{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:34:07Z","timestamp":1775421247775,"version":"3.50.1"},"reference-count":67,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T00:00:00Z","timestamp":1686268800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001858","name":"VINNOVA","doi-asserted-by":"publisher","award":["2019-05021"],"award-info":[{"award-number":["2019-05021"]}],"id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,3,3]]},"DOI":"10.1080\/19393555.2023.2222713","type":"journal-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T12:15:30Z","timestamp":1686312930000},"page":"121-137","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["User perception of Context-Based Micro-Training \u2013 a method for cybersecurity training"],"prefix":"10.1080","volume":"33","author":[{"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[{"name":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"}]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham, Nottingham, UK"}]},{"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"}]}],"member":"301","published-online":{"date-parts":[[2023,6,9]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101586"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-11-2016-0085"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tjem.2018.08.001"},{"key":"e_1_3_2_6_1","volume-title":"Proceedings of the World Congress on Engineering","author":"Al Daeef M. M.","year":"2017","unstructured":"Al Daeef, M. M., Basir, N., & Saudi, M. M. (2017). Security awareness training: A review. (Ed.),^(Eds). Proceedings of the World Congress on Engineering, London, UK."},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TALE.2018.8615162"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102090"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106531"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2019-0019"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1901.02672"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_15_1","volume-title":"Mobile learning with micro-content: A framework and evaluation (BLED proceedings","author":"Bruck P. A.","year":"2012","unstructured":"Bruck, P. A., Motiwalla, L., & Foerster, F. (2012). Mobile learning with micro-content: A framework and evaluation (BLED proceedings (Vol. 25). AIS."},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91716-0_2"},{"key":"e_1_3_2_17_1","unstructured":"Cybint. (2020). 15 alarming cyber security facts and stats . Retrieved April 23 2021 from https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.52306\/03010420GXUV5876"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.02.007"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14024"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2020.1797546"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.023"},{"key":"e_1_3_2_23_1","unstructured":"EC-council. (2019). The top types of cybersecurity attacks of 2019 till date . Retrieved April. 23 2021 from https:\/\/blog.eccouncil.org\/the-top-types-of-cybersecurity-attacks-of-2019-till-date\/"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.016"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006128500590070"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2017.e00346"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2008.00433.x"},{"key":"e_1_3_2_28_1","unstructured":"Henriquez M. (2019). The top 12 data breaches of 2019 . Retrieved April 23 2021 from https:\/\/www.securitymagazine.com\/articles\/91366-the-top-12-data-breaches-of-2019"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985451"},{"key":"e_1_3_2_30_1","first-page":"253","volume-title":"Learning with Technology, ASCILITE'95 Conference Proceedings","author":"Herrington J.","year":"1995","unstructured":"Herrington, J., & Oliver, R. (1995). Critical characteristics of situated learning: Implications for the instructional design of multimedia for higher education. Learning with Technology, ASCILITE'95 Conference Proceedings (pp. 253\u2013262). ASCILITE."},{"key":"e_1_3_2_31_1","doi-asserted-by":"crossref","unstructured":"Huynh D. Luong P. Iida H. & Beuran R. (2017). Design and evaluation of a cybersecurity awareness training game. Vol. 10507 LNCS (pp. 183\u2013188).","DOI":"10.1007\/978-3-319-66715-7_19"},{"key":"e_1_3_2_32_1","article-title":"The WVS cultural map of the world","author":"Inglehart R.","year":"2010","unstructured":"Inglehart, R., & Welzel, C. (2010). The WVS cultural map of the world. World Values Survey. https:\/\/www.worldvaluessurvey.org\/WVSContents.jsp?CMSID=Findings","journal-title":"World Values Survey"},{"issue":"4","key":"e_1_3_2_33_1","first-page":"351","article-title":"Human aspects of cyber security: Behaviour or culture change?","volume":"1","author":"Joinson A.","year":"2018","unstructured":"Joinson, A., & van Steen, T. (2018). Human aspects of cyber security: Behaviour or culture change? Cyber Security: A Peer-Reviewed Journal, 1(4), 351\u2013360.","journal-title":"Cyber Security: A Peer-Reviewed Journal"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.9734\/BJAST\/2015\/14975"},{"key":"e_1_3_2_35_1","first-page":"53","article-title":"Contextual