{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:56:06Z","timestamp":1776977766346,"version":"3.51.4"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472337","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Beyond the Firewall: A Comparative Analysis of Leading Cybersecurity Training Programs"],"prefix":"10.1109","author":[{"given":"Eric B.","family":"Blancaflor","sequence":"first","affiliation":[{"name":"Map&#x00FA;a University,School of Information Technology,Makati City,Philippines"}]},{"given":"James Alvis R.","family":"Azarcon","sequence":"additional","affiliation":[{"name":"Map&#x00FA;a University,School of Information Technology,Makati City,Philippines"}]},{"given":"Aton Alwin A.","family":"David","sequence":"additional","affiliation":[{"name":"Map&#x00FA;a University,School of Information Technology,Makati City,Philippines"}]},{"given":"Josh Mae M.","family":"Jacala","sequence":"additional","affiliation":[{"name":"Map&#x00FA;a University,School of Information Technology,Makati City,Philippines"}]},{"given":"Jorj Andrei G.","family":"Sional","sequence":"additional","affiliation":[{"name":"Map&#x00FA;a University,School of Information Technology,Makati City,Philippines"}]},{"given":"Will Stephenson P.","family":"Sy","sequence":"additional","affiliation":[{"name":"Map&#x00FA;a University,School of Information Technology,Makati City,Philippines"}]},{"given":"Ma. Theresa","family":"Menor","sequence":"additional","affiliation":[{"name":"Map&#x00FA;a University,SHS Department,Makati City,Philippines"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3442480"},{"key":"ref2","first-page":"204","article-title":"Cybersecurity challenges and awareness among small and medium enterprises (SMEs) in a developing economy","volume":"50","author":"Rahman","year":"2020","journal-title":"Int. J. Inf. Manage."},{"key":"ref3","first-page":"1","article-title":"A framework for improving cybersecurity awareness among SMEs in developing countries","volume-title":"Proc. 2019 Int. Conf. Inf. Commun. Technol. Appl. (ICICTA)","author":"Olowononi"},{"key":"ref4","first-page":"1","article-title":"Cybersecurity and its impact on the performance of small and medium enterprises","volume-title":"Proc. 2020 Int. Conf. Comput. Inf. Syst. (ICOCIS)","author":"Aloh"},{"issue":"1","key":"ref5","first-page":"51","article-title":"Developing a cybersecurity awareness program for small and medium-sized enterprises in emerging economies","volume":"13","author":"Prempeh","year":"2021","journal-title":"J. Inf. Technol. Manage."},{"key":"ref6","first-page":"828","article-title":"Digital transformation challenges and opportunities for SMEs in emerging economies","volume":"139","author":"Singh","year":"2021","journal-title":"J. Bus. Res."},{"key":"ref7","article-title":"Addressing Cyberspace Vulnerability: The ASEAN and the Philippines","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2018.1484598"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-69891-5_81-1","article-title":"Cybersecurity: Practice","author":"Grispos","year":"2019"},{"key":"ref10","article-title":"ISO\/IEC 27001:2022","year":"2022"},{"key":"ref11","article-title":"Information security - the fourth wave","volume-title":"ResearchGate","author":"von Solms","year":"2018"},{"key":"ref12","article-title":"Intrusion Detection Systems Basics & Benefits","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app10165702"},{"key":"ref14","article-title":"The Importance of Website & Server Logs","author":"Konov","year":"2022"},{"key":"ref15","first-page":"358","article-title":"A Reflection on Typology and Verification Flaws in Consideration of Biocybersecurity\/Cybersecurity: Just Another Gap in the Wall","volume-title":"Eur. Conf. Cyber Warfare Security","author":"Potter"},{"key":"ref16","article-title":"Cybersecurity threats proliferating for midsize and smaller businesses","author":"Banham","year":"2017"},{"key":"ref17","article-title":"What is Cyber Vendor Risk Management? Cyber VRM Explained","author":"Sen","year":"2024"},{"key":"ref18","article-title":"Importance of Cloud Security","author":"Markulec","year":"2024"},{"key":"ref19","article-title":"The imperative need for robust data security in the Digital age","volume-title":"LinkedIn","volume":"2023"},{"key":"ref20","article-title":"Cybersecurity Courses & Certifications"},{"key":"ref21","article-title":"Is CompTIA Security+ Worth it in 2024?","author":"Madden","year":"2024"},{"key":"ref22","article-title":"6 Best Certifications for Ethical Hackers To Boost Your IT Career","author":"Scheldt","year":"2022"},{"key":"ref23","article-title":"Cybersecurity Is All We Teach"},{"key":"ref24","article-title":"Level Up Your IT Skills: Are CompTIA Certifications Worth It?"},{"key":"ref25","article-title":"Cyber Security Courses, Training, Certifications and Resources"},{"key":"ref26","article-title":"Is it Worth it to get CompTIA+ Certified?","year":"2024"},{"key":"ref27","article-title":"The CompTIA Cybersecurity Career Pathway: Employable Skills Found Here","author":"Lane","year":"2023"},{"key":"ref28","article-title":"Top 5 Reasons to Earn GIAC Certifications & Keep Them Active","year":"2023"},{"key":"ref29","article-title":"CompTIA Career Pathway"},{"key":"ref30","article-title":"From Hacker to Hero: Mastering Cybersecurity with EC-Council","author":"Media","year":"2024"},{"key":"ref31","article-title":"Flexible Cybersecurity Degree and Certificate Programs to Meet Your Schedule"},{"key":"ref32","article-title":"CompTIA Security+","year":"2024"},{"key":"ref33","article-title":"Comptia"},{"key":"ref34","article-title":"Empowering Cyber Security Practitioners & Teams"},{"key":"ref35","article-title":"SANS Institute review"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472337.pdf?arnumber=11472337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:57:46Z","timestamp":1776974266000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472337\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472337","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}