{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:59:17Z","timestamp":1743019157776,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031725623"},{"type":"electronic","value":"9783031725630"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72563-0_4","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:35:36Z","timestamp":1732682136000},"page":"47-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Useful but\u00a0for\u00a0Someone Else - An\u00a0Explorative Study on\u00a0Cybersecurity Training Acceptance"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1436-2980","authenticated-orcid":false,"given":"Erik","family":"Bergstr\u00f6m","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-4942","authenticated-orcid":false,"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5962-9995","authenticated-orcid":false,"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"4_CR1","unstructured":"Al-Daeef, M.M., Basir, N., Saudi, M.M.: Security awareness training: a review. In: Proceedings of the World Congress on Engineering, vol.\u00a01, pp. 5\u20137 (2017)"},{"issue":"11","key":"4_CR2","first-page":"6374","volume":"7","author":"AF Al-Otaibi","year":"2020","unstructured":"Al-Otaibi, A.F., Alsuwat, E.S.: A study on social engineering attacks: phishing attack. Int. J. Recent Adv. Multidiscip. Res 7(11), 6374\u20136380 (2020)","journal-title":"Int. J. Recent Adv. Multidiscip. Res"},{"issue":"1","key":"4_CR3","first-page":"55","volume":"19","author":"Y Al-Slais","year":"2022","unstructured":"Al-Slais, Y., El-Medany, W.M.: User-centric adaptive password policies to combat password fatigue. Int. Arab J. Inf. Technol. 19(1), 55\u201362 (2022)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Aldawood, H., Skinner, G.: Challenges of implementing training and awareness programs targeting cyber security social engineering. In: Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019, pp. 111\u2013117 (2019), https:\/\/doi.org\/10.1109\/CCC.2019.00004. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85073880632&doi=10.1109%2fCCC.2019.00004 &partnerID=40 &md5=a2c495392d520e4826a258997f7db3ea","DOI":"10.1109\/CCC.2019.00004"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Human Behav. 69, 437\u2013443 (2017). ISSN 0747-5632. https:\/\/doi.org\/10.1016\/j.chb.2016.12.040","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint (2019). https:\/\/doi.org\/10.48550\/arXiv.1901.02672","DOI":"10.48550\/arXiv.1901.02672"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Burns, A.J., Johnson, M.E., Caputo, D.D.: Spear phishing in a barrel: insights from a targeted phishing campaign. J. Organ. Comput. Electron. Commer. 29(1), 24\u201339 (2019). https:\/\/doi.org\/10.1080\/10919392.2019.1552745. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85061751561&doi=10.1080%2f10919392.2019.1552745 &partnerID=40 &md5=cfbb559d76773624c9cff6f180813ab8","DOI":"10.1080\/10919392.2019.1552745"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Deng, G., Yu, X., Guo, H.: Efficient password guessing based on a password segmentation approach. In: 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings (2019). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013139. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85081984230&doi=10.1109%2fGLOBECOM38437.2019.9013139 &partnerID=40 &md5=c9198ed26cec939cc9415a24289ae158","DOI":"10.1109\/GLOBECOM38437.2019.9013139"},{"key":"4_CR9","unstructured":"ENISA: Threat Landscape (2022). https:\/\/www.enisa.europa.eu\/topics\/cyber-threats\/threats-and-trends"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(20)30006-3","volume":"2020","author":"J Fielding","year":"2020","unstructured":"Fielding, J.: The people problem: how cyber security\u2019s weakest link can become a formidable asset. Comput. Fraud Secur. 2020(1), 6\u20139 (2020)","journal-title":"Comput. Fraud Secur."},{"key":"4_CR11","unstructured":"Grassi, P., Fenton, J., Newton, E., Perlner, R., Regenscheid, A., Burr, W., Richer, J., Lefkovitz, N., Danker, J., Choong, Y.Y.: NIST Special Publication 800-63b: Digital Identity Guidelines (2017), publisher: National Institute of Standards and Technology (NIST)"},{"key":"4_CR12","unstructured":"Haney, J.M., Lutters, W.G.: \u201cIt\u2019s Scary... It\u2019s Confusing... It\u2019s Dull\": how cybersecurity advocates overcome negative perceptions of security. In: SOUPS@ USENIX Security Symposium, pp. 411\u2013425 (2018)"},{"key":"4_CR13","unstructured":"Hunt, T.: Password reuse, credential stuffing and another billion records in Have I been pwned (2017). https:\/\/www.troyhunt.com\/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned\/"},{"key":"4_CR14","unstructured":"IBM: Cost of a data breach report 2023 (2023). https:\/\/www.ibm.com\/reports\/data-breach"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Joinson, A., van Steen, T.: Human aspects of cyber security: behaviour or culture change? Cyber Secur. Peer-Rev. J. 1(4), 351\u2013360 (2018). ISSN 2398-5100","DOI":"10.69554\/KMOS3545"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"K\u00e4vrestad, J., Gellerstedt, M., Nohlberg, M., Rambusch, J.: Survey of users\u2019 willingness to adopt and pay for cybersecurity training. In: Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, 6\u20138 July 2022, Proceedings, pp. 14\u201323, Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-12172-2_2","DOI":"10.1007\/978-3-031-12172-2_2"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"K\u00e4vrestad, J., Nohlberg, M., Furnell, S.: A taxonomy of SETA methods and linkage to delivery preferences. In: The Data base for Advances in Information Systems. Association for Computing Machinery (ACM) (2023)","DOI":"10.1145\/3631341.3631348"},{"key":"4_CR18","unstructured":"Landress, A.D., Parrish, J., Terrell, S.: Resiliency as an outcome of SETA programs. In: AMCIS 2017 - America\u2019s Conference on Information Systems: A Tradition of Innovation, vol. 2017-August (2017). https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85048443542&partnerID=40 &md5=ba43367470e43169e37aa0e2bff45fb7"},{"key":"4_CR19","unstructured":"Mukaka, M.M.: A guide to appropriate use of correlation coefficient in medical research. Malawi Med. J. 24(3), 69\u201371 (2012). ISSN 1995-7262"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Nagyfejeo, E., Von\u00a0Solms, B.: Why do national cybersecurity awareness programmes often fail? section ii: studies and analysis of cybercrime phenomenon. Int. J. Inf. Secur. Cybercrime 9(2), 18\u201327 (2020). https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/ijisc9&i=86","DOI":"10.19107\/IJISC.2020.02.03"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Norman, G.: Likert scales, levels of measurement and the \u201claws\u201d of statistics. Adv. Health Sci. Educ. 15(5), 625\u2013632 (2010). ISSN 1382-4996. https:\/\/doi.org\/10.1007\/s10459-010-9222-y","DOI":"10.1007\/s10459-010-9222-y"},{"key":"4_CR22","unstructured":"Nurse, J.R.C.: Cybersecurity awareness. In: Encyclopedia of Cryptography, Security and Privacy. Springer, Heidelberg (2021). ISBN 978-3-642-27739-9"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Piki, A., Stavrou, E., Procopiou, A., Demosthenous, A.: Fostering cybersecurity awareness and skills development through digital game-based learning. In: 2023 10th International Conference on Behavioural and Social Computing (BESC), pp. 1\u20139. IEEE (2023)","DOI":"10.1109\/BESC59560.2023.10386988"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Puhakainen, P., Siponen, M.: Improving employees\u2019 compliance through information systems security training: an action research study. MIS Q. 757\u2013778 (2010). ISSN 0276-7783. https:\/\/doi.org\/10.2307\/25750704","DOI":"10.2307\/25750704"},{"key":"4_CR25","volume-title":"The Coding Manual for Qualitative Researchers","author":"J Salda\u00f1a","year":"2021","unstructured":"Salda\u00f1a, J.: The Coding Manual for Qualitative Researchers, 4th edn. SAGE Publications Inc., Thousand Oaks (2021)","edition":"4"},{"issue":"7","key":"4_CR26","first-page":"73","volume":"18","author":"E Stavrou","year":"2020","unstructured":"Stavrou, E.: Back to basics: towards building societal resilience against a cyber pandemic. J. Syst. Cybern. Inf. (JSCI) 18(7), 73\u201380 (2020)","journal-title":"J. Syst. Cybern. Inf. (JSCI)"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Zimmermann, V., Renaud, K.: Moving from a \u2018human-as-problem\u201d to a \u2018human-as-solution\u201d cybersecurity mindset. Int. J. Human-Comput. Stud. 131, 169\u2013187 (2019). ISSN 1071-5819. https:\/\/doi.org\/10.1016\/j.ijhcs.2019.05.005","DOI":"10.1016\/j.ijhcs.2019.05.005"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72563-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:08:33Z","timestamp":1732684113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72563-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031725623","9783031725630"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72563-0_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sk\u00f6vde","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}