{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:31:15Z","timestamp":1767339075814,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,12]]},"DOI":"10.1145\/3670243.3673883","type":"proceedings-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:53:02Z","timestamp":1723031582000},"page":"240-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Cybersecurity Awareness and Education"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4041-6058","authenticated-orcid":false,"given":"Celina","family":"Junghans","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, University of Vienna; Austrian Computer Society OCG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2998-742X","authenticated-orcid":false,"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, University of Vienna; Austrian Computer Society OCG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8540-2137","authenticated-orcid":false,"given":"Thomas","family":"Schaberreiter","sequence":"additional","affiliation":[{"name":"CS-AWARE Corporation; Austrian Computer Society OCG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6410-2071","authenticated-orcid":false,"given":"Martin","family":"Kandlhofer","sequence":"additional","affiliation":[{"name":"Austrian Computer Society OCG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0000-2908","authenticated-orcid":false,"given":"Ronald","family":"Bieber","sequence":"additional","affiliation":[{"name":"Austrian Computer Society OCG, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9269-7196","authenticated-orcid":false,"given":"Jerry","family":"Andriessen","sequence":"additional","affiliation":[{"name":"Wise &amp; Munro Learning Research, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4831-1580","authenticated-orcid":false,"given":"Mirjam","family":"Pardijs","sequence":"additional","affiliation":[{"name":"Wise &amp; Munro Learning Research, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03033420"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Jerry Andriessen Thomas Schaberreiter Alexandros Papanikolaou and Juha R\u00f6ning (Eds.). 2022. Cybersecurity Awareness. Advances in Information Security Vol.\u00a088. Springer International Publishing Cham. https:\/\/doi.org\/10.1007\/978-3-031-04227-0","DOI":"10.1007\/978-3-031-04227-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/bmb.2003.494031039994"},{"key":"e_1_3_2_1_4_1","unstructured":"ENISA. 2024. Training and Exercises. Online: https:\/\/www.enisa.europa.eu\/topics\/training-and-exercises (last accessed 06\/2024)."},{"key":"e_1_3_2_1_5_1","unstructured":"ENISA. 2024. Training material for SMEs. Online: https:\/\/www.enisa.europa.eu\/publications\/archive\/training-material-SMEs (last accessed 06\/2024)."},{"key":"e_1_3_2_1_6_1","volume-title":"Regulation of the European Parliament and of the Council of","author":"European Commission","year":"2016","unstructured":"European Commission. 2016. Regulation of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Regulation (EU) 2016\/679."},{"key":"e_1_3_2_1_7_1","unstructured":"European Commission. 2020. The EU\u2019s Cybersecurity Strategy for the Digital Decade. Joint Communication to the European Parliament and the Council - JOIN(2020) 18 final."},{"key":"e_1_3_2_1_8_1","first-page":"143","article-title":"Foundations for Collaborative Cyber Security Learning: Exploring Educator and Learner Requirements","author":"Furnell Steven","year":"2021","unstructured":"Steven Furnell, Gregor Langner, and Gerald Quirchmayr. 2021. Foundations for Collaborative Cyber Security Learning: Exploring Educator and Learner Requirements. In Foundations for Collaborative Cyber Security Learning: Exploring Educator and Learner Requirements. 143\u2013145. 36th International Conference on ICT Systems Security and Privacy Protection ; Conference date: 22-06-2021 Through 24-06-2021.","journal-title":"Foundations for Collaborative Cyber Security Learning: Exploring Educator and Learner Requirements."},{"key":"e_1_3_2_1_9_1","unstructured":"D. Gamage S. Fernando and I. Perera. 2014. Factors affecting to effective eLearning: Learners Perspective. In Scientific Research Journal (SCIRJ) no. 2."},{"key":"e_1_3_2_1_10_1","volume-title":"ANALYSIS OF GRAPHICAL USER INTERFACE DESIGN IN THE CONTEXT OF HUMAN-COMPUTER INTERACTION. In EDULEARN11 Proceedings","author":"Gutierrez\u00a0Miranda M.","year":"2011","unstructured":"M. Gutierrez\u00a0Miranda. 2011. THE IMPORTANCE OF GRAPHIC USERS INTERFACE, ANALYSIS OF GRAPHICAL USER INTERFACE DESIGN IN THE CONTEXT OF HUMAN-COMPUTER INTERACTION. In EDULEARN11 Proceedings (Barcelona, Spain) (3rd International Conference on Education and New Learning Technologies). IATED, 7137\u20137144."},{"key":"e_1_3_2_1_11_1","unstructured":"ICDL Foundation. 2019. ICDL Workforce CYBER SECURITY Syllabus 2.0. Online: https:\/\/shorturl.at\/b8uqs (last accessed 06\/2024)."},{"key":"e_1_3_2_1_12_1","unstructured":"ISO\/IEC 27000:2016. 