{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:07:02Z","timestamp":1755223622671,"version":"3.43.0"},"reference-count":184,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"The ATHENA project, a Digital Europe Project, co-funded by the European Union","award":["101127970"],"award-info":[{"award-number":["101127970"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3594045","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:52:04Z","timestamp":1753901524000},"page":"138265-138312","source":"Crossref","is-referenced-by-count":0,"title":["Strengths and Knowledge Gaps Identified From Cybersecurity Education and Training Programs, and the Implications for Operational Technology Personnel in Critical Infrastructures: A Scoping Review"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9069-4266","authenticated-orcid":false,"given":"Leanne Noelle Strom","family":"Torgersen","sequence":"first","affiliation":[{"name":"Faculty of Health, Welfare and Organization, &#x00D8;stfold University College, Halden, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2239-413X","authenticated-orcid":false,"given":"Elizabeth Rebecca","family":"Noble","sequence":"additional","affiliation":[{"name":"Faculty of Health, Welfare and Organization, &#x00D8;stfold University College, Halden, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1907-0004","authenticated-orcid":false,"given":"Torvald Foss\u00e5en","family":"Ask","sequence":"additional","affiliation":[{"name":"Faculty of Health, Welfare and Organization, &#x00D8;stfold University College, Halden, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4540-9534","authenticated-orcid":false,"given":"Benjamin J.","family":"Knox","sequence":"additional","affiliation":[{"name":"Faculty of Health, Welfare and Organization, &#x00D8;stfold University College, Halden, Norway"}]}],"member":"263","reference":[{"author":"Rainer","key":"ref1","article-title":"Department of energy cybersecurity program. DOE O 205.1D"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3344429.3372507"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.019938"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app13063410"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ths.2015.7225263"},{"volume-title":"The NIS2 Directive: A High Common Level of Cybersecurity in the EU","year":"2021","author":"Negreiro","key":"ref6"},{"author":"Ashenden","key":"ref7","article-title":"Information security awareness: Improving current research & practice"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102551"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/mspec.2013.6471059"},{"volume-title":"PRC State-sponsored Actors Compromise and Maintain Persistent Access To U.S. Critical Infrastructure, AA24-038A","year":"2024","key":"ref10"},{"first-page":"1","volume-title":"Cybersecurity Culture Guidelines-behavioural Aspects of Cybersecurity","year":"2018","key":"ref11"},{"issue":"4","key":"ref12","first-page":"1","article-title":"An effective cybersecurity awareness training model: First defense of an organizational security strategy","volume":"9","author":"Dash","year":"2022","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s12913-022-08983-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61569-6_15"},{"volume-title":"What is Cybersecurity?","year":"2024","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ths.2011.6107876"},{"article-title":"NIST special publication 800-50 building an information technology security awareness and training program, computer security","year":"2003","author":"Wilson","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2023.988043"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00691"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON62633.2025.11016494"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.11591\/edulearn.v12i1.7736"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.12.168"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/21582440231156367"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2022.998335"},{"volume-title":"JBI Manual for Evidence Synthesis: Introduction","year":"2020","author":"Aromataris","key":"ref25"},{"first-page":"1","volume-title":"Intelligence-driven Computer Network Defense Informed By Analysis of Adversary Campaigns and Intrusion Kill Chains","author":"Hutchins","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/malware.2011.6112333"},{"volume-title":"APT 1: Exposing One of China\u2019s Cyber Espionage Units","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.11124\/JBIES-20-00167"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.46658\/JBIMES-24-01","volume-title":"JBI Manual Evidence Synthesis: 10. Scoping Reviews","author":"Aromataris","year":"2024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01626-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.11124\/jbies-22-00123"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm57358.2023.10333919"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IMCET53404.2021.9665642"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC60084.2023.10349976"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON46332.2021.9454062"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2018.8363488"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2782813"},{"issue":"4","key":"ref39","first-page":"281","article-title":"Social representations of cybersecurity by university students and implications for instructional design","volume":"26","author":"Pawlowski","year":"2015","journal-title":"J. Inf. Syst. Educ."},{"key":"ref40","first-page":"88","article-title":"Cyber security competencies: Cyber security education and research in Finnish universities","volume-title":"Proc. 14th Eur. Conf. Cyber Warfare Security","author":"Lehto"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.4018\/IJCWT.2016040102"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/08404704231196137"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2196\/41294"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s20247148"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare9101335"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2023.1042783"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05637-6_33"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.176"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.616"},{"issue":"2","key":"ref50","first-page":"72","article-title":"The structure of a graduate defensive cybersecurity course","volume":"39","author":"Lotfy","year":"2023","journal-title":"J. Comput. Sci. Colleges"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3570353.3570358"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2751957.2751958"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2528908.2528920"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3368691.3368705"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.02.003"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz001"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00064-4"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-020-10155-x"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.53656\/ped2023-6s.07"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2019-0022"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216711"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2023.1277282"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.17513"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/app12136520"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.46300\/9109.2020.14.10"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1845583"},{"issue":"4","key":"ref69","first-page":"299","article-title":"Identifying strategies to address human cybersecurity behavior: A review study","volume":"22","author":"Hakami","year":"2022","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"4","key":"ref70","first-page":"1","article-title":"The human factors and cybersecurity policy","volume":"20","author":"Qashqari","year":"2020","journal-title":"Int. J. Comput. Sci. Network Secur."