{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:54:16Z","timestamp":1743036856312,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031725623"},{"type":"electronic","value":"9783031725630"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72563-0_10","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:35:11Z","timestamp":1732682111000},"page":"130-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Harnessing the Right Talent for SETA Programs: Cybersecurity Roles and Competencies that Make a Difference"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5703-5000","authenticated-orcid":false,"given":"Apostolos","family":"Charalambous","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-4942","authenticated-orcid":false,"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"10_CR1","unstructured":"ENISA Threat Landscape 2023. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2023. Accessed 10 May 2024"},{"key":"10_CR2","unstructured":"TrendMicro: Calibrating Expansion \u2013 2023 Annual Cybersecurity Report. https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Calibrating_Expansion_2023_Annual_Cybersecurity_Report.pdf. Accessed 10 May 2024"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Uchendu, B.,\u00a0Nurse, R.C.,\u00a0Bada, M.,\u00a0Furnell, S.: Developing a cyber security culture: Current practices and future needs, Comput. Secur. 109 (2021)","DOI":"10.1016\/j.cose.2021.102387"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Gundu, T.: Learn, unlearn and relearn: adaptive cybersecurity culture model. In: 19th International Conference on Cyber Warfare and Security (ICCWS) (2024)","DOI":"10.34190\/iccws.19.1.2177"},{"issue":"7","key":"10_CR5","first-page":"73","volume":"18","author":"E Stavrou","year":"2020","unstructured":"Stavrou, E.: Back to basics: towards building societal resilience against a cyber pandemic. J. Syst. Cybern. Inf. (JSCI) 18(7), 73\u201380 (2020)","journal-title":"J. Syst. Cybern. Inf. (JSCI)"},{"key":"10_CR6","unstructured":"WEF: The Cyber Resilience Index: Advancing Organizational Cyber Resilience. https:\/\/www3.weforum.org\/docs\/WEF_Cyber_Resilience_Index_2022.pdf"},{"issue":"8","key":"10_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1108\/ITP-07-2022-0515","volume":"36","author":"A Alyami","year":"2023","unstructured":"Alyami, A., Sammon, D., Neville, K., Mahony, C.: The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model. Inf. Technol. People 36(8), 94\u2013125 (2023)","journal-title":"Inf. Technol. People"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Sirur, S.,\u00a0Nurse,\u00a0J.R.C., Webb, H.: Are we there yet? understanding the challenges faced in complying with the general data protection regulation (GDPR). In: 2nd International Workshop on Multimedia Privacy and Security, pp. 88\u201395. ACM (2018)","DOI":"10.1145\/3267357.3267368"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-031-12172-2_12","volume-title":"Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6\u20138, 2022, Proceedings","author":"EN Mwim","year":"2022","unstructured":"Mwim, E.N., Mtsweni, J.: Systematic review of factors that influence the cybersecurity culture. In: Clarke, N., Furnell, S. (eds.) Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6\u20138, 2022, Proceedings, pp. 147\u2013172. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-12172-2_12"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-58561-6_1","volume-title":"Proceedings of the 20th International Conference on Computing and Information Technology (IC2IT 2024)","author":"A Kaewsa-ard","year":"2024","unstructured":"Kaewsa-ard, A., Utakrit, N.: Identifying key issues to enhance the cybersecurity awareness strategy within organizations. In: Meesad, P., Sodsee, S., Jitsakul, W., Tangwannawit, S. (eds.) Proceedings of the 20th International Conference on Computing and Information Technology (IC2IT 2024), pp. 1\u201311. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58561-6_1"},{"key":"10_CR11","unstructured":"ENISA: European Cybersecurity Skills Framework. https:\/\/www.enisa.europa.eu\/topics\/education\/european-cybersecurity-skills-framework. Accessed 06 Apr 2023"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Huang, K., Pearlson, K.: For what technology can\u2019t fix: building a model of organizational cybersecurity culture. In: Proceeding of the 52nd Hawaii International Conference on System Sciences, pp. 6398\u20136407 (2019)","DOI":"10.24251\/HICSS.2019.769"},{"key":"10_CR13","unstructured":"Hulatt, D., and Stavrou, E.: The development of a multidisciplinary cybersecurity workforce: an investigation. In: 17th International Symposium on Human Aspects of Information Security & Assurance (HAISA) (2018)"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Furnell, S., Langner, G., Tokola, T., Andriessen, J., Quirchmayr, G., Luciano, C.: Collaborative cybersecurity learning: establishing educator and learner expectations and requirements. In: Drevin, L., Miloslavskaya, N., Leung, W.S., von Solms, S. (eds.) WISE 2022, vol. 650. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08172-9_4","DOI":"10.1007\/978-3-031-08172-9_4"},{"key":"10_CR15","unstructured":"(ISC)2 How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce (2023)"},{"key":"10_CR16","unstructured":"ISACA State of Cybersecurity 2023 Global Update on Workforce Efforts, Resources and Cyberoperations (2023)"},{"issue":"4","key":"10_CR17","first-page":"4","volume":"19","author":"D Kirova","year":"2018","unstructured":"Kirova, D., Baum\u00f6l, U.: Factors that affect the success of security education, training, and awareness programs: a literature review. J. Inf. Technol. Theory Appl. (JITTA) 19(4), 4 (2018)","journal-title":"J. Inf. Technol. Theory Appl. (JITTA)"},{"key":"10_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102404","volume":"109","author":"S Hu","year":"2021","unstructured":"Hu, S., Hsu, C., Zhou, Z.: The impact of SETA event attributes on employees\u2019 security-related intentions: an event system theory perspective. Comput. Secur. 