{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:23:02Z","timestamp":1742912582153,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840777"},{"type":"electronic","value":"9783031840784"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84078-4_23","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T20:37:10Z","timestamp":1741898230000},"page":"334-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Target Profile Model to Improve Cybersecurity Capabilities of Educational Institutions Against Cyber-Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4943-9329","authenticated-orcid":false,"given":"Jeremy","family":"Cruz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4237-3441","authenticated-orcid":false,"given":"Andr\u00e9s","family":"La Rosa Toro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0039-6044","authenticated-orcid":false,"given":"Juan Mansilla","family":"Lopez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5864-658X","authenticated-orcid":false,"given":"Christian Cipriano","family":"Portugal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"23_CR1","unstructured":"Skybox Vulnerability and Threat Trends Report 2021. https:\/\/www.cyber-risk-review.com\/skybox-vulnerability-and-threat-trends-report-2021. Accessed 01 Dec 2023"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"708","DOI":"10.18421\/TEM92-38","volume":"9","author":"A Gapsalamov","year":"2020","unstructured":"Gapsalamov, A., Akhmetshin, E., Sharipov, R., Vasilev, V., Bochkareva, T.: Approaches to information security in educational processes in the context of digitalization. TEM J. 9(2), 708\u2013715 (2020)","journal-title":"TEM J."},{"key":"23_CR3","unstructured":"Global Risks Report 2022. https:\/\/www.weforum.org\/publications\/global-risks-report-2022\/. Accessed 07 Dec 2023"},{"key":"23_CR4","unstructured":"2022 Cyber Attack Trends Mid-Year Report. https:\/\/pages.checkpoint.com\/cyber-attack-2022-trends.html. Accessed 10 Jan 2024"},{"key":"23_CR5","unstructured":"Pinheiro, J.: Review of cyber threats on educational institutions. In: Proceedings of the Digital Privacy and Security Conference 2020, Portugal, p.43 (2020)"},{"key":"23_CR6","unstructured":"The State of Ransomware in Education 2023. https:\/\/news.sophos.com\/en-us\/2023\/07\/20\/the-state-of-ransomware-in-education-2023\/. Accessed \/10 Dec 2023"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/fi13020039","volume":"13","author":"J Ulven","year":"2021","unstructured":"Ulven, J., Wangen, G.: A systematic review of cybersecurity risks in higher education. Future Internet 13(2), 39 (2021)","journal-title":"Future Internet"},{"key":"23_CR8","unstructured":"Lamarca, B.: Cybersecurity risk assessment of the university of northern Philippines using PRISM approach. In: 6th International Conference on Software Engineering & Computer Systems, Malaysia, pp. 25\u201327. IOP Conference Series (2020)"},{"key":"23_CR9","unstructured":"Bitdefender 2023 Cybersecurity Assessment. https:\/\/www.bitdefenderperu.com\/bitdefender-2023-cybersecurity-assessment\/. Accessed 18 Dec 2023"},{"issue":"17","key":"23_CR10","doi-asserted-by":"publisher","first-page":"8061","DOI":"10.3390\/app11178061","volume":"11","author":"S Ramanauskaite","year":"2021","unstructured":"Ramanauskaite, S., Neringa, U., \u0160ar\u016bnas, G., Saulius, P., Vaidotas, T., Algimantas, V.: Educational organization\u2019s security level estimation model. Appl. Sci. 11(17), 8061 (2021)","journal-title":"Appl. Sci."},{"issue":"3","key":"23_CR11","first-page":"201","volume":"60","author":"S Hina","year":"2020","unstructured":"Hina, S., Dominic, D.: Information security policies compliance: a perspective for higher education institutions. J. Comput. Inf. Syst. 60(3), 201\u2013211 (2020)","journal-title":"J. Comput. Inf. Syst."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Karim, F., Zo, H., Eom, J., Chiravuri, A.: Identifying organizations dynamic capabilities for sustainable digital transformation: a mixed methods study. Technol. Soc. 73 (2023)","DOI":"10.1016\/j.techsoc.2023.102257"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Fernandez, I., Fernandez, C., Fernandez, M., Fernandez, J.: Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: a UK survey for 2018 and 2019. Comput. Secur. 124 (2023)","DOI":"10.1016\/j.cose.2022.102954"},{"issue":"6","key":"23_CR14","first-page":"2090","volume":"29","author":"T Alsahafi","year":"2022","unstructured":"Alsahafi, T., Halboob, W., Almuhtadi, J.: Compliance with Saudi NCA-ECC based on ISO\/IEC 27001. Tehnicki Vjesnik 29(6), 2090\u20132097 (2022)","journal-title":"Tehnicki Vjesnik"},{"key":"23_CR15","doi-asserted-by":"publisher","unstructured":"Masmali, H.H., Miah, S.J.: Emergent insight of the cyber security management for Saudi Arabian universities: a content analysis. