{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T02:39:05Z","timestamp":1769395145467,"version":"3.49.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031717123","type":"print"},{"value":"9783031717130","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-71713-0_16","type":"book-chapter","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T22:03:09Z","timestamp":1725314589000},"page":"240-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Social Security Education"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-6786","authenticated-orcid":false,"given":"Vita Santa","family":"Barletta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5719-7447","authenticated-orcid":false,"given":"Danilo","family":"Caivano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4038-2317","authenticated-orcid":false,"given":"Christian","family":"Catalano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2007-9559","authenticated-orcid":false,"given":"Marco","family":"de Gemmis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9285-2555","authenticated-orcid":false,"given":"Donato","family":"Impedovo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,3]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","unstructured":"Aldawood, H., Skinner, G.: Educating and raising awareness on cyber security social engineering: a literature review. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), pp. 62\u201368 (2018). https:\/\/doi.org\/10.1109\/TALE.2018.8615162","DOI":"10.1109\/TALE.2018.8615162"},{"key":"16_CR2","unstructured":"Baldassarre, M.T., Barletta, V.S., Caivano, D., Raguseo, D., Scalera, M.: Teaching cyber security: the hack-space integrated model, vol.\u00a02315 (2019)"},{"key":"16_CR3","volume-title":"Moral Disengagement: How People Do Harm and Live with Themselves","author":"A Bandura","year":"2016","unstructured":"Bandura, A.: Moral Disengagement: How People Do Harm and Live with Themselves. Worth Publishers, New York (2016)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Barletta, V.S., Caivano, D., Calvano, M., Curci, A., Piccinno, A.: Craste: human factors and perception in cybersecurity education (2024). https:\/\/ceur-ws.org\/Vol-3713\/paper_7.pdf","DOI":"10.2139\/ssrn.4854627"},{"key":"16_CR5","doi-asserted-by":"publisher","unstructured":"Barletta, V.S., Caivano, D., De\u00a0Vincentiis, M., Pal, A., Volpe, F.: Automotive knowledge base for supporting vehicle-SOC analysts. In: 2023 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE), pp. 960\u2013965 (2023). https:\/\/doi.org\/10.1109\/MetroXRAINE58569.2023.10405622","DOI":"10.1109\/MetroXRAINE58569.2023.10405622"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Barletta, V.S., Calvano, M., Caruso, F., Curci, A., Piccinno, A.: Serious games for cybersecurity: how to improve perception and human factors. In: 2023 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering (MetroXRAINE), pp. 1110\u20131115 (2023). https:\/\/doi.org\/10.1109\/MetroXRAINE58569.2023.10405607","DOI":"10.1109\/MetroXRAINE58569.2023.10405607"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Barletta, V.S., Cassano, F., Pagano, A., Piccinno, A.: New perspectives for cyber security in software development: when end-user development meets artificial intelligence. In: 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 531\u2013534 (2022). https:\/\/doi.org\/10.1109\/3ICT56508.2022.9990622","DOI":"10.1109\/3ICT56508.2022.9990622"},{"issue":"2","key":"16_CR8","first-page":"117","volume":"99","author":"DM Beskow","year":"2019","unstructured":"Beskow, D.M., Carley, K.M.: Social cybersecurity: an emerging national security requirement. Mil. Rev. 99(2), 117\u2013127 (2019)","journal-title":"Mil. Rev."},{"key":"16_CR9","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-319-93372-6_42","volume-title":"Social, Cultural, and Behavioral Modeling","author":"KM Carley","year":"2018","unstructured":"Carley, K.M., Cervone, G., Agarwal, N., Liu, H.: Social cyber-security. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds.) SBP-BRiMS 2018. LNCS, vol. 10899, pp. 389\u2013394. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93372-6_42"},{"key":"16_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-319-98872-6_19","volume-title":"Methodologies and Intelligent Systems for Technology Enhanced Learning, 8th International Conference","author":"F Cassano","year":"2019","unstructured":"Cassano, F., Piccinno, A., Roselli, T., Rossano, V.: Gamification and learning analytics to improve engagement in university courses. In: Di Mascio, T., et al. (eds.) MIS4TEL 2018. AISC, vol. 804, pp. 156\u2013163. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-98872-6_19"},{"issue":"19","key":"16_CR11","doi-asserted-by":"publisher","first-page":"12249","DOI":"10.3390\/ijerph191912249","volume":"19","author":"A Concha-Salgado","year":"2022","unstructured":"Concha-Salgado, A., Ram\u00edrez, A., P\u00e9rez, B., P\u00e9rez-Luco, R., Garc\u00eda-Cueto, E.: Moral disengagement as a self-regulatory cognitive process of transgressions: psychometric evidence of the bandura scale in chilean adolescents. Int. J. Environ. Res. Public Health 19(19), 12249 (2022). https:\/\/doi.org\/10.3390\/ijerph191912249","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Corradini, I., Nardelli, E.: Building organizational risk culture in cyber security: the role of human factors. In: Advances in Intelligent Systems and Computing (2018)","DOI":"10.1007\/978-3-319-94782-2_19"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Corradini, I., Nardelli, E.: Developing digital awareness at school: a fundamental step for cybersecurity education. In: International Conference on Applied Human Factors and Ergonomics (2020)","DOI":"10.1007\/978-3-030-52581-1_14"},{"key":"16_CR14","unstructured":"Daniel, K.: Thinking, fast and slow (2017)"},{"issue":"1","key":"16_CR15","first-page":"80","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M., et al.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warfare Secur. Res. 1(1), 80 (2011)","journal-title":"Lead. Issues Inf. Warfare Secur. Res."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Khan, M.S., Siddiqui, S., Ferens, K.: A cognitive and concurrent cyber kill chain model. In: Computer and Network Security Essentials (2018)","DOI":"10.1007\/978-3-319-58424-9_34"},{"key":"16_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101731","volume":"92","author":"AR Neigel","year":"2020","unstructured":"Neigel, A.R., Claypoole, V.L., Waldfogle, G.E., Acharya, S., Hancock, G.M.: Holistic cyber hygiene education: accounting for the human factors. Comput. Secur. 92, 101731 (2020)","journal-title":"Comput. Secur."},{"key":"16_CR18","unstructured":"Parsons, K., McCormac, A., Butavicius, M.A.: Human factors and information security: individual, culture and security environment executive summary (2011)"},{"key":"16_CR19","unstructured":"Tarnowski, I.: How to use cyber kill chain model to build cybersecurity? (2017)"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Thackray, H., McAlaney, J., Dogan, H., Taylor, J., Richardson, C.: Social psychology: an under-used tool in cybersecurity. In: British Computer Society Conference on Human-Computer Interaction (2016)","DOI":"10.14236\/ewic\/HCI2016.64"},{"key":"16_CR21","doi-asserted-by":"publisher","unstructured":"Tioh, J.N., Mina, M., Jacobson, D.W.: Cyber security social engineers an extensible teaching tool for social engineering education and awareness. In: 2019 IEEE Frontiers in Education Conference (FIE), pp.\u00a01\u20135 (2019). https:\/\/doi.org\/10.1109\/FIE43999.2019.9028369","DOI":"10.1109\/FIE43999.2019.9028369"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-40511-2_17","volume-title":"Availability, Reliability, and Security in Information Systems and HCI","author":"IA T\u00f8ndel","year":"2013","unstructured":"T\u00f8ndel, I.A., Mostue, B.A., Jaatun, M.G., Kj\u00f8lle, G.: Towards improved understanding and holistic management of the cyber security challenges in power transmission systems. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8127, pp. 240\u2013255. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40511-2_17"},{"key":"16_CR23","doi-asserted-by":"publisher","unstructured":"Santa Barletta, V., et al.: CSE4IA 2024-2nd International Workshop on Cyber Security Education for Industry and Academia, pp.\u00a01\u20134. ACM International Conference Proceeding Series, ACM (2024). https:\/\/doi.org\/10.1145\/3656650.3660536","DOI":"10.1145\/3656650.3660536"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Yadav, T.K., Rao, A.M.: Technical aspects of cyber kill chain. arXiv abs\/1606.03184 (2015)","DOI":"10.1007\/978-3-319-22915-7_40"}],"container-title":["Lecture Notes in Computer Science","Extended Reality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71713-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T22:05:19Z","timestamp":1725314719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71713-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031717123","9783031717130"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71713-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"3 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"XR Salento","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Extended Reality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lecce","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"avr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.xrsalento.it\/index","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}