2016. Information technology \u2013 Security techniques \u2014 Information security management systems \u2013 Overview and vocabulary. Standard. ISO\/IEC."},{"volume-title":"Development of an e-learning model and prototype for cybersecurity training in the workforce. Master\u2019s thesis","author":"Junghans Celina","key":"e_1_3_2_1_13_1","unstructured":"Celina Junghans. 2024. Development of an e-learning model and prototype for cybersecurity training in the workforce. Master\u2019s thesis, University of Vienna."},{"key":"e_1_3_2_1_14_1","volume-title":"Sustainable, Secure, and Smart Collaboration (S3C) Workshop 2023(Sustainable, Secure, and Smart Collaboration (S3C) Workshop","author":"Luidold Christian","year":"2023","unstructured":"Christian Luidold, Thomas Schaberreiter, Christian Wieser, Adamantios Koumpis, Cinzia Cappiello, Tiziano Citro, Jerry Andriessen, and Juha R\u00f6ning. 2023. Increasing Cybersecurity Awareness and Collaboration in Organisations and Local \/ Regional Networks: The CS-AWARE-NEXT Project. In Sustainable, Secure, and Smart Collaboration (S3C) Workshop 2023(Sustainable, Secure, and Smart Collaboration (S3C) Workshop 2023). https:\/\/doi.org\/Vol-3574\/paper_5.pdf Workshop is part of CHITALY \u201923, Sept 20-22, Turin, IT."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643604.2643632"},{"key":"e_1_3_2_1_16_1","first-page":"115","volume-title":"Proceedings of the 11th International conference on virtual learning","author":"Nedeva V.","unstructured":"V. Nedeva and S. Dineva. 2013. Measurement and Control of Statistics Learning Processes based on Constructivist Feedback and Reproducible Computing. In Proceedings of the 11th International conference on virtual learning pp. 108\u2013115."},{"volume-title":"Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity","author":"Cybersecurity\u00a0Education Joint","key":"e_1_3_2_1_17_1","unstructured":"Joint Task\u00a0Force on Cybersecurity\u00a0Education. 2018. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. Association for Computing Machinery, New York, NY, USA."},{"key":"e_1_3_2_1_18_1","unstructured":"A.\u00a0R. Peslak. 2003. Teaching Computer Information Systems Via Distance Education: A Researched and Personal Perspective. In Information Systems Education Journal no. 1."},{"volume-title":"Narrative knowing and the human sciences","author":"Polkinghorne E.","key":"e_1_3_2_1_19_1","unstructured":"D.\u00a0E. Polkinghorne. 1988. Narrative knowing and the human sciences. In Albany, NY: State Univ. of New York Press."},{"key":"e_1_3_2_1_20_1","unstructured":"SANS. 2024. Cyber Security Training Certifications Degrees and Resources. Online: https:\/\/www.sans.org\/emea\/ (last accessed 06\/2024)."},{"key":"e_1_3_2_1_21_1","volume-title":"Storyboards: A Dynamic Storytelling Tool. In roceedings of the 2006 UPA conference on Usability through Storytelling.","author":"Sova R.","year":"2006","unstructured":"R. Sova and D.\u00a0H. Sova. 2006. Storyboards: A Dynamic Storytelling Tool. In roceedings of the 2006 UPA conference on Usability through Storytelling."},{"key":"e_1_3_2_1_22_1","volume-title":"Mixed-methods research methodologies.Qualitative report 17, 1","author":"Terrell R","year":"2012","unstructured":"Steven\u00a0R Terrell. 2012. Mixed-methods research methodologies.Qualitative report 17, 1 (2012), 254\u2013280."},{"key":"e_1_3_2_1_23_1","unstructured":"The European Parliament and the Council of the European Union. 2022. Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022. Official Journal of the European Union L333\/80."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"Teemu Tokola Thomas Schaberreiter Gerald Quirchmayr Ludwig Englbrecht G\u00fcnther Pernul Sokratis Katsikas Bart Preneel and Qiang Tang. 2019. A Collaborative Cybersecurity Education Program. 181\u2013200. https:\/\/doi.org\/10.4018\/978-1-5225-7847-5.ch010","DOI":"10.4018\/978-1-5225-7847-5.ch010"},{"key":"e_1_3_2_1_25_1","unstructured":"Som Tshering. 2006. The World of Digital Storytelling. In Educational leadership."},{"key":"e_1_3_2_1_26_1","volume-title":"Cham: Springer International Publishing.","author":"Zaphiris P.","year":"2016","unstructured":"P. Zaphiris and A. Ioannou. 2016. Learning and Collaboration Technologies. In Cham: Springer International Publishing."}],"event":{"name":"CEEeGov 2024: Central and Eastern European eDem and eGov Days 2024","acronym":"CEEeGov 2024","location":"Budapest Hungary"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3673883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670243.3673883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:02:35Z","timestamp":1755900155000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3673883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":26,"alternative-id":["10.1145\/3670243.3673883","10.1145\/3670243"],"URL":"https:\/\/doi.org\/10.1145\/3670243.3673883","relation":{},"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"2024-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}