{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T07:40:54Z","timestamp":1773560454558,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s13198-024-02273-3","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T10:02:33Z","timestamp":1709200953000},"page":"2518-2528","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A study on building awareness in cyber security for educational system in India using interpretive structural modellings"],"prefix":"10.1007","volume":"15","author":[{"given":"Sachi Nandan","family":"Mohanty","sequence":"first","affiliation":[]},{"given":"Tilottama","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Richa","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Sukanta Kumar","family":"Baral","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8040-1976","authenticated-orcid":false,"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"2273_CR1","doi-asserted-by":"crossref","unstructured":"Abbasimehr H, Paki R (2022) Improving time series forecasting using LSTM and attention models. J Ambient Intell Humaniz Comput 1\u201319","DOI":"10.1007\/s12652-020-02761-x"},{"key":"2273_CR2","unstructured":"Adenusi Dauda A, Adekunle AU, Ekuewa JB, Ayediran OR. (2020). Challenges and way out of cyber security issues in Nigeria. Villanova J Sci Technol Manag 15"},{"key":"2273_CR3","doi-asserted-by":"crossref","unstructured":"Behera S, Tripathy RK, Mohanty S (2013) Least square support vector machine modelling of breakdown voltage of solid insulating materials in the presence of voids. J Inst Eng (India): Ser B 94:21\u201327","DOI":"10.1007\/s40031-013-0039-y"},{"issue":"3","key":"2273_CR4","doi-asserted-by":"publisher","first-page":"2369","DOI":"10.1007\/s12652-022-04491-8","volume":"14","author":"S Bera","year":"2023","unstructured":"Bera S, Gupta GS, Kumar D, Shiva Kumar S, Gupta KK (2023) LSTM-UKF framework for an effective global land-ocean index temperature prediction. J Ambient Intell Humaniz Comput 14(3):2369\u20132384","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s10639-018-9765-8","volume":"24","author":"F Breitinger","year":"2018","unstructured":"Breitinger F et al (2018) Survey Results on Adults and Cybersecurity Education Educ Inf Technol 24:10. https:\/\/doi.org\/10.1007\/s10639-018-9765-8","journal-title":"Survey Results on Adults and Cybersecurity Education Educ Inf Technol"},{"key":"2273_CR6","unstructured":"Breitinger F, Ricci J, Baggili I (2018) Survey results on adults and cybersecurity education. Cyber Forensics Research and Education Group (UNHcFREG) 10"},{"key":"2273_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/cybsec\/tyz001","volume":"5","author":"F Catota","year":"2019","unstructured":"Catota F, Morgan M, Sicker DC (2019) Cybersecurity education in a developing nation: the Ecuadorian environment. J Cybersec 5:1\u201319","journal-title":"J Cybersec"},{"key":"2273_CR8","doi-asserted-by":"crossref","unstructured":"Chang H, Zhao D, Wu CH, Li L, Si N, He R (2020) Visualization of spatial matching features during deep person re-identification. J Ambient Intell Humaniz Comput 1\u201313","DOI":"10.1007\/s12652-020-01754-0"},{"key":"2273_CR9","unstructured":"Dilipraj D (2020) India\u2019s forthcoming national cyber security strategy analysing the past to predict the expected outcome. Centre for Air Power Studies Forum for National Security Studies (CAPS) 7"},{"issue":"5","key":"2273_CR10","doi-asserted-by":"publisher","first-page":"5309","DOI":"10.1007\/s12652-019-01399-8","volume":"14","author":"DC Edara","year":"2023","unstructured":"Edara DC, Vanukuri LP, Sistla V, Kolli VKK (2023) Sentiment analysis and text categorization of cancer medical records with LSTM. J Ambient Intell Humaniz Comput 14(5):5309\u20135325","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR11","unstructured":"Gujjar P, Manjunatha T (2020) Technology challenges in social networking and cyber security. In Seventeenth AIMS international conference on management, Kozhikode, vol. 4, pp 822\u2013825"},{"key":"2273_CR12","doi-asserted-by":"publisher","first-page":"2375","DOI":"10.1007\/s12652-020-02353-9","volume":"12","author":"V Gundu","year":"2021","unstructured":"Gundu V, Simon SP (2021) PSO\u2013LSTM for short term forecast of heterogeneous time series electricity price signals. J Ambient Intell Humaniz Comput 12:2375\u20132385","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR13","doi-asserted-by":"publisher","first-page":"8859","DOI":"10.1007\/s12652-020-02678-5","volume":"12","author":"XP