{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:24Z","timestamp":1742912484199,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031725586"},{"type":"electronic","value":"9783031725593"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72559-3_12","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:25:06Z","timestamp":1732681506000},"page":"165-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5263-3967","authenticated-orcid":false,"given":"Nathan","family":"Monsoro","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7907-3170","authenticated-orcid":false,"given":"C\u00e9lia","family":"Martinie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5381-971X","authenticated-orcid":false,"given":"Philippe","family":"Palanque","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2856-7537","authenticated-orcid":false,"given":"Th\u00e9o","family":"Sauban\u00e8re","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Allen, W.C.: Overview and evolution of the ADDIE training system. Adv. Dev. Hum. Resour. 8(4), 430\u2013441 (2006). https:\/\/doi.org\/10.1177\/1523422306292942","key":"12_CR1","DOI":"10.1177\/1523422306292942"},{"unstructured":"APWG, Phishing activity trends report, 4th quarter 2023. https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2023.pdf. Accessed Mar 2024","key":"12_CR2"},{"unstructured":"Branson, R.K.: The interservice procedures for instructional systems development. Educ. Technol. 18(3), 11\u201314 (1978). http:\/\/www.jstor.org\/stable\/44418942","key":"12_CR3"},{"doi-asserted-by":"crossref","unstructured":"Branson, R.K.: Interservice procedures for instructional systems development: executive summary and model. Center for Educational Technology, Florida State University, Tallahassee, Fla (1975). https:\/\/apps.dtic.mil\/sti\/citations\/tr\/ADA019486","key":"12_CR4","DOI":"10.21236\/ADA023892"},{"doi-asserted-by":"publisher","unstructured":"Chowdhury, N., Katsikas, S., Gkioulos, V.: Modeling effective cybersecurity training frameworks: a delphi method-based study. Comput. Secur. 113, 102551 (2022). ISSN 0167-4048. https:\/\/doi.org\/10.1016\/j.cose.2021.102551","key":"12_CR5","DOI":"10.1016\/j.cose.2021.102551"},{"doi-asserted-by":"crossref","unstructured":"Cockburn, A., Gutwin, C., Scarr, J., Malacria, S.: Supporting novice to expert transitions in user interfaces. ACM Comput. Surv. 47(2), Article no. 31, 36 p. (2014)","key":"12_CR6","DOI":"10.1145\/2659796"},{"doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the CHI 2006, pp. 581\u2013590. ACM, New York (2006). https:\/\/doi.org\/10.1145\/1124772.1124861","key":"12_CR7","DOI":"10.1145\/1124772.1124861"},{"doi-asserted-by":"publisher","unstructured":"Gupta, S., Singhal, A., Kapoor, A.: A literature survey on social engineering attacks: Phishing attack. In: Proceedings of the ICCCA 2016, pp. 537\u2013540 (2016). https:\/\/doi.org\/10.1109\/CCAA.2016.7813778","key":"12_CR8","DOI":"10.1109\/CCAA.2016.7813778"},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1207\/s15326985ep3102_2","volume":"31","author":"T de Jong","year":"1996","unstructured":"de Jong, T., Ferguson-Hessler, M.G.: Types and qualities of knowledge. Educ. Psychol. 31(2), 105\u2013113 (1996)","journal-title":"Educ. Psychol."},{"doi-asserted-by":"crossref","unstructured":"Karimnia, R., Maennel, K., Shahin, M.: Culturally-sensitive cybersecurity awareness program design for Iranian high-school students. In: ICISSP, pp. 121\u2013132, February 2022","key":"12_CR10","DOI":"10.5220\/0010824800003120"},{"doi-asserted-by":"publisher","unstructured":"K\u00e4vrestad, J., Fallatah, W., Furnell, S.: Cybersecurity training acceptance: a literature review. In: Furnell, S., Clarke, N. (eds.) HAISA 2023. IFIPAICT, vol. 674, pp. 53\u201363. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38530-8_5","key":"12_CR11","DOI":"10.1007\/978-3-031-38530-8_5"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1080\/19393555.2023.2222713","volume":"33","author":"J K\u00e4vrestad","year":"2024","unstructured":"K\u00e4vrestad, J., Furnell, S., Nohlberg, M.: User perception of context-based micro-training \u2013 a method for cybersecurity training. Inf. Secur. J.  Glob. Perspect. 33(2), 121\u2013137 (2024). https:\/\/doi.org\/10.1080\/19393555.2023.2222713","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"unstructured":"International Standard Organization. ISO 9241-11:2018. Ergonomics of Human-System Interaction \u2014 Part 11: Usability: Definitions and Concepts, 2nd edn. (2018)","key":"12_CR13"},{"doi-asserted-by":"crossref","unstructured":"Lallai, G., Zedda, G.L., Martinie, C., Palanque, P., Pisano, M., Spano, D.: Engineering task-based augmented reality guidance: application to the training of aircraft flight procedures. Interact. Comput. 