109, 102404 (2021)","journal-title":"Comput. Secur."},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"102090","DOI":"10.1016\/j.cose.2020.102090","volume":"100","author":"M Alshaikh","year":"2021","unstructured":"Alshaikh, M., Maynard, S.B., Ahmad, A.: Applying social marketing to evaluate current security education training and awareness programs in organisations. Comput. Secur. 100, 102090 (2021)","journal-title":"Comput. Secur."},{"issue":"1","key":"10_CR20","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.compedu.2008.06.011","volume":"52","author":"RS Shaw","year":"2009","unstructured":"Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.-J.: The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(1), 92\u2013100 (2009)","journal-title":"Comput. Educ."},{"key":"10_CR21","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of Information Security, 7 edn. Cengage (2004)"},{"key":"10_CR22","unstructured":"Heikka, J. A constructive approach to information systems security training: an action research experience, learning from the past & charting the future of the discipline. In: 14th Americas Conference on Information Systems, Toronto, Ontario, Canada, August (2008)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Piki, A., Stavrou, E., Procopiou, A., Demosthenous, A. Fostering cybersecurity awareness and skills development through digital game-based learning. In: 10th International Conference on Behavioural and Social Computing (BESC), Larnaca (2023)","DOI":"10.1109\/BESC59560.2023.10386988"},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1108\/INTR-06-2022-0455","volume":"34","author":"S Hu","year":"2024","unstructured":"Hu, S., Hsu, C., Zhou, Z.: Understanding employees\u2019 perceptions of SETA events: the role of pedagogical and communication approaches. Internet Res. 34(2), 294\u2013319 (2024)","journal-title":"Internet Res."},{"key":"10_CR25","unstructured":"Offor, P., Tejay, G.: Information systems security training in organizations: andragogical perspective. In: 20th Americas Conference on Information Systems (AIS) (2014)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Charalambous, A., Stavrou, E.: Building societal resilience against social engineering attacks: unleashing the power of instructional design and microtargeting. In: 16th Annual International Conference of Education, Research and Innovation (ICERI), Seville (2023)","DOI":"10.21125\/iceri.2023.1368"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","volume":"45","author":"L Li","year":"2019","unstructured":"Li, L., He, W., Xu, L., Ash, I., Anwar, M., Yuan, X.: Investigating the impact of cybersecurity policy awareness on employees\u2019 cybersecurity behavior. Int. J. Inf. Manag. 45, 13\u201324 (2019)","journal-title":"Int. J. Inf. Manag."},{"key":"10_CR28","unstructured":"Alshaikh, M., Naseer, H., Ahmad, A., Maynard, S.B: Toward sustainable behaviour change: an approach for cyber security education training and awareness. In: ECIS 2019 (2019)"},{"key":"10_CR29","doi-asserted-by":"publisher","first-page":"103630","DOI":"10.1016\/j.cose.2023.103630","volume":"137","author":"J K\u00e4vrestad","year":"2024","unstructured":"K\u00e4vrestad, J., Rambusch, J., Nohlberg, M.: Design principles for cognitively accessible cybersecurity training. Comput. Secur. 137, 103630 (2024)","journal-title":"Comput. Secur."},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Stavrou, E.: Planning for professional development in cybersecurity: a new curriculum design. In: IFIP International Symposium on Human Aspects of Information Security & Assurance (HAISA), Kent, UK (2023)","DOI":"10.1007\/978-3-031-38530-8_8"},{"key":"10_CR31","doi-asserted-by":"publisher","unstructured":"Stavrou E., Piki, A.: Cultivating self-efficacy to empower professionals\u2019 re-up skilling in cybersecurity. In: Information and Computer Security (ICS) (2024). https:\/\/doi.org\/10.1108\/ICS-02-2024-0038","DOI":"10.1108\/ICS-02-2024-0038"},{"key":"10_CR32","unstructured":"WEF: Reskilling Revolution 2030 - Global Skills Taxonomy. https:\/\/www1.reskillingrevolution2030.org\/skills-taxonomy\/index.html. Accessed 10 May 2024"},{"key":"10_CR33","unstructured":"WEF: Education 4.0 Learning Taxonomy. https:\/\/www1.reskillingrevolution2030.org\/education-taxonomy\/index.html. Accessed 10 May 2024"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Karimnia, R., Maennel, K., Shahin, M.: Culturally-sensitive cybersecurity awareness program design for Iranian high-school students. In: 8th International Conference on Information Systems Security and Privacy (ICISSP) (2022)","DOI":"10.5220\/0010824800003120"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72563-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:09:38Z","timestamp":1732684178000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72563-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031725623","9783031725630"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72563-0_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sk\u00f6vde","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}