{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T05:56:46Z","timestamp":1763445406673,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/educon45650.2020.9125213","type":"proceedings-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T16:36:11Z","timestamp":1593102971000},"page":"1361-1369","source":"Crossref","is-referenced-by-count":6,"title":["Cybersecurity Education and Skills: Exploring Students\u2019 Perceptions, Preferences and Performance in a Blended Learning Initiative"],"prefix":"10.1109","author":[{"given":"Ali","family":"Farooq","sequence":"first","affiliation":[]},{"given":"Antti","family":"Hakkala","sequence":"additional","affiliation":[]},{"given":"Seppo","family":"Virtanen","sequence":"additional","affiliation":[]},{"given":"Jouni","family":"Isoaho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2016","author":"hair","key":"ref32"},{"journal-title":"Multivariate Data Analysis","year":"2010","author":"hair","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NCG.2018.8593159"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2010.10.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2012.12.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-479-0.ch002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2010.07.017"},{"key":"ref14","first-page":"924","article-title":"Designing a blended-learning Bachelor&#x2019;s degree in electrical engineering for non-traditional students","author":"bohmer","year":"2013","journal-title":"IEEE Global Engineering Education Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2017.7942899"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2011.5773168"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2015.7096083"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2018.8363295"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5539\/ies.v3n3p36"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.394"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35694-5_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"ref3","first-page":"32","article-title":"Different Approaches in the Teaching of Information Systems Security","author":"yurcik","year":"2001","journal-title":"The Proceedings of the Information Systems Education Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v16i3.2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2015040104"},{"key":"ref5","article-title":"Virtualization of laboratory education in network security engineering","author":"hakkala","year":"2015","journal-title":"ICEE 2015 - International Conference on Engineering Education"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2015.09.005"},{"key":"ref7","first-page":"1890","article-title":"Approximately stable, school optimal, and student-truthful many-to-one matchings (via differential privacy)","author":"kannan","year":"2014","journal-title":"Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.11.003"},{"key":"ref9","article-title":"Hybrid, Blended, Flipped, and Inverted: Defining Terms in a Two Dimensional Taxonomy","author":"margulieux","year":"2014","journal-title":"12th Annual Hawaii International Conference on Education"},{"journal-title":"On Security and Privacy for Networked Information Society - Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes","year":"2017","author":"hakkala","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/03043797.2011.619647"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/016146811311500307","article-title":"The Effectiveness of Online and Blended Learning: A Meta-Analysis of the Empirical Literature","volume":"115","author":"means","year":"2013","journal-title":"Teachers College Record"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3102\/0034654309333844"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.111.3.455"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/IJKL.2008.022886"},{"journal-title":"In Quest of information security in higher education institutions Security awareness concerns and behaviour of students","year":"2019","author":"farooq","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_17"}],"event":{"name":"2020 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2020,4,27]]},"location":"Porto, Portugal","end":{"date-parts":[[2020,4,30]]}},"container-title":["2020 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9121928\/9125085\/09125213.pdf?arnumber=9125213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T07:03:33Z","timestamp":1667113413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9125213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/educon45650.2020.9125213","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}