learning: A review and synthesis","author":"Karweit N.","year":"1998","unstructured":"Karweit, N. (1998). Contextual learning: A review and synthesis. Educational Reform and Vocational Education, 53\u201384. http:\/\/hdl.voced.edu.au\/10707\/63919","journal-title":"Educational Reform and Vocational Education"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14040104"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306446.3340814"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_7"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57404-8_6"},{"key":"e_1_3_2_40_1","volume-title":"Proceedings of the 15th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2021","author":"K\u00e4vrestad J.","year":"2019","unstructured":"K\u00e4vrestad, J., Sk\u00e4rg\u00e5rd, M., & Nohlberg, M. (2019). Users perception of using CBMT for information security training. Proceedings of the 15th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2021), Nicosia, cyprus. CSCAN."},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-01-2013-0005"},{"key":"e_1_3_2_42_1","volume-title":"Applying Modern Principles of Adult Education","author":"Knowles M. S.","year":"1984","unstructured":"Knowles, M. S. (1984). Andragogy in Action. Applying Modern Principles of Adult Education. Jossey Bass."},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101995"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01250"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2014.885159"},{"key":"e_1_3_2_46_1","first-page":"177","volume-title":"Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance","author":"Micallef N.","year":"2017","unstructured":"Micallef, N., & Arachchilage, N. A. G. (2017). Involving users in the design of a serious game for security questions education. Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, Adelaide, Australia, (pp. 177\u2013187). CSCAN."},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2006.01822.x"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10459-010-9222-y"},{"key":"e_1_3_2_49_1","unstructured":"OECD. (2019). Hows Life in the Digital Age? Retrieved April 23 2021 from https:\/\/www.oecdilibrary.org\/content\/publication\/9789264311800-en"},{"key":"e_1_3_2_50_1","volume-title":"Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)","author":"Parsons K.","year":"2018","unstructured":"Parsons, K., Butavicius, M., Lillie, M., Calic, D., McCormac, A., & Pattinson, M. (2018). Which individual, cultural, organisational and inerventional factors explain phishing resilience? Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Dundee, Scotland. CSCAN."},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.05.003"},{"key":"e_1_3_2_52_1","first-page":"259","volume-title":"(Proceedings of the Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020)","author":"Reinheimer B.","year":"2020","unstructured":"Reinheimer, B., Aldag, L., Mayer, P., Mossano, M., Duezguen, R., Lofthouse, B., von Landesberger, T., & Volkamer, M. (2020). An investigation of phishing awareness and education over time: When and how to best remind users (Proceedings of the Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020) (pp. 259\u2013284). USENIX Association."},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/20552076221081716"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.037"},{"key":"e_1_3_2_56_1","volume-title":"Elementary survey sampling","author":"Scheaffer R. L.","year":"2011","unstructured":"Scheaffer, R. L., Mendenhall, W., III, Ott, R. L., & Gerow, K. G. (2011). Elementary survey sampling. Cengage Learning."},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04302"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/503345.503348"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00491"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/01490400.2015.1127189"},{"key":"e_1_3_2_63_1","unstructured":"Vetenskapsr\u00e5det. (2017). Good research practice. https:\/\/www.vr.se\/english\/analysis\/reports\/our-reports\/2017-08-31-good-research-practice.html"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677290"},{"key":"e_1_3_2_65_1","volume-title":"Naked statistics: Stripping the dread from the data","author":"Wheelan C.","year":"2013","unstructured":"Wheelan, C. (2013). Naked statistics: Stripping the dread from the data. WW Norton & Company."},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1186\/cc1455"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-16"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1919941"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.05.005"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2023.2222713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T02:57:31Z","timestamp":1705546651000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2023.2222713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,9]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3,3]]}},"alternative-id":["10.1080\/19393555.2023.2222713"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2023.2222713","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}