{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:47:25Z","timestamp":1743011245787,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319210667"},{"type":"electronic","value":"9783319210674"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21067-4_49","type":"book-chapter","created":{"date-parts":[[2015,7,19]],"date-time":"2015-07-19T21:10:43Z","timestamp":1437340243000},"page":"480-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Theoretical Foundations for Developing Cybersecurity Training"],"prefix":"10.1007","author":[{"given":"Eric C.","family":"Ortiz","sequence":"first","affiliation":[]},{"given":"Lauren","family":"Reinerman-Jones","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"49_CR1","unstructured":"Greenwald, G., MacAskill, E., Poitras, L.: Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian 11 June 2013"},{"issue":"4","key":"49_CR2","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1111\/j.1468-2478.2009.00572.x","volume":"53","author":"L Hansen","year":"2009","unstructured":"Hansen, L., Nissenbaum, H.: Digital disaster, cyber security, and the copenhagen school. Int. Stud. Quart. 53(4), 1155\u20131175 (2009)","journal-title":"Int. Stud. Quart."},{"key":"49_CR3","unstructured":"McDowell, M., Householder, A.: US-CERT, 6 May 2009. \n                      https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-001\n                      \n                    . Accessed 18 February 2015"},{"key":"49_CR4","unstructured":"Managing Information Security Risk, U.S. Department of Commerce, Gaithersburg (2011)"},{"key":"49_CR5","unstructured":"National Institute of Standards and Technology, U.S. Department of Commerce, 1 April 2014. \n                      http:\/\/csrc.nist.gov\/groups\/SMA\/fisma\/overview.html\n                      \n                    . Accessed 17 February 2015"},{"key":"49_CR6","unstructured":"Vacca, J.R.: Guarding against network intrusion. In: Computer and Information Security Handbook, pp. 86\u201387. Elsevier, Waltham (2013)"},{"key":"49_CR7","unstructured":"Patriciu, V.-V., Furtuna, A.C.: Guide for designing cyber security exercises. In: Proceedings of the 8th WSEAS International Conference on E-Activities and Information Security and Privacy (2009)"},{"key":"49_CR8","unstructured":"Munir, A., Lukman, S., Muhammad, K., Al-Maimani, M.: Human errors in information security. Int. J. 1(3), (2012)"},{"key":"49_CR9","unstructured":"Kenyon, H.: SMBs Ignoring Insider Threats. InformationWeek, 23 June 2014"},{"issue":"1","key":"49_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2008.8","volume":"6","author":"FL Greitzer","year":"2008","unstructured":"Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D.: Combating the insider cyber threat. Secur. Priv. IEEE 6(1), 61\u201364 (2008)","journal-title":"Secur. Priv. IEEE"},{"key":"49_CR11","unstructured":"Hald, S.L., Pedersen, J.M.: An updated taxonomy for characterizing hackers according to thier threat properties. In: 2012 14th International Conference on Advanced Communication Technology (ICACT). IEEE (2012)"},{"issue":"1","key":"49_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1049\/et.2014.0117","volume":"9","author":"S Gold","year":"2014","unstructured":"Gold, S.: Cyber-psychopathy: what goes on in a hacker\u2019s head. Eng. Technol. Mag. 9(1), 20 (2014)","journal-title":"Eng. Technol. Mag."},{"key":"49_CR13","unstructured":"Cox, E.: Ahmed Al-Khabaz expelled from Dawson College after finding security flaw. National Post, 20 January 2013"},{"key":"49_CR14","unstructured":"Statement Before the Senate Appropriations Committee. The Federal Bureau of Investigation, 12 June 2013"},{"issue":"5","key":"49_CR15","first-page":"101","volume":"89","author":"WJ Lynn","year":"2010","unstructured":"Lynn, W.J.: Defending a new domain: the pentagon\u2019s cyberstrategy. Foreign Aff. 89(5), 101 (2010)","journal-title":"Foreign Aff."},{"key":"49_CR16","unstructured":"Harris, E.A.: Target Executive Resigns After Breach. The New York Times, 5 March 2014"},{"key":"49_CR17","unstructured":"Platsis, G.: The Real Vulnerability of the Cyberworld: You and I, Adelphi (2015)"},{"key":"49_CR18","unstructured":"Roman, J.: Cost of Mitigating the Insider Threat (2013)"},{"key":"49_CR19","unstructured":"Stanescu, I.A., Stefan, A.: Interoperability in serious games. In: The 7th International Scientific Conference eLearning and Software for Education, Bucharest (2011)"},{"key":"49_CR20","unstructured":"DoD Cyber Awareness Challenge Training, U.S. Army, 2015. \n                      https:\/\/ia.signal.army.mil\/DoDIAA\/default.asp\n                      \n                    . Accessed 18 February 2015"},{"key":"49_CR21","unstructured":"SIMTRAY, University of Maryland University College, 2014. Accessed 16 February 2015"},{"key":"49_CR22","unstructured":"Stewart, K.E., Humphries, J.W., Andel, T.R.: Developing a virtualization platform for courses in networking, systems administration and cyber security education. In: Proceedings of the 2009 Spring Simulation Multiconference (2009)"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Williams, C., Meinel, C.: Online assessment for hands-on cyber security training in a virtual lab. In: Global Engineering Education Conference (EDUCON). IEEE (2012)","DOI":"10.1109\/EDUCON.2012.6201149"},{"key":"49_CR24","doi-asserted-by":"crossref","unstructured":"Sawyer, B.D., Finomore, V.S., Funke, G.J., Mancuso, V.F., Funke, M.E., Matthews, G., Warm, J.S.: Cyber vigilance: effects of signal probability and event rate. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2014)","DOI":"10.1177\/1541931214581369"}],"container-title":["Lecture Notes in Computer Science","Virtual, Augmented and Mixed Reality"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21067-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:27:12Z","timestamp":1582414032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21067-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319210667","9783319210674"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21067-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}