{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:33:20Z","timestamp":1766050400214,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031385292"},{"type":"electronic","value":"9783031385308"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-38530-8_1","type":"book-chapter","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T20:38:17Z","timestamp":1690317497000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Combating Digital Exclusion with Cybersecurity Training \u2013 An Interview Study with Swedish Seniors"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[]},{"given":"David","family":"Lindvall","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5962-9995","authenticated-orcid":false,"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"key":"1_CR1","unstructured":"OECD, Hows Life in the Digital Age? (2019)"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-48070-7_5","volume-title":"Digitalisation and Human Security","author":"KS Gulbrandsen","year":"2020","unstructured":"Gulbrandsen, K.S., Sheehan, M.: Social exclusion as human insecurity: a human cybersecurity framework applied to the European high north. In: Salminen, M., Zojer, G., Hossain, K. (eds.) Digitalisation and Human Security, pp. 113\u2013140. Springer, Heidelberg (2020). https:\/\/doi.org\/10.1007\/978-3-030-48070-7_5"},{"key":"1_CR3","unstructured":"Holgersson, J., S\u00f6derstr\u00f6m, E.: Bridging the gap: exploring elderly citizens\u2019 perceptions of digital exclusion. In: 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, 8\u201314 June 2019. Association for Information Systems (2019)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Aissaoui, N.: The digital divide: a literature review and some directions for future research in light of COVID-19. Global Knowledge, Memory and Communication (2021)","DOI":"10.1108\/GKMC-06-2020-0075"},{"key":"1_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-030-81111-2_2","volume-title":"Human Aspects of Information Security and Assurance. HAISA 2021","author":"J Holgersson","year":"2021","unstructured":"Holgersson, J., K\u00e4vrestad, J., Nohlberg, M.: Cybersecurity and digital exclusion of seniors: what do they fear? In: Furnell, S., Clarke, N. (eds.) Human Aspects of Information Security and Assurance. HAISA 2021. IFIP Advances in Information and Communication Technology, vol. 613, pp. 12\u201321. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81111-2_2"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Trautman, L.J., Hussein, M., Opara, E.U., Molesky, M.J., Rahman, S.: Posted: no phishing (2020)","DOI":"10.2139\/ssrn.3549992"},{"issue":"5","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.17762\/turcomat.v12i5.2180","volume":"12","author":"NHN Zulkipli","year":"2021","unstructured":"Zulkipli, N.H.N.: Synthesizing cybersecurity issues and challenges for the elderly. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(5), 1775\u20131781 (2021)","journal-title":"Turk. J. Comput. Math. Educ. (TURCOMAT)"},{"issue":"9","key":"1_CR8","first-page":"114","volume":"20","author":"MI Alwanain","year":"2020","unstructured":"Alwanain, M.I.: Phishing awareness and elderly users in social media. Int. J. Comput. Sci. Netw. Secur. 20(9), 114\u2013119 (2020)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Aldawood, H., Skinner, G.: Educating and raising awareness on cyber security social engineering: a literature review. In: Proceedings of 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, pp. 62\u201368. IEEE (2018)","DOI":"10.1109\/TALE.2018.8615162"},{"issue":"4","key":"1_CR10","first-page":"752","volume":"62","author":"S Hu","year":"2022","unstructured":"Hu, S., Hsu, C., Zhou, Z.: Security education, training, and awareness programs: literature review. J. Comput. Inf. Syst. 62(4), 752\u2013764 (2022)","journal-title":"J. Comput. Inf. Syst."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Sharma, K., Zhan, X., Nah, F.F.-H., Siau, K., Cheng, M.X.: Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity. Organ. Cybersecur. J.: Pract. Process People 1(1) (2021)","DOI":"10.1108\/OCJ-03-2021-0009"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1177\/0018720818810942","volume":"61","author":"A Xiong","year":"2019","unstructured":"Xiong, A., Proctor, R.W., Yang, W., Li, N.: Embedding training within warnings improves skills of identifying phishing webpages. Hum. Factors 61(4), 577\u2013595 (2019)","journal-title":"Hum. Factors"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems (2007)","DOI":"10.1145\/1240624.1240760"},{"issue":"3","key":"1_CR14","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Jin, G., Tu, M., Kim, T.-H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education (2018)","DOI":"10.1145\/3159450.3159591"},{"issue":"5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1108\/AJIM-09-2018-0213","volume":"71","author":"SF Ma","year":"2019","unstructured":"Ma, S.F., Zhang, S.X., Li, G., Wu, Y.: Exploring information security education on social media use Perspective of uses and gratifications theory. Aslib J. Inf. Manag. 71(5), 618\u2013636 (2019)","journal-title":"Aslib J. Inf. Manag."},{"key":"1_CR17","unstructured":"Oates, B.J., Griffiths, M., McLean, R.: Researching Information Systems and Computing. Sage (2022)"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11648\/j.ajtas.20160501.11","volume":"5","author":"I Etikan","year":"2016","unstructured":"Etikan, I., Musa, S.A., Alkassim, R.S.: Comparison of convenience sampling and purposive sampling. Am. J. Theor. Appl. Stat. 5(1), 1\u20134 (2016)","journal-title":"Am. J. Theor. Appl. Stat."},{"key":"1_CR20","unstructured":"Vetenskapsr\u00e5det, Good Research Practice (2017)"},{"issue":"4","key":"1_CR21","doi-asserted-by":"publisher","first-page":"104","DOI":"10.3390\/fi14040104","volume":"14","author":"J K\u00e4vrestad","year":"2022","unstructured":"K\u00e4vrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R., Furnell, S.: Evaluation of contextual and game-based training for phishing detection. Future Internet 14(4), 104 (2022)","journal-title":"Future Internet"},{"key":"1_CR22","unstructured":"K\u00e4vrestad, J., Friman, E., Bohlander, J., Nohlberg, M.: Can Johnny actually like security training? In: Proceedings of the 6th International Workshop on Socio-Technical Perspective in IS development. CEUR-WS (2020)"},{"key":"1_CR23","unstructured":"Ng, I.Y., Sun, L.S., Pang, N., Lim, D., Soh, G.: From digital exclusion to universal digital access in Singapore. Faculty of Arts and Social Sciences, National University of Singapore, Singapore (2021)"},{"issue":"5","key":"1_CR24","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1002\/hbe2.291","volume":"3","author":"B Morrison","year":"2021","unstructured":"Morrison, B., Coventry, L., Briggs, P.: How do older adults feel about engaging with cyber-security? Hum. Behav. Emerg. Technol. 3(5), 1033\u20131049 (2021)","journal-title":"Hum. Behav. Emerg. Technol."}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-38530-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T20:38:29Z","timestamp":1690317509000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-38530-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031385292","9783031385308"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-38530-8_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"69% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.93","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}