{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:04:58Z","timestamp":1771700698421,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670468","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern Europe"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2183-4181","authenticated-orcid":false,"given":"Marko","family":"Zivanovic","sequence":"first","affiliation":[{"name":"PhD Student, Faculty of Technical Science, Novi Sad, Serbia, Serbia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6188-4936","authenticated-orcid":false,"given":"Imre","family":"Lend\u00e1k","sequence":"additional","affiliation":[{"name":"Professor, Faculty of Technical Science, Novi Sad, Serbia, Serbia and \rProfessor, Data Science and Engineering Department, Faculty of Informatics, E\u00f6tv\u00f6s Lor\u00e1nd University, Hungary, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0592-9962","authenticated-orcid":false,"given":"Ranko","family":"Popovic","sequence":"additional","affiliation":[{"name":"Retired professor, Faculty of Technical Science, Novi Sad, Serbia, Serbia"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Check Point Software's 2023 Cyber Security Report https:\/\/pages.checkpoint.com\/cyber-security-report-2023.html (accessed 14.05.2024)"},{"key":"e_1_3_2_1_2_1","unstructured":"(ISC)2. 2023 How the Economy Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce https:\/\/media.isc2.org\/-\/media\/Project\/ISC2\/Main\/Media\/documents\/research\/ISC2_Cybersecurity_Workforce_Study_2023.pdf?rev=28b46de71ce24e6ab7705f6e3da8637e (accessed 14.05.2024)"},{"key":"e_1_3_2_1_3_1","unstructured":"Bloomberg Adria Cybersecurity Workforce https:\/\/rs.bloombergadria.com\/tehnologija\/digitalizacija\/55963\/sajber-napadi-ko-nas-u-srbiji-stiti-od-njih-i-zasto-toliko-kadrova-fali\/news\/?utm_source=linker&utm_medium=sw&utm_campaign=bloombergrs&utm_content=ad17 (accessed 14.05.2024)"},{"key":"e_1_3_2_1_4_1","unstructured":"Cybersecurity skills development in the EU.\u201d ENISA. 2019 https:\/\/www.enisa.europa.eu\/publications\/the-status-of-cyber-security-education-in-the-european-union (accessed 14.05.2024)"},{"key":"e_1_3_2_1_5_1","unstructured":"ECSO gaps in European cyber education and professional training. https:\/\/ecs-org.eu\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_6_1","unstructured":"Assessing the courses for cybersecurity professionals already developed by CONCORDIA partners https:\/\/www.concordia-h2020.eu\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_7_1","unstructured":"SPARTA deliverables https:\/\/www.sparta.eu\/deliverables\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_8_1","volume-title":"Design of education and professional framework CyberSec4Europe","year":"2021","unstructured":"D6.3: Design of education and professional framework CyberSec4Europe, 2021, Brussels, Brussels, Rep. Call H2020-SU-ICT-03-2018"},{"key":"e_1_3_2_1_9_1","unstructured":"\u201cREWIRE: Cybersecurity skills alliance\u2014A new vision for Europe https:\/\/rewireproject.eu\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_10_1","unstructured":"Europe council decision 765\/2008 setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339\/93"},{"key":"e_1_3_2_1_11_1","volume-title":"ARES","author":"Zivanonic Marko","unstructured":"Marko Zivanonic, Imre Lend\u00e1k, Ranko Popovic, 2023, \u201cDynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)\u201d, ARES"},{"key":"e_1_3_2_1_12_1","volume-title":"Association for Computing Machinery","author":"Computer Science","year":"2013","unstructured":"Computer Science Curricula 2013, Association for Computing Machinery (ACM) IEEE Computer Society https:\/\/www.acm.org\/binaries\/content\/assets\/education\/cs2013_web_final.pdf (accessed 