{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:56:03Z","timestamp":1774367763025,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-023-00809-5","type":"journal-article","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T13:04:04Z","timestamp":1706533444000},"page":"1679-1693","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns"],"prefix":"10.1007","volume":"23","author":[{"given":"Giddeon Njamngang","family":"Angafor","sequence":"first","affiliation":[]},{"given":"Iryna","family":"Yevseyeva","sequence":"additional","affiliation":[]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,29]]},"reference":[{"issue":"2","key":"809_CR1","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1057\/s41284-021-00286-2","volume":"35","author":"A Georgiadou","year":"2022","unstructured":"Georgiadou, A., Mouzakitis, S., Askounis, D.: Working from home during COVID-19 crisis: a cyber security culture assessment survey. Secur. J. 35(2), 486\u2013505 (2022)","journal-title":"Secur. J."},{"issue":"2","key":"809_CR2","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1177\/17816858211059250","volume":"20","author":"I Tasheva","year":"2021","unstructured":"Tasheva, I.: Cybersecurity post-COVID-19: lessons learned and policy recommendations. Eur. View 20(2), 140\u2013149 (2021)","journal-title":"Eur. View"},{"issue":"2","key":"809_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247","volume":"4","author":"B Pranggono","year":"2021","unstructured":"Pranggono, B., Arabo, A.: COVID-19 pandemic cybersecurity issues. Internet Technol. Lett. 4(2), e247 (2021)","journal-title":"Internet Technol. Lett."},{"issue":"22","key":"809_CR4","doi-asserted-by":"publisher","first-page":"8663","DOI":"10.3390\/s22228663","volume":"22","author":"M Hijji","year":"2022","unstructured":"Hijji, M., Alam, G.: Cybersecurity awareness and training (CAT) framework for remote working employees. Sensors 22(22), 8663 (2022)","journal-title":"Sensors"},{"key":"809_CR5","doi-asserted-by":"crossref","unstructured":"Tzokatziou, G., Maglaras, L., Janicke, H.: Insecure by design: Using human interface devices to exploit SCADA systems. In: 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) 3, pp. 103\u2013106 (2015)","DOI":"10.14236\/ewic\/ICS2015.13"},{"key":"809_CR6","first-page":"2","volume":"2","author":"G Sebastian","year":"2021","unstructured":"Sebastian, G.: A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and a proposed 8 step WFH cyber-attack mitigation plan. Commun. IBIMA 2, 2\u20137 (2021)","journal-title":"Commun. IBIMA"},{"issue":"19","key":"809_CR7","doi-asserted-by":"publisher","first-page":"9083","DOI":"10.3390\/app11199083","volume":"11","author":"Y Lambat","year":"2021","unstructured":"Lambat, Y., Ayres, N., Maglaras, L., Ferrag, M.A.: A mamdani type fuzzy inference system to calculate employee susceptibility to phishing attacks. Appl. Sci. 11(19), 9083 (2021)","journal-title":"Appl. Sci."},{"issue":"1","key":"809_CR8","first-page":"229","volume":"93","author":"C Kagerl","year":"2023","unstructured":"Kagerl, C., Starzetz, J.: Working from home for good? lessons learned from the COVID-19 pandemic and what this means for the future of work. J. Bus. Econ. 93(1), 229\u2013265 (2023)","journal-title":"J. Bus. Econ."},{"issue":"1","key":"809_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1038\/s41562-021-01196-4","volume":"6","author":"L Yang","year":"2022","unstructured":"Yang, L., Holtz, D., Jaffe, S., Suri, S., Sinha, S., Weston, J., Joyce, C., Shah, N., Sherman, K., Hecht, B., et al.: The effects of remote work on collaboration among information workers. Nat. Hum. Behav. 6(1), 43\u201354 (2022)","journal-title":"Nat. Hum. Behav."