{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T02:57:30Z","timestamp":1770778650156,"version":"3.50.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031941580","type":"print"},{"value":"9783031941597","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94159-7_14","type":"book-chapter","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T06:03:59Z","timestamp":1749189839000},"page":"129-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Developing Green IT and Cybersecurity Competencies Through Virtualization: Upskilling Learners Across Disciplines"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Yiangou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-4942","authenticated-orcid":false,"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,30]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","DOI":"10.21125\/iceri.2024.2284","volume-title":"Integrating Cybersecurity and Green IT Skills for Sustainable Development: An Investigation, 17th annual International Conference of Education, Research and Innovation (ICERI), 11\u201313 November","author":"I Yiangou","year":"2024","unstructured":"Yiangou, I., Stylianou, M., Stavrou, E.: Integrating Cybersecurity and Green IT Skills for Sustainable Development: An Investigation, 17th annual International Conference of Education, Research and Innovation (ICERI), 11\u201313 November. Seville, Spain (2024)"},{"issue":"110446","key":"14_CR2","doi-asserted-by":"publisher","first-page":"110446","DOI":"10.1016\/j.comnet.2024.110446","volume":"247","author":"SM AlHidaifi","year":"2024","unstructured":"AlHidaifi, S.M., Asghar, M.R., Ansari, I.S.: Towards a cyber resilience quantification framework (CRQF) for IT infrastructure. Comput. Netw. 247(110446), 110446 (2024)","journal-title":"Comput. Netw."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"87445","DOI":"10.1109\/ACCESS.2023.3304332","volume":"11","author":"SG Paul","year":"2023","unstructured":"Paul, S.G., Saha, A., Arefin, M.S., Bhuiyan, T., Biswas, A.A., Reza, A.W., et al.: A comprehensive review of green computing: past, present, and future research. IEEE Access. 11, 87445\u201387494 (2023)","journal-title":"IEEE Access."},{"key":"14_CR4","unstructured":"Communication from the Commission. The European Green Deal (2019)"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"344","DOI":"10.30574\/gscarr.2024.19.3.0236","volume":"19","author":"AB Ige","year":"2024","unstructured":"Ige, A.B., Kupa, E., Ilori, O.: Aligning sustainable development goals with cybersecurity strategies: ensuring a secure and sustainable future. GSC Adv. Res. Rev. 19(3), 344\u2013360 (2024)","journal-title":"GSC Adv. Res. Rev."},{"key":"14_CR6","unstructured":"Joint communication to the European Parliament and the council. The EU\u2019s cybersecurity strategy for the digital decade (2020)"},{"key":"14_CR7","unstructured":"The 17 goals. Sdgs.un.org. https:\/\/sdgs.un.org\/goals"},{"key":"14_CR8","unstructured":"Bianchi, G., Pisiotis, U., Cabrera Giraldez, M.: GreenComp the European sustainability competence framework (2022)"},{"key":"14_CR9","unstructured":"Vuorikari, R., Kluzer, S., Punie, Y.: DigComp 2.2: The digital competence framework for citizens with new examples of knowledge, skills and attitudes (2022)"},{"key":"14_CR10","unstructured":"European Commission: directorate-general for employment, social affairs and inclusion. European skills agenda skills for jobs. Publications Office of the European Union (2020)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Murugesan, S.: Green IT: An Overview in Harnessing Green IT: Principles and Practices, Wiley & Sons (2012)","DOI":"10.1002\/9781118305393"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Potamos, G., Theodoulou, S., Stavrou, E., Stavrou, S.: Maritime cyber threats detection framework: building capabilities. In: IFIP Advances in Information and Communication Technology, pp. 107\u2013129. Cham: Springer International Publishing (2022)","DOI":"10.1007\/978-3-031-08172-9_8"},{"issue":"5","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.51594\/csitrj.v5i5.1115","volume":"5","author":"EG Chukwurah","year":"2024","unstructured":"Chukwurah, E.G., Okeke, C.D., Ekechi, C.C.: Innovation green technology in the age of cybersecurity: balancing sustainability goals with security concerns. Comput. Sci. IT Res. J. 5(5), 1048\u20131075 (2024)","journal-title":"Comput. Sci. IT Res. J."},{"key":"14_CR14","unstructured":"Security aspects of virtualization. ENISA (2016). https:\/\/www.enisa.europa.eu\/publications\/security-aspects-of-virtualization"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"103695","DOI":"10.1016\/j.compedu.2019.103695","volume":"144","author":"MA Al Mamun","year":"2020","unstructured":"Al Mamun, M.A., Lawrie, G., Wright, T.: Instructional design of scaffolded online learning modules for self-directed and inquiry-based learning environments. Comput. Educ. 144, 103695 (2020)","journal-title":"Comput. Educ."},{"issue":"4","key":"14_CR16","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1108\/ICS-02-2024-0038","volume":"32","author":"E Stavrou","year":"2024","unstructured":"Stavrou, E., Piki, A.: Cultivating self-efficacy to empower professionals\u2019 re-up skilling in cybersecurity. Inf. Comput. Secur. 32(4), 523\u2013541 (2024)","journal-title":"Inf. Comput. Secur."},{"key":"14_CR17","first-page":"75","volume":"18","author":"D Dicheva","year":"2015","unstructured":"Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: a systemic mapping study. Educ. Technol. Soc. 18, 75\u201388 (2015)","journal-title":"Educ. Technol. Soc."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Piki, A., Stavrou, E., Procopiou, A., Demosthenous, A.: Fostering cybersecurity awareness and skills development through digital game-based learning. In: 2023 10th International Conference on Behavioural and Social Computing (BESC), pp. 1\u20139. IEEE (2023)","DOI":"10.1109\/BESC59560.2023.10386988"},{"issue":"2","key":"14_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/info15020117","volume":"15","author":"M Mukherjee","year":"2024","unstructured":"Mukherjee, M., Le, N.T., Chow, Y.W., Susilo, W.: Strategic approaches to cybersecurity learning: a study of educational models and outcomes. Information 15(2), 117 (2024)","journal-title":"Information"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Burrell, D.N., Dattola, A., Dawson, M.E., Nobles, C.: A practical exploration of cybersecurity faculty development with microteaching. In:\u00a0Research anthology on advancements in cybersecurity education, pp. 477\u2013490. IGI Global Scientific Publishing (2022)","DOI":"10.4018\/978-1-6684-3554-0.ch023"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Subasinghe, C., Giridharan, B.: Introducing multidisciplinary micro-credentialing: rethinking learning and development for higher education and industry. In:\u00a0Introducing Multidisciplinary Micro-credentialing: Rethinking Learning and Development for Higher Education and Industry, pp. 3\u201316. Emerald Publishing Limited (2023)","DOI":"10.1108\/978-1-80382-459-820231002"}],"container-title":["Communications in Computer and Information Science","HCI International 2025 Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94159-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T06:04:08Z","timestamp":1749189848000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94159-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031941580","9783031941597"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94159-7_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"30 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}