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds.) Proceedings of Seventh International Congress on Information and Communication Technology. LNNS, vol. 448, pp. 153\u2013171. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-1610-6_14","DOI":"10.1007\/978-981-19-1610-6_14"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Ganesen, R., Abu, A., Ramli, R., Abdul, F., Nabil, M.: Cybersecurity risk assessment: modeling factors associated with higher education institutions. Int. J. Adv. Comput. Sci. Appl. 13(8) (2022)","DOI":"10.14569\/IJACSA.2022.0130843"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Wu, K., Li, C.: Application of symmetric encryption algorithm sensor in the research of college student security management system. J. Sens. 2022 (2022)","DOI":"10.1155\/2022\/3323547"},{"issue":"10","key":"23_CR18","doi-asserted-by":"publisher","first-page":"417","DOI":"10.3390\/info12100417","volume":"12","author":"M Khader","year":"2021","unstructured":"Khader, M., Karam, M., Fares, H.: Cybersecurity awareness framework for academia. Information 12(10), 417 (2021)","journal-title":"Information"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Rotanova, M., Shimichev, A., Golvanov, I.: Secondary school information protection as a factor of students\u2019 information security. In: 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, Russia, pp. 609\u2013612 (2021)","DOI":"10.1109\/ElConRus51938.2021.9396542"},{"key":"23_CR20","unstructured":"The State of K-12 cybersecurity: Year in Review. Report. https:\/\/static1.squarespace.com\/static\/5e441b46adfb340b05008fe7\/t\/6228bfe3f412c818293e16e1\/1646837732368\/StateofK12Cybersecurity2022.pdf. Accessed 03 Dec 2023"},{"issue":"3-4","key":"23_CR21","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s12243-020-00783-2","volume":"76","author":"J Merchan-Lima","year":"2020","unstructured":"Merchan-Lima, J., Astudillo-Salinas, F., Tello-Oquendo, L., Sanchez, F., Lopez-Fonseca, G., Quiroz, D.: Information security management frameworks and strategies in higher education institutions: a systematic review. Ann. Telecommun. 76(3\u20134), 255\u2013270 (2020). https:\/\/doi.org\/10.1007\/s12243-020-00783-2","journal-title":"Ann. Telecommun."},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"156556","DOI":"10.1109\/ACCESS.2021.3129488","volume":"9","author":"S Abdymanapov","year":"2021","unstructured":"Abdymanapov, S., Muratbekov, M., Altynbek, S., Barlybayev, A.: Fuzzy expert system of information security risk assessment on the example of analysis learning management systems. IEEE Access 9, 156556\u2013156565 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"23_CR23","doi-asserted-by":"publisher","first-page":"192","DOI":"10.3390\/info13040192","volume":"13","author":"E Cheng","year":"2022","unstructured":"Cheng, E., Wang, T.: Institutional strategies for cybersecurity in higher education institutions. Information 13(4), 192 (2022)","journal-title":"Information"},{"key":"23_CR24","unstructured":"Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know. https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/annual-trend-micro-email-threats-report. Accessed 26 Dec 2023"},{"issue":"23","key":"23_CR25","doi-asserted-by":"publisher","first-page":"11269","DOI":"10.3390\/app112311269","volume":"11","author":"M Antunes","year":"2021","unstructured":"Antunes, M., Silva, C., Marques, F.: An integrated cybernetic awareness strategy to assess cybersecurity attitudes and behaviors in school context. Appl. Sci. 11(23), 11269 (2021)","journal-title":"Appl. Sci."},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Blazic, B., Blazic, A.: Cybersecurity skills among European high-school students: a new approach in the design of sustainable educational development in cybersecurity. Sustainability 14(8), 4763 (2022)","DOI":"10.3390\/su14084763"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Peng, Z., Liang, F., Mu, L.: Big data-based access control system in educational information security assurance. Wirel. Commun. Mob. Comput. 2022 (2022)","DOI":"10.1155\/2022\/2853821"},{"issue":"1","key":"23_CR28","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/JSYST.2018.2824252","volume":"13","author":"C Foglietta","year":"2019","unstructured":"Foglietta, C., et al.: From detecting cyber-attacks to mitigating risk within a hybrid environment. IEEE Syst. J. 13(1), 424\u2013435 (2019)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"23_CR29","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TLA.2018.8358671","volume":"16","author":"Y Basallo","year":"2018","unstructured":"Basallo, Y., Senti, V., Sanchez, N.: Artificial intelligence techniques for information security risk assessment. IEEE Lat. Am. Trans. 16(3), 897\u2013901 (2018)","journal-title":"IEEE Lat. Am. Trans."