{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:18Z","timestamp":1756273218263,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130156","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"832-837","source":"Crossref","is-referenced-by-count":0,"title":["CYRUS - A personalised, customised, work-based training framework for enhanced CYbeR-security skills across indUstrial Sectors"],"prefix":"10.1109","author":[{"given":"Enrico","family":"Frumento","sequence":"first","affiliation":[{"name":"Cybersecurity Research Lead CEFRIEL,Milan,Italy"}]},{"given":"Katharina","family":"Lange","sequence":"additional","affiliation":[{"name":"Communication Manager EIT Manufacturing Central gGmbH,Darmstadt,Germany"}]},{"given":"Alessia","family":"Golfetti","sequence":"additional","affiliation":[{"name":"Head of secure societies Deep Blue SRL,Rome,Italy"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.cose.2024.103826"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.procs.2023.10.358"},{"volume-title":"General pedagogy: A guide to effective teaching","year":"2023","author":"Zama","key":"ref3"},{"key":"ref4","article-title":"How effective is security awareness training?","author":"Jordan","year":"2025","journal-title":"uSecure"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.14569\/IJACSA.2022.0130572"},{"year":"2021","journal-title":"ProofPoint","article-title":"Why Employee Cyber-Awareness is Critical Every Day, Not Just During a Crisis","key":"ref6"},{"key":"ref7","article-title":"How effective is security awareness training? Not enough","author":"Isabella","year":"2022","journal-title":"TechTarget"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-030-81111-2_9"},{"year":"2019","author":"Australia","article-title":"Most Common Vulnerabilities for SMEs (20152019)","key":"ref9"},{"issue":"2024","author":"Frumento","article-title":"Cybersecurity: how to involve people in risk mitigation?","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.4324\/9780203357385-23"},{"year":"1980","author":"Knowles","article-title":"The modern practice of adult education: From pedagogy to andragogy","key":"ref12"},{"year":"1984","author":"Knowles","article-title":"Andragogy in action","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.19173\/irrodl.v13i1.1076"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.5040\/9781472553232"},{"year":"2024","article-title":"1 Overview of the training requirements of different user groups in the TM sectors","key":"ref16"},{"volume-title":"CYRUS project, D1.1 Report on the cybersecurity skills and needs, future cyber-threat scenarios, and the assets at stake in the TM sectors","year":"2023","key":"ref17"},{"volume-title":"CYRUS project, D1.2 Cybersecurity competence framework","year":"2024","key":"ref18"},{"year":"2025","article-title":"CYRUS CyberSecurity Training","key":"ref19"},{"year":"2024","article-title":"CYRUS Cybersecurity Competence Framework Excel","key":"ref20"},{"year":"2024","author":"Draghi","article-title":"The future of European competitiveness-A competitiveness strategy for Europe","key":"ref21"},{"year":"2020","article-title":"Enhanced cyberrisk reporting: Opening doors to risk-based cybersecurity","key":"ref22"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130156.pdf?arnumber=11130156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:05:21Z","timestamp":1756271121000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130156","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}