{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T20:48:46Z","timestamp":1774385326746,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T00:00:00Z","timestamp":1561593600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T00:00:00Z","timestamp":1561593600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["17K00478"],"award-info":[{"award-number":["17K00478"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["17K00479"],"award-info":[{"award-number":["17K00479"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s10639-019-09942-y","type":"journal-article","created":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T07:45:48Z","timestamp":1561621548000},"page":"3619-3643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Supporting cybersecurity education and training via LMS integration: CyLMS"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4109-3763","authenticated-orcid":false,"given":"Razvan","family":"Beuran","sequence":"first","affiliation":[]},{"given":"Dat","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Zheyu","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Shinobu","family":"Hasegawa","sequence":"additional","affiliation":[]},{"given":"Yasuo","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yoichi","family":"Shinoda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,27]]},"reference":[{"key":"9942_CR1","unstructured":"Advanced Distributed Learning (ADL) Initiative: SCORM Overview. \n                    https:\/\/www.adlnet.gov\/scorm\n                    \n                  ."},{"issue":"1","key":"9942_CR2","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.compedu.2012.08.010","volume":"60","author":"C Alario-Hoyos","year":"2013","unstructured":"Alario-Hoyos, C., Bote-Lorenzo, M.L., Gomez-Sanchez, E., Asensio-Perez, J.I., Vega-Gorgojo, G., Ruiz-calleja, A. (2013). GLUE: An architecture for the integration of external tools in Virtual Learning Environments. Computers & Education, 60(1), 122\u2013137.","journal-title":"Computers & Education"},{"issue":"Section C","key":"9942_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.cose.2016.05.004","volume":"61","author":"M Bartnes","year":"2016","unstructured":"Bartnes, M., Moe, N.B., Heegaard, P.E. (2016). The future of information security incident management training: a case study of electrical power companies. Computers & Security, 61(Section C), 32\u201345.","journal-title":"Computers & Security"},{"issue":"3","key":"9942_CR4","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1587\/transinf.2017EDP7207","volume":"E101-D","author":"R Beuran","year":"2018","unstructured":"Beuran, R., Pham, C., Tang, D., Chinen, K., Tan, Y., Shinoda, Y. (2018). Cybersecurity education and training support system: cyRIS. IEICE Transactions on Information and Systems, E101-D(3), 740\u2013749.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"9942_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.cose.2018.06.001","volume":"78C","author":"R Beuran","year":"2018","unstructured":"Beuran, R., Tang, D., Pham, C., Chinen, K., Tan, Y., Shinoda, Y. (2018). Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security, 78C, 43\u201359.","journal-title":"Computers & Security"},{"issue":"1\u20137","key":"9942_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1\u20137), 107\u2013117.","journal-title":"Computer Networks and ISDN Systems"},{"key":"9942_CR7","unstructured":"Cyber Range Organization and Design (CROND). GitHub Repository for CyLMS. \n                    https:\/\/github.com\/crond-jaist\/cylms\n                    \n                  ."},{"key":"9942_CR8","unstructured":"DBpedia Association: DBpedia Website. \n                    https:\/\/wiki.dbpedia.org\/\n                    \n                  ."},{"key":"9942_CR9","unstructured":"Evans, C. (2017). The Official YAML Website. \n                    http:\/\/www.yaml.org\/\n                    \n                  ."},{"key":"9942_CR10","doi-asserted-by":"crossref","unstructured":"Ghiglieri, M., & Stopczynski, M. (2016). Seclab: an innovative approach to learn and understand current security and privacy issues. In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE \u201816) (pp 67\u201372).","DOI":"10.1145\/2978192.2978224"},{"key":"9942_CR11","unstructured":"IMS Global Learning Consortium: Learning Tools Interoperability Website. \n                    http:\/\/www.imsglobal.org\/activity\/learning-tools-interoperability\n                    \n                  ."},{"key":"9942_CR12","unstructured":"Jeffrey, C. tty.js: A terminal for your browser, using node\/express\/socket.io. \n                    https:\/\/github.com\/chjj\/tty.js\/\n                    \n                  ."