{"id":"https://openalex.org/W4366825280","doi":"https://doi.org/10.1108/ics-09-2021-0145","title":"Design and evaluation of a self-paced cybersecurity tool","display_name":"Design and evaluation of a self-paced cybersecurity tool","publication_year":2023,"publication_date":"2023-04-24","ids":{"openalex":"https://openalex.org/W4366825280","doi":"https://doi.org/10.1108/ics-09-2021-0145"},"language":"en","primary_location":{"id":"doi:10.1108/ics-09-2021-0145","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-09-2021-0145","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031953054","display_name":"Alireza Shojaifar","orcid":null},"institutions":[{"id":"https://openalex.org/I2972652528","display_name":"FHNW University of Applied Sciences and Arts","ror":"https://ror.org/04mq2g308","country_code":"CH","type":"education","lineage":["https://openalex.org/I2972652528"]},{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]}],"countries":["CH","NL"],"is_corresponding":true,"raw_author_name":"Alireza Shojaifar","raw_affiliation_strings":["Institute for Interactive Technologies (IIT), University of Applied Sciences and Arts Northwestern Switzerland (FHNW), Windisch, Switzerland and Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Institute for Interactive Technologies (IIT), University of Applied Sciences and Arts Northwestern Switzerland (FHNW), Windisch, Switzerland and Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands","institution_ids":["https://openalex.org/I2972652528","https://openalex.org/I193662353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103800478","display_name":"Samuel A. Fricker","orcid":null},"institutions":[{"id":"https://openalex.org/I2972652528","display_name":"FHNW University of Applied Sciences and Arts","ror":"https://ror.org/04mq2g308","country_code":"CH","type":"education","lineage":["https://openalex.org/I2972652528"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Samuel A. Fricker","raw_affiliation_strings":["Institute for Interactive Technologies (IIT), University of Applied Sciences and Arts Northwestern Switzerland (FHNW), Windisch, Switzerland and cyberGEIGER GmbH, Freiburg i. Br., Germany"],"affiliations":[{"raw_affiliation_string":"Institute for Interactive Technologies (IIT), University of Applied Sciences and Arts Northwestern Switzerland (FHNW), Windisch, Switzerland and cyberGEIGER GmbH, Freiburg i. Br., Germany","institution_ids":["https://openalex.org/I2972652528"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031953054"],"corresponding_institution_ids":["https://openalex.org/I193662353","https://openalex.org/I2972652528"],"apc_list":null,"apc_paid":null,"fwci":4.1282,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.94372002,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"31","issue":"2","first_page":"244","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.7534058690071106},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.5661857724189758},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5152900218963623},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.5018885135650635},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.45142239332199097},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.43626832962036133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43478891253471375},{"id":"https://openalex.org/keywords/qualitative-property","display_name":"Qualitative property","score":0.4114006757736206},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.36045366525650024},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3594912886619568},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3304617404937744},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.22828146815299988}],"concepts":[{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.7534058690071106},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.5661857724189758},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5152900218963623},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.5018885135650635},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.45142239332199097},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.43626832962036133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43478891253471375},{"id":"https://openalex.org/C87156501","wikidata":"https://www.wikidata.org/wiki/Q7268708","display_name":"Qualitative