{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:23:02Z","timestamp":1743092582738,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031252211"},{"type":"electronic","value":"9783031252228"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25222-8_2","type":"book-chapter","created":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T14:29:55Z","timestamp":1674916195000},"page":"18-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Guidelines to Develop Consumers Cyber Resilience Capabilities in the IoE Ecosystem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-4942","authenticated-orcid":false,"given":"Eliana","family":"Stavrou","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,29]]},"reference":[{"key":"2_CR1","unstructured":"Malan, J., Eager, J., Lale-Demoz, E., Cacciaguerra, G., Brady, M.: Framing the Nature and Scale of Cyber Security Vulnerabilities within the Current Consumer Internet of Things (IoT) Landscape. Centre for Strategy & Evaluation (2020)"},{"key":"2_CR2","unstructured":"Holst, A.: \u2018IoT connected devices worldwide 2019\u20132030\u2019, Statista. https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/. Accessed 13 Dec 2021"},{"key":"2_CR3","unstructured":"OWASP, OWASP Internet of Things Project. https:\/\/wiki.owasp.org\/index.php\/OWASP_Internet_of_Things_Project#tab=Main. Accessed 14 Dec 14 2021"},{"key":"2_CR4","unstructured":"NETSCOUT, Threat Intelligence Report - Dawn of the Terrorbit Era. Accessed 13 Dec 2021. https:\/\/www.netscout.com\/sites\/default\/files\/2019-02\/SECR_001_EN-1901%20-%20NETSCOUT%20Threat%20Intelligence%20Report%202H%202018.pdf"},{"key":"2_CR5","unstructured":"Internet Society, The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things, Internet Society. https:\/\/www.internetsociety.org\/resources\/doc\/2019\/trust-opportunity-exploring-consumer-attitudes-to-iot\/. Accessed 13 Dec 2021"},{"issue":"7","key":"2_CR6","first-page":"73","volume":"18","author":"E Stavrou","year":"2020","unstructured":"Stavrou, E.: Back to basics: towards building societal resilience against a cyber pandemic. J. Systemics, Cybern. Inf. 18(7), 73\u201380 (2020)","journal-title":"J. Systemics, Cybern. Inf."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"NIST, NIST Cybersecurity Framework, NIST, February 05, 2018. https:\/\/www.nist.gov\/cyberframework\/framework. Accessed 30 May 2022","DOI":"10.6028\/NIST.CSWP.29.ipd"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-030-03638-6_18","volume-title":"Secure IT Systems","author":"K Maennel","year":"2018","unstructured":"Maennel, K., M\u00e4ses, S., Maennel, O.: Cyber hygiene: the big picture. In: Gruschka, N. (ed.) NordSec 2018. LNCS, vol. 11252, pp. 291\u2013305. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03638-6_18"},{"key":"2_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113160","volume":"128","author":"A Vishwanath","year":"2020","unstructured":"Vishwanath, A., et al.: Cyber hygiene: The concept, its measure, and its initial tests. Decis. Support Syst. 128, 113160 (2020). https:\/\/doi.org\/10.1016\/j.dss.2019.113160","journal-title":"Decis. Support Syst."},{"key":"2_CR10","unstructured":"ENISA, ENISA Threat Landscape 2021, ENISA. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2021. Accessed 14 Dec 2021"},{"key":"2_CR11","unstructured":"Vailshery, L., Sujay.: Average number of connected devices in UK households 2020. Statista. https:\/\/www.statista.com\/statistics\/1107269\/average-number-connected-devices-uk-house\/. Accessed 14 Dec 2021"},{"key":"2_CR12","unstructured":"Deloitte, How the pandemic has stress-tested the crowded digital home. https:\/\/www2.deloitte.com\/us\/en\/insights\/industry\/telecommunications\/connectivity-mobile-trends-survey.html. Accessed 13 Dec 2021"},{"key":"2_CR13","unstructured":"ENISA, Guidelines for Securing the Internet of Things, ENISA. https:\/\/www.enisa.europa.eu\/publications\/guidelines-for-securing-the-internet-of-things. Accessed 14 Dec 2021"},{"key":"2_CR14","unstructured":"Wikipedia, \u2018Mirai (malware)\u2019, Wikipedia. December. 