{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:40:15Z","timestamp":1777894815820,"version":"3.51.4"},"reference-count":18,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"2","license":[{"start":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T00:00:00Z","timestamp":1770768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T00:00:00Z","timestamp":1770768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Digitalisierungsinitiative der Z\u00fcrcher Hochschulen"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1365\/s40702-026-01250-7","type":"journal-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:05:58Z","timestamp":1770815158000},"page":"425-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CYRENZH Cybersecurity Clinic: Konzept und Erkenntnisse","CYRENZH Cybersecurity Clinic: Concept and Lessons Learned"],"prefix":"10.1365","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1444-0926","authenticated-orcid":false,"given":"Tim","family":"Geppert","sequence":"first","affiliation":[]},{"given":"Tibor","family":"Dudas","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Frei","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Knieps","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Ambuehl","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Schaltegger","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Rennhard","sequence":"additional","affiliation":[]},{"given":"Nico","family":"Ebert","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2026,2,11]]},"reference":[{"key":"1250_CR1","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-662-59351-6_14","volume-title":"Transactions on Edutainment XV","author":"C Beaumont","year":"2019","unstructured":"Beaumont\u00a0C, Hartley\u00a0P (2019) The cyber security knowledge exchange: working with employers to produce authentic PBL scenarios and enhance employability. In: Pan\u00a0Z, Cheok\u00a0AD, M\u00fcller\u00a0W, Zhang\u00a0M, El Rhalibi\u00a0A, Kifayat\u00a0K (Hrsg) Transactions on Edutainment XV, Bd 11345. Springer, Berlin Heidelberg, S\u00a0209\u2013228 https:\/\/doi.org\/10.1007\/978-3-662-59351-6_14"},{"key":"1250_CR2","doi-asserted-by":"publisher","first-page":"4283","DOI":"10.24251\/HICSS.2018.538","volume-title":"Cyber clinics: re-imagining cyber security awareness","author":"D Croasdell","year":"2018","unstructured":"Croasdell\u00a0D, Elste\u00a0J, Hill\u00a0A (2018) Cyber clinics: re-imagining cyber security awareness. HICSS, S\u00a04283\u20134288 https:\/\/doi.org\/10.24251\/HICSS.2018.538"},{"key":"1250_CR3","unstructured":"Cyren ZH (2025) Volunteer Network. https:\/\/cyrenzh.ch\/de\/cybersecurity-clinic-de\/. Zugegriffen: 5. Nov. 2025"},{"key":"1250_CR4","doi-asserted-by":"publisher","first-page":"643","DOI":"10.5220\/0011783800003405","volume-title":"Cyber teaching hospitals: developing cyber workforce competence","author":"J Elste","year":"2023","unstructured":"Elste\u00a0J, Croasdell\u00a0D (2023) Cyber teaching hospitals: developing cyber workforce competence. Proceedings of the 9th\u00a0International Conference on Information Systems Security and Privacy, S\u00a0643\u2013650 https:\/\/doi.org\/10.5220\/0011783800003405"},{"key":"1250_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/FIE56618.2022.9962613","volume-title":"Collaboration program to disseminate cybersecurity in the ECE curriculum","author":"V Gonzalez","year":"2022","unstructured":"Gonzalez\u00a0V, Perez\u00a0O, Romero\u00a0R (2022) Collaboration program to disseminate cybersecurity in the ECE curriculum. 2022 IEEE Frontiers in Education Conference (FIE), S\u00a01\u20134 https:\/\/doi.org\/10.1109\/FIE56618.2022.9962613"},{"key":"1250_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/FIE58773.2023.10343280","volume-title":"Cybersecurity in ECE curriculum, an expanded collaboration program to disseminate real security experiences in cyber-physical systems","author":"V Gonzalez","year":"2023","unstructured":"Gonzalez\u00a0V, Perez\u00a0O, Romero\u00a0R (2023) Cybersecurity in ECE curriculum, an expanded collaboration program to disseminate real security experiences in cyber-physical systems. 2023 IEEE Frontiers in Education Conference (FIE), S\u00a01\u20134 https:\/\/doi.org\/10.1109\/FIE58773.2023.10343280"},{"key":"1250_CR7","unstructured":"Karagiannopoulos V, Sugiura L, Kirby AL (2019) The Portsmouth cybercrime awareness clinic project: key findings and recommendations. University of Portsmouth. https:\/\/pure.port.ac.uk\/ws\/portalfiles\/portal\/16037279\/The_Portsmouth_Cybercrime_Awareness_Clinic_Project_Key_Findings_and_Recommendations_October_2019.pdf. Zugegriffen: 20. Mai 2025"},{"issue":"3","key":"1250_CR8","doi-asserted-by":"publisher","first-page":"307","DOI":"10.48009\/3_iis_2021_328-341","volume":"22","author":"K Lingelbach","year":"2021","unstructured":"Lingelbach\u00a0K (2021) Student perceptions of