property","level":2,"score":0.4114006757736206},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.36045366525650024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3594912886619568},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3304617404937744},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.22828146815299988},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-09-2021-0145","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-09-2021-0145","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W20106690","https://openalex.org/W46684033","https://openalex.org/W122607271","https://openalex.org/W1543266722","https://openalex.org/W1602619638","https://openalex.org/W1964009157","https://openalex.org/W1964721073","https://openalex.org/W1979290264","https://openalex.org/W1987463984","https://openalex.org/W1988071189","https://openalex.org/W1989210507","https://openalex.org/W2016324762","https://openalex.org/W2018110008","https://openalex.org/W2020989719","https://openalex.org/W2025043113","https://openalex.org/W2027082401","https://openalex.org/W2050401924","https://openalex.org/W2055847123","https://openalex.org/W2070775597","https://openalex.org/W2081436185","https://openalex.org/W2084628308","https://openalex.org/W2100797043","https://openalex.org/W2118376079","https://openalex.org/W2118717649","https://openalex.org/W2133824719","https://openalex.org/W2136922540","https://openalex.org/W2148277253","https://openalex.org/W2150659349","https://openalex.org/W2170899042","https://openalex.org/W2208756933","https://openalex.org/W2208973092","https://openalex.org/W2475201703","https://openalex.org/W2497179706","https://openalex.org/W2518516139","https://openalex.org/W2534257498","https://openalex.org/W2545284035","https://openalex.org/W2568632554","https://openalex.org/W2575939729","https://openalex.org/W2737451008","https://openalex.org/W2884960840","https://openalex.org/W2887498301","https://openalex.org/W2904907452","https://openalex.org/W2913271926","https://openalex.org/W2921545123","https://openalex.org/W2982346827","https://openalex.org/W2985776815","https://openalex.org/W3004029179","https://openalex.org/W3020919406","https://openalex.org/W3042970060","https://openalex.org/W3107568738","https://openalex.org/W3151685851","https://openalex.org/W4229001507","https://openalex.org/W4236219900"],"related_works":["https://openalex.org/W2013993249","https://openalex.org/W2802927003","https://openalex.org/W4252638921","https://openalex.org/W1995726786","https://openalex.org/W2978435296","https://openalex.org/W2529354072","https://openalex.org/W4206134169","https://openalex.org/W3153356960","https://openalex.org/W4281736225","https://openalex.org/W1999291729"],"abstract_inverted_index":{"Purpose":[0],"This":[1,66,97,179,195],"paper":[2],"aims":[3],"to":[4,74,82,175],"present":[5],"the":[6,17,42,53,141,153,198,207],"evaluation":[7],"of":[8,19,44,57,155,200,209],"a":[9,34,71,101,187],"self-paced":[10,188],"tool,":[11],"CyberSecurity":[12],"Coach":[13],"(CYSEC),":[14],"and":[15,27,55,86,104,114,168,171,173],"discuss":[16],"adoption":[18,143,154,208],"CYSEC":[20,77,89],"for":[21,36,46,60,217],"cybersecurity":[22,58,130,167,176,201],"capability":[23,87],"improvement":[24],"in":[25,62,80,92,94,193,203],"small-":[26],"medium-sized":[28],"enterprises":[29],"(SMEs).":[30],"Cybersecurity":[31],"is":[32,68,78],"increasingly":[33],"concern":[35],"SMEs.":[37,96,136,194],"Previous":[38],"literature":[39],"has":[40,190],"explored":[41],"role":[43],"tools":[45,59],"awareness":[47,84,162],"raising.":[48],"However,":[49],"few":[50],"studies":[51],"validated":[52],"effectiveness":[54],"usefulness":[56],"SMEs":[61,81,125,204],"real-world":[63],"practices.":[64],"Design/methodology/approach":[65],"study":[67,98,103,181,196,213],"built":[69],"on":[70],"qualitative":[72],"approach":[73],"investigating":[75],"how":[76,186],"used":[79,192],"support":[83],"raising":[85],"improvement.":[88],"was":[90],"placed":[91],"operation":[93],"12":[95],"first":[99],"conducted":[100],"survey":[102],"then":[105],"nine":[106],"structured":[107],"interviews":[108],"with":[109],"chief":[110,115],"executive":[111],"officers":[112,118],"(CEOs)":[113],"information":[116],"security":[117],"(CISO).":[119],"Findings":[120],"The":[121,137],"results":[122],"emphasise":[123],"that":[124,140],"are":[126,149],"heterogeneous.":[127],"Thus,":[128],"one":[129],"solution":[131],"may":[132],"not":[133],"suit":[134],"all":[135],"findings":[138],"specify":[139],"tool\u2019s":[142],"varied":[144],"quite":[145],"widely.":[146],"Four":[147],"factors":[148],"primary":[150],"determinants":[151],"influencing":[152],"CYSEC:":[156],"personalisation":[157],"features,":[158],"CEOs\u2019":[159,164],"or":[160,165],"CISOs\u2019":[161,166],"level,":[163],"IT":[169],"knowledge":[170],"skill":[172],"connection":[174],"expertise.":[177],"Originality/value":[178],"empirical":[180],"provides":[182],"new":[183],"insights":[184],"into":[185],"tool":[189],"been":[191],"advances":[197],"understanding":[199],"activities":[202],"by":[205],"studying":[206],"CYSEC.":[210],"Moreover,":[211],"this":[212],"proposes":[214],"significant":[215],"dimensions":[216],"future":[218],"research.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
