{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T16:03:59Z","timestamp":1743609839959,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031358210"},{"type":"electronic","value":"9783031358227"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35822-7_37","type":"book-chapter","created":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T23:04:57Z","timestamp":1688857497000},"page":"576-590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Capability Maturity Models for Targeted Cyber Security Training"],"prefix":"10.1007","author":[{"given":"Sabarathinam","family":"Chockalingam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Espen","family":"Nystad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Coralie","family":"Esnoul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,9]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","unstructured":"Breda, F., Barbosa, H., Morais, T.: Social engineering and cyber security. In: International Technology, Education and Development Conference, Valencia, Spain March (2017). https:\/\/doi.org\/10.21125\/inted.2017.1008","DOI":"10.21125\/inted.2017.1008"},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/fi11040089","volume":"11","author":"F Salahdine","year":"2019","unstructured":"Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11, 89 (2019)","journal-title":"Future Internet"},{"key":"37_CR3","first-page":"10","volume":"13","author":"R Richardson","year":"2017","unstructured":"Richardson, R., North, M.M.: Ransomware: evolution, mitigation, and prevention. Int. Manag. Rev. 13, 10 (2017)","journal-title":"Int. Manag. Rev."},{"key":"37_CR4","unstructured":"Hydro: Cyber-attack on Hydro. https:\/\/www.hydro.com\/en-NO\/media\/on-the-agenda\/cyber-attack\/"},{"key":"37_CR5","unstructured":"ICS-CERT: Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability (2009)"},{"key":"37_CR6","unstructured":"Beyer, R.E., Brummel, B.: Implementing effective cyber security training for end users of computer networks. In: Society for Human Resource Management and Society for Industrial and Organizational Psychology (2015)"},{"key":"37_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-319-67383-7_8","volume-title":"Software Process Improvement and Capability Determination","author":"AM Rea-Guaman","year":"2017","unstructured":"Rea-Guaman, A.M., San Feliu, T., Calvo-Manzano, J.A., Sanchez-Garcia, I.D.: Comparative study of cybersecurity capability maturity models. In: Mas, A., Mesquida, A., O\u2019Connor, R.V., Rout, T., Dorling, A. (eds.) SPICE 2017. CCIS, vol. 770, pp. 100\u2013113. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67383-7_8"},{"key":"37_CR8","unstructured":"Marshall, S., Mitchell, G.: An e-learning maturity model. In: Proceedings of the 19th Annual Conference of the Australian Society for Computers in Learning in Tertiary Education, Auckland, New Zealand (2002)"},{"key":"37_CR9","unstructured":"Paulk, M.C., Curtis, B., Chrissis, M.B.: Capability maturity model for software. Carnegie-Mellon University. Pittsburg, Software Engineering Institute (1991)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"von Wangenheim, C.G., Hauck, J.C.R., Salviano, C.F., von Wangenheim, A.: Systematic literature review of software process capability\/maturity models. In: Proceedings of International Conference on Software Process Improvement and Capability Determination (SPICE), Pisa, Italy (2010)","DOI":"10.1109\/MS.2010.96"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Barclay, C.: Sustainable security advantage in a changing environment: the cybersecurity capability maturity model (CM2). In: Proceedings of the 2014 ITU Kaleidoscope Academic Conference: Living in a Converged World-Impossible without Standards? (2014)","DOI":"10.1109\/Kaleidoscope.2014.6858466"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"White, G.B.: The community cyber security maturity model. In: 2011 IEEE International Conference on Technologies for Homeland Security (HST) (2011)","DOI":"10.1109\/THS.2011.6107866"},{"key":"37_CR13","doi-asserted-by":"publisher","first-page":"4895","DOI":"10.1007\/s11276-018-01920-5","volume":"26","author":"L Englbrecht","year":"2020","unstructured":"Englbrecht, L., Meier, S., Pernul, G.: Towards a capability maturity model for digital forensic readiness. Wirel. Netw. 26, 4895\u20134907 (2020)","journal-title":"Wirel. Netw."},{"key":"37_CR14","first-page":"206","volume":"16","author":"M Solar","year":"2013","unstructured":"Solar, M., Sabattin, J., Parada, V.: A maturity model for assessing the use of ICT in school education. J. Educ. Technol. Soc. 16, 206\u2013218 (2013)","journal-title":"J. Educ. Technol. Soc."},{"key":"37_CR15","first-page":"33","volume":"25","author":"GR Middleton","year":"2007","unstructured":"Middleton, G.R.: A maturity model for intelligence training and education. Am. Intell. J. 25, 33\u201345 (2007)","journal-title":"Am. Intell. J."},{"key":"37_CR16","unstructured":"Burley, D., et al.: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity (2017)"},{"key":"37_CR17","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1207\/s15430421tip4104_2","volume":"41","author":"DR Krathwohl","year":"2002","unstructured":"Krathwohl, D.R.: A Revision of bloom\u2019s taxonomy: an overview. Theor. Pract. 41, 212\u2013218 (2002)","journal-title":"Theor. Pract."},{"key":"37_CR18","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1177\/1052562903252515","volume":"27","author":"N Athanassiou","year":"2003","unstructured":"Athanassiou, N., McNett, J.M., Harvey, C.: Critical thinking in the management classroom: bloom\u2019s taxonomy as a learning tool. J. Manag. Educ. 27, 533\u2013555 (2003)","journal-title":"J. Manag. Educ."},{"key":"37_CR19","unstructured":"Sivaraman, S.I., Krishna, D.: Blooms taxonomy\u2013application in exam papers assessment. Chem. Eng. (VITU) 12, 32 (2015)"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35822-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:16:46Z","timestamp":1710361006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35822-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031358210","9783031358227"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35822-7_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}