{"id":"https://openalex.org/W4396542942","doi":"https://doi.org/10.1109/ihtc58960.2023.10508824","title":"Enhancing Western Organizational Cybersecurity Resilience through Tailored Education for Non-Technical Employees","display_name":"Enhancing Western Organizational Cybersecurity Resilience through Tailored Education for Non-Technical Employees","publication_year":2023,"publication_date":"2023-11-01","ids":{"openalex":"https://openalex.org/W4396542942","doi":"https://doi.org/10.1109/ihtc58960.2023.10508824"},"language":"en","primary_location":{"id":"doi:10.1109/ihtc58960.2023.10508824","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ihtc58960.2023.10508824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Humanitarian Technology Conference (IHTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061800641","display_name":"Sina Keshvadi","orcid":"https://orcid.org/0000-0001-9491-7079"},"institutions":[{"id":"https://openalex.org/I160262251","display_name":"Thompson Rivers University","ror":"https://ror.org/01v9wj339","country_code":"CA","type":"education","lineage":["https://openalex.org/I160262251"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sina Keshvadi","raw_affiliation_strings":["Thompson Rivers University,Faculty of Science,Kamloops,Canada"],"affiliations":[{"raw_affiliation_string":"Thompson Rivers University,Faculty of Science,Kamloops,Canada","institution_ids":["https://openalex.org/I160262251"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5061800641"],"corresponding_institution_ids":["https://openalex.org/I160262251"],"apc_list":null,"apc_paid":null,"fwci":1.3767,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86919008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"800","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.8116754293441772},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6417451500892639},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5198802947998047},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.45212462544441223},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.44303205609321594},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3901885449886322}],"concepts":[{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.8116754293441772},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6417451500892639},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5198802947998047},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.45212462544441223},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.44303205609321594},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3901885449886322},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ihtc58960.2023.10508824","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ihtc58960.2023.10508824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Humanitarian Technology Conference (IHTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1899760619","https://openalex.org/W2001637908","https://openalex.org/W2728677437","https://openalex.org/W2975887878","https://openalex.org/W3125759795","https://openalex.org/W3151909024","https://openalex.org/W3182576883","https://openalex.org/W3214926740","https://openalex.org/W4214939176","https://openalex.org/W4252307542","https://openalex.org/W4289537443","https://openalex.org/W4299675875","https://openalex.org/W4308039003","https://openalex.org/W4385270014"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2284759612","https://openalex.org/W4402320089","https://openalex.org/W4378555281","https://openalex.org/W2953081822","https://openalex.org/W2752145644","https://openalex.org/W1887981150","https://openalex.org/W4229446828","https://openalex.org/W2016027324","https://openalex.org/W2884088167"],"abstract_inverted_index":{"In":[0],"the":[1,6,12,51,87,140,163,184,199],"rapidly":[2],"changing":[3],"digital":[4],"world,":[5],"rise":[7],"of":[8,37,75,92,107,139,148,162,166,174,181,186,202],"remote":[9],"work":[10],"and":[11,47,54,114,119],"shift":[13],"towards":[14],"cloud-based":[15],"infrastructures":[16],"have":[17],"made":[18],"organizations":[19,32,76],"more":[20],"vulnerable":[21],"to":[22,210],"cyber":[23,28],"attacks.":[24],"This":[25],"paper":[26],"examines":[27],"attacks":[29],"on":[30,101,144],"Western":[31,55],"through":[33],"an":[34,159],"in-depth":[35],"analysis":[36],"a":[38,68,99,128,145,171],"survey":[39],"involving":[40],"208":[41],"Senior":[42],"Cybersecurity":[43],"Leaders":[44],"from":[45],"public":[46],"private":[48],"sectors":[49],"in":[50,62,71,86,206],"USA,":[52],"Australia,":[53],"Europe.":[56],"The":[57,90],"survey,":[58],"conducted":[59],"by":[60],"census.io":[61],"Spring":[63],"2023,":[64],"reveals":[65],"that":[66],"despite":[67],"98%":[69],"increase":[70],"cybersecurity":[72,93,102,130,177,188,204,214],"budgets,":[73],"93%":[74,169],"experienced":[77],"at":[78],"least":[79],"one":[80],"successful":[81],"cyberattack":[82],"with":[83,104],"significant":[84],"impact":[85],"past":[88],"year.":[89],"lack":[91],"awareness":[94],"among":[95],"employees":[96,209],"has":[97,151],"placed":[98],"strain":[100],"teams,":[103],"over":[105],"85%":[106],"respondents":[108],"expressing":[109],"concerns":[110],"about":[111],"mental":[112],"health":[113],"physical":[115],"burnout":[116],"for":[117,134],"themselves":[118],"their":[120,175,192],"teams.":[121],"To":[122],"address":[123],"these":[124],"challenges,":[125],"we":[126],"propose":[127],"specialized":[129],"education":[131,189,205],"program":[132,143],"designed":[133],"non-technical":[135,149,208],"staff.Our":[136],"pilot":[137],"implementation":[138],"proposed":[141],"training":[142],"limited":[146],"group":[147],"volunteers":[150],"yielded":[152],"promising":[153],"results.":[154],"Among":[155],"participants,":[156],"83%":[157],"reported":[158],"improved":[160],"understanding":[161],"root":[164],"causes":[165],"cyberattacks,":[167],"while":[168],"demonstrated":[170],"better":[172],"grasp":[173],"organizations\u2019":[176],"policies.":[178],"Importantly,":[179],"100%":[180],"participants":[182],"endorsed":[183],"integration":[185],"this":[187],"component":[190],"into":[191],"organization\u2019s":[193],"security":[194],"training.":[195],"These":[196],"findings":[197],"highlight":[198],"potential":[200],"effectiveness":[201],"tailored":[203],"empowering":[207],"bolster":[211],"overall":[212],"organizational":[213],"resilience.":[215]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