},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Nazar, N., Darvishi, I., Yeboah-Ofori, A.: Cyber threat analysis on online learning and its mitigation techniques amid Covid-19. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus, pp. 1\u20137 (2022)","DOI":"10.1109\/ISC255366.2022.9922102"},{"issue":"3","key":"23_CR31","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1108\/ICS-09-2018-0108","volume":"23","author":"I Topa","year":"2019","unstructured":"Topa, I., Karyda, M.: From theory to practice: guidelines for enhancing information security management. Inf. Comput. Secur. 23(3), 326\u2013342 (2019)","journal-title":"Inf. Comput. Secur."},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Benz, M., Chatterjee, D.: Calculated risk? A cybersecurity evaluation tool for SMEs, Bus. Horiz. 63(4), 531\u2013540 (2020)","DOI":"10.1016\/j.bushor.2020.03.010"},{"issue":"5","key":"23_CR33","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.bushor.2021.02.022","volume":"64","author":"I Lee","year":"2021","unstructured":"Lee, I.: Cybersecurity: risk management framework and investment cost analysis. Bus. Horiz. 64(5), 659\u2013671 (2021)","journal-title":"Bus. Horiz."},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"AlDaajeh, S., Saleous, H., Alrabaee, S., Barka, E., Breitinger, F., Choo, K.: The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119 (2022)","DOI":"10.1016\/j.cose.2022.102754"},{"key":"23_CR35","first-page":"431","volume":"25","author":"C Daniel","year":"2023","unstructured":"Daniel, C., Mullarkey, M., Agrawal, M.: RQ labs: a cybersecurity workforce skills development framework. Inf. Syst. Front. 25, 431\u2013450 (2023)","journal-title":"Inf. Syst. Front."},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Arista, A., Ngafidin, K.: An information system risk management of a higher education computing environment. Int. J. Adv. Sci. Eng. Inf. Technol. (2022)","DOI":"10.18517\/ijaseit.12.2.13953"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Savolainen, T.: A safe learning environment from the perspective of Laurea university of applied sciences safety, security and risk management students and staff. Heliyon 9(3), e12836 (2023)","DOI":"10.1016\/j.heliyon.2023.e12836"},{"issue":"10","key":"23_CR38","doi-asserted-by":"publisher","first-page":"3660","DOI":"10.3390\/app10103660","volume":"10","author":"A Aliyu","year":"2020","unstructured":"Aliyu, A., et al.: A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom. Appl. Sci. 10(10), 3660 (2020)","journal-title":"Appl. Sci."},{"key":"23_CR39","unstructured":"Framework for Improving Critical Infrastructure Cybersecurity. https:\/\/nvlpubs.nist.gov\/nistpubs\/cswp\/nist.cswp.04162018.pdf. Accessed 20 Dec 2023"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"Barker, W., Fisher, W., Scarfone, K., Souppaya, M.: Ransomware risk management: a cybersecurity framework profile. NIST (2022)","DOI":"10.6028\/NIST.IR.8374"},{"key":"23_CR41","unstructured":"McIntosh, A., Stocchetti, V.: Blueprint for ransomware defense, National Institute for Security and Technology (2022)"},{"key":"23_CR42","unstructured":"NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. https:\/\/csrc.nist.gov\/pubs\/sp\/800\/53\/r5\/upd1\/final. Accessed 15 Dec 2023"},{"key":"23_CR43","doi-asserted-by":"crossref","unstructured":"Rose, S., Nightingale, J., Garfinkel, S., Chandramouli, R.: Trustworthy email. NIST (2019)","DOI":"10.6028\/NIST.SP.800-177r1"},{"key":"23_CR44","unstructured":"Capacity Enhancement Guide: Counter-Phishing Recommendations for Federal Agencies. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Capacity_Enhancement_Guide-Counter-Phishing_Recommendations_for_Federal_Agencies_1_0.pdf. Accessed 10 Jan 2024"},{"key":"23_CR45","unstructured":"Cyber Strategy Framework (CSF). https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/es\/Documents\/riesgos\/Deloitte-ES-RA-CyberStrategyFramework.pdf. Accessed 04 Jan 2024"},{"key":"23_CR46","unstructured":"Organizational cyber maturity: A survey of industries. https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/organizational-cyber-maturity-a-survey-of-industries. Accessed 25 Mar 2024"},{"key":"23_CR47","doi-asserted-by":"publisher","unstructured":"Informe GEM 2023: Tecnolog\u00eda en la educaci\u00f3n. https:\/\/doi.org\/10.54676\/IDQE8212. Accessed 25 May 2024","DOI":"10.54676\/IDQE8212"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84078-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T20:37:31Z","timestamp":1741898251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84078-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840777","9783031840784"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84078-4_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}