{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:20:37Z","timestamp":1769847637859,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3656650.3660536","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T18:27:17Z","timestamp":1717180037000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["CyberSecurity Education for Industry and Academia (CSE4IA 2024)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-6786","authenticated-orcid":false,"given":"Vita Santa","family":"Barletta","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6167-3896","authenticated-orcid":false,"given":"Federica","family":"Caruso","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Computer Science and Mathematics, University of L'Aquila, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8069-1168","authenticated-orcid":false,"given":"Tania","family":"Di Mascio","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Computer Science and Mathematics, University of L'Aquila, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2730-7697","authenticated-orcid":false,"given":"Francesco","family":"Greco","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6437-8251","authenticated-orcid":false,"given":"Tasmina","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4079-9641","authenticated-orcid":false,"given":"Veronica","family":"Rossano","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bari Aldo Moro, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2273-6679","authenticated-orcid":false,"given":"Hannan","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym15122175"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 3rd Italian Conference on Cyber Security (ITASEC2019)","author":"Baldassarre Maria\u00a0Teresa","year":"2019","unstructured":"Maria\u00a0Teresa Baldassarre, Vita Santa\u00a0Barletta, Danilo Caivano, Domenico Raguseo, Michele Scalera, 2019. Teaching Cyber Security: The HACK-SPACE Integrated Model. In Proceedings of the 3rd Italian Conference on Cyber Security (ITASEC2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"CEUR Workshop Proceedings, Vol.\u00a03408","author":"Barletta Vita\u00a0Santa","year":"2023","unstructured":"Vita\u00a0Santa Barletta, Danilo Caivano, Federica Caruso, Sara Peretti, and Veronica Rossano. 2023. Cyber Security Education for Industry and Academia-CSE4IA. In CEUR Workshop Proceedings, Vol.\u00a03408. CEUR-WS."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MetroXRAINE58569.2023.10405607"},{"key":"e_1_3_2_1_5_1","volume-title":"Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills?Education and information technologies 27, 3","author":"Bla\u017ei\u010d Borka\u00a0Jerman","year":"2022","unstructured":"Borka\u00a0Jerman Bla\u017ei\u010d. 2022. Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills?Education and information technologies 27, 3 (2022), 3011\u20133036."},{"key":"e_1_3_2_1_6_1","volume-title":"CEUR Workshop Proceedings, Vol.\u00a03408","author":"Calvano Miriana","year":"2023","unstructured":"Miriana Calvano, Federica Caruso, Antonio Curci, Antonio Piccinno, and Veronica Rossano. 2023. A Rapid Review on Serious Games for Cybersecurity Education: Are \u201cSerious\u201d and Gaming Aspects Well Balanced?. In CEUR Workshop Proceedings, Vol.\u00a03408."},{"key":"e_1_3_2_1_7_1","volume-title":"IS-EUD Workshops.","author":"Catalano Christian","year":"2023","unstructured":"Christian Catalano, Alessandro Pagano, Antonio Piccinno, and Alessandro Stamerra. 2023. Cartoons to Improve Cyber Security Education: Snow White in Browser in the Middle. In IS-EUD Workshops."},{"key":"e_1_3_2_1_8_1","volume-title":"Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on risk and insurance-Issues and practice 47, 3","author":"Cremer Frank","year":"2022","unstructured":"Frank Cremer, Barry Sheehan, Michael Fortmann, Arash\u00a0N Kia, Martin Mullins, Finbarr Murphy, and Stefan Materne. 2022. Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on risk and insurance-Issues and practice 47, 3 (2022), 698\u2013736."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/info15020117"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23084117"}],"event":{"name":"AVI 2024: International Conference on Advanced Visual Interfaces 2024","location":"Arenzano, Genoa Italy","acronym":"AVI 2024"},"container-title":["Proceedings of the 2024 International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3660536","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656650.3660536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:54:52Z","timestamp":1755788092000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656650.3660536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":11,"alternative-id":["10.1145\/3656650.3660536","10.1145\/3656650"],"URL":"https:\/\/doi.org\/10.1145\/3656650.3660536","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}