},{"key":"9942_CR13","unstructured":"Noor Azam, Md.H., & Beuran, R. (2018). Usability evaluation of open source and online capture the flag platforms. Tech. Rep. IS-RR-2018-001 Japan advanced institute of science and technology (JAIST)."},{"key":"9942_CR14","unstructured":"Muras, T. Moosh Official Website. \n                    https:\/\/moosh-online.com\/\n                    \n                  ."},{"key":"9942_CR15","unstructured":"National Institute of Information and Communications Technology, Japan: Cyber Defense Exercise with Recurrence (CYDER) (in Japanese). \n                    https:\/\/cyder.nict.go.jp\/\n                    \n                  ."},{"key":"9942_CR16","unstructured":"noVNC Development Team. noVNC: HTML VNC Client Library and Application. \n                    https:\/\/github.com\/novnc\/noVNC\n                    \n                  ."},{"key":"9942_CR17","unstructured":"Rustici Software: Sample SCORM Packages. \n                    https:\/\/scorm.com\/scorm-explained\/technical-scorm\/golf-examples\/\n                    \n                  ."},{"key":"9942_CR18","doi-asserted-by":"crossref","unstructured":"Sancristobal, E., Castro, M., Harward, J., Baley, P., DeLong, K., Hardison, J. (2010). Integration view of web labs and learning management systems. In Proceedings of IEEE EDUCON 2010 Conference (pp. 1409\u20131417).","DOI":"10.1109\/EDUCON.2010.5492363"},{"key":"9942_CR19","unstructured":"SANS Institute: SANS NetWars Training Courses. \n                    https:\/\/www.sans.org\/netwars\/\n                    \n                  ."},{"key":"9942_CR20","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A. (2008). National institute of standards and technology \u2013 technical guide to information security testing and assessment.","DOI":"10.6028\/NIST.SP.800-115"},{"key":"9942_CR21","unstructured":"Soceanu, A., Vasylenko, M., Gradinaru, A. (2017). Improving cybersecurity skills using network security virtual labs. In: Proceedings of International MultiConference of Engineers and Computer Scientists (IMECS 2017)."},{"key":"9942_CR22","unstructured":"Tan, Z., Hasegawa, S., Beuran, R. (2018). Concept map building from linked open data for cybersecurity awareness training. In Proceedings of the Japanese society for artificial intelligence (JSAI) special interest group on advanced learning science and technology workshop (SIG-ALST83) (pp. 1\u20136)."},{"key":"9942_CR23","doi-asserted-by":"crossref","unstructured":"Tang, D., Pham, C., Chinen, K., Beuran, R. (2017). Interactive cybersecurity defense training inspired by web-based learning theory. In Proceedings of the IEEE 9th international conference on engineering education (ICEED 2017) (pp. 103\u2013108).","DOI":"10.1109\/ICEED.2017.8251171"},{"key":"9942_CR24","unstructured":"The Moodle Project: AIKEN Format. \n                    https:\/\/docs.moodle.org\/en\/Aiken_format\n                    \n                  ."},{"key":"9942_CR25","unstructured":"The Moodle Project: GIFT Format. \n                    https:\/\/docs.moodle.org\/en\/GIFT_format\n                    \n                  ."},{"key":"9942_CR26","unstructured":"The Moodle Project: Moodle XML Format. \n                    https:\/\/docs.moodle.org\/en\/Moodle_XML_format\n                    \n                  ."},{"key":"9942_CR27","unstructured":"Web Application Security Forum: Hardening Project (in Japanese). \n                    https:\/\/wasforum.jp\/hardening-project\/\n                    \n                  \n                           \n                    https:\/\/wasforum.jp\/hardening-project\/\n                    \n                  ."},{"issue":"1","key":"9942_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.iheduc.2006.10.005","volume":"10","author":"Y Woo","year":"2007","unstructured":"Woo, Y., & Reeves, T.C. (2007). Meaningful interaction in web-based learning: a social constructivist interpretation. The Internet and Higher Education, 10(1), 15\u201325.","journal-title":"The Internet and Higher Education"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-019-09942-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10639-019-09942-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-019-09942-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T23:15:32Z","timestamp":1593126932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10639-019-09942-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,27]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["9942"],"URL":"https:\/\/doi.org\/10.1007\/s10639-019-09942-y","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"value":"1360-2357","type":"print"},{"value":"1573-7608","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,27]]},"assertion":[{"value":"19 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}