{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T08:55:16Z","timestamp":1770195316441,"version":"3.49.0"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1109\/educon46332.2021.9454062","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T16:36:14Z","timestamp":1624034174000},"page":"1674-1681","source":"Crossref","is-referenced-by-count":12,"title":["Cybersecurity Training in the Healthcare Workforce \u2013 Utilization of the ADDIE Model"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Pears","sequence":"first","affiliation":[]},{"given":"Stathis Th.","family":"Konstantinidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsurg.2018.01.015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/00221300209602099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF02904345"},{"key":"ref32","first-page":"411","author":"haney","year":"2018","journal-title":"&#x201C; It&#x2019;s Scary&#x2026; It&#x2019;s Confusing&#x2026; It&#x2019;s Dull&#x201D; How Cybersecurity Advocates Overcome Negative Perceptions of Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-385522-0.00005-6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4324\/9780203774441"},{"key":"ref35","author":"walsh","year":"2014","journal-title":"The nurse mentor&#x2019;s handbook Supporting students in clinical practice"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsurg.2013.01.008"},{"key":"ref60","author":"banta","year":"1988","journal-title":"Implementing outcomes assessment Promise and perils"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/0142159X.2018.1460656"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2729.2008.00292.x"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.08.035"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09506-6"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52581-1_14"},{"key":"ref27","author":"kristiandi hartono","year":"2018","journal-title":"Bahasa Indonesia ADDIE MODEL"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3434780.3436637"},{"key":"ref66","first-page":"2561","article-title":"CyberSecurity and Technology: How Do They Fit into a Science Classroom?","author":"burrows","year":"2019","journal-title":"Proceedings of Society for Information Technology & Teacher Education International Conference"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/0729436990180105"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.21585\/ijcses.v2i1.21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S2155-8256(20)30014-4"},{"key":"ref1","article-title":"UPDATED Statement on reported NHS cyber-attack","year":"2020","journal-title":"NHS Digital"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23204"},{"key":"ref22","article-title":"Cyber and data security services and resources","year":"2020","journal-title":"NHS Digital"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/ans.12180"},{"key":"ref24","first-page":"253","article-title":"Actions to empower digital competences in healthcare workforce: a qualitative approach","volume":"238","author":"konstantinidis","year":"2017","journal-title":"Informatics Empowers Healthcare Transformation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3349266.3351407"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/pfi.4930420508"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3233\/THC-161263"},{"key":"ref50","first-page":"x","author":"dweck","year":"2006","journal-title":"Mindset The New Psychology of Success"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jarmac.2019.05.005"},{"key":"ref59","article-title":"Classroom assessment for student learning: Doing it right-using it well","author":"chappuis","year":"2012","journal-title":"Upper Saddle River NJ Pearson Education"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jemermed.2018.10.029"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1111\/medu.13387"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.4103\/0974-2700.70743"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.2196\/14676"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3343"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3109\/0142159X.2011.613501"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11165-016-9541-y"},{"key":"ref10","first-page":"1","article-title":"A human error approach to aviation accident analysis: The human factors analysis and classification system","author":"wiegmann","year":"2012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.b3595"},{"key":"ref40","author":"winne","year":"2014","journal-title":"Metacognition"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpedsurg.2018.02.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.02.007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/0018720815585906"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3011141.3011165"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4103\/0019-5278.197518"},{"key":"ref17","article-title":"Strategies of decision making","author":"klein","year":"1989","journal-title":"KLEIN ASSOCIATES INC YELLOW SPRINGS OH"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1518\/001872008X288385"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29824-5_1"},{"key":"ref4","first-page":"561","article-title":"Analysis of EU-USA cooperation opportunities on IT skills for healthcare workforce","author":"traver","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/1460458217704257"},{"key":"ref6","article-title":"Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data","year":"2020","journal-title":"Ponemon Institute"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2196\/12644"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-019-0161-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/jhrm.21230"},{"key":"ref49","article-title":"Investigating the impact of cybersecurity policy awareness on employees","year":"2020","journal-title":"cybersecurity behavior Elsevier Enhanced Reader"},{"key":"ref9","first-page":"110","article-title":"Revisiting the Swiss cheese model of accidents","volume":"27","author":"reason","year":"2006","journal-title":"Journal of Clinical Engineering"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1177\/1053825916678265"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1108\/14676370910945963"},{"key":"ref48","article-title":"Instructional design theory","author":"merrill","year":"1994","journal-title":"Educational Technology"},{"key":"ref47","first-page":"246","author":"willeke","year":"2011","journal-title":"Agile in academics applying agile to instructional design"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/0956797617744771"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(80)90052-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11409-006-6893-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11409-019-09197-5"}],"event":{"name":"2021 IEEE Global Engineering Education Conference (EDUCON)","location":"Vienna, Austria","start":{"date-parts":[[2021,4,21]]},"end":{"date-parts":[[2021,4,23]]}},"container-title":["2021 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9453798\/9453843\/09454062.pdf?arnumber=9454062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:42:37Z","timestamp":1652182957000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9454062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/educon46332.2021.9454062","relation":{},"subject":[],"published":{"date-parts":[[2021,4,21]]}}}