},{"issue":"2","key":"809_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.3934\/electreng.2021008","volume":"5","author":"Lidong Wang and Cheryl Ann Alexander","year":"2021","unstructured":"Lidong Wang and Cheryl Ann Alexander: Cyber security during the COVID-19 pandemic. AIMS Electron. Electr. Eng. 5(2), 146\u2013157 (2021)","journal-title":"AIMS Electron. Electr. Eng."},{"key":"809_CR11","doi-asserted-by":"crossref","unstructured":"Barrero, J.M., Bloom, N., Davis, S.J.: 60 million fewer commuting hours per day: how Americans use time saved by working from home. University of Chicago, Becker Friedman Institute for Economics Working Paper (2020-132) (2020)","DOI":"10.2139\/ssrn.3695188"},{"key":"809_CR12","doi-asserted-by":"crossref","unstructured":"Angafor, G.N., Yevseyeva, I., Maglaras, L.: Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Inf. Comput. Secur. (2023)","DOI":"10.1108\/ICS-05-2022-0085"},{"key":"809_CR13","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)"},{"issue":"3","key":"809_CR14","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"809_CR15","unstructured":"CybSafe. 7 reasons why security awareness training is important in 2023, Mar 2023. https:\/\/www.cybsafe.com\/blog\/7-reasons-why-security-awareness-training-is-important\/"},{"issue":"1","key":"809_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-191358","volume":"28","author":"M Pattinson","year":"2020","unstructured":"Pattinson, M., Butavicius, M., Lillie, M., Ciccarello, B., Parsons, K., Calic, D., McCormac, A.: Matching training to individual learning styles improves information security awareness. Inf. Comput. Secur. 28(1), 1\u201314 (2020)","journal-title":"Inf. Comput. Secur."},{"issue":"9","key":"809_CR17","doi-asserted-by":"publisher","first-page":"3065","DOI":"10.3390\/app10093065","volume":"10","author":"A Kova\u010devi\u0107","year":"2020","unstructured":"Kova\u010devi\u0107, A., Radenkovi\u0107, S.D.: SAWIT\u2014security awareness improvement tool in the workplace. Appl. Sci. 10(9), 3065 (2020)","journal-title":"Appl. Sci."},{"key":"809_CR18","doi-asserted-by":"publisher","first-page":"125140","DOI":"10.1109\/ACCESS.2020.3007867","volume":"8","author":"A Kova\u010devi\u0107","year":"2020","unstructured":"Kova\u010devi\u0107, A., Putnik, N., To\u0161kovi\u0107, O.: Factors related to cyber security behavior. IEEE Access 8, 125140\u2013125148 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"809_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi11030073","volume":"11","author":"H Aldawood","year":"2019","unstructured":"Aldawood, H., Skinner, G.: Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues. Future Internet 11(3), 73 (2019)","journal-title":"Future Internet"},{"issue":"1","key":"809_CR20","first-page":"7","volume":"34","author":"P Tasevski","year":"2016","unstructured":"Tasevski, P.: It and cyber security awareness-raising campaigns. Inf. Secur. 34(1), 7\u201322 (2016)","journal-title":"Inf. Secur."},{"issue":"1","key":"809_CR21","first-page":"65","volume":"30","author":"DJ Middaugh","year":"2021","unstructured":"Middaugh, D.J.: Cybersecurity attacks during a pandemic: it is not just it\u2019s job! Medsurg Nurs. 30(1), 65\u201366 (2021)","journal-title":"Medsurg Nurs."},{"issue":"2","key":"809_CR22","doi-asserted-by":"publisher","first-page":"144","DOI":"10.26735\/JFLR5507","volume":"5","author":"Mohammed ALotibi and Abdulrahman Abdullah Alghamdi","year":"2022","unstructured":"Mohammed ALotibi and Abdulrahman Abdullah Alghamdi: The effect of applying information security awareness concept of MOH employees on cybersecurity department-ministry of health-Riyadh. J. Inf. Secur. Cybercrimes Res. 5(2), 144\u2013163 (2022)","journal-title":"J. Inf. Secur. Cybercrimes Res."},{"key":"809_CR23","doi-asserted-by":"crossref","unstructured":"Furnell, S., Network Research Group, et al.: Securing the home worker. Netw. Secur. 