Ji","year":"2021","unstructured":"Ji XP, Tian W, Liu W, Liu G (2021) Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model. J Ambient Intell Humaniz Comput 12:8859\u20138866","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR14","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s12652-020-01995-z","volume":"12","author":"J Jithish","year":"2021","unstructured":"Jithish J, Sankaran S, Achuthan K (2021) A decision-centric approach for secure and energy-efficient cyber-physical systems. J Ambient Intell Humaniz Comput 12:417\u2013441","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR15","doi-asserted-by":"crossref","unstructured":"Kanchan S, Singh G, Chaudhari NS (2022) SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems. J Ambient Intell Humanized Comput 1\u201320","DOI":"10.1007\/s12652-020-02859-2"},{"key":"2273_CR16","doi-asserted-by":"crossref","unstructured":"Kaur J, Khehra BS (2022) Fuzzy logic and hybrid based approaches for the risk of heart disease detection: state-of-the-art review. J Inst Eng (India): Ser B 103(2):681\u2013697","DOI":"10.1007\/s40031-021-00644-z"},{"key":"2273_CR17","unstructured":"Kulkarni PB, Ravi K (2018) Interpretive Structural Modeling (ISM) for implementation of green supply chain management in construction sector within Maharashtra. IRJET 13"},{"key":"2273_CR18","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1007\/s12652-018-0881-5","volume":"10","author":"J Leng","year":"2019","unstructured":"Leng J, Zhang H, Yan D, Liu Q, Chen X, Zhang D (2019) Digital twin-driven manufacturing cyber-physical system for parallel controlling of smart workshop. J Ambient Intell Humaniz Comput 10:1155\u20131166","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR19","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1007\/s12652-018-0832-1","volume":"10","author":"XX Li","year":"2019","unstructured":"Li XX, He FZ, Li WD (2019) A cloud-terminal-based cyber-physical system architecture for energy efficient machining process optimization. J Ambient Intell Humaniz Comput 10:1049\u20131064","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"2273_CR20","first-page":"10","volume":"8","author":"M Mahinderjit Singh","year":"2017","unstructured":"Mahinderjit Singh M, Chan CW, Zulkefli Z (2017) Security and privacy risks awareness for Bring Your Own Device (BYOD) Paradigm. IJACSA 8(2):10","journal-title":"IJACSA"},{"key":"2273_CR21","unstructured":"Nirmala AP, Saravana N (2018) Analysis on challenges and threats in cyber security. IJARCET 8"},{"key":"2273_CR22","doi-asserted-by":"crossref","unstructured":"Pratishtha, Jay, Rakesh (2020) A detailed survey on cyber security and its challenges. Int J Commun Inform Technol 1(1): 51\u201354","DOI":"10.33545\/2707661X.2020.v1.i1a.9"},{"key":"2273_CR23","doi-asserted-by":"crossref","unstructured":"Quayyum F (2020) Cyber security education for children through gamification: research plan and perspectives. Norwegian University of Science and Technology (NTNU), Trondheim, pp 9\u201313","DOI":"10.1145\/3397617.3398030"},{"issue":"5","key":"2273_CR24","first-page":"5","volume":"10","author":"NAA Rahman","year":"2020","unstructured":"Rahman NAA, Sairi IH, Zizi NAM, Khalid F (2020) The importance of cybersecurity education in school. Int J Inform Edu Technol 10(5):5","journal-title":"Int J Inform Edu Technol"},{"issue":"2","key":"2273_CR25","first-page":"17","volume":"27","author":"MD Richardson","year":"2020","unstructured":"Richardson MD, Lemoine PA, Stephens WE, Waller RE (2020) Planning for cyber security in schools: the human factor. Edu Plan 27(2):17","journal-title":"Edu Plan"},{"key":"2273_CR26","doi-asserted-by":"crossref","unstructured":"Rowland P, Podhradsk A, Plucker S (2018) CybHER: a method for empowering, motivating, educating and anchoring. In Proceedings of the 51st Hawaii International Conference on system sciences, vol. 9","DOI":"10.24251\/HICSS.2018.470"},{"key":"2273_CR27","doi-asserted-by":"crossref","unstructured":"Saha A, Rajak S, Saha J, Chowdhury C (2022) A survey of machine learning and meta- heuristics approaches for sensor-based human activity recognition systems. J Ambient Intell Humaniz Comput 1\u201328","DOI":"10.1007\/s12652-022-03870-5"},{"key":"2273_CR28","doi-asserted-by":"crossref","unstructured":"Shi N, Wang Y (2020) Symmetry in computer-aided music composition system with social network analysis and artificial neural network methods. J Ambient Intell Humaniz Comput 