33(1), 17\u201339 (2021)","key":"12_CR14","DOI":"10.1093\/iwcomp\/iwab007"},{"doi-asserted-by":"publisher","unstructured":"Jampen, D., G\u00fcr, G., Sutter, T., et al.: Don\u2019t click: towards an effective anti-phishing training. A comparative literature review. Hum. Cent. Comput. Inf. Sci. 10, 33 (2020). https:\/\/doi.org\/10.1186\/s13673-020-00237-7","key":"12_CR15","DOI":"10.1186\/s13673-020-00237-7"},{"doi-asserted-by":"publisher","unstructured":"Martinie, C., Naqvi, B.: On using the task models for validation and evolution of usable security design patterns. In: Furnell, S., Clarke, N. (eds.) HAISA 2023. IFIPAICT, vol. 674, pp. 405\u2013417. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38530-8_32","key":"12_CR16","DOI":"10.1007\/978-3-031-38530-8_32"},{"doi-asserted-by":"publisher","unstructured":"Martinie, C., Navarre, D., Palanque, P., Barboni, E., Steere, S.: Engineering operations-based training. Proc. ACM Hum. Comput. Interact. 6(EICS), Article no. 164, 25 p. (2022). https:\/\/doi.org\/10.1145\/3534518","key":"12_CR17","DOI":"10.1145\/3534518"},{"doi-asserted-by":"publisher","unstructured":"Martinie, C., Palanque, P., Barboni, E.: Principles of task analysis and modeling: understanding activity, modeling tasks, and analyzing models. In: Vanderdonckt, J., Palanque, P., Winckler, M. (eds.) Handbook of Human Computer Interaction, pp. 1\u201340. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-319-27648-9_57-1","key":"12_CR18","DOI":"10.1007\/978-3-319-27648-9_57-1"},{"doi-asserted-by":"publisher","unstructured":"Martinie, C., Palanque, P., Navarre, D., Winckler, M., Poupart, E.: Model-based training: an approach supporting operability of critical interactive systems. In: Proceedings of the EICS 2011, pp. 53\u201362. ACM (2011). https:\/\/doi.org\/10.1145\/1996461.1996495","key":"12_CR19","DOI":"10.1145\/1996461.1996495"},{"doi-asserted-by":"publisher","unstructured":"Martinie, C., Palanque, P., Ragosta, M., Fahssi, R.: Extending procedural task models by systematic explicit integration of objects, knowledge and information. In: Proceedings of the ECCE 2013, pp. 1\u201310, Article no. 23. ACM (2013). https:\/\/doi.org\/10.1145\/2501907.2501954","key":"12_CR20","DOI":"10.1145\/2501907.2501954"},{"doi-asserted-by":"publisher","unstructured":"Pr\u00fcmmer, J., van Steen, T., van den Berg, B.: A systematic review of current cybersecurity training methods. Comput. Secur. 136, 103585 (2024). ISSN 0167-4048. https:\/\/doi.org\/10.1016\/j.cose.2023.103585","key":"12_CR21","DOI":"10.1016\/j.cose.2023.103585"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"MA Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the \u2018weakest link\u2019 \u2014 a human\/computer interaction approach to usable and effective security. BT Technol. J. 19, 122\u2013131 (2001). https:\/\/doi.org\/10.1023\/A:1011902718709","journal-title":"BT Technol. J."},{"unstructured":"Staggs, J., Beyer, R., Mol, M., Fisher, M. Brummel, B.J., Hale, J.: A perceptual taxonomy of contextual cues for cyber trust. In: Proceedings of the CISSE, pp. 152\u2013169 (2014). https:\/\/cisse.info\/journal\/index.php\/cisse\/article\/view\/9\/CISSE_v02_i01_a01.pdf","key":"12_CR23"},{"doi-asserted-by":"crossref","unstructured":"Stockett, J.: Dr. InfoSec: how to teach your community to stop worrying and love 2-factor authentication. In: 2018 Proceedings of the SIGUCCS 2018, pp. 21\u201323. ACM (2018)","key":"12_CR24","DOI":"10.1145\/3235715.3235753"},{"doi-asserted-by":"publisher","unstructured":"Wash, R.: How experts detect phishing scam emails.  Proc. ACM Hum. Comput. Interact. 4(CSCW2), Article 160 no. (2020). https:\/\/doi.org\/10.1145\/3415231","key":"12_CR25","DOI":"10.1145\/3415231"},{"issue":"1","key":"12_CR26","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TE.2021.3086025","volume":"65","author":"MD Workman","year":"2022","unstructured":"Workman, M.D., Lu\u00e9vanos, J.A., Mai, B.: A study of cybersecurity education using a present-test-practice-assess model. IEEE Trans. Educ. 65(1), 40\u201345 (2022). https:\/\/doi.org\/10.1109\/TE.2021.3086025","journal-title":"IEEE Trans. Educ."},{"doi-asserted-by":"crossref","unstructured":"Yan, Z., et al.: Finding the weakest links in the weakest link: how well do undergraduate students make cybersecurity judgment? Comput. Hum. Behav. 84, 375\u2013382 (2018)","key":"12_CR27","DOI":"10.1016\/j.chb.2018.02.019"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72559-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:06:25Z","timestamp":1732683985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72559-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031725586","9783031725593"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72559-3_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sk\u00f6vde","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}