{"id":"https://openalex.org/W4400681969","doi":"https://doi.org/10.1108/ics-02-2024-0038","title":"Cultivating self-efficacy to empower professionals\u2019 re-up skilling in cybersecurity","display_name":"Cultivating self-efficacy to empower professionals\u2019 re-up skilling in cybersecurity","publication_year":2024,"publication_date":"2024-07-16","ids":{"openalex":"https://openalex.org/W4400681969","doi":"https://doi.org/10.1108/ics-02-2024-0038"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2024-0038","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-02-2024-0038","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1108/ics-02-2024-0038","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032212838","display_name":"Eliana Stavrou","orcid":"https://orcid.org/0000-0003-4040-4942"},"institutions":[{"id":"https://openalex.org/I59746437","display_name":"Open University of Cyprus","ror":"https://ror.org/033sm2k57","country_code":"CY","type":"education","lineage":["https://openalex.org/I59746437"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Eliana Stavrou","raw_affiliation_strings":["Faculty of Pure and Applied Sciences, Open University of Cyprus, Latsia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Faculty of Pure and Applied Sciences, Open University of Cyprus, Latsia, Cyprus","institution_ids":["https://openalex.org/I59746437"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014994577","display_name":"Andriani Piki","orcid":"https://orcid.org/0000-0003-0376-1713"},"institutions":[{"id":"https://openalex.org/I4210108889","display_name":"University of Central Lancashire Cyprus","ror":"https://ror.org/020ps3a34","country_code":"CY","type":"education","lineage":["https://openalex.org/I185852735","https://openalex.org/I4210108889"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Andriani Piki","raw_affiliation_strings":["School of Sciences, University of Central Lancashire \u2013 Cyprus Campus, Larnaca, Cyprus"],"affiliations":[{"raw_affiliation_string":"School of Sciences, University of Central Lancashire \u2013 Cyprus Campus, Larnaca, Cyprus","institution_ids":["https://openalex.org/I4210108889"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032212838"],"corresponding_institution_ids":["https://openalex.org/I59746437"],"apc_list":null,"apc_paid":null,"fwci":14.6131,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.98888384,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"32","issue":"4","first_page":"523","last_page":"541"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9327999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9327999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/self-efficacy","display_name":"Self-efficacy","score":0.6110402345657349},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4093196988105774},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3900042772293091},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.37600648403167725},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.34357720613479614},{"id":"https://openalex.org/keywords/medical-education","display_name":"Medical education","score":0.33709144592285156},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22746697068214417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.21886253356933594},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.11136680841445923},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.10910236835479736}],"concepts":[{"id":"https://openalex.org/C110131835","wikidata":"https://www.wikidata.org/wiki/Q1153659","display_name":"Self-efficacy","level":2,"score":0.6110402345657349},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4093196988105774},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3900042772293091},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.37600648403167725},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34357720613479614},{"id":"https://openalex.org/C509550671","wikidata":"https://www.wikidata.org/wiki/Q126945","display_name":"Medical education","level":1,"score":0.33709144592285156},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22746697068214417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.21886253356933594},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.11136680841445923},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.10910236835479736}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2024-0038","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-02-2024-0038","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1108/ics-02-2024-0038","is_oa":true,"landing_page_url":"https://doi.org/10.1108/ics-02-2024-0038","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2124074613","https://openalex.org/W2897451703","https://openalex.org/W2910239048","https://openalex.org/W2942154892","https://openalex.org/W2980688573","https://openalex.org/W3027643953","https://openalex.org/W3092984482","https://openalex.org/W3108349812","https://openalex.org/W3123473485","https://openalex.org/W4323543586","https://openalex.org/W4361284741","https://openalex.org/W4388049971","https://openalex.org/W4400410628"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2293471625","https://openalex.org/W2547249285","https://openalex.org/W2304228402","https://openalex.org/W2889071105","https://openalex.org/W4313485131","https://openalex.org/W2012644352","https://openalex.org/W2347520414","https://openalex.org/W1978032881"],"abstract_inverted_index":{"Purpose":[0],"The":[1,61,130,204,299],"accelerated":[2],"digital":[3],"transformation":[4],"and":[5,12,26,38,45,56,80,100,120,143,147,153,169,224,291,309,315,325,341,348,354],"the":[6,23,30,36,83,103,111,116,133,163,182,192,208,216,234,246,255,271,302],"growing":[7],"emphasis":[8],"on":[9,186],"privacy,":[10],"safety":[11],"security":[13],"present":[14,301],"ongoing":[15],"challenges":[16],"for":[17,136,277,359],"cybersecurity":[18,31,41,48,73,99,142,173,187,202,213,222,264,321],"experts.":[19],"Alongside":[20],"these":[21],"challenges,":[22],"multidisciplinary,":[24],"everchanging":[25],"complex":[27],"nature":[28],"of":[29,40,63,162,165,210,218,257,304,330],"domain":[32],"has":[33],"further":[34],"challenged":[35],"acquisition":[37],"retention":[39],"talent.":[42],"Empowering":[43],"reskilling":[44,314],"upskilling":[46,171,284,316],"in":[47,72,98,102,141,172,199,215,249,296,307,317,363],"necessitates":[49],"efficacious":[50],"educational":[51,343],"endeavours":[52],"which":[53],"promote":[54,77],"self-confidence":[55],"foster":[57,313],"a":[58,96,138,159,211,229,275,287,292,328,360],"growth":[59,294],"mindset.":[60],"purpose":[62],"this":[64],"paper":[65],"is":[66,174,179,226,244],"to":[67,91,108,126,190,231,270,312,352],"highlight":[68],"that":[69,124,150,195,266,345],"cultivating":[70,305],"self-efficacy":[71,166,196,238,260,306,334],"education":[74,311],"can":[75,151,197,267,335],"help":[76],"competency":[78],"development":[79],"effectively":[81,283],"address":[82],"prominent":[84],"skills":[85,112,117,123,358],"gaps.":[86],"This":[87,252],"notion":[88],"applies":[89],"equally":[90],"both":[92],"aspiring":[93],"individuals":[94],"pursuing":[95],"career":[97,362],"professionals":[101],"field":[104],"who":[105],"may":[106],"wish":[107],"better":[109],"articulate":[110],"they":[113,118],"already":[114],"possess,":[115],"lack":[119],"newly":[121],"surfacing":[122],"need":[125,135],"be":[127,268,336],"developed.":[128],"Design/methodology/approach":[129],"study":[131,178,206],"discusses":[132],"imminent":[134],"adopting":[137],"\u201cskills-first\u201d":[139],"approach":[140,243],"explores":[144],"innovative":[145,263,320],"pedagogies":[146],"professional":[148,188,293],"frameworks":[149],"inform":[152],"frame":[154],"such":[155],"an":[156],"approach.":[157],"Subsequently,":[158],"critical":[160],"analysis":[161],"importance":[164,256,303],"towards":[167],"motivating":[168],"supporting":[170],"performed.":[175],"A":[176,241],"case":[177,205],"presented,":[180],"expanding":[181],"authors\u2019":[183],"previous":[184],"work":[185,253],"development,":[189],"demonstrate":[191],"mediating":[193],"role":[194],"play":[198],"developing":[200],"core":[201],"competencies.":[203],"presents":[207],"design":[209],"new":[212,247],"curriculum":[214,236,322],"context":[217],"postgraduate,":[219],"synchronous":[220],"distance":[221],"education,":[223],"it":[225],"utilised":[227],"as":[228],"basis":[230],"discuss":[232],"how":[233,333],"proposed":[235],"cultivates":[237],"attitudes.":[239],"Findings":[240],"skills-first":[242],"becoming":[245],"norm":[248],"contemporary":[250],"workplaces.":[251],"highlights":[254],"actively":[258],"nurturing":[259],"attitudes":[261],"through":[262,338],"curricula":[265],"tailored":[269],"learners\u2019":[272],"needs,":[273],"instigating":[274],"drive":[276],"learning":[278,289],"and,":[279],"ultimately,":[280],"helping":[281],"learners":[282,331],"by":[285],"portraying":[286],"self-directed":[288],"path":[290],"mindset":[295],"cybersecurity.":[297,318,364],"Originality/value":[298],"authors":[300],"higher":[308],"lifelong":[310],"An":[319],"was":[323],"constructed":[324],"delivered":[326],"with":[327],"group":[329],"demonstrating":[332],"leveraged":[337],"interactive,":[339],"reflective":[340],"self-assessment":[342],"activities":[344],"enhanced":[346],"motivation":[347],"self-awareness,":[349],"curiosity,":[350],"attention":[351],"detail":[353],"resilience":[355],"\u2013":[356],"key":[357],"successful":[361]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