},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101823"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.08.209"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.2151"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.11.206"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2020.03.058"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.178"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.10.282"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.06.004"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.05.007"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103695"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103671"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103069"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102609"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101731"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103614"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108061"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.08.098"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2022.103908"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICIR55739.2022.00027"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2014.6980976"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2017.8088665"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ISI58743.2023.10297207"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.30935\/ojcmt\/13784"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.18421\/TEM122-05"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(17)30122-8"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00680-4"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3281272"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2017.8088646"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE.2017.8284420"},{"key":"ref101","first-page":"143","article-title":"Tracking the students\u2019 learning behavior for cybersecurity scenarios","volume-title":"Proc. LASI-SPAIN","author":"Uzal"},{"key":"ref102","first-page":"9","article-title":"OT cyber security frameworks comparison tool (CSFCTool)","volume-title":"Proc. ITASEC","author":"Murino"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.18260\/p.23911"},{"key":"ref104","first-page":"1","article-title":"Sifu reloaded: An open-source gamified Web-based cybersecurity awareness platform (short paper)","volume-title":"Proc. 4th Int. Comput. Program. Educ. Conf.","author":"Paiva"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--43340"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON52738.2021.9535632"},{"issue":"4","key":"ref107","first-page":"37","article-title":"Enabling exercises, education and research with a comprehensive cyber range","volume":"12","author":"Leitner","year":"2021","journal-title":"J. Wireless Mobile Netw., Ubiquitous Comput., Dependable Appl."},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.17083\/ijsg.v8i1.413"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--40437"},{"key":"ref110","first-page":"1","article-title":"Modeling cognitive dynamics in end-user response to phishing emails","volume-title":"Proc. 17th Int. Conf. Cognit. Model.","author":"Cranford"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2020-0121"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80865-5_3"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213571039"},{"key":"ref114","first-page":"69","article-title":"Human centric framework for customising and producing effective cybersecurity training materials","volume-title":"Proc. Joint 4th Int. Workshop Exper. SQuaRE Ser. Future Direction 1st Asia\u2013Pacific Softw. Eng. Diversity, Equity, Inclusion Workshop","author":"Giriraj"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_9"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52581-1_12"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/app10165702"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99587-4_42"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60585-2_23"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.36941\/ajis-2021-0111"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--42554"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028407"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/isec49744.2020.9280596"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENG.2018.8638166"},{"key":"ref125","first-page":"1","article-title":"How to increase ethical awareness in cybersecurity decision-making","volume-title":"Proc. ACIS","author":"Sadeghi"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3617553.3617888"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409313"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3374135.3385301"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3291533.3291542"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41932-9_19"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017692"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_24"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.5220\/0010393107020713"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.5220\/0007574305580563"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.15388\/Im.2023.96.67"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86797-3_25"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.5220\/0011680500003405"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43129-6_17"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94782-2_20"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2020.385"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94782-2_13"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/2957792.2957800"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42051-2_14"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20488-4_6"},{"key":"ref145","first-page":"179","article-title":"A curriculum model for industrial control systems cyber-security with sample modules","volume-title":"Proc. 27th Int. Conf. Comput. Appl.","author":"Foreman"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.120304"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ASCC.2015.7244713"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41932-9_22"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42051-2_10"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.34190\/eccws.21.1.201"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI54926.2021.00203"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/RTUCON51174.2020.9316573"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_2"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ISECon.2019.8882112"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/EAEEIE46886.2019.9000440"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017583"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18500-2_4"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64881-7_10"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2018.470"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103585"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19097-1_13"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.05.005"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.ypmed.2014.06.010"},{"volume-title":"What is Cyber Resilience?","year":"2024","key":"ref164"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.1.80"},{"volume-title":"Behavior Principles in Everyday Life","year":"2001","author":"Baldwin","key":"ref166"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1006\/lmot.2001.1112"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.2007.00325.x"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/2994475.2994484"},{"article-title":"Cybersecurity in critical infrastructure: Understanding the needs of operational technology personnel for developing training in cybersecurity awareness and behavior","year":"2025","author":"Noble","key":"ref171"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90328-2_2"},{"volume-title":"Cyber Security Culture in Organizations","year":"2017","key":"ref173"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2021.1903367"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.4018\/IJCWT.2019010104"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-50r1.ipd"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00704-z"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-92840-6_14"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295x.84.2.191"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395522"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102710"},{"key":"ref184","first-page":"1","article-title":"The study of cybersecurity self-efficacy: A systematic literature review of methodology","volume-title":"Proc. 17th USENIX Symp. Usable Privacy Secur. (SOUPS)","author":"Borgert"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11104227.pdf?arnumber=11104227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T05:23:09Z","timestamp":1754976189000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11104227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":184,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3594045","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}