2006(11), 6\u201312 (2006)","DOI":"10.1016\/S1353-4858(06)70451-2"},{"issue":"8","key":"809_CR24","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(20)30084-1","volume":"2020","author":"Steven Furnell and Jayesh Navin Shah","year":"2020","unstructured":"Steven Furnell and Jayesh Navin Shah: Home working and cyber security-an outbreak of unpreparedness? Comput. Fraud Secur. 2020(8), 6\u201312 (2020)","journal-title":"Comput. Fraud Secur."},{"key":"809_CR25","unstructured":"Siadati, H., Palka, S., Siegel, A., McCoy, D.: Measuring the effectiveness of embedded phishing exercises. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17) (2017)"},{"key":"809_CR26","unstructured":"Student guide to phishing: what to do if you click (but don\u2019t click!), Aug 2021. URL https:\/\/www.onlineeducation.com\/features\/student-guide-to-phishing-attacks"},{"key":"809_CR27","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060","volume":"3","author":"Z Alkhalil","year":"2021","unstructured":"Alkhalil, Z., Hewage, C., Nawaf, L., Khan, I.: Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. 3, 563060 (2021)","journal-title":"Front. Comput. Sci."},{"issue":"5","key":"809_CR28","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1049\/ise2.12073","volume":"16","author":"AF Al-Qahtani","year":"2022","unstructured":"Al-Qahtani, A.F., Cresci, S.: The COVID-19 scamdemic: a survey of phishing attacks and their countermeasures during COVID-19. IET Inf. Secur. 16(5), 324\u2013345 (2022)","journal-title":"IET Inf. Secur."},{"key":"809_CR29","unstructured":"Mahadevan, P.: Cybercrime. Threats during the COVID (2019)"},{"key":"809_CR30","doi-asserted-by":"crossref","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82, 69\u201382 (2015)","DOI":"10.1016\/j.ijhcs.2015.05.005"},{"issue":"2","key":"809_CR31","first-page":"5","volume":"14","author":"MJA Miranda","year":"2018","unstructured":"Miranda, M.J.A.: Enhancing cybersecurity awareness training: a comprehensive phishing exercise approach. Int. Manag. Rev. 14(2), 5\u201310 (2018)","journal-title":"Int. Manag. Rev."},{"issue":"7","key":"809_CR32","doi-asserted-by":"publisher","first-page":"153","DOI":"10.17148\/IJARCCE.2022.11728","volume":"11","author":"P Sharma","year":"2022","unstructured":"Sharma, P., Dash, B., Ansari, M.F.: Anti-phishing techniques-a review of cyber defense mechanisms. IJARCCE 11(7), 153\u2013160 (2022)","journal-title":"IJARCCE"},{"key":"809_CR33","doi-asserted-by":"crossref","unstructured":"Ahmad, T.: Pandemic and work from home: challenges of cybercrimes and cybersecurity. Available at SSRN (2020)","DOI":"10.2139\/ssrn.3568830"},{"key":"809_CR34","unstructured":"URL https:\/\/www.pwc.nl\/nl\/themas\/assets\/pdf\/impact-of-covid-19-on-cyber-security-nl.pdf"},{"key":"809_CR35","doi-asserted-by":"publisher","unstructured":"Reeg\u00e5rd, K., Blackett. C., Katta. V.: The Concept of Cybersecurity Culture (2019). https:\/\/doi.org\/10.3850\/978-981-11-2724-3_0761-cd","DOI":"10.3850\/978-981-11-2724-3_0761-cd"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00809-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00809-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00809-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:04:46Z","timestamp":1716775486000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00809-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,29]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["809"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00809-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,29]]},"assertion":[{"value":"29 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare full compliance with ethical standards. This article does not contain any studies involving humans or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}