14, 2021. https:\/\/en.wikipedia.org\/w\/index.php?title=Mirai(malware)&oldid=1060214070. Accessed 14 Dec 2021"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Joint Task Force on Cybersecurity E, Cybersecurity Curricula 2017. New York NY, USA: ACM 2018 https:\/\/doi.org\/10.1145\/3422808","DOI":"10.1145\/3422808"},{"key":"2_CR16","unstructured":"\u2018CyBOK\u2019, The Cyber Security Body Of Knowledge. https:\/\/www.cybok.org\/. Accessed 30 May 2022"},{"key":"2_CR17","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber security awareness campaigns: why do they fail to change behaviour? In: Proceedings of the International Conference on Cyber Security for Sustainable Society (CSSS, 2015), pp. 118\u2013131 Coventry, UK (2015)"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Goel, S., Williams, K., Dincelli, E.: Got phished? internet security and human vulnerability. J. Assoc. Inf. Syst. 18, 22\u201344 (2017). https:\/\/doi.org\/10.17705\/1jais.00447","DOI":"10.17705\/1jais.00447"},{"key":"2_CR19","unstructured":"ENISA, Cybersecurity Culture Guidelines: Behavioural Aspects of Cybersecurity, April 16, 2019. https:\/\/www.enisa.europa.eu\/publications\/cybersecurity-culture-guidelines-behavioural-aspects-of-cybersecurity. Accessed 14 Dec 2021"},{"key":"2_CR20","unstructured":"European Commission, Joint Research Centre, Baldini, G., Barrero, J., Draper, G., et al.: Cybersecurity, our digital anchor : a European perspective. In: Dewar, M., et al. (eds.) Publications Office (2020). https:\/\/data.europa.eu\/doi\/10.2760\/352218. Accessed 14 Dec 14 2021"},{"issue":"3","key":"2_CR21","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ICS-03-2018-0032","volume":"26","author":"A McCormac","year":"2018","unstructured":"McCormac, A., Calic, D., Parsons, K., Butavicius, M., Pattinson, M., Lillie, M.: The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. 26(3), 277\u2013289 (2018). https:\/\/doi.org\/10.1108\/ICS-03-2018-0032","journal-title":"Inf. Comput. Secur."},{"key":"2_CR22","unstructured":"European Court of Auditors, Challenges to effective EU cybersecurity policy (2019). https:\/\/www.eca.europa.eu\/Lists\/ECADocuments\/BRP_CYBERSECURITY\/BRP_CYBERSECURITY_EN.pdf. Accessed 14 Dec 2021"},{"key":"2_CR23","unstructured":"European Economic and Social Committee, \u2018Cybersecurity: Ensuring awareness and resilience of the private sector across Europe in face of mounting cyber risks\u2019. https:\/\/www.eesc.europa.eu\/sites\/default\/files\/files\/qe-01-18-515-en-n.pdf. Accessed 14 Dec 2021"},{"key":"2_CR24","unstructured":"ENISA, Raising awareness of cybersecurity: a key element of national cybersecurity strategies. Publications Office, LU (2021). https:\/\/data.europa.eu\/doi\/10.2824\/363629. Accessed May 30 2022"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Parrish, A., et al.: Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. In: Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, New York, NY, USA, Jul. 2018, pp. 36\u201354 (2018). https:\/\/doi.org\/10.1145\/3293881.3295778","DOI":"10.1145\/3293881.3295778"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Everything"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25222-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T19:44:21Z","timestamp":1701805461000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25222-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031252211","9783031252228"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25222-8_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IoECon","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Everything","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimar\u00e3es","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ioecon2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}