a\u00a0cybersecurity service-learning project. Issues Inf Syst 22(3):307\u2013319. https:\/\/doi.org\/10.48009\/3_iis_2021_328-341","journal-title":"Issues Inf Syst"},{"key":"1250_CR9","doi-asserted-by":"publisher","unstructured":"Mukhopadhyay A, Luther K (2024) OSINT clinic: co-designing AI-augmented collaborative OSINT investigations for vulnerability assessment. https:\/\/doi.org\/10.1145\/3706598.3713283","DOI":"10.1145\/3706598.3713283"},{"key":"1250_CR10","unstructured":"Peter MK, D\u00f6rlemann K, Hertig K, Kaelin AW, Lerch KM, Vifian P, Wettstein N (2024) Cyberstudie 2024 \u2013 IT-Sicherheit in Schweizer KMU, bei IT-Dienstleistungsunternehmen und in der Schweizer Bev\u00f6lkerung. https:\/\/cyberstudie.ch\/"},{"key":"1250_CR11","unstructured":"Powazek S (2023) Clinic development toolkit. https:\/\/cybersecurityclinics.org\/wp-content\/uploads\/2023\/06\/CCDS-Clinic-Development-Toolkit-2023.pdf. Zugegriffen: 5. Nov. 2025"},{"issue":"4","key":"1250_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2017.3151327","volume":"15","author":"A Sherman","year":"2017","unstructured":"Sherman\u00a0A, Dark\u00a0M, Chan\u00a0A, Chong\u00a0R, Morris\u00a0T, Oliva\u00a0L, Springer\u00a0J, Thuraisingham\u00a0B, Vatcher\u00a0C, Verma\u00a0R, Wetzel\u00a0S (2017) INSuRE: collaborating centers of academic excellence engage students in cybersecurity research. IEEE Secur Privacy 15(4):72\u201378. https:\/\/doi.org\/10.1109\/MSP.2017.3151327","journal-title":"IEEE Secur Privacy"},{"key":"1250_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/3511861.3511874","volume-title":"Collaborative paradigm of teaching penetration testing using real-world university applications","author":"VJ Sufatrio","year":"2022","unstructured":"Sufatrio\u00a0VJ, Chang\u00a0E\u2011C (2022) Collaborative paradigm of teaching penetration testing using real-world university applications. Proceedings of the 24th\u00a0Australasian Computing Education Conference, S\u00a0114\u2013122 https:\/\/doi.org\/10.1145\/3511861.3511874"},{"key":"1250_CR14","volume-title":"WiP: a\u00a0qualitative study of service-learning oriented cybersecurity clinics\u2019 processes and challenges","author":"M Ung","year":"2024","unstructured":"Ung\u00a0M, Lin\u00a0A, Votipka\u00a0D (2024) WiP: a\u00a0qualitative study of service-learning oriented cybersecurity clinics\u2019 processes and challenges. Twentieth Symposium on Usable Privacy and Security, Philadelphia"},{"key":"1250_CR15","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/CSR61664.2024.10679506","volume-title":"The affordability of cybersecurity costs in developing countries: a\u00a0systematic review","author":"C Uwaoma","year":"2024","unstructured":"Uwaoma\u00a0C, Enkhtaivan\u00a0A (2024) The affordability of cybersecurity costs in developing countries: a\u00a0systematic review. 2024 IEEE International Conference on Cyber Security and Resilience (CSR), S\u00a0545\u2013550 https:\/\/doi.org\/10.1109\/CSR61664.2024.10679506"},{"key":"1250_CR16","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/CSCE60160.2023.00174","volume-title":"Project Xander: hands-on skills for cybersecurity","author":"G White","year":"2023","unstructured":"White\u00a0G (2023a) Project Xander: hands-on skills for cybersecurity. 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), S\u00a01047\u20131053 https:\/\/doi.org\/10.1109\/CSCE60160.2023.00174"},{"key":"1250_CR17","unstructured":"White G (2023b) Reaching an underserved population in communities: project Xander\u2014cybersecurity for nonprofits. HICSS 56, Bd 2, S\u00a01674\u20131683. https:\/\/aisel.aisnet.org\/hicss-56\/dg\/cybersecurity\/2"},{"issue":"12","key":"1250_CR18","doi-asserted-by":"publisher","first-page":"1538","DOI":"10.1021\/ed077p1538","volume":"77","author":"D Wiegand","year":"2000","unstructured":"Wiegand\u00a0D, Strait\u00a0M (2000) What is service learning? J\u00a0Chem Educ 77(12):1538. https:\/\/doi.org\/10.1021\/ed077p1538","journal-title":"J Chem Educ"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-026-01250-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-026-01250-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-026-01250-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T07:33:28Z","timestamp":1777620808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-026-01250-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,11]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1250"],"URL":"https:\/\/doi.org\/10.1365\/s40702-026-01250-7","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,11]]},"assertion":[{"value":"14 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"T.\u00a0Geppert, T.\u00a0Dudas, P.\u00a0Frei, M.\u00a0Knieps, B.\u00a0Ambuehl, T.\u00a0Schaltegger, M.\u00a0Rennhard und N.\u00a0Ebert geben an, dass kein Interessenkonflikt besteht.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Interessenkonflikt"}}]}}