14.05.2024)"},{"key":"e_1_3_2_1_13_1","volume-title":"Curriculum Guidelines for Undergraduate Degree Programs in Computer Science CC2001 https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/cc2001","author":"ACM","year":"2024","unstructured":"ACM Curriculum Guidelines for Undergraduate Degree Programs in Computer Science CC2001 https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/cc2001.pdf (accessed 14.05.2024)"},{"key":"e_1_3_2_1_14_1","volume-title":"Computing Curricula Computer Science","volume":"2008","author":"ACM","year":"2001","unstructured":"ACM Computing Curricula Computer Science Volume CS2008 https:\/\/www.acm.org\/binaries\/content\/assets\/education\/curricula-recommendations\/cc2001.pdf (accessed 14.05.2024)"},{"key":"e_1_3_2_1_15_1","unstructured":"ACM Cybersecurity Curricula 2017 https:\/\/cybered.hosting.acm.org\/wp-content\/uploads\/2018\/02\/newcover_csec2017.pdf (accessed 14.05.2024)"},{"key":"e_1_3_2_1_16_1","volume-title":"Collaboration program to disseminate cybersecurity in the ECE curriculum","author":"Gonzalez Virgilio","unstructured":"Virgilio Gonzalez, Oscar Perez, Rodrigo Romero, 2022, \u201cCollaboration program to disseminate cybersecurity in the ECE curriculum\u201d, IEEE"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019746"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.26.497"},{"key":"e_1_3_2_1_19_1","volume-title":"Peerapon Vateekul and Proadpran Punyabukkana","author":"Kawintiranon Kornraphop","year":"2016","unstructured":"Kornraphop Kawintiranon, Peerapon Vateekul and Proadpran Punyabukkana, 2016, \u201cUnderstanding knowledge areas in curriculum through text mining from course materials\u201d, TALE"},{"key":"e_1_3_2_1_20_1","unstructured":"The EU's Cybersecurity Strategy for the Digital Decade https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52020JC0018 (accessed 14.05.2024)"},{"key":"e_1_3_2_1_21_1","article-title":"Understanding Cybersecurity Education Gaps in Europe","author":"Sara Ricci","year":"2024","unstructured":"Sara Ricci , Simon Parker , Jan Jerabek , Yianna Danidou , Argyro Chatzopoulou ,Remi Badonnel , Imre Lendak , Vladimir Janout, 2024, \u201cUnderstanding Cybersecurity Education Gaps in Europe\u201d, IEEE Transactions on Education","journal-title":"IEEE Transactions on Education"},{"key":"e_1_3_2_1_22_1","unstructured":"Cyber security academic programs database https:\/\/www.enisa.europa.eu\/topics\/education\/cyberhead"},{"key":"e_1_3_2_1_23_1","volume-title":"Athanasios Grammatopoulos","author":"Adamos Konstantinos","year":"2023","unstructured":"Konstantinos Adamos, Fabio Di Franco, Athanasios Grammatopoulos, 2023, \u201cAn Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD\u201d, IEEE Security & Privacy"},{"key":"e_1_3_2_1_24_1","volume-title":"Letterio Galletta and Rocco De Nicola","author":"Hajny Jan","year":"2021","unstructured":"Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta and Rocco De Nicola, 2021, \u201cFramework, Tools and Good Practices for Cybersecurity Curricula\u201d, IEEE Access"},{"key":"e_1_3_2_1_25_1","unstructured":"Concordia courses database for cyber security professionals https:\/\/www.concordia-h2020.eu\/map-courses-cyber-professionals\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_26_1","unstructured":"Cyberseek framework https:\/\/www.cyberseek.org\/pathway.html (accessed 14.05.2024)"},{"key":"e_1_3_2_1_27_1","unstructured":"ENISA European Cybersecurity Skills Framework2022 https:\/\/www.enisa.europa.eu\/publications\/european-cybersecurity-skills-framework-role-profiles\/@@download\/fullReport (accessed 14.05.2024)"},{"key":"e_1_3_2_1_28_1","volume-title":"Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review","author":"Ramirez Robert","unstructured":"Robert Ramirez and Nazli Choucri, 2016, \u201cImproving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review\u201d, IEEE"},{"key":"e_1_3_2_1_29_1","unstructured":"Masaryk University Brno Cyber Security curriculum https:\/\/www.fi.muni.cz\/catalogue-current\/?program=nmgr_pskb_en (accessed 14.05.2024)"},{"key":"e_1_3_2_1_30_1","unstructured":"Faculty of Technical Sciences University of Novi Sad (FTN) Cyber Security curriculum http:\/\/www.ftn.uns.ac.rs\/1149659633\/informaciona-bezbednost (accessed 14.05.2024)"},{"key":"e_1_3_2_1_31_1","unstructured":"Faculty of Electrical Engineering and Computing University of Zagreb (FER) Cyber Security curriculum https:\/\/www.fer.unizg.hr\/studiji\/specijalisticki_studiji\/is\/kolegiji (accessed 14.05.2024)"},{"key":"e_1_3_2_1_32_1","unstructured":"Faculty of Computer Science and Engineering University of Skopje Cyber Security curriculum https:\/\/www.finki.ukim.mk\/program\/ITCS23_1\/en (accessed 14.05.2024)"},{"key":"e_1_3_2_1_33_1","unstructured":"Faculty of Information Studies University of Ljubljana Cyber Security curriculum https:\/\/www.fis.unm.si\/studijski-programi\/kibernetska-varnost-mag\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_34_1","unstructured":"Technical University of Cluj-Napoca Cyber Security curriculum https:\/\/os.cs.utcluj.ro\/sisc\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_35_1","unstructured":"Ludovika university of public service Security curriculum https:\/\/antk.uni-nke.hu\/hallgatoknak\/tanulmanyi-ugyek\/tantervek\/kiberbiztonsagi-mesterkepzesi-szak (accessed 14.05.2024)"},{"key":"e_1_3_2_1_36_1","unstructured":"BA School of Business and Finance (BASBF) Security curriculum https:\/\/www.ba.lv\/studies\/program\/cybersecurity-management\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_37_1","unstructured":"Tallinn University of Technology Security curriculum https:\/\/ois2.taltech.ee\/uusois\/programme\/IVCM09\/24 (accessed 14.05.2024)"},{"key":"e_1_3_2_1_38_1","unstructured":"Vilnius Gediminas Technical University Security curriculum https:\/\/vilniustech.lt\/studies\/study-programmes\/master-study-programmes\/317411?element_id=317413&sp_id=44_pr_2023&f_id=4&qualification=a%3A1%3A%7Bi%3A0%3Bs%3A1%3A%22M%22%3B%7D#Modules (accessed 14.05.2024)"},{"key":"e_1_3_2_1_39_1","unstructured":"Rzeszow University of Technology Security curriculum https:\/\/krk.prz.edu.pl\/plany.pl?lng=EN&W=E&K=F&KW=&TK=html&S=2108&P=&C=2023&erasmus=&O= (accessed 14.05.2024)"},{"key":"e_1_3_2_1_40_1","unstructured":"Linkedin job ads search engine https:\/\/www.linkedin.com\/jobs\/search (accessed 14.05.2024)"},{"key":"e_1_3_2_1_41_1","volume-title":"CompTIA Cybersecurity Analyst (CySA+)","year":"2024","unstructured":"CySA+ \u201cCompTIA Cybersecurity Analyst (CySA+)\u201d course https:\/\/www.itonlinelearning.com\/course\/comptia-cybersecurity-analyst-cysa\/ (accessed 14.05.2024)"},{"key":"e_1_3_2_1_42_1","volume-title":"Becoming a Cybersecurity Consultant","author":"Concordia","year":"2020","unstructured":"Concordia \u201cBecoming a Cybersecurity Consultant\u201d course https:\/\/www.concordia-h2020.eu\/becoming-a-cybersecurity-consultant (accessed 14.05.2024)"},{"key":"e_1_3_2_1_43_1","volume-title":"Training Program for CISSP Certification","author":"SANS Institute","year":"2024","unstructured":"SANS Institute \u201cTraining Program for CISSP Certification\u201d course https:\/\/www.sans.org\/cyber-security-courses\/sans-training-cissp-certification\/ (accessed 14.05.2024)"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:51:14Z","timestamp":1755881474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":43,"alternative-id":["10.1145\/3664476.3670468","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670468","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}