1\u201316","DOI":"10.1007\/s12652-020-02436-7"},{"issue":"9","key":"2273_CR29","doi-asserted-by":"publisher","first-page":"12373","DOI":"10.1007\/s12652-022-04333-7","volume":"14","author":"Y Son","year":"2023","unstructured":"Son Y, Zhang X, Yoon Y, Cho J, Choi S (2023) LSTM\u2013GAN based cloud movement prediction in satellite images for PV forecast. J Ambient Intell Humaniz Comput 14(9):12373\u201312386","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2273_CR30","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1007\/s12652-021-03263-0","volume":"13","author":"R Steele","year":"2022","unstructured":"Steele R, Hillsgrove T, Khoshavi N, Jaimes LG (2022) A survey of cyber-physical system implementations of real-time personalized interventions. J Ambient Intell and Human Comput 13:2325\u20132342","journal-title":"J Ambient Intell and Human Comput"},{"key":"2273_CR31","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s12652-014-0245-8","volume":"6","author":"PC Sung","year":"2015","unstructured":"Sung PC, Hsu CC, Lee CL, Chiu YSP, Chen HL (2015) Formulating grip strength and key pinch strength prediction models for Taiwanese: a comparison between stepwise regression and artificial neural networks. J Ambient Intell Humaniz Comput 6:37\u201346","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"360","key":"2273_CR32","first-page":"64","volume":"16","author":"A Tarabasz","year":"2018","unstructured":"Tarabasz A (2018) Cybersecurity and internet of threats. Studia ekonomiczne. Zeszyty naukowe 16(360):64\u201381","journal-title":"Studia ekonomiczne. Zeszyty naukowe"},{"key":"2273_CR33","doi-asserted-by":"crossref","unstructured":"Tirumala SS, Sarrafzadeh S, Pang P (2016) A survey on internet usage and cybersecurity. In: 14th annual conference on privacy 7","DOI":"10.1109\/PST.2016.7906931"},{"issue":"1","key":"2273_CR34","first-page":"21","volume":"2019","author":"L Tsado","year":"2019","unstructured":"Tsado L (2019) Cybersecurity education: the need for a topdriven, multidisciplinary, school-wide approach. J Cybersec Edu Res Pract 2019(1):21","journal-title":"J Cybersec Edu Res Pract"},{"key":"2273_CR35","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/fi13020039","volume":"13","author":"JB Ulven","year":"2021","unstructured":"Ulven JB, Gaute W (2021) A systematic review of cybersecurity risks in higher education. Future Internet 13:39. https:\/\/doi.org\/10.3390\/fi13020039","journal-title":"Future Internet"},{"issue":"3","key":"2273_CR36","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1007\/s12652-022-04484-7","volume":"14","author":"Q Xu","year":"2023","unstructured":"Xu Q, Wu D, Jiang C, Wang X (2023) A composite quantile regression long short-term memory network with group lasso for wind turbine anomaly detection. J Ambient Intell Humaniz Comput 14(3):2261\u20132274","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"2273_CR37","first-page":"6","volume":"9","author":"R Yadav","year":"2021","unstructured":"Yadav R (2021) Social deception in online platform: concept, attacks and ethical issues. It In Industry 9(3):6","journal-title":"It In Industry"},{"key":"2273_CR38","doi-asserted-by":"crossref","unstructured":"Zeng L, Zhang H, Han Q, Tang Y, Ye L, Wu Y, Zu H (2021) An LSTM-based driving operation suggestion method for riding comfort-oriented critical zone. J Ambient Intell Humaniz Comput 1\u201317.","DOI":"10.1007\/s12652-021-03327-1"},{"key":"2273_CR39","doi-asserted-by":"publisher","first-page":"4439","DOI":"10.1007\/s12652-018-1125-4","volume":"10","author":"H Zhang","year":"2019","unstructured":"Zhang H, Zhang G, Yan Q (2019) Digital twin-driven cyber-physical production system towards smart shop-floor. J Ambient Intell Humaniz Comput 10:4439\u20134453","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02273-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-024-02273-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02273-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:22:41Z","timestamp":1718382161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-024-02273-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,29]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2273"],"URL":"https:\/\/doi.org\/10.1007\/s13198-024-02273-3","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,29]]},"assertion":[{"value":"13 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest and all ethical issues including human or animal participation has been done. No such consent is applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}