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-319-99828-2_16","volume-title":"ICT Systems Security and Privacy Protection","author":"M Agarwal","year":"2018","unstructured":"Agarwal, M., Puzis, R., Haj-Yahya, J., Zilberman, P., Elovici, Y.: Anti-forensic = suspicious: detection of stealthy malware that hides its network traffic. In: Janczewski, L.J., Kuty\u0142owski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 216\u2013230. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99828-2_16"},{"key":"16_CR12","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-030-58201-2_24","volume-title":"ICT Systems Security and Privacy Protection","author":"G Dupont","year":"2020","unstructured":"Dupont, G., dos Santos, D.R., Costante, E., den Hartog, J., Etalle, S.: A matter of life and death: analyzing the security of healthcare networks. In: H\u00f6lbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 355\u2013369. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58201-2_24"},{"key":"16_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-22312-0_3","volume-title":"ICT Systems Security and Privacy Protection","author":"H Yoo","year":"2019","unstructured":"Yoo, H., Ahmed, I.: Control logic injection attacks on industrial control systems. In: Dhillon, G., Karlsson, F., Hedstr\u00f6m, K., Z\u00faquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 33\u201348. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22312-0_3"},{"key":"16_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-642-55415-5_41","volume-title":"ICT Systems Security and Privacy Protection","author":"J Vossaert","year":"2014","unstructured":"Vossaert, J., Lapon, J., De Decker, B., Naessens, V.: Trusted computing to increase security and privacy in eID authentication. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 485\u2013492. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_41"},{"key":"16_CR15","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-58201-2_14","volume-title":"ICT Systems Security and Privacy Protection","author":"M Eckel","year":"2020","unstructured":"Eckel, M., Fuchs, A., Repp, J., Springer, M.: Secure attestation of virtualized environments. In: H\u00f6lbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 203\u2013216. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58201-2_14"},{"key":"16_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-030-58201-2_8","volume-title":"ICT Systems Security and Privacy Protection","author":"A Kitkowska","year":"2020","unstructured":"Kitkowska, A., Shulman, Y., Martucci, L.A., W\u00e4stlund, E.: Facilitating privacy attitudes and behaviors with affective visual design. In: H\u00f6lbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 109\u2013123. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58201-2_8"},{"key":"16_CR17","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-030-22312-0_14","volume-title":"ICT Systems Security and Privacy Protection","author":"J Simonet","year":"2019","unstructured":"Simonet, J., Teufel, S.: The influence of organizational, social and personal factors on cybersecurity awareness and behaviour of home computer users. In: Dhillon, G., Karlsson, F., Hedstr\u00f6m, K., Z\u00faquete, A. (eds.) SEC 2019. IAICT, vol. 562, pp. 194\u2013208. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22312-0_14"},{"key":"16_CR18","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-58469-0_10","volume-title":"ICT Systems Security and Privacy Protection","author":"R Rios","year":"2017","unstructured":"Rios, R., Nu\u00f1ez, D., Lopez, J.: Query privacy in sensing-as-a-service platforms. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IAICT, vol. 502, pp. 141\u2013154. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58469-0_10"},{"key":"16_CR19","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-319-99828-2_22","volume-title":"ICT Systems Security and Privacy Protection","author":"W Chen","year":"2018","unstructured":"Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M., Aspinall, D.: Formal analysis of sneak-peek: a data centre attack and its mitigations. In: Janczewski, L.J., Kuty\u0142owski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 307\u2013322. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99828-2_22"},{"key":"16_CR20","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-33630-5_7","volume-title":"ICT Systems Security and Privacy Protection","author":"S Adepu","year":"2016","unstructured":"Adepu, S., Mathur, A.: Using process invariants to detect cyber attacks on a water treatment system. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 91\u2013104. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_7"},{"key":"16_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-030-58201-2_9","volume-title":"ICT Systems Security and Privacy Protection","author":"O Drozd","year":"2020","unstructured":"Drozd, O., Kirrane, S.: Privacy CURE: consent comprehension made easy. In: H\u00f6lbl, M., Rannenberg, K., Welzer, T. (eds.) SEC 2020. IAICT, vol. 580, pp. 124\u2013139. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58201-2_9"},{"key":"16_CR22","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-319-99828-2_12","volume-title":"ICT Systems Security and Privacy Protection","author":"N Paul","year":"2018","unstructured":"Paul, N., Tesfay, W.B., Kipker, D.-K., Stelter, M., Pape, S.: Assessing privacy policies of Internet of Things services. In: Janczewski, L.J., Kuty\u0142owski, M. (eds.) SEC 2018. IAICT, vol. 529, pp. 156\u2013169. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99828-2_12"},{"key":"16_CR23","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-39218-4_4","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"WJ Caelli","year":"2013","unstructured":"Caelli, W.J., Kwok, L.-F., Longley, D.: Evolving a secure internet. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 42\u201354. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_4"},{"key":"16_CR24","unstructured":"Wheeler J.A.: Top 10 factors for integrated risk management success, Gartner, Inc. (2017). https:\/\/www.gartner.com\/en\/documents\/3645368\/top-10-factors-for-integrated-risk-management-success. Accessed 16 Dec 2020"},{"key":"16_CR25","unstructured":"World Economic Forum (WEF): Digital transformation of industries: digital enterprise. World Economic Forum White Paper (2016). http:\/\/reports.weforum.org\/digital-transformation\/wp-content\/blogs.dir\/94\/mp\/files\/pages\/files\/digital-enterprise-narrative-final-january-2016.pdf. Accessed 16 Dec 2020"},{"key":"16_CR26","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-18467-8_19","volume-title":"ICT Systems Security and Privacy Protection","author":"L Connolly","year":"2015","unstructured":"Connolly, L., Lang, M., Tygar, J.D.: Investigation of employee security behaviour: a grounded theory approach. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 283\u2013296. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18467-8_19"},{"key":"16_CR27","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-030-23451-5_11","volume-title":"Information Security Education. Education in Proactive Information Security","author":"A Tolah","year":"2019","unstructured":"Tolah, A., Furnell, S.M., Papadaki, M.: A comprehensive framework for understanding security culture in organizations. In: Drevin, L., Theocharidou, M. (eds.) WISE 2019. IAICT, vol. 557, pp. 143\u2013156. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23451-5_11"},{"key":"16_CR28","unstructured":"Cybersecurity Ventures: Cybersecurity Talent Crunch to Create 3.5 Million Unfilled Jobs Globally By 2021. https:\/\/cybersecurityventures.com\/jobs\/. Accessed 16 Dec 2020"},{"key":"16_CR29","unstructured":"CSEC: Cybersecurity Curricula 2017 \u2013 Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Version 1.0 Report 31 December 2017. CSEC2017 Joint Task Force - Association for Computing Machinery (ACM), IEEE Computer Society (IEEE-CS), Association for Information Systems Special Interest Group on Information Security and Privacy (AIS SIGSEC) and International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8). https:\/\/cybered.hosting.acm.org\/wp-content\/uploads\/2018\/02\/newcover_csec2017.pdf. Accessed 16 Dec 2020"},{"key":"16_CR30","doi-asserted-by":"publisher","unstructured":"Hui, K.L., Vance, A., Zhdanov, D.: Securing Digital Assets. In: Bush, A., Rai, A. (eds.) MIS Quarterly Research Curations (2016). https:\/\/doi.org\/10.25300\/05272016. http:\/\/misq.org\/research-curations","DOI":"10.25300\/05272016"}],"container-title":["IFIP Advances in Information and Communication Technology","Advancing Research in Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81701-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T22:02:39Z","timestamp":1754172159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81701-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030817008","9783030817015"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81701-5_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}