{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:40:02Z","timestamp":1755902402554,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","award":["893367"],"award-info":[{"award-number":["893367"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,12]]},"DOI":"10.1145\/3670243.3673882","type":"proceedings-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:53:02Z","timestamp":1723031582000},"page":"234-239","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Proactive Curriculum for Cyber Security Education: A Model of Micro-Credentials and Active Blended Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7201-6034","authenticated-orcid":false,"given":"Gregor","family":"Eibl","sequence":"first","affiliation":[{"name":"Department for E-Governance and Administration, University of Continuing Education Krems, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1387-5500","authenticated-orcid":false,"given":"Christoph","family":"Jungbauer","sequence":"additional","affiliation":[{"name":"Multimedia Information Systems, University of Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1277-827X","authenticated-orcid":false,"given":"Olga","family":"Litvyak","sequence":"additional","affiliation":[{"name":"Department for E-Governance and Administration, University of Continuing Education Krems, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9262-9740","authenticated-orcid":false,"given":"Peter","family":"Volkl","sequence":"additional","affiliation":[{"name":"Department of Information Systems Management, Ferdinand Porsche FernFH, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6508-5787","authenticated-orcid":false,"given":"Christian","family":"Luidold","sequence":"additional","affiliation":[{"name":"Multimedia Information Systems, University of Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24311"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.126"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2324-5_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-021-10704-y"},{"key":"e_1_3_2_1_6_1","unstructured":"J Buvat M Turner RK Puttur M Slatter and Capgemini Digital Transformation Institute. 2018. Cybersecurity talent: the big gap in cyber protection. Capgemini Digit. Transform. Inst. (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100361"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.120304"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCWT.2017040101"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7225323"},{"key":"e_1_3_2_1_11_1","volume-title":"LU. Retrieved","author":"European Union Agency for Cybersecurity.","year":"2023","unstructured":"European Union Agency for Cybersecurity. 2023. ENISA threat landscape 2023: July 2022 to June 2023. Publications Office, LU. Retrieved April 17, 2024 from https:\/\/data.europa.eu\/doi\/10.2824\/782573"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/03043797.2013.766679"},{"key":"e_1_3_2_1_13_1","unstructured":"W Frost and P Sullivan. 2015. The 2015 Global Information Security Workforce Study. (2015)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102080"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(17)30013-1"},{"volume-title":"Start with a Story: The Case Study Method of Teaching College Science","author":"Herreid C.F.","key":"e_1_3_2_1_16_1","unstructured":"C.F. Herreid. 2007. Start with a Story: The Case Study Method of Teaching College Science. NSTA Press. Retrieved from https:\/\/books.google.at\/books?id=HdXcYhThxoIC"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50244-7_18"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/dsji.12117"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91293-2_1"},{"key":"e_1_3_2_1_20_1","volume-title":"From Operational Requirements to Training Solution: Protection of Civilians for NATO and UN led Operations Pilot Course. FINCENT Publ. Ser. 12019","author":"Levomaa Virpi","year":"2019","unstructured":"Virpi Levomaa and Hanne Dumur-Laanila. 2019. From Operational Requirements to Training Solution: Protection of Civilians for NATO and UN led Operations Pilot Course. FINCENT Publ. Ser. 12019 (2019)."},{"volume-title":"H4cker5 wanted: an examination of the cybersecurity labor market","author":"Libicki Martin C.","key":"e_1_3_2_1_21_1","unstructured":"Martin C. Libicki, David Senty, and Julia Pollak. 2014. H4cker5 wanted: an examination of the cybersecurity labor market. RAND, Santa Monica, CA."},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"A Literature Review of the Factors Influencing E\u2011Learning and Blended Learning in Relation to Learning Outcome, Student Satisfaction and Engagement","volume":"16","author":"Nortvig Anne-Mette","year":"2018","unstructured":"Anne-Mette Nortvig, Anne Kristine Petersen, and S\u00f8ren Hattesen Balle. 2018. A Literature Review of the Factors Influencing E\u2011Learning and Blended Learning in Relation to Learning Outcome, Student Satisfaction and Engagement. Electron. J. E-Learn. 16, 1 (February 2018), pp46\u201155-pp46\u201155.","journal-title":"Electron. J. E-Learn."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295778"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181r1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2004.tb00809.x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67383-7_8"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315575681"},{"key":"e_1_3_2_1_28_1","first-page":"5","article-title":"CYBER SKILLS GAP WIDENS: Education is needed to build competencies as threats rise","volume":"77","author":"Wamsley L.","year":"2020","unstructured":"L. Wamsley. 2020. CYBER SKILLS GAP WIDENS: Education is needed to build competencies as threats rise: Internal Auditor. Intern. Audit. 77, 5 (October 2020), 13\u201314.","journal-title":"Internal Auditor. Intern. Audit."},{"key":"e_1_3_2_1_29_1","volume-title":"Retrieved","author":"Forum World Economic","year":"2024","unstructured":"World Economic Forum. 2024. Strategic Cybersecurity Talent Framework. Retrieved April 30, 2024 from https:\/\/www3.weforum.org\/docs\/WEF_Strategic_Cybersecurity_Talent_Framework_2024.pdf"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102724"},{"key":"e_1_3_2_1_31_1","unstructured":"NCSC-certified degrees. Retrieved April 30 2024 from https:\/\/www.ncsc.gov.uk\/information\/ncsc-certified-degrees"},{"key":"e_1_3_2_1_32_1","unstructured":"THE STATE OF UNIVERSITY-BUSINESS COOPERATION IN EUROPE. Retrieved from https:\/\/publications.europa.eu\/resource\/cellar\/1b03ee59-67a4-11e8-ab9c-01aa75ed71a1.0001.01\/DOC_1"}],"event":{"name":"CEEeGov 2024: Central and Eastern European eDem and eGov Days 2024","acronym":"CEEeGov 2024","location":"Budapest Hungary"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3673882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670243.3673882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:02:51Z","timestamp":1755900171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3673882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":32,"alternative-id":["10.1145\/3670243.3673882","10.1145\/3670243"],"URL":"https:\/\/doi.org\/10.1145\/3670243.3673882